21st Century Cures Act: Interoperability, Information Blocking, and the ONC Health IT Certification Program, 25642-25961 [2020-07419]

Download as PDF 25642 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations DEPARTMENT OF HEALTH AND HUMAN SERVICES Office of the Secretary 45 CFR Parts 170 and 171 RIN 0955–AA01 21st Century Cures Act: Interoperability, Information Blocking, and the ONC Health IT Certification Program Office of the National Coordinator for Health Information Technology (ONC), Department of Health and Human Services (HHS). ACTION: Final rule. AGENCY: This final rule implements certain provisions of the 21st Century Cures Act, including Conditions and Maintenance of Certification requirements for health information technology (health IT) developers under the ONC Health IT Certification Program (Program), the voluntary certification of health IT for use by pediatric health care providers, and reasonable and necessary activities that do not constitute information blocking. The implementation of these provisions will advance interoperability and support the access, exchange, and use of electronic health information. The rule also finalizes certain modifications to the 2015 Edition health IT certification criteria and Program in additional ways to advance interoperability, enhance health IT certification, and reduce burden and costs. DATES: Effective date: This final rule is effective on June 30, 2020. Incorporation by reference: The incorporation by reference of certain publications listed in the rule was approved by the Director of the Federal Register as of June 30, 2020. Compliance date: Compliance with 45 CFR 170.401, 170.402(a)(1), and 45 CFR part 171 is required by November 2, 2020. FOR FURTHER INFORMATION CONTACT: Michael Lipinski, Office of Policy, Office of the National Coordinator for Health Information Technology, 202– 690–7151. SUPPLEMENTARY INFORMATION: SUMMARY: Table of Contents I. Executive Summary A. Purpose of Regulatory Action B. Summary of Major Provisions and Clarifications 1. Deregulatory Actions for Previous Rulemakings 2. Updates to the 2015 Edition Certification Criteria VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 a. Adoption of the United States Core Data for Interoperability (USCDI) as a Standard b. Electronic Prescribing c. Clinical Quality Measures—Report d. Electronic Health Information (EHI) Export e. Application Programming Interfaces f. Privacy and Security Transparency Attestations g. Security Tags and Consent Management 3. Modifications To the ONC Health IT Certification Program 4. Health IT for the Care Continuum 5. Conditions and Maintenance of Certification Requirements 6. Information Blocking C. Costs and Benefits II. Background A. Statutory Basis 1. Standards, Implementation Specifications, and Certification Criteria 2. Health IT Certification Program(s) B. Regulatory History C. General Comments on the Proposed Rule III. Deregulatory Actions for Previous Rulemakings A. Background 1. History of Burden Reduction and Regulatory Flexibility 2. Executive Orders 13771 and 13777 B. Deregulatory Actions 1. Removal of Randomized Surveillance Requirements 2. Removal of the 2014 Edition From the Code of Federal Regulations 3. Removal of the ONC-Approved Accreditor From the Program 4. Removal of Certain 2015 Edition Certification Criteria and Standards a. 2015 Edition Base EHR Definition Certification Criteria b. Drug-Formulary and Preferred Drug Lists c. Patient-Specific Education Resources d. Common Clinical Data Set Summary Record—Create; and Common Clinical Data Set Summary Record—Receive e. Secure Messaging 5. Removal of Certain ONC Health IT Certification Program Requirements a. Limitations Disclosures b. Transparency and Mandatory Disclosures Requirements 6. Recognition of Food and Drug Administration Processes a. FDA Software Precertification Pilot Program b. Development of Similar Independent Program Processes—Request for Information IV. Updates To the 2015 Edition Certification Criteria A. Standards and Implementation Specifications 1. National Technology Transfer and Advancement Act 2. Compliance With Adopted Standards and Implementation Specifications 3. ‘‘Reasonably Available’’ to Interested Parties B. Revised and New 2015 Edition Criteria 1. The United States Core Data for Interoperability Standard (USCDI) a. USCDI 2015 Edition Certification Criteria PO 00000 Frm 00002 Fmt 4701 Sfmt 4700 b. USCDI Standard—Data Classes Included c. USCDI Standard—Relationship to Content Exchange Standards and Implementation Specifications 2. Clinical Notes C-CDA Implementation Specification 3. Unique Device Identifier(s) for a Patient’s Implantable Device(s) C-CDA Implementation Specification 4. Electronic Prescribing Criterion a. Electronic Prescribing Standard and Certification Criterion b. Electronic Prescribing Transactions 5. Clinical Quality Measures—Report Criterion 6. Electronic Health Information (EHI) Export Criterion a. Single Patient Export To Support Patient Access b. Patient Population Export to Support Transitions Between Health IT Systems c. Scope of Data Export d. Export Format e. Initial Step Towards Real-Time Access f. Timeframes g. 2015 Edition ‘‘Data Export’’ Criterion in § 170.315(b)(6) 7. Standardized API for Patient and Population Services Criterion 8. Privacy and Security Transparency Attestations Criteria a. Encrypt Authentication Credentials b. Multi-Factor Authentication 9. Security Tags and Consent Management Criteria a. Implementation With the Consolidated CDA Release 2.1 b. Implementation With the Fast Healthcare Interoperability Resources (FHIRr) Standard 10. Auditable Events and TamperResistance, Audit Reports, and Auditing Actions on Health Information C. Unchanged 2015 Edition Criteria— Promoting Interoperability Programs Reference Alignment V. Modifications To the ONC Health IT Certification Program A. Corrections 1. Auditable Events and Tamper Resistance 2. Amendments 3. View, Download, and Transmit to 3rd Party 4. Integrating Revised and New Certification Criteria Into the 2015 Edition Privacy and Security Certification Framework B. Principles of Proper Conduct for ONCACBs 1. Records Retention 2. Conformance Methods for Certification Criteria 3. ONC-ACBs To Accept Test Results From Any ONC-ATL in Good Standing 4. Mandatory Disclosures and Certifications C. Principles of Proper Conduct for ONCATLs—Records Retention VI. Health IT for the Care Continuum A. Health IT for Pediatric Setting 1. Background and Stakeholder Convening 2. Recommendations for the Voluntary Certification of Health IT for Use in Pediatric Care a. 2015 Edition Certification Criteria b. New or Revised Certification Criteria E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations B. Health IT and Opioid Use Disorder Prevention and Treatment—Request for Information VII. Conditions and Maintenance of Certification Requirements for Health IT Developers A. Implementation B. Provisions 1. Information Blocking 2. Assurances a. Full Compliance and Unrestricted Implementation of Certification Criteria Capabilities b. Certification to the ‘‘Electronic Health Information Export’’ Criterion c. Records and Information Retention d. Trusted Exchange Framework and the Common Agreement—Request for Information 3. Communications a. Background and Purpose b. Condition of Certification Requirements c. Maintenance of Certification Requirements 4. Application Programming Interfaces a. Statutory Interpretation and API Policy Principles b. API Standards and Implementation Specifications c. Standardized API for Patient and Population Services d. API Condition of Certification Requirements e. API Maintenance of Certification Requirements 5. Real World Testing a. Unit of Analysis at which Testing Requirements Apply b. Applicability of Real World Testing Condition and Maintenance of Certification Requirements c. Testing Plans, Methods, and Results Reporting d. Submission Dates e. Real World Testing Pilot Year f. Health IT Modules Certified But Not Yet Deployed g. Standards Version Advancement Process (SVAP) h. Updating Already Certified Health IT Leveraging SVAP Flexibility i. Health IT Modules Presented for Certification Leveraging SVAP Flexibility j. Requirements Associated With All Health IT Modules Certified Leveraging SVAP Flexibility k. Advanced Version Approval for SVAP l. Real World Testing Principles of Proper Conduct for ONC-ACBs m. Health IT Module Certification & Certification to Newer Versions of Certain Standards 6. Attestations 7. EHR Reporting Criteria Submission C. Compliance D. Enforcement 1. ONC Direct Review of the Conditions and Maintenance of Certification Requirements 2. Review and Enforcement Only by ONC 3. Review Processes a. Initiating Review and Health IT Developer Notice b. Relationship With ONC-ACBs and ONCATLs VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 c. Records Access d. Corrective Action e. Certification Ban and Termination f. Appeal g. Suspension h. Proposed Termination 4. Public Listing of Certification Ban and Terminations 5. Effect on Existing Program Requirements and Processes 6. Coordination With the Office of Inspector General 7. Applicability of Conditions and Maintenance of Certification Requirements for Self-Developers VIII. Information Blocking A. Statutory Basis B. Legislative Background and Policy Considerations 1. Purpose of the Information Blocking Provision 2. Policy Considerations and Approach to Information Blocking 3. General Comments Regarding Information Blocking Exceptions C. Relevant Statutory Terms and Provisions 1. ‘‘Required by Law’’ 2. Health Care Providers, Health IT Developers, Exchanges, and Networks a. Health Care Providers b. Health IT Developers of Certified Health IT c. Health Information Networks and Health Information Exchanges 3. Electronic Health Information 4. Price Information—Request for Information 5. Interests Promoted by the Information Blocking Provision a. Access, Exchange, and Use of EHI b. Interoperability Elements 6. Practices That May Implicate the Information Blocking Provision a. Prevention, Material Discouragement, and Other Interference b. Likelihood of Interference c. Examples of Practices Likely to Interfere With Access, Exchange, or Use of EHI 7. Applicability of Exceptions a. Reasonable and Necessary Activities b. Treatment of Different Types of Actors c. Establishing That Activities and Practices Meet the Conditions of an Exception D. Exceptions to the Information Blocking Definition 1. Exceptions That Involve not Fulfilling Requests To Access, Exchange, or Use EHI a. Preventing Harm Exception—When will an actor’s practice that is likely to interfere with the access, exchange, or use of EHI in order to prevent harm not be considered information blocking? b. Privacy Exception—When will an actor’s practice of not fulfilling a request to access, exchange, or use EHI in order to protect an individual’s privacy not be considered information blocking? c. Security Exception—When will an actor’s practice that is likely to interfere with the access, exchange, or use of EHI in order to protect the security of EHI not be considered information blocking? d. Infeasibility Exception—When will an actor’s practice of not fulfilling a request PO 00000 Frm 00003 Fmt 4701 Sfmt 4700 25643 to access, exchange, or use EHI due to the infeasibility of the request not be considered information blocking? e. Health IT Performance Exception— When will an actor’s practice that is implemented to maintain or improve health IT performance and that is likely to interfere with the access, exchange, or use of EHI not be considered information blocking? 2. Exceptions That Involve Procedures for Fulfilling Requests To Access, Exchange, or Use EHI a. Content and Manner Exception—When will an actor’s practice of limiting the content of its response to or the manner in which it fulfills a request to access, exchange, or use EHI not be considered information blocking? b. Fees Exception—When will an actor’s practice of charging fees for accessing, exchanging, or using EHI not be considered information blocking? c. Licensing Exception—When will an actor’s practice to license interoperability elements in order for EHI to be accessed, exchanged, or used not be considered information blocking? E. Additional Exceptions—Request for Information 1. Exception for Complying With Common Agreement for Trusted Exchange 2. New Exceptions F. Complaint Process G. Disincentives for Health Care Providers—Request for Information IX. Registries Request for Information X. Patient Matching Request for Information XI. Incorporation by Reference XII. Collection of Information Requirements A. ONC–ACBs B. Health IT Developers XIII. Regulatory Impact Analysis A. Statement of Need B. Alternatives Considered C. Overall Impact 1. Executive Orders 12866 and 13563— Regulatory Planning and Review Analysis 2. Executive Order 13771—Reducing Regulation and Controlling Regulatory Costs a. Costs and Benefits b. Accounting Statement and Table 3. Regulatory Flexibility Act 4. Executive Order 13132—Federalism 5. Unfunded Mandates Reform Act of 1995 Regulation Text I. Executive Summary A. Purpose of Regulatory Action ONC is responsible for the implementation of key provisions in Title IV of the 21st Century Cures Act (Cures Act) that are designed to advance interoperability; support the access, exchange, and use of electronic health information (EHI); and address occurrences of information blocking. This final rule implements certain provisions of the Cures Act, including Conditions and Maintenance of Certification requirements for health information technology (health IT) E:\FR\FM\01MYR3.SGM 01MYR3 25644 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations developers, the voluntary certification of health IT for use by pediatric health providers, and reasonable and necessary activities that do not constitute information blocking. The final rule also implements parts of section 4006(a) of the Cures Act to support patients’ access to their EHI in a form convenient for patients, such as making a patient’s EHI more electronically accessible through the adoption of standards and certification criteria and the implementation of information blocking policies that support patient electronic access to their health information at no cost. Additionally, the final rule modifies the 2015 Edition health IT certification criteria and ONC Health IT Certification Program (Program) in other ways to advance interoperability, enhance health IT certification, and reduce burden and costs. In addition to fulfilling the Cures Act’s requirements, the final rule contributes to fulfilling Executive Order (E.O.) 13813. The President issued E.O. 13813 on October 12, 2017, to promote health care choice and competition across the United States. Section 1(c) of the E.O., in relevant part, states that government rules affecting the United States health care system should reinject competition into health care markets by lowering barriers to entry and preventing abuses of market power. Section 1(c) also states that government rules should improve access to and the quality of information that Americans need to make informed health care decisions. For example, as mentioned above, the final rule establishes application programming interface (API) requirements, including for patients’ access to their health information without special effort. The API approach also supports health care providers’ independence to choose the ‘‘provider-facing’’ third-party services they want to use to interact with the certified API technology they have acquired. In addition, the final rule provides the Secretary of Health and Human Services’ (Secretary) interpretation of the information blocking definition as established in the Cures Act and the application of the information blocking provision by identifying reasonable and necessary activities that would not constitute information blocking. Many of these activities focus on improving patient and health care provider access to EHI and promoting competition. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 B. Summary of Major Provisions and Clarifications 1. Deregulatory Actions for Previous Rulemakings Since the inception of the Program, we have aimed to implement and administer the Program in the least burdensome manner that supports our policy goals. Throughout the years, we have worked to improve the Program with a focus on ways to reduce burden, offer flexibility to both developers and providers, and support innovation. This approach has been consistent with the principles of E.O. 13563 on Improving Regulation and Regulatory Review (February 2, 2011), which instructs agencies to ‘‘periodically review its existing significant regulations and determine whether any such regulations should be modified, streamlined, expanded, or repealed so as to make the agency’s regulatory program more effective or less burdensome in achieving the regulatory objectives.’’ To that end, we have historically, where feasible and appropriate, taken measures to reduce burden within the Program and make the Program more effective, flexible, and streamlined. We reviewed and evaluated existing regulations and identified ways to administratively reduce burden and implement deregulatory actions through guidance. In this final rule, we have finalized new deregulatory actions that will reduce burden for health IT developers, providers, and other stakeholders. We have finalized five deregulatory actions in section III.B: (1) Removal of a requirement to conduct randomized surveillance on a set percentage of certified products, allowing ONC-Authorized Certification Bodies (ONC–ACBs) more flexibility to identify the right approach for surveillance actions; (2) removal of the 2014 Edition from the Code of Federal Regulations (CFR); (3) removal of the ONC-Approved Accreditor (ONC–AA) from the Program; (4) removal of certain 2015 Edition certification criteria; and (5) removal of certain Program requirements. We have not finalized a sixth deregulatory action we proposed, related to recognition of the Food and Drug Administration (FDA) Software Precertification Program, as comments and the early stage of development of the FDA program indicate finalization would be premature at this time. 2. Updates to the 2015 Edition Certification Criteria This final rule updates the 2015 Edition to remove several certification criteria. It also updates some certification criteria to reflect standard PO 00000 Frm 00004 Fmt 4701 Sfmt 4700 and implementation specification updates. In consideration of public comments, the final rule adds only two new technical certification criteria and two new attestation-structured privacy and security certification criteria. a. Adoption of the United States Core Data for Interoperability (USCDI) as a Standard We noted in the Proposed Rule that, as part of continued efforts to ensure the availability of a minimum baseline of data classes that could be commonly available for interoperable exchange, ONC adopted the 2015 Edition ‘‘Common Clinical Data Set’’ (CCDS) definition and used the CCDS shorthand in several certification criteria. However, the CCDS definition also began to be used colloquially for many different purposes. As the CCDS definition’s relevance grew outside of its regulatory context, it was often viewed as a ceiling to the industry’s collective data set for access, exchange, and use. In addition, we noted in the NPRM that as we continue to move toward valuebased care, the inclusion of additional data classes beyond the CCDS would be necessary. In order to advance interoperability, we proposed to remove the CCDS definition and its references from the 2015 Edition and replace it with the ‘‘United States Core Data for Interoperability 1’’ (USCDI). We proposed to adopt the USCDI as a standard, naming USCDI Version 1 (USCDI v1) in § 170.213 and incorporating it by reference in § 170.299. The USCDI standard would establish a set of data classes and constituent data elements required to support interoperability nationwide. To achieve the goals set forth in the Cures Act, we indicated that we intended to establish and follow a predictable, transparent, and collaborative process to expand the USCDI, including providing stakeholders with the opportunity to comment on the USCDI’s expansion. We also noted that once the USCDI is adopted by the Secretary in regulation, health IT developers would be allowed to take advantage of a new proposed flexibility we called the ‘‘Standards Version Advancement Process’’ (SVAP) (see 84 FR 7497 through 7500, see also section VII.B.5 of this final rule). In order to advance interoperability, we have finalized the adoption of the USCDI standard. Because the USCDI is adopted as a standard and the SVAP is finalized, the SVAP will allow a developer to voluntarily have their products certified to newer, National Coordinator approved versions of the 1 https://www.healthit.gov/uscdi. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations USCDI in the future without waiting for rulemaking to update the version of the USCDI listed in the regulations. b. Electronic Prescribing We have finalized an update to the electronic prescribing National Council for Prescription Drug Programs (NCPDP) SCRIPT standard in 45 CFR 170.205(b) from NCPDP SCRIPT standard version 10.6 to NCPDP SCRIPT standard version 2017071 for the electronic prescribing certification criterion (§ 170.315(b)(3)). ONC and the Centers for Medicare & Medicaid Services (CMS) have historically maintained aligned e-Rx and medication history (MH) standards to ensure that the current standard for certification to the electronic prescribing criterion supports use of the current Part D e-Rx and MH standards. This helps advance alignment with CMS’ program standards. In a final rule published April 16, 2018, CMS finalized its update of its Part D standards to NCPDP SCRIPT standard version 2017071 for e-Rx and MH, effective January 1, 2020 (83 FR 16440). In addition to continuing to reference the transactions previously included in § 170.315(b)(3), and in keeping with CMS’ final rule, we have adopted all of the additional NCPDP SCRIPT standard version 2017071 transactions that CMS adopted in 42 CFR 423.160(b)(2)(iv). Furthermore, we have adopted the same electronic Prior Authorization (ePA) request and response transactions supported by NCPDP SCRIPT standard 2017071 proposed by CMS in the Medicare Program; Secure Electronic Prior Authorization for Medicare Part D proposed rule (84 FR 28450). Some adopted transactions are required to demonstrate conformance to the updated § 170.315(b)(3) criterion, while other transactions are optional. c. Clinical Quality Measures—Report In this final rule, we have removed the Health Level 7 (HL7®) Quality Reporting Document Architecture (QRDA) standard requirements in the 2015 Edition ‘‘Clinical Quality Measures—report’’ criterion in § 170.315(c)(3) and, in their place, required Health IT Modules to support the CMS QRDA Implementation Guide (IGs).2 This will help reduce the burden for health IT developers and remove certification requirements that do not support quality reporting for CMS programs. 2 https://ecqi.healthit.gov/qrda-quality-reportingdocument-architecture. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 d. Electronic Health Information (EHI) Export We proposed to adopt a new 2015 Edition certification criterion, referred to as ‘‘EHI export’’ in § 170.315(b)(10) in the Proposed Rule. The criterion’s proposed conformance requirements were intended to provide a means to export the entire EHI a certified health IT product produced and electronically managed to support two contexts: (1) Single patient EHI export and (2) for patient EHI export when a health care provider is switching health IT systems. The proposals did not require the exported data to be in a specific standardized format. Rather, we proposed to require that such an export be in a computable, electronic format made available via a publicly accessible hyperlink. We noted that this transparency would facilitate the subsequent interpretation and use of the exported information. We have finalized the criterion with modifications in response to public comment. We have refined the scope of data a Health IT Module certified to § 170.315(b)(10) must export, and aligned the criterion to the definition of EHI we finalized in § 170.102 and § 171.102. The finalized criterion requires a certified Health IT Module to electronically export all of the EHI, as defined in § 171.102, that can be stored at the time of certification by the product, of which the Health IT Module is a part. We finalized the 2015 Edition Cures Update ‘‘EHI export’’ criterion in § 170.315(b)(10) but did not finalize its inclusion in the 2015 Edition Base Electronic Health Record (EHR) definition, as proposed. Our intention with this criterion, in combination with other criteria set forth in this final rule, is to advance the interoperability of health IT as defined in section 4003 the Cures Act, including the ‘‘complete access, exchange, and use of all electronically accessible health information.’’ e. Application Programming Interfaces (APIs) We have adopted a new API certification criterion in § 170.315(g)(10) to replace the ‘‘application access—data category request’’ certification criterion (§ 170.315(g)(8)), and added it to the updated 2015 Edition Base EHR definition. This new ‘‘standardized API for patient and population services’’ certification criterion focuses on supporting two types of API-enabled services: (1) Services for which a single patient’s data is the focus and (2) services for which multiple patients’ PO 00000 Frm 00005 Fmt 4701 Sfmt 4700 25645 data are the focus. The API certification criterion requires the use of the Health Level 7 (HL7®) Fast Healthcare Interoperability Resources (FHIR®) standard Release 4 and references several standards and implementation specifications adopted in § 170.213 and § 170.215 to support standardization and interoperability. This certification criterion will align industry efforts around FHIR Release 4 and advance interoperability of API-enabled ‘‘read’’ services for single and multiple patients. f. Privacy and Security Transparency Attestations We have adopted two new privacy and security certification criteria requiring transparency attestations from developers of certified health IT as part of the updated 2015 Edition privacy and security certification framework. The attestations will serve to identify whether or not certified health IT supports encrypting authentication credentials and/or multi-factor authentication (MFA). While these criteria provide increased transparency, they do not require new development or implementation to take place. As part of ONC’s ongoing commitment to advance transparency about certified health IT products, ONC will list the developers’ attestation responses on the Certified Health IT Product List (CHPL). g. Security Tags and Consent Management In the 2015 Edition final rule (80 FR 62646, Oct. 16, 2015), we adopted two ‘‘data segmentation for privacy’’ (DS4P) certification criteria, one for creating a summary record according to the DS4P standard (§ 170.315(b)(7)) and one for receiving a summary record according to the DS4P standard (§ 170.315(b)(8)). Certification to these 2015 Edition DS4P criteria only required security tagging of Consolidated-Clinical Document Architecture (C–CDA) documents at the document level. As noted in the 2015 Edition final rule (80 FR 62646), certification to these criteria is not linked to meeting the Certified EHR Technology definition (CEHRT) used in CMS programs. Since the 2015 Edition final rule, the health care industry has engaged in additional field testing and implementation of the DS4P standard. Stakeholders also shared with ONC— through public forums, listening sessions, and correspondence—that only tagging C–CDA documents at the document level did not permit providers the flexibility to address more complex use cases for representing patient privacy preferences. Based on public comment, in this final rule, we E:\FR\FM\01MYR3.SGM 01MYR3 25646 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations have changed the names of the two current 2015 Edition DS4P criteria to Security tags—Summary of Care (send) and Security tags—Summary of Care (receive). We also updated the requirements for these criteria to support security tagging at the document, section, and entry levels. This change better reflects the purpose of these criteria and enables adopters to support a more granular approach to security tagging clinical documents for exchange. In finalizing this more granular approach for security tagging Consolidated Clinical Document Architecture (C–CDA) documents, we note that we do not specify rules or requirements for the disposition of tagged data or any requirements on health care providers related to data segmentation for privacy. The use cases for which health IT certified to these criteria might be implemented would be driven by other applicable Federal, State, local, or tribal law and are outside the scope of the certification criteria. We recognize that the tagging of documents is not a fully automated segmentation of the record but rather a first, technological step or tool to support health IT developers implementing technology solutions for health care providers to replace burdensome manual processes for tagging sensitive information. We also proposed to adopt a new 2015 Edition certification criterion, ‘‘consent management for APIs’’ in § 170.315(g)(11), to support data segmentation and consent management through an API in accordance with the Consent Implementation Guide (IG). However, in response to comments, we have chosen not to finalize our proposal for this criterion at this time. 3. Modifications to the ONC Health IT Certification Program In this final rule, we have finalized corrections to the 2015 Edition privacy and security certification framework (80 FR 62705) and relevant regulatory provisions. We also have finalized corrections to the relevant current Certification Companion Guides (CCGs). We have adopted new and revised Principles of Proper Conduct (PoPC) for ONC–ACBs. We have finalized clarification that the records retention provision includes the ‘‘life of the edition’’ as well as three years after the retirement of an edition related to the certification of Complete EHRs and Health IT Modules. We also have finalized revisions to the PoPC in § 170.523(h) to clarify the basis for certification, including to permit a certification decision to be based on an VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 evaluation conducted by the ONC–ACB for Health IT Modules’ compliance with certification criteria by use of conformity methods approved by the National Coordinator for Health Information Technology (National Coordinator). We also have finalized the addition of § 170.523(r) to require ONC– ACBs to accept test results from any ONC-Authorized Testing Laboratory (ONC–ATL) in good standing under the Program and compliant with the ISO/ IEC 17025 accreditation requirements consistent with the requirements set forth in §§ 170.520(b)(3) and 170.524(a). We believe these new and revised PoPC provide necessary clarifications for ONC–ACBs and promote stability among the ONC–ACBs. We also have finalized the update of § 170.523(k) to broaden the requirements beyond just the Medicare and Medicaid EHR Incentive Programs (now renamed the Promoting Interoperability (PI) Programs and referenced as such hereafter) and provided other necessary clarifications. We have finalized a revised PoPC for ONC–ATLs. The finalized revision clarifies that the records retention provision includes the ‘‘life of the edition’’ as well as three years after the retirement of an edition related to the certification of Complete EHRs and Health IT Modules. 4. Health IT for the Care Continuum Section 4001(b) of the Cures Act includes two provisions related to supporting health IT across the care continuum. The first instructs the National Coordinator to encourage, keep, or recognize through existing authorities the voluntary certification of health IT for use in medical specialties and sites of service where more technological advancement or integration is needed. The second outlines a provision related to the voluntary certification of health IT for use by pediatric health providers to support the health care of children. These provisions align closely with our core purpose to promote interoperability and to support care coordination, patient engagement, and health care quality improvement initiatives. Advancing health IT that promotes and supports patient care when and where it is needed continues to be a primary goal of the Program. This means health IT should support patient populations, specialized care, transitions of care, and practice settings across the care continuum. We have explored how we might work with the health IT industry and with specialty organizations to collaboratively develop and promote health IT that supports medical PO 00000 Frm 00006 Fmt 4701 Sfmt 4700 specialties and sites of service. Over time, we have taken steps to make the Program modular, more open and accessible to different types of health IT, and better able to advance functionality that is generally applicable to a variety of care and practice settings. We considered a wide range of factors specific to the provisions in the Cures Act to support providers of health care for children. These include: The evolution of health IT across the care continuum, the costs and benefits associated with health IT, the potential regulatory burden and compliance timelines, and the need to help advance health IT that benefits multiple medical specialties and sites of service involved in the care of children. In consideration of these factors, and to advance implementation of section 4001(b) of the Cures Act specific to pediatric care, we held a listening session where stakeholders could share their clinical knowledge and technical expertise in pediatric care and pediatric sites of service. Through the information learned at this listening session and our analysis of the health IT landscape for pediatric settings, we identified existing 2015 Edition criteria, as well as new or revised 2015 Edition criteria proposed in the Proposed Rule, that could benefit providers of pediatric care and pediatric settings. In this final rule, we have identified the already existing 2015 Edition certification criteria and the new or revised 2015 Edition criteria adopted in this final rule that support the voluntary certification of health IT for pediatric care and pediatric settings. We also elaborate on our next steps to support pediatric care and pediatric settings through the development, adoption, certification, and use of health IT, including the continued support of a pediatrics health IT web page on www.healthit.gov/pediatrics and the future development of informational resources. We also recognize the significance of the opioid epidemic confronting our nation and the importance of helping to support the health IT needs of health care providers committed to preventing inappropriate access to prescription opioids and to providing safe, appropriate treatment. Therefore, we requested public comment on how our existing Program requirements and the proposals in the Proposed Rule may support use cases related to Opioid Use Disorder (OUD) prevention and treatment and if there were additional areas that we should consider for effective implementation of health IT to help address OUD prevention and treatment. We received over 100 E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations comments in responses to this RFI, which we are actively reviewing. 5. Conditions and Maintenance of Certification Requirements We have established in this final rule, certain Conditions and Maintenance of Certification requirements for health IT developers based on the Conditions and Maintenance of Certification requirements outlined in section 4002 of the Cures Act. The Program’s Conditions and Maintenance of Certification requirements express initial requirements for health IT developers and their certified Health IT Module(s) as well as ongoing requirements that must be met by both health IT developers and their certified Health IT Module(s) under the Program. In this regard, we have implemented the Cures Act Conditions of Certification requirements with further specificity as it applies to the Program and implemented any accompanying Maintenance of Certification requirements as standalone requirements to ensure that the Conditions of Certification requirements are not only met but continually being met through the Maintenance of Certification requirements. In this rule, we capitalize ‘‘Conditions of Certification’’ and ‘‘Maintenance of Certification’’ when referring to Conditions and Maintenance of Certification requirements established for the Program under section 4002 of the Cures Act for ease of reference and to distinguish from other conditions. Information Blocking Section 4002 of the Cures Act requires that a health IT developer, as a Condition and Maintenance of Certification requirement under the Program, not take any action that constitutes information blocking as defined in section 3022(a) of the Public Health Service Act (PHSA). We have adopted the information blocking Condition of Certification requirement in § 170.401 as proposed. As finalized, the Condition of Certification requirement prohibits any health IT developer under the Program from taking any action that constitutes information blocking as defined by section 3022(a) of the PHSA. We have also finalized that definition in § 171.103. Assurances Section 4002 of the Cures Act also requires that a health IT developer, as a Condition of Certification requirement under the Program, provide assurances to the Secretary that, unless for legitimate purpose(s) as specified by the VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 Secretary, the developer will not take any action that constitutes information blocking as defined in section 3022(a) of the PHSA or any other action that may inhibit the appropriate exchange, access, and use of EHI. We have finalized our proposed implementation of this provision through several Conditions of Certification and accompanying Maintenance of Certification requirements, which are set forth in § 170.402. We have also adopted more specific Conditions and Maintenance of Certification requirements, which are also set forth in § 170.402, for certified health IT developers to provide assurances to the Secretary that it does not take any other action that may inhibit the appropriate exchange, access, and use of EHI. These requirements serve to provide further clarity under the Program as to how health IT developers must meet our requirements as promulgated under the Cures Act. Communications The Cures Act also requires as a Condition and Maintenance of Certification requirement under the Program that health IT developers do not prohibit or restrict communications about certain aspects of the performance of health IT and the developers’ related business practices. We have finalized (in § 170.403) provisions that permit developers to impose certain types of limited prohibitions and restrictions that strike a balance between the need to promote open communication about health IT, and related developer business practices, with the need to protect the legitimate business interests of health IT developers and others. The provisions identify certain narrowlydefined types of communications, such as communications required by law, made to a government agency, or made to a defined category of safety organization, which will receive ‘‘unqualified protection’’ under our Program. Under this policy, developers will be prohibited from imposing any prohibitions or restrictions on such protected communications. Based on public comment received, we have also finalized provisions that allow health IT developers certified under the Program to place limitations on certain types of communications, including screenshots and video. We have adopted Maintenance of Certification requirements proposed in § 170.403(b) with modifications. A health IT developer must not impose or enforce any contractual requirement that contravenes the requirements of this Condition of Certification. Furthermore, if a health IT developer PO 00000 Frm 00007 Fmt 4701 Sfmt 4700 25647 has contracts/agreements in existence that contravene the requirements of this Condition of Certification, the developer must notify all affected customers, other persons, or entities that the prohibition or restriction within the contract/ agreement will not be enforced by the health IT developer. In response to comments, we have finalized in § 170.403(b)(2)(ii) that health IT developers are required to amend their contracts/agreements to remove or make void such provisions only when the contracts/agreements are next modified for other purposes and not within the proposed period of time from the effective date of this final rule. Application Programming Interfaces (APIs) As a Condition of Certification requirement in section 4002 of the Cures Act requires health IT developers to publish APIs that allow ‘‘health information from such technology to be accessed, exchanged, and used without special effort through the use of APIs or successor technology or standards, as provided for under applicable law.’’ The Cures Act’s API Condition of Certification requirement also states that a developer must, through an API, ‘‘provide access to all data elements of a patient’s electronic health record to the extent permissible under applicable privacy laws.’’ The Cures Act’s API Condition of Certification requirement in section 4002 includes several key phrases and requirements for health IT developers that go beyond the technical functionality of the Health IT Modules they present for certification. This final rule captures both the technical functionality and behaviors necessary to implement the Cures Act API Condition of Certification requirement. Specifically, we have adopted new standards, new implementation specifications, a new certification criterion, and have modified the Base EHR definition. In addition, we have finalized detailed Condition and Maintenance of Certification requirements for health IT developers. Real World Testing The Cures Act also added a new Condition and Maintenance of Certification requirement that health IT developers must successfully test the real world use of health IT for interoperability in the type(s) of setting(s) in which such technology would be marketed. This provision is critical to advancing transparency regarding Health IT Modules’ performance and to users having information that could be crucial to E:\FR\FM\01MYR3.SGM 01MYR3 25648 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations their decisions to acquire certified health IT. As discussed in section VII.B.5 of this final rule, we have established in § 170.405 real world testing Condition and Maintenance of Certification requirements that include Maintenance of Certification requirements to update Health IT Modules certified to certain certification criteria (see § 170.405(b)(3) through (7) and section IV.B of this final rule preamble) to ensure this certified technology meets its users’ needs for widespread and continued interoperability. As finalized, real world testing Condition and Maintenance of Certification requirements apply to health IT developers with one or more Health IT Module(s) certified to specific certification criteria focused on interoperability and data exchange that are listed in § 170.405(a), as discussed in section VII.B.5 of this final rule. Under these Condition and Maintenance of Certification requirements, health IT developers must submit publicly available annual real world testing plans as well as annual real world testing results for health IT certified to the criteria identified in § 170.405(a). We have also finalized a flexibility that we have named the Standards Version Advancement Process (SVAP). Under this flexibility, health IT developers will have the option to update their health IT that is certified to the criteria identified in § 170.405(a) to use more advanced version(s) of the adopted standard(s) or implementation specification(s) included in the criteria, provided such versions are approved by the National Coordinator for use in health IT certified under the Program. Similarly, we have finalized our proposal (84 FR 7497 through 7500) that health IT developers presenting health IT for initial certification to one of the criteria listed in § 170.405(a) would have the option to certify to National Coordinator-approved newer version(s) of one or more of the Secretary-adopted standards or implementation specifications applicable to the criterion. All health IT developers voluntarily opting to avail themselves of the SVAP flexibility must ensure that their annual real world testing plans and real world testing results submissions address all the versions of all the standards and implementation specifications to which each Health IT Module is certified. In addition, we have finalized in § 170.405(b)(8)(i) the requirement that health IT developers with existing certifications to criteria listed in § 170.405(a) who wish to avail themselves of the SVAP flexibility must notify both their ONC–ACB and their VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 affected customers of their plans to update their certified health IT, and the update’s anticipated impact on their existing certified health IT and customers, specifically including but not limited to whether, and if so for how long, the health IT developer intends to continue supporting the prior version(s) 3 of the standard(s) to which the Health IT Module has already been certified, in addition to the National Coordinator-approved newer version(s) included in a planned update. We have finalized our proposal (84 FR 7501) to establish in § 170.523(p) a new PoPC for ONC–ACBs that requires ONC–ACBs to review and confirm that each health IT developer with one or more Health IT Module(s) certified to any one or more of the criteria listed in § 170.405(a) submits real world testing plans and real world results on a timeframe that allows for the ONC–ACB to confirm completeness of all plans and results by applicable annual due dates. The specific annual due dates finalized in § 170.523(p) differ from those proposed as, and for the reasons, discussed in section VII.B.5 of this final rule preamble. Once completeness is confirmed, ONC–ACBs must make the plans available to ONC and the public via the Certified Health IT Product List (CHPL).4 We have also finalized, with clarifying revisions, the PoPC proposed in § 170.523(m) to require ONC–ACBs to aggregate and report to ONC no less than quarterly all updates successfully made to support National Coordinatorapproved newer versions of Secretaryadopted standards in certified health IT pursuant to the developers having voluntarily opted to avail themselves of the SVAP flexibility. We also finalize in § 170.523(t) the new PoPC for ONC– ACBs that requires them to ensure that developers seeking to take advantage of the SVAP flexibility provide the advance notice required in § 170.405(b)(8) to all affected customers and its ONC–ACB, and comply with all other applicable requirements. Attestations Section 4002(a) of the Cures Act requires that a health IT developer, as 3 In the near term, many of these prior versions are likely to be the same versions adopted by the Secretary and incorporated by reference in subpart B of 45 CFR part 170. Over time, however, we anticipate increasing frequency of prior versions certified including National Coordinator-approved newer versions of these Secretary-adopted standards. 4 Although real world testing plans and results will not be immediately available upon publication of this final rule, an overview of the CHPL is available at https://chpl.healthit.gov/#/resources/ overview (last accessed 07/12/2019). For additional information on how to navigate the CHPL, please refer to the CHPL Public User Guide. PO 00000 Frm 00008 Fmt 4701 Sfmt 4700 Condition and Maintenance of Certification requirements under the Program, provide to the Secretary an attestation to all of the other Conditions of Certification required in section 3001(c)(5)(D) of the PHSA, except for the ‘‘EHR reporting criteria submission’’ Condition of Certification requirement in § 3001(c)(5)(D)(vii). We have finalized regulation text implementing the Cures Act’s ‘‘attestations’’ Condition of Certification requirement in § 170.406. Under § 170.406 as finalized by this rule, health IT developers will attest twice a year to compliance with the Conditions and Maintenance of Certification requirements (except for the EHR reporting criteria submission requirement, which would be metrics reporting requirements separately implemented through a future rulemaking). We believe requiring attestations every six months under § 170.406(b) will properly balance the need to support appropriate enforcement with our desire to limit the burden on health IT developers. In this regard, we have also identified methods to make the process as simple and efficient for health IT developers as possible (e.g., 30-day attestation window, web-based form submissions, and attestation alert reminders). We have also finalized that attestations will be submitted to ONC– ACBs. We have finalized a new PoPC in § 170.523(q) that an ONC–ACB must review these submissions for completion and share the health IT developers’ attestations with us. We would then make the attestations publicly available through the CHPL. EHR Reporting Criteria Submission The Cures Act specifies that health IT developers be required, as Condition and Maintenance of Certification requirements under the Program, to submit reporting criteria on certified health IT in accordance with the EHR Reporting Program established under section 3009A of the PHSA, as added by the Cures Act. We have not yet established an EHR Reporting Program. Once we establish such program, we will undertake rulemaking to propose and implement the associated Condition and Maintenance of Certification requirements for health IT developers. Enforcement Section 4002(a) of the Cures Act adds (in section 3001(c)(5)(D) of the PHSA) Program requirements aimed at addressing health IT developers’ actions and business practices through the Conditions and Maintenance of Certification requirements, which expands the current focus of the E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations Program requirements beyond the certified health IT itself. Equally important, Cures Act section 4002(a) also provides that the Secretary may encourage compliance with the Conditions and Maintenance of Certification requirements and take action to discourage noncompliance. We, therefore, have finalized our proposed enforcement framework for the Conditions and Maintenance of Certification requirements in §§ 170.580 and 170.581 to encourage consistent compliance with the requirements. More specifically, we have finalized our proposed corrective action process in § 170.580 for ONC to review potential or known instances where a Condition or Maintenance of Certification requirement under the Program has not been met or is not being met by a health IT developer. We have also finalized in §§ 170.580 and 170.581 our proposal to utilize, with minor modifications, the processes previously established for ONC direct review of certified health IT in the enforcement of the Conditions and Maintenance of Certification requirements. Where we identify noncompliance, our first priority will be to work with the health IT developer to remedy the matter through a corrective action process. However, under certain circumstances, ONC may ban a health IT developer from the Program and/or terminate the certification of one or more of its Health IT Modules. 6. Information Blocking Section 4004 of the Cures Act added section 3022 of the PHSA (42 U.S.C. 300jj–52, ‘‘the information blocking provision’’). Section 3022(a)(1) of the PHSA defines practices that constitute information blocking when engaged in by a health care provider, or a health information technology developer, exchange, or network. Section 3022(a)(3) authorizes the Secretary to identify, through notice and comment rulemaking, reasonable and necessary activities that do not constitute information blocking for purposes of the definition set forth in section 3022(a)(1). We identify eight reasonable and necessary activities as exceptions to the information blocking definition, each of which does not constitute information blocking for purposes of section 3022(a)(1) of the PHSA. The exceptions apply to certain activities that are likely to interfere with, prevent, or materially discourage the access, exchange, or use of EHI, but that would be reasonable and necessary if certain conditions are met. In developing and finalizing the final exceptions, we were guided by three overarching policy considerations. First, VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 the exceptions are limited to certain activities that we believe are important to the successful functioning of the U.S. health care system, including promoting public confidence in health IT infrastructure by supporting the privacy and security of EHI, and protecting patient safety and promoting competition and innovation in health IT and its use to provide health care services to consumers. Second, each exception is intended to address a significant risk that regulated individuals and entities (i.e., health care providers, health IT developers of certified health IT, health information networks, and health information exchanges) will not engage in these reasonable and necessary activities because of potential uncertainty regarding whether they would be considered information blocking. Third, and last, each exception is intended to be tailored, through appropriate conditions, so that it is limited to the reasonable and necessary activities that it is designed to exempt. The eight exceptions are set forth in section VIII.D of this final rule. The five exceptions finalized in §§ 171.201–205, and discussed in section VIII.D.1.a–e of this final rule, involve not fulfilling requests to access, exchange, or use EHI. These exceptions are intended to prevent harm and protect patient safety, promote the privacy and security of EHI, excuse an actor from responding to requests that are infeasible, and address activities that are reasonable and necessary to promote the performance of health IT. The three exceptions finalized in §§ 171.301–303, and discussed in section VIII.D.2.a–c of this final rule, involve procedures for fulfilling requests to access, exchange, or use EHI. These exceptions describe when an actor’s practice of limiting the content of its response to or the manner in which it responds to a request to access, exchange, or use EHI will not be considered information blocking; when an actor’s practice of charging fees, including fees that result in a reasonable profit margin, for accessing, exchanging, or using EHI will not be considered information blocking; and when an actor’s practice to license interoperability elements for EHI to be accessed, exchanged, or used will not be considered information blocking. An actor will not be subject to enforcement actions under the information blocking provision for civil monetary penalties (CMP) or appropriate disincentives if the actor’s practice satisfies at least one exception. In order to satisfy an exception, each relevant practice by an actor at all relevant times must meet all of the PO 00000 Frm 00009 Fmt 4701 Sfmt 4700 25649 applicable conditions of the exception. However, failure to meet the conditions of an exception does not automatically mean a practice constitutes information blocking. A practice failing to meet all conditions of an exception only means that the practice would not have guaranteed protection from CMPs or appropriate disincentives. The practice would instead be evaluated on a caseby-case basis to assess the specific facts and circumstances (e.g., whether the practice would be considered to rise to the level of an interference, and whether the actor acted with the requisite intent) to determine whether information blocking has occurred. In addition to establishing the exceptions, we have defined and interpreted terms that are present in section 3022 of the PHSA (such as the types of individuals and entities covered by the information blocking provision). We have also finalized new terms and definitions that are necessary to implement the information blocking provision. We have codified the information blocking section in a new part of title 45 of the Code of Federal Regulations, part 171. C. Costs and Benefits Executive Orders 12866 on Regulatory Planning and Review (September 30, 1993), and 13563 on Improving Regulation and Regulatory Review (February 2, 2011), direct agencies to assess all costs and benefits of available regulatory alternatives and, if regulation is necessary, to select regulatory approaches that maximize net benefits (including potential economic, environmental, public health and safety effects, distributive impacts, and equity). A regulatory impact analysis (RIA) must be prepared for major rules with economically significant effects ($100 million or more in any one year). OMB has determined that this final rule is an economically significant rule as the costs associated with this final rule could be greater than $100 million per year. Accordingly, we have prepared an RIA that to the best of our ability presents the costs and benefits of this final rule. We have estimated the potential monetary costs and benefits of this final rule for health IT developers, health care providers, patients, ONC–ACBs, ONC–ATLs, and the Federal Government (i.e., ONC), and have broken those costs and benefits out into the following categories: (1) Deregulatory actions (no associated costs); (2) updates to the 2015 Edition health IT certification criteria; (3) Conditions and Maintenance of Certification requirements for a health E:\FR\FM\01MYR3.SGM 01MYR3 25650 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations IT developer; (4) oversight for the Conditions and Maintenance of Certification requirements; and (5) information blocking. We note that we have rounded all estimates to the nearest dollar and all estimates are expressed in 2017 dollars as it is the most recent data available to address all cost and benefit estimates consistently. We also note that we did not have adequate data to quantify some of the costs and benefits within this RIA. In those situations, we have described the non-quantified costs and benefits of our provisions; however, such costs and benefits have not been accounted for in the monetary cost and benefit totals below. We estimated that the total cost for this final rule for the first year after it is finalized (including one-time costs), based on the cost estimates outlined above and throughout this RIA, would, on average, range from $953 million to $2.6 billion with an average annual cost of $1.8 billion. We estimate that the total perpetual cost for this final rule (starting in year two), based on the cost estimates outlined above, would, on average, range from $366 million to $1.3 billion with an average annual cost of $840 million. We estimated the total annual benefit for this final rule, based on the benefit estimates outlined above, would range from $1.2 billion to $5.0 billion with primary estimated annual benefit of $3.1 billion. II. Background A. Statutory Basis The Health Information Technology for Economic and Clinical Health (HITECH) Act, Title XIII of Division A and Title IV of Division B of the American Recovery and Reinvestment Act of 2009 (the Recovery Act) (Pub. L. 111–5), was enacted on February 17, 2009. The HITECH Act amended the Public Health Service Act (PHSA) and created ‘‘Title XXX—Health Information Technology and Quality’’ (Title XXX) to improve health care quality, safety, and efficiency through the promotion of health IT and electronic health information (EHI) exchange. The 21st Century Cures Act (hereinafter the ‘‘Cures Act’’) was enacted on December 13, 2016, to accelerate the discovery, development, and delivery of 21st century cures, and for other purposes. The Cures Act, Pub. L. 114–255, included Title IV—Delivery, which amended portions of the HITECH Act (Title XIII of Division A of Pub. L. 111–5) by modifying or adding certain provisions to the PHSA relating to health IT. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 1. Standards, Implementation Specifications, and Certification Criteria The HITECH Act established two new Federal advisory committees, the HIT Policy Committee (HITPC) and the HIT Standards Committee (HITSC). Each was responsible for advising the National Coordinator for Health Information Technology (National Coordinator) on different aspects of standards, implementation specifications, and certification criteria. Section 3002 of the PHSA, as amended by section 4003(e) of the Cures Act, replaced the HITPC and HITSC with one committee, the Health Information Technology Advisory Committee (HIT Advisory Committee or HITAC). After that change, section 3002(a) of the PHSA established that the HITAC would advise and recommend to the National Coordinator on different aspects of standards, implementation specifications, and certification criteria, relating to the implementation of a health IT infrastructure, nationally and locally, that advances the electronic access, exchange, and use of health information. Further described in section 3002(b)(1)(A) of the PHSA, this included providing the National Coordinator with recommendations on a policy framework to advance interoperable health IT infrastructure, updating recommendations to the policy framework, and making new recommendations, as appropriate. Section 3002(b)(2)(A) identified that in general, the HITAC would recommend to the National Coordinator, for purposes of adoption under section 3004 of the PHSA, standards, implementation specifications, and certification criteria and an order of priority for the development, harmonization, and recognition of such standards, specifications, and certification criteria. Similar to the process previously required of the former HITPC and HITSC, the HITAC will develop a schedule for the assessment of policy recommendations for the Secretary to publish in the Federal Register. Section 3004 of the PHSA identifies a process for the adoption of health IT standards, implementation specifications, and certification criteria and authorizes the Secretary to adopt such standards, implementation specifications, and certification criteria. As specified in section 3004(a)(1), the Secretary is required, in consultation with representatives of other relevant Federal agencies, to jointly review standards, implementation specifications, and certification criteria endorsed by the National Coordinator PO 00000 Frm 00010 Fmt 4701 Sfmt 4700 under section 3001(c), and subsequently determine whether to propose the adoption of any grouping of such standards, implementation specifications, or certification criteria. The Secretary is required to publish all determinations in the Federal Register. Section 3004(b)(3) of the PHSA, which is titled Subsequent Standards Activity, provides that the Secretary shall adopt additional standards, implementation specifications, and certification criteria as necessary and consistent with the schedule published by the HITAC. We consider this provision in the broader context of the HITECH Act and Cures Act to continue to grant the Secretary the authority and discretion to adopt standards, implementation specifications, and certification criteria that have been recommended by the HITAC and endorsed by the National Coordinator, as well as other appropriate and necessary health IT standards, implementation specifications, and certification criteria. 2. Health IT Certification Program(s) Under the HITECH Act, section 3001(c)(5) of the PHSA provides the National Coordinator with the authority to establish a program or programs for the voluntary certification of health IT. Specifically, section 3001(c)(5)(A) specifies that the National Coordinator, in consultation with the Director of the National Institute of Standards and Technology (NIST), shall keep or recognize a program or programs for the voluntary certification of health IT that is in compliance with applicable certification criteria adopted under this subtitle (i.e., certification criteria adopted by the Secretary under section 3004 of the PHSA). The certification program(s) must also include, as appropriate, testing of the technology in accordance with section 13201(b) of the HITECH Act. Overall, section 13201(b) of the HITECH Act requires that with respect to the development of standards and implementation specifications, the Director of National Institute of Standards and Technology (NIST) shall support the establishment of a conformance testing infrastructure, including the development of technical test beds. The same HITECH Act provision (section 13201(b)) also indicates that the development of this conformance testing infrastructure may include a program to accredit independent, non-Federal laboratories to perform testing. Section 4001 of the Cures Act amended section 3001(c)(5) of the PHSA to instruct the National Coordinator to encourage, keep, or recognize, through E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations existing authorities, the voluntary certification of health IT under the program for use in medical specialties and sites of service for which no such technology is available or where more technological advancement or integration is needed. Section 3001(c)(5)(C)(iii) in particular identifies that the Secretary, in consultation with relevant stakeholders, shall make recommendations for the voluntary certification of health IT for use by pediatric health providers to support the care of children, as well as adopt certification criteria under section 3004 to support the voluntary certification of health IT for use by pediatric health providers. The Cures Act further amended section 3001(c)(5) of the PHSA by adding section 3001(c)(5)(D), which provides the Secretary with the authority to require, through notice and comment rulemaking, Conditions and Maintenance of Certification requirements for the Program. B. Regulatory History The Secretary issued an interim final rule with request for comments on January 13, 2010, (75 FR 2014), which adopted an initial set of standards, implementation specifications, and certification criteria. On March 10, 2010, we published a proposed rule (75 FR 11328) that proposed both a temporary and permanent certification program for the purposes of testing and certifying health IT. A final rule establishing the temporary certification program was published on June 24, 2010, (75 FR 36158), and a final rule establishing the permanent certification program was published on January 7, 2011, (76 FR 1262). We have issued multiple rulemakings since these initial rulemakings to update standards, implementation specifications, certification criteria, and the certification program, a history of which can be found in the October 16, 2015 final rule titled, ‘‘2015 Edition Health Information (Health IT) Certification Criteria, 2015 Edition Base Electronic Health Record (EHR) Definition, and ONC Health IT Certification Program Modifications’’ (80 FR 62602) (‘‘2015 Edition final rule’’). A final rule corrections and clarifications notice was published for the 2015 Edition final rule on December 11, 2015, (80 FR 76868), to correct preamble and regulatory text errors and clarify requirements of the Common Clinical Data Set (CCDS), the 2015 Edition privacy and security certification framework, and the mandatory disclosures for health IT developers. The 2015 Edition final rule established a new edition of VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 certification criteria (‘‘2015 Edition health IT certification criteria’’ or ‘‘2015 Edition’’) and a new 2015 Edition Base EHR definition. The 2015 Edition established the capabilities and specified the related standards and implementation specifications that CEHRT would need to include to, at a minimum, support the achievement of ‘‘meaningful use’’ by eligible clinicians, eligible hospitals, and critical access hospitals under the Medicare and Medicaid EHR Incentive Programs (EHR Incentive Programs) (now referred to as the Promoting Interoperability (PI) Programs) 5 when the 2015 Edition is required for use under these and other programs referencing the CEHRT definition. The 2015 Edition final rule also made changes to the ONC HIT Certification Program. The final rule adopted a proposal to change the Program’s name to the ‘‘ONC Health IT Certification Program’’ from the ONC HIT Certification Program, modified the Program to make it more accessible to other types of health IT beyond EHR technology and for health IT that supports care and practice settings beyond the ambulatory and inpatient settings, and adopted new and revised PoPC for ONC–ACBs. After issuing a proposed rule on March 2, 2016, (81 FR 11056), we published a final rule titled, ‘‘ONC Health IT Certification Program: Enhanced Oversight and Accountability’’ (81 FR 72404) (‘‘EOA final rule’’) on October 19, 2016. The EOA final rule finalized modifications and new requirements under the Program, including provisions related to our role in the Program. The final rule created a regulatory framework for our direct review of health IT certified under the Program, including, when necessary, requiring the correction of non-conformities found in health IT certified under the Program and suspending and terminating certifications issued to Complete EHRs and Health IT Modules. The final rule also sets forth processes for us to authorize and oversee accredited testing laboratories under the Program. In addition, it includes provisions for expanded public availability of certified health IT surveillance results. On March 4, 2019, the Secretary published a proposed rule titled, ‘‘21st Century Cures Act: Interoperability, Information Blocking, and the ONC Health IT Certification Program’’ (84 FR 7424) (‘‘Proposed Rule’’). The Proposed Rule proposed to implement certain provisions of the Cures Act that would 5 https://www.federalregister.gov/d/2018-16766/ p-4. PO 00000 Frm 00011 Fmt 4701 Sfmt 4700 25651 advance interoperability and support the access, exchange, and use of electronic health information and is the subject of this final rule. C. General Comments on the Proposed Rule Comments. Numerous commenters expressed support for the overall direction of the Proposed Rule. Numerous commenters also expressed support for the policy goals expressed in the Proposed Rule, including: Reduced health care costs; improved public health surveillance; improved care coordination, continuity of care, and shared access of data between patient and provider; improved quality and patient safety; increased cost and quality transparency; greater efficiencies; and better health outcomes for patients. A few commenters also commended our interest in ways to use health IT to address opioid use disorders. Many commenters also appreciated detailed context for the provisions in the Proposed Rule. Many commenters stated that the proposed provisions and standards will provide opportunities for innovation as well as increase the ability of health care providers to connect new tools and services to their systems. A number of commenters commended our responsiveness to the health care community, including patients, in drafting the rule. A few commenters suggested that the existing language in the rule should remain mostly unchanged as ONC drafts the final rule. Many commenters commended us for collaborating with public- and privatesector partners in developing the Proposed Rule. Specifically, some commenters expressed appreciation for our work with CMS and their companion Interoperability and Patient Access Proposed Rule. A number of commenters shared that they look forward to working with us and CMS as the health care industry progresses toward an interoperable system, making it easier for small independent practices and providers to move to value-based care. Response. We appreciate the support expressed by many commenters. This final rule maintains the direction of the Proposed Rule, and we too look forward to ongoing collaboration with public and private sector partners as we implement the provisions of this final rule. Comments. A few commenters recommended that the final rule include additional resources to assist with readability and ease of understanding. Response. We thank commenters for their feedback. As we did with the E:\FR\FM\01MYR3.SGM 01MYR3 25652 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations Proposed Rule, we are providing resources such as infographics, fact sheets, webinars, and other forms of educational materials and outreach. Many of the education materials can be found on www.HealthIT.gov/curesrule. Comments. Several commenters expressed the opinion that the use of EHRs—and health IT, more generally— has negatively affected the quality of health care delivery and that the Proposed Rule will exacerbate this issue. Some of these commenters stated that the need to input information into EHRs during office visits has resulted in clinicians spending less time communicating with patients, and some noted the impact of data entry on clinician burnout. A few commenters made a similar point that use of EHRs has reduced productivity and, as a result, increased health care spending. Response. We thank commenters for their feedback. We are aware of the challenges stakeholders have experienced in using EHRs and health IT more broadly. In the Cures Act, Congress identified the importance of easing regulatory and administrative burdens associated with the use of EHRs and health IT. Specifically, through section 4001(a) of the Cures Act, Congress directed the Department of Health and Human Services to establish a goal, develop a strategy, and provide recommendations to reduce EHR-related burdens that affect care delivery. To that end, on November 28, 2018, we, in partnership with CMS, released a draft Strategy on Reducing Regulatory and Administrative Burden Relating to the Use of Health IT and EHRs 6 for public comment. This draft strategy reflects input HHS received through several wide-reaching listening sessions, written input, and stakeholder outreach. We released the final report on February 21, 2020. Reflective of public comment, the final Strategy on Reducing Regulatory and Administrative Burdens Relating to the Use of Health IT and EHRs 7 targets burdens tied to regulatory and administrative requirements that HHS can directly impact through the rulemaking process. The report’s strategies, recommendations, and policy shifts aim to give clinicians more time to focus on what matters—caring for their patients. Based on stakeholder input, the final strategy outlines three overarching goals designed to reduce clinician burden: (1) Reduce the effort 6 https://www.healthit.gov/sites/default/files/ page/2018–11/Draft%20Strategy %20on%20Reducing%20Regulatory %20and%20Administrative %20Burden%20Relating.pdf. 7 https://www.healthit.gov/sites/default/files/ page/2020-02/BurdenReport_0.pdf. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 and time required to record health information in EHRs for clinicians; (2) reduce the effort and time required to meet regulatory reporting requirements for clinicians, hospitals, and health care organizations; and (3) improve the functionality and intuitiveness (ease of use) of EHRs. In addition to the final strategy mentioned above, we refer readers to section III of this final rule, Deregulatory Actions for Previous Rulemakings, for more information on how we have worked to improve the Program with a focus on ways to reduce burden, offer flexibility to both health IT developers and providers, and support innovation. Comments. We received several comments from a variety of stakeholders to extend the 60-day comment period for the Proposed Rule, stating that due to the depth and complexity of the policies proposed, it would be critical for the public to have extended time to provide sufficient and thoughtful comments to advance shared goals and shape the interoperability landscape. Response. In response to stakeholder inquiries to extend the 60-day public comment period and based on the stated goals of the Proposed Rule to improve interoperability and patient access to health information for the purposes of promoting competition and better care, we extended the comment period for the Proposed Rule for an additional 30 days which ended on June 3, 2019. Comments. A number of commenters recommended delaying the final rule by issuing an Interim Final Rule (IFR) with comment. Commenters noted that many organizations are providing comments that include new information blocking exceptions and that we will not be able to incorporate such suggestions into the final rule without an opportunity for comment. Several commenters stated that an IFR was appropriate due to the significance and breadth of the Proposed Rule, as well the magnitude of changes proposed and that an IFR would allow for additional opportunity for stakeholder comment. Several commenters recommended that ONC consider issuing a Supplemental Notice of Proposed Rulemaking (SNPRM) to seek additional comments on the information blocking provisions. Some of these commenters stated that new definitions and terms introduced in the Proposed Rule need additional clarification and an SNPRM would enable ONC to propose such clarifications and seek feedback on modified proposals. Response. We recognize the importance of allowing enough time for comment given the breadth of the Proposed Rule and acknowledge the PO 00000 Frm 00012 Fmt 4701 Sfmt 4700 comments requesting the issuance of an IFR or a SNPRM. We believe that the advance posting of the Proposed Rule on the ONC website, the initial 60-day comment period, and the 30-day extension, provided adequate time for comment, especially given the large volume of comments received. As discussed in the information blocking section of the Proposed Rule (84 FR 7508), after hearing from stakeholders and based on our findings from our 2015 Report to Congress,8 we concluded that information blocking is a serious problem and recommended that Congress prohibit information blocking and provide penalties and enforcement mechanisms to deter these harmful practices. Congress responded by enacting the Cures Act on December 13, 2016, with many provisions specifying a need for swift implementation. It has been three years since the Cures Act was enacted and information blocking remains a serious concern. This final rule includes provisions that will address information blocking and cannot be further delayed. We have taken multiple actions to address some expressed concerns regarding the timing of the Conditions and Maintenance of Certification requirements as well as the comprehensiveness of the information blocking proposals. These actions include some burden reduction by removing certain certification criteria, narrowing the scope of certain certification criteria, and increasing the compliance timeline with criteria. For purposes of information blocking, we have established compliance date for 45 CFR part 171 that is six months, rather than sixty days, after the date this final rule publishes in the Federal Register. We have also focused the scope of EHI, and provided new and revised exceptions that are actionable and reduce burden. One of these new exceptions (see § 171.301(a) and section VIII.D.2.a of this final rule) includes a provision by which, until 24 months after this rule is published in the Federal Register, an actor’s conduct can satisfy the conditions of the Content and Manner Exception (§ 171.301) if they provide at least the content that is within the USCDI in response to a request for access, exchange, or use of EHI. Because of these reasons and those noted above, we decline to issue an IFR or SNPRM. Rather, we have issued this final rule to support interoperability, empower patient control of their health care, and instill competition in health care markets. 8 https://www.healthit.gov/sites/default/files/ reports/info_blocking_040915.pdf. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations III. Deregulatory Actions for Previous Rulemakings A. Background 1. History of Burden Reduction and Regulatory Flexibility Since the inception of the ONC Health IT Certification Program (Program), we have aimed to implement and administer the Program in the least burdensome manner that supports our policy goals. Through the years, we have worked to improve the Program with a focus on ways to reduce burden, offer flexibility, and support innovation. This approach has been consistent with the principles of Executive Order (E.O.) 13563 on Improving Regulation and Regulatory Review (February 2, 2011), which instructs agencies to periodically review its existing significant regulations and ‘‘determine whether any such regulations should be modified, streamlined, expanded, or repealed so as to make the agency’s regulatory program more effective or less burdensome in achieving the regulatory objectives.’’ To that end, we have historically taken measures where feasible and appropriate to reduce burden within the Program and make the Program more effective, flexible, and streamlined. For example, in the 2014 Edition final rule (77 FR 54164, Sept. 4, 2012), we revised the certified electronic health record technology (CEHRT) definition to provide flexibility and create regulatory efficiencies by narrowing required functionality to a core set of capabilities (i.e., the Base EHR definition) plus the additional capabilities each eligible clinician, eligible hospital, and critical access hospital needed to successfully achieve the applicable objective and measures under the EHR Incentive Programs (now referred to as the Promoting Interoperability (PI) Programs). ONC has also supported more efficient testing and certification methods and reduced regulatory burden through the adoption of a gap certification policy. As explained in the 2014 Edition final rule (77 FR 54254) and the 2015 Edition final rule (80 FR 62681), as modified by the 2015 final rule with corrections and clarifications at 80 FR 76868, where applicable, gap certification allows for the use of a previously certified health IT product’s test results for certification criteria identified as unchanged. Developers have been able to use gap certification for more efficient certification of their health IT when updating from the 2011 Edition to the 2014 Edition and from the 2014 Edition to the 2015 Edition. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 ONC introduced further means to reduce regulatory burden, increase regulatory flexibility, and promote innovation in the 2014 Edition Release 2 final rule (79 FR 54430) published on September 11, 2014. The 2014 Edition Release 2 final rule established a set of optional 2014 Edition certification criteria that provided flexibility and alternative certification pathways for health IT developers and providers based on their specific circumstances. The 2014 Edition Release 2 final rule also simplified the Program by discontinuing the use of the ‘‘Complete EHR’’ certification concept beginning with the 2015 Edition (79 FR 54443). In the 2015 Edition final rule, we did not ‘‘carry forward’’ certain 2014 Edition certification criteria into the 2015 Edition, such as the ‘‘image results,’’ ‘‘patient list creation,’’ and ‘‘electronic medication administration record’’ criteria. We determined that these criteria did not advance functionality or support interoperability (80 FR 62682 through 62684). We also did not require all health IT to be certified to the ‘‘meaningful use measurement’’ certification criteria for ‘‘automated numerator recording’’ and ‘‘automated measure calculation’’ (80 FR 62604 and 62605), which the 2014 Edition had previously required. Based on stakeholder feedback and Program administration observations, we also permitted testing efficiencies for the 2015 Edition ‘‘automated numerator recording’’ and ‘‘automated measure calculation’’ criteria by removing the live demonstration requirement of recording data and generating reports (80 FR 62703). Health IT developers may now self-test their Health IT Modules’ capabilities and submit the resulting reports to the ONC-Authorized Testing Laboratory (ONC–ATL) to verify compliance with the ‘‘meaningful use measurement’’ criterion.9 In order to further reduce burden for health IT developers, in our 2015 Edition final rule, we adopted a more straightforward approach to privacy and security certification requirements and clarified which requirements apply to each criterion within the regulatory functional areas (80 FR 62605). 2. Executive Orders 13771 and 13777 On January 30, 2017, the President issued E.O. 13771 on Reducing Regulation and Controlling Regulatory Costs, which requires agencies to identify deregulatory actions. This order 9 https://www.healthit.gov/test-method/ automated-numerator-recording and https:// www.healthit.gov/test-method/automated-measurecalculation. PO 00000 Frm 00013 Fmt 4701 Sfmt 4700 25653 was followed by E.O. 13777, titled ‘‘Enforcing the Regulatory Reform Agenda’’ (February 24, 2017). E.O. 13777 provides further direction on implementing regulatory reform by identifying a process by which agencies must review and evaluate existing regulations and make recommendations for repeal or simplification. In order to implement these regulatory reform initiatives and policies, ONC reviewed and evaluated existing regulations in the year leading to the issuance of the 21st Century Cures Act: Interoperability, Information Blocking, and the ONC Health IT Certification Program Proposed Rule (Proposed Rule) (84 FR 7424 through 7610). During our review, we sought to identify ways to further reduce administrative burden, to implement deregulatory actions through guidance, and to put forth deregulatory actions in this final rule that will reduce burden for health IT developer, providers, and other stakeholders. Prior to publishing the Proposed Rule, on August 21, 2017, ONC issued Relied Upon Software Program Guidance.10 Health IT developers are permitted to use ‘‘relied upon software’’ 11 to demonstrate compliance with certification criteria adopted at 45 CFR part 170, subpart C. Historically, in cases where a Health IT Module is paired with multiple ‘‘relied upon software’’ products for the same capability, health IT developers were required to demonstrate compliance for the same certification criterion with each of those ‘‘relied upon software’’ products in order for the products to be listed on the Certified Health IT Product List (CHPL). With the guidance issued on August 21, 2017, health IT developers could demonstrate compliance with only one ‘‘relied upon software’’ product for a criterion/ capability. Once the health IT developer demonstrates compliance with a minimum of one ‘‘relied upon software’’ product, the developer can have multiple, additional ‘‘relied upon software’’ products for the same criterion/capability listed on the CHPL (https://chpl.healthit.gov/). This approach reduces burden for health IT developers, ONC–ATLs, and ONCAuthorized Certification Bodies (ONC– ACBs). On September 21, 2017, ONC announced a deregulatory action to reduce the overall burden for testing 10 https://www.healthit.gov/sites/default/files/ relieduponsoftwareguidance.pdf. 11 ‘‘Relied upon’’ software is defined in the 2011 final rule establishing the permanent certification program (76 FR 1276). E:\FR\FM\01MYR3.SGM 01MYR3 25654 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations health IT to the 2015 Edition certification criteria.12 ONC reviewed the 2015 Edition test procedures and changed 30 of the 2015 Edition test procedures from requiring ONC–ATL evaluation to requiring only attestation by health IT developers that their product has capabilities conformant with those specified in the associated certification criterion/criteria.13 This deregulatory action reduced burden and costs program-wide, while still maintaining the Program’s high level of integrity and assurances. The total testing cost savings for health IT developers have been estimated between $8.34 and $9.26 million. ONC– ATLs also benefitted by having more time and resources to focus on toolbased testing (for interoperabilityoriented criteria) and being responsive to any retesting requirements that may arise from ONC–ACB surveillance activities. Health care providers and other users of certified health IT did not lose confidence in the Program because health IT developers were still required to meet certification criteria requirements and maintain their products’ conformance to the full scope of the associated criteria, including when implemented in the field and in production use. ONC and ONC–ACBs continue to conduct surveillance activities and respond to end-user complaints. B. Deregulatory Actions In the Proposed Rule, we proposed (84 FR 7434 through 7439) and sought comment on six specific deregulatory actions. Having considered the comments received on the proposals, which are summarized below, we have decided to finalize five of the six proposed deregulatory actions and not to finalize the proposal to recognize the FDA Software Precertification Pilot Program. We refer readers to section XIII (Regulatory Impact Analysis) of this final rule for a discussion of the estimated cost savings from these finalized deregulatory actions. 1. Removal of Randomized Surveillance Requirements ONC–ACBs are required under § 170.556 to conduct surveillance of certified health IT to ensure that health IT continues to conform with and function as required by the full scope of the certification requirements. Surveillance is categorized as either 12 https://www.healthit.gov/buzz-blog/healthitcertification/certification-program-updates-supportefficiency-reduce-burden/. 13 https://www.healthit.gov/sites/default/files/ policy/selfdeclarationapproachprogramguidance1704.pdf. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 reactive surveillance (for example, complaint-based surveillance) or randomized surveillance. Previously finalized regulations in § 170.556(c)(2) required ONC–ACBs to proactively surveil two percent of the certificates they issue annually. As discussed in the Proposed Rule, in the time since the two percent randomized surveillance requirement was finalized, stakeholders had expressed concern that the benefits of in-the-field, randomized surveillance may not outweigh the time commitment required by providers, particularly if no non-conformities are found (84 FR 7434). We noted in the Proposed Rule that, in general, health care providers had expressed that reactive surveillance (e.g., surveillance based on user complaints) is a more logical and economical approach to surveillance. Consistent with our September 21, 2017, exercise of enforcement discretion on implementation of randomized surveillance by ONC–ACBs,14 we proposed in the Proposed Rule to eliminate certain regulatory randomized surveillance requirements (84 FR 7434). In the Proposed Rule, we specifically proposed to revise § 170.556(c) by changing the requirement that ONC– ACBs must conduct in-the-field, randomized surveillance to specify that ONC–ACBs may conduct in-the-field, randomized surveillance (84 FR 7434). We further proposed to remove § 170.556(c)(2), which specified that ONC–ACBs must conduct randomized surveillance for a minimum of two percent of certified health IT products per year. We also proposed to remove the requirements in § 170.556(c)(5) regarding the exclusion and exhaustion of selected locations for randomized surveillance. Additionally, we proposed to remove the requirements in § 170.556(c)(6) regarding the consecutive selection of certified health IT for randomized surveillance. As noted in the Proposed Rule, without these regulatory requirements, ONC– ACBs would still be required to perform reactive surveillance, and would be permitted to conduct randomized surveillance of their own accord, using the methodology identified by ONC with respect to scope (§ 170.556(c)(1)), selection method (§ 170.556(c)(3)), and the number and types of locations for in-the-field surveillance (§ 170.556(c)(4)). Comments. A substantial number of commenters supported removing the requirements for randomized surveillance. Many commenters 14 https://www.healthit.gov/sites/default/files/ ONC_Enforcement_Discretion_Randomized_ Surveillance_8-30-17.pdf. PO 00000 Frm 00014 Fmt 4701 Sfmt 4700 supported the proposal to revise § 170.556(c) by changing the requirement that ONC–ACBs must conduct in-the-field, randomized surveillance to specify that ONC–ACBs may conduct in-the-field, randomized surveillance, including the removal of § 170.556(c)(2). Commenters noted that since ONC–ACBs would still be required to perform reactive surveillance, and would be permitted to conduct randomized surveillance of their own accord, the regulatory requirement to conduct randomized surveillance on a specified portion of certified health IT would be unnecessary. Commenters supporting this proposal praised the deregulatory action as allowing more flexibility for ONC–ACBs. A number of commenters were generally supportive of the proposal and applied the caveat that if an ONC–ACB did voluntarily conduct randomized surveillance, they should not do so repeatedly on the same Health IT Module. These commenters indicated a preference that the requirements in § 170.556(c)(6) regarding the consecutive selection of certified health IT for randomized surveillance remain. Several commenters were supportive of removing randomized surveillance requirements and indicated they found this appropriate in view of the Conditions and Maintenance of Certification enhancements to the Program as directed by the Cures Act, while others noted that reactive surveillance may be more effective in surfacing and correcting nonconformities. A number of commenters did not support the proposal, with many expressing concerns that this could be or be perceived to be a reduction in oversight of developers or could reduce providers’ confidence that certified Health IT Modules would meet their needs. While a majority of commenters speaking to surveillance burdens on health care providers indicated the removal of mandatory randomized surveillance would, on the whole, reduce burden on health care providers, several expressed concerns about whether providers can discern when a product does not meet certification requirements or know where and how to report their concerns about their certified health IT’s conformance to Program requirements. A few commenters suggested that the increased emphasis on reactive surveillance (particularly in some commenters’ view because ONC is removing randomized surveillance requirements in advance of the full implementation of the EHR Reporting Program called for by section 4002 of E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations the Cures Act) indicates a need for additional guidance to help providers and particularly clinicians understand how to recognize and report potential non-conformities in the certified health IT they use. Response. We thank commenters for their input and reiterate our continued commitment to sustaining the integrity of our Program, including ensuring robust oversight of certified health IT products while avoiding unnecessary burdens on all program stakeholders. Having considered all comments received, in context of the totality of updates we proposed to the Program, we have concluded that the removal of the regulatory requirements for ONC–ACBs to conduct randomized surveillance is consistent with enhancing Program efficiency while maintaining its efficacy. We leave ONC–ACBs the option to conduct randomized surveillance as they determine necessary or appropriate to support continued conformance to Program requirements by Health IT Modules they have certified. We also note that ONC– ACBs that choose to conduct randomized surveillance will still be required to use the methodology identified by ONC with respect to scope (§ 170.556(c)(1)), selection method (§ 170.556(c)(3)), and the number and types of locations for in-the-field surveillance (§ 170.556(c)(4)). While we appreciate concerns that removal of requirements in § 170.556(c)(6) regarding the consecutive selection of certified health IT creates a potential that the same Health IT Module(s) could be selected for randomized surveillance in consecutive years, we are unaware of evidence suggesting that ONC–ACBs choosing to implement randomized surveillance would do so in a manner that would tend to erode its efficacy by over-sampling some products at the expense of under-sampling others. Rather than retain a regulatory provision intended to counterbalance a regulatory requirement for randomized surveillance of a required minimum percent of certified products each year, we believe it is more appropriate at this time to remove the restriction on consecutive selection of the same Health IT Module(s) or location(s) for randomized surveillance and monitor the results of this and other Program enhancements finalized in this rule for any indication that we may need to further adjust regulatory requirements in the future. We thank commenters for bringing to our attention that health care providers may be uncertain about how or where they can engage the ONC Health IT Certification Program for assistance VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 when the certified health IT they rely on is not performing its certified functions as they expect and their health IT developer is unresponsive or fails to resolve non-conformities with Program requirements. Reactive surveillance by ONC–ACBs, informed and focused by end-user complaints, has always been an essential component of the Program’s oversight and assurance of continued conformity of certified Health IT Modules when deployed in the field. While we encourage users to begin seeking troubleshooting and issue resolution support from the developer of their health IT—because the developer is often in the best position to act most promptly to resolve problems with their products’ performance—we also encourage the user to share their concerns with the ONC–ACB that certified the health IT in question when the developer has not addressed users’ concerns that their certified health IT is not performing as it is certified to perform. As we recognize that users may in some circumstances need, or for purposes potentially including but not limited to their own preferences may wish, to share their concerns about their certified health IT’s performance or other health IT matters directly with ONC, we invite health IT users and all other interested parties to share their health IT-related feedback or concerns with ONC through the Health IT Feedback Form on our HealthIT.gov website.15 Depending on the nature of a specific feedback message, we may contact the submitter for additional information and, in some instances, may share the information provided with other appropriate entities—such as but not limited to the ONC–ACBs who certify the products about which we receive feedback, as they are often in the best position to assess and respond to feedback expressing concerns about conformance of specific certified criteria used by Health IT Modules in production environments. All information submitted through the Health IT Feedback Form is carefully reviewed and helps us to improve our awareness and ability to address health IT-related issues and challenges. Also, we note for clarity that persons sharing health IT-related concerns with ONC via the Health IT Feedback Form have the option to remain anonymous and this option has been chosen by some submitters. However, we wish to note that anonymous submissions will prevent us from acquiring additional information to fully follow up on a matter if the submission does not 15 https://www.healthit.gov/form/healthitfeedback-form. PO 00000 Frm 00015 Fmt 4701 Sfmt 4700 25655 include sufficient detail on which to act. In general, submitters should provide as much detail as possible about the developer, product name, and version of the certified health IT as well as their specific concerns about the certified health IT’s performance. 2. Removal of the 2014 Edition From the Code of Federal Regulations In the March 4, 2019 Proposed Rule, we also proposed to remove the 2014 Edition from the Code of Federal Regulations (CFR), which includes standards and functionality now significantly outmoded (84 FR 7434). We noted that removal of the 2014 Edition would make the 2015 Edition the new baseline for health IT certification. The 2015 Edition, including the additional certification criteria, standards, and requirements adopted in this final rule, will better enable interoperability and the access, exchange, and use of electronic health information, as discussed in the Proposed Rule (84 FR 7434), and its adoption and implementation by providers is expected to yield the estimated costs savings described (84 FR 7563 and 7564) within the Regulatory Impact Analysis (section XIV) of the Proposed Rule and in the Regulatory Impact Analysis section (section XIII) of this final rule. To implement the removal of the 2014 Edition from the CFR, we proposed (84 FR 7434 and 7435) to remove the 2014 Edition certification criteria (§ 170.314) and related standards, terms, and requirements from the CFR. In regard to terms, we proposed to retire the 2014 Edition-related definitions found in § 170.102, including the ‘‘2014 Edition Base EHR,’’ ‘‘2014 Edition EHR certification criteria,’’ and ‘‘Complete EHR, 2014 Edition.’’ As explained in the 2015 Edition final rule (80 FR 62719), the ability to maintain Complete EHR certification is only permitted with health IT certified to the 2014 Edition certification criteria. Because this concept was discontinued for the 2015 Edition, we proposed (84 FR 7435) to remove § 170.545 and any references to Complete EHR from the regulation text in conjunction with the removal of the 2014 Edition. We also proposed (84 FR 7435) to remove references to the 2014 Edition from the Common Clinical Data Set (CCDS) definition and effectively replace it with a new governmentunique standard, the United States Core Data for Interoperability (USCDI). We proposed (84 FR 7435) to remove the standards and implementation specifications found in §§ 170.200, 170.202, 170.204, 170.205, 170.207, 170.210, and 170.299 that are only E:\FR\FM\01MYR3.SGM 01MYR3 25656 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations referenced in the 2014 Edition certification criteria. Adopted standards that are also referenced in the 2015 Edition would remain. Finally, we proposed (84 FR 7435) to remove requirements in § 170.550(f) and any other requirements in subpart E, §§ 170.500 through 170.599, which are specific to the 2014 Edition and do not apply to the 2015 Edition. As discussed in the Proposed Rule (84 FR 7435), in order to avoid regulatory conflicts, we took into consideration the final rule released by CMS on November 16, 2017, titled ‘‘Medicare Program; CY 2018 Updates to the Quality Payment Program; and Quality Payment Program: Extreme and Uncontrollable Circumstance Policy for the Transition Year’’ (82 FR 53568). This Quality Payment Program (QPP) final rule permits eligible clinicians to use EHR technology certified to either the 2014 or 2015 Edition certification criteria, or a combination of the two for the CY 2018 performance period. This QPP final rule also states that the 2015 Edition certified EHR technology (CEHRT) will be required starting with the CY 2019 QPP program year (82 FR 53671). Therefore, we proposed (84 FR 7435) the effective date of removal of the 2014 Edition certification criteria and related standards, terms, and requirements from the CFR would be the effective date of this final rule. Comments. The majority of the comments received supported removing the 2014 Edition certification criteria from the Code of Federal Regulations. Commenters supporting the removal noted that it will reduce confusion and acknowledges that standards and functionality in the 2014 Edition are now significantly outmoded. Some commenters requested the removal be delayed until the end of CY 2019. Response. We thank commenters for their support. We have finalized the removal of the 2014 Edition from the CFR as proposed, including making the removal effective as of the effective date of this final rule (60 days after the rule is published in the Federal Register). The 2015 Edition was the sole edition permitted to meet the CEHRT definition beginning in the CY 2019 program year. This final rule is published in CY 2020. Therefore, the removal is not in conflict with CMS’ regulatory requirements for QPP. To finalize removal of the 2014 Edition from the CFR, we have removed, effective as of the effective date of this final rule, the 2014 Edition certification criteria in § 170.314. We also finalized removal of terms and definitions specific to the 2014 Edition from § 170.102, including the ‘‘2014 Edition VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 Base EHR,’’ ‘‘2014 Edition EHR certification criteria,’’ and ‘‘Complete EHR, 2014 Edition’’ definitions. As explained in the 2015 Edition final rule (80 FR 62719), the ‘‘Complete EHR’’ concept was discontinued for the 2015 Edition. Therefore, in conjunction with the removal of the 2014 Edition, we also remove in this final rule § 170.545 and all other references to ‘‘Complete EHR’’ from the regulation text. Moreover, in finalizing the removal of the 2014 Edition from the CFR, we also finalize removal of the standards and implementation specifications found in §§ 170.200, 170.202, 170.204, 170.205, 170.207, 170.210, and 170.299 that are referenced only in the 2014 Edition certification criteria. Adopted standards that are also referenced in the 2015 Edition, as modified by this final rule, remain in the CFR. We also retained the CCDS definition in § 170.102 but removed the standards and implementation specifications that reference the 2014 Edition. Additionally, we finalized the removal of requirements in § 170.550(f) and any other requirements in subpart E, §§ 170.500 through 170.599, that are specific to the 2014 Edition and do not apply to the 2015 Edition. 3. Removal of the ONC-Approved Accreditor From the Program We proposed to remove the ONC–AA from the Program (84 FR 7435). The ONC–AA’s role is to accredit certification bodies for the Program and to oversee the ONC–ACBs. However, years of experience and changes with the Program have led ONC to conclude that, in many respects, the role of the ONC–AA to oversee ONC–ACBs is now duplicative of ONC’s oversight. More specifically, ONC’s experience with administering the Principles of Proper Conduct (PoPC) for ONC–ACBs as well as issuing necessary regulatory changes (e.g., ONC–ACB surveillance and reporting requirements in the 2015 Edition final rule) has demonstrated that ONC on its own has the capacity to provide the appropriate oversight of ONC–ACBs. Therefore, we believe removal of the ONC–AA will reduce the Program’s administrative complexity and burden. Comments. All but one commenter specifically addressing this proposal were in support of removing the ONC– AA. The one commenter opposed to the proposal stated concerns related to decoupling accreditation to ISO/IEC 17065 standards (an internationally recognized standard for bodies certifying products, processes, and services to provide assurance of compliance with specified requirements such as initial testing, PO 00000 Frm 00016 Fmt 4701 Sfmt 4700 inspection, and quality management systems) from specific assessment of a certification body’s ability to apply their accredited ISO/IEC 17065 capabilities to the Program’s certification scheme requirements. The commenter noted that this might place a greater burden on ONC staff than did the Program structure that included an ONC–AA. Finally, one of the commenters in support of removing the ONC–AA from the Program requested additional clarification about criteria and processes that will be used for accreditation of certification bodies following removal of the ONC–AA from the Program. Response. We thank all commenters for their thoughtful feedback. Upon consideration of all comments received on this proposal, we have finalized it as proposed. As noted in the preamble to the Proposed Rule (84 FR 7435), ONC’s experience with administering the PoPC for ONC–ACBs as well as issuing necessary regulatory changes (e.g., ONC–ACB surveillance and reporting requirements in the 2015 Edition final rule) has demonstrated that ONC on its own has the capacity to provide the appropriate oversight of ONC–ACBs. Therefore, we believe removal of the ONC–AA will reduce the Program’s administrative complexity and burden while maintaining its effectiveness. We anticipate providing updated information about ONC’s updated processes for approval and oversight of certification bodies through familiar mechanisms including but not necessarily limited to the HealthIT.gov website prior to the effective date of this final rule, and on an ongoing basis as needed or otherwise appropriate to ensure effective transparency about this aspect of the Program. To finalize this deregulatory action, we have removed the definition for ‘‘ONC-Approved Accreditor or ONC– AA’’ from § 170.502. We also removed §§ 170.501(c), 170.503, and 170.504 regarding requests for ONC–AA status, ONC–AA ongoing responsibilities, and reconsideration for requests for ONC– AA status. Regarding correspondence and communication with ONC, we have revised § 170.505 to remove specific references to the ‘‘ONC–AA’’ and ‘‘accreditation organizations requesting ONC–AA status.’’ We also have finalized our proposal to sunset the policies reflected in the final rule titled ‘‘Permanent Certification Program for Health Information Technology; Revisions to ONC-Approved Accreditor Processes’’ (76 FR 72636), and to remove § 170.575, which established a process for addressing instances where the ONC–AA engages in improper conduct or does not perform its E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations responsibilities under the Program. Because the regulations promulgated in this prior final rule relate solely to the role of the ONC–AA, we have finalized the removal of those requirements. Accordingly, we also revised the application process for ONC–ACB status in § 170.520(a)(3) to require documentation, with an appropriate scope, that confirms that the applicant has been accredited to ISO/IEC 17065 by any accreditation body that is a signatory to the Multilateral Recognition Arrangement (MLA) with the International Accreditation Forum (IAF), in place of the ONC–AA accreditation documentation requirements. Similarly, instead of requiring the ONC–AA to evaluate the conformance of ONC–ACBs to ISO/IEC 17065, we revise § 170.523(a) to simply require ONC–ACBs to maintain accreditation in good standing to ISO/ IEC 17065. This means that ONC–ACBs would need to continue to comply with ISO/IEC 17065 and requirements specific to the ONC Health IT Certification Program scheme. 4. Removal of Certain 2015 Edition Certification Criteria and Standards Having reviewed and analyzed the 2015 Edition, we proposed to remove certain certification criteria and standards as discussed in the Proposed Rule (84 FR 7435 through 7437) and below. We stated (84 FR 7435) that we believe the removal of these criteria and standards will reduce burden and costs for health IT developers and health care providers by eliminating the need to: Design and meet specific certification functionalities; prepare, test, and certify health IT in certain instances; adhere to associated reporting and disclosure requirements; maintain and update certifications for certified functionalities, and participate in routine surveillance (84 FR 7435). Although we did not expressly state it in the Proposed Rule preamble, the burdens and costs reduced by removal of certain criteria from the 2015 Edition would be those associated with the needs we discussed in the preamble (84 FR 7435) specifically in connection to the criteria we proposed to remove, which are those that had been set forth in § 170.315(a)(6), (7) and (8), (10) and (11), and (13), (b)(4) and (5), and (e)(2) (as the text of 45 CFR part 170 stood prior to this final rule). a. 2015 Edition Base EHR Definition Certification Criteria We proposed to remove certain certification criteria from the 2015 Edition that had been included in the 2015 Edition Base EHR definition. As VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 discussed in the preamble to the Proposed Rule (84 FR 7435), the removal of these criteria supports burden and cost reductions for health IT developers and health care providers by eliminating the need to: Design and meet these specific certification functionalities; prepare, test, and certify health IT in certain instances; adhere to associated reporting and disclosure requirements; maintain and update certifications for these specific certified functionalities; and participate in surveillance of health IT certified to these criteria and standards. i. Problem List We proposed to remove the 2015 Edition ‘‘problem list’’ certification criterion (§ 170.315(a)(6)) from the 2015 Edition (84 FR 7436). As we noted in the Proposed Rule, the functionality in this criterion was first adopted as a 2011 Edition certification criterion to support the associated meaningful use Stage 1 objective and measure for recording problem list information. This 2015 Edition ‘‘problem list’’ criterion functionally remains relatively the same as the 2011 Edition and has exactly the same functionality as the 2014 Edition ‘‘problem list’’ criterion. We proposed to remove this criterion because the criterion no longer supports the ‘‘recording’’ objective and measure of the CMS PI Programs as such objective and measure no longer exist.16 Additionally, we stated the functionality is sufficiently widespread among health care providers since it has been part of certification and the Certified EHR Technology definition since the 2011 Edition and has not substantively changed with the 2015 Edition. Furthermore, we stated in the Proposed Rule that the functionality is essential to clinical care and would be in EHR systems absent certification, particularly considering the limited certification requirements. Comments. A number of commenters expressed support for removing the ‘‘problem list’’ certification criterion from the 2015 Edition and ‘‘Base EHR’’ definition. Several of those expressing support for the removal of this criterion specifically noted that the inclusion of the same data elements in the USCDI should suffice to ensure continued ability of certified health IT to record and facilitate access and exchange of 16 By stating in the NPRM that the objective and measure no longer exist, we meant in the CMS PI (formerly EHR Incentive) Programs. The authority citation for this statement is the December 15, 2015 CMS Final Rule ‘‘Medicare and Medicaid Programs; Electronic Health Record Incentive Program-Stage 3 and Modifications to Meaningful Use in 2015 Through 2017’’ (80 FR 62761 and 62785). PO 00000 Frm 00017 Fmt 4701 Sfmt 4700 25657 these data. However, a few commenters expressed concern that removing this and other requirements would be a disincentive to maintain the functionality in the future, and some commenters expressed concern about ONC’s ability to continue to provide effective oversight and require correction if developers do not ensure the functionalities perform safely and effectively. Commenters stated that while many developers will still continue to support the functionalities proposed for removal, eliminating the certification requirement may allow for developers to provide a ‘‘strippeddown’’ product at a lower price point and, in absence of CEHRT definition to guide the providers, mislead independent and small providers into unwittingly acquiring certified health IT that does not fully meet their needs. Response. As discussed in the preamble to the Proposed Rule, a criterion specific to the ‘‘problem list’’ functionality was first adopted in the 2011 Edition, specifically to ensure support for the associated meaningful use Stage 1 objective and the measure for recording problem list information under the CMS PI Programs. The ‘‘recording’’ objective and measure is no longer a part of the CMS PI Programs. However, the functionality remains widespread among EHR systems used by health care providers. While this prevalence may be due in part to its inclusion in the Certified EHR Technology definition, without substantive changes, since the 2011 Edition, we believe the more significant reason that this functionality is widely available is because it is essential to clinical care, and therefore, that the market will and should drive its continued presence in EHR systems regardless of certification requirements. While we also appreciate the concerns of commenters about the need for health IT to support the accurate recording of patients’ problems and the standardsbased exchange of that information, we reiterate that the interoperabilityfocused criteria that will remain in the Base EHR definition and reference the USCDI will ensure that any system of certified health IT meeting the Base EHR definition is capable of using and exchanging data on a patient’s problems using content, format, and other standards applicable to each mode of exchange (e.g., standardized API and C– CDA). Moreover, these interoperabilityfocused criteria will be subject not only to the Program’s familiar initial certification testing and in-the-field reactive surveillance requirements but also to the new Condition and E:\FR\FM\01MYR3.SGM 01MYR3 25658 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations Maintenance of Certification requirements for developers to test annually their certified Health IT Modules’ interoperability performance in the types of real world settings for which they are sold. After consideration of all comments received, and for the reasons noted in the preamble to the Proposed Rule and above, we have finalized the removal of the ‘‘problem list’’ certification criterion (§ 170.315(a)(6)). We further note that upon the effective date of this final rule, the ‘‘problem list’’ certification criterion is removed from the 2015 Edition and the criterion will no longer be included in the 2015 Edition ‘‘safety-enhanced design’’ criterion. This criterion, in § 170.315(g)(3), specifies the usercentered design testing that must be applied to particular EHR functionality submitted for certification. However, in response to specific commenters’ concerns about the impact of removing the functionally-based problem list criterion on our ability to take action where developers may retain the functionality, but fail to ensure it does not pose a danger to patient safety or public health, we note that our responsibility, pursuant to section 3001(b) of the PHSA, includes ensuring certified health IT does not pose a risk to patient safety or public health, and is not limited to measuring the conformity of the health IT to specific certification criteria. As discussed in the ‘‘ONC Health IT Certification Program: Enhanced Oversight and Accountability’’ (EOA) rule which was proposed in 81 FR 11056, and finalized in 81 FR 72404 in 2016, ONC has the authority to address suspected or confirmed non-conformities to the requirements under the ONC Health IT Certification Program if the certified health IT is causing or contributing to serious risks to public health or safety (81 FR 72406). The EOA final rule established in § 170.580 a regulatory framework for ONC’s direct review of health IT certified under the Program, which expressly addresses the potential for ONC to initiate direct review if we have a reasonable belief that certified health IT may not conform to the requirements of the Program because the certified health IT may be causing or contributing to conditions that present a serious risk to public health or safety. With respect to health care providers’ selection of certified health IT products, we would encourage all providers to consider the Base EHR or Certified EHR Technology (CEHRT) definition as a useful starting point. Certain health care payment programs, including the CMS PI Programs, require the use of certified health IT. CMS refers to the minimum VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 set of required certification functionalities that the health IT used by eligible clinicians must have in order to qualify for the CMS incentive programs as CEHRT. Using certified health IT improves care coordination through the electronic exchange of clinical-care documents. It provides a baseline assurance that the technology will perform clinical-care and data-exchange functions in accordance with interoperability standards and user-centered design. ii. Medication List We proposed to remove the 2015 Edition ‘‘medication list’’ certification criterion (§ 170.315(a)(7)) (84 FR 7436). As we noted in the Proposed Rule, the 2015 Edition ‘‘medication list’’ criterion remains functionally the same as the 2011 Edition and 2014 Edition ‘‘medication list’’ criteria. As also discussed in the Proposed Rule, a functionally-based ‘‘medication list’’ criterion was first adopted as a 2011 Edition certification criterion to support the associated meaningful use Stage 1 objective and measure for recording medication list information. The ‘‘medication list’’ criterion that we proposed to remove does not require use of a specific vocabulary standard to record medications. Comments. Comments on the proposal to remove the ‘‘medication list’’ criterion were somewhat mixed. While a number of comments expressed support for the removal of the ‘‘medication list’’ criterion from the 2015 Edition as duplicative of medication data included in the USCDI a number of commenters expressed concerns with, and a few commenters indicated opposition to, the removal of the ‘‘medication list’’ criterion. A few commenters raised concerns specific to elimination of the ‘‘medication list’’ criterion in view of the need to respond to the opioids crisis. One commenter expressed concern in the context of both the medication list and the drugformulary and preferred drug lists criteria as to whether the removal of these criteria could potentially impact patients’ drug costs. Several comments also expressed the same concerns for eliminating the ‘‘medication list’’ that were expressed in regard to removal of the ‘‘problem list’’ criterion, which are summarized above, regarding whether developers will continue to include the functionality and maintain its safe performance. Response. We thank commenters for their input. Upon consideration of all comments received on this proposal, we have finalized the removal of the ‘‘medication list’’ criterion PO 00000 Frm 00018 Fmt 4701 Sfmt 4700 (§ 170.315(a)(7)). The ‘‘recording’’ objective and measure of the CMS PI Programs that the ‘‘medication list’’ criterion was originally adopted to support has since been retired from the CMS Programs. However, the functionality remains widespread among EHR systems used by health care providers. While this prevalence may be due in part to its inclusion in the Certified EHR Technology definition since the 2011 Edition, we believe this functionality is widely available and used in more significant part because it is essential to clinical care and, therefore, the market will and should drive its continued presence in EHR systems regardless of certification requirements. While we also appreciate the concerns of commenters about the need for health IT to support clinicians’ ability to access, maintain, use, and exchange accurate and up-to-date information on their patients’ current medication lists and medication history, we repeat for clarity and emphasis that the interoperability-focused criteria that will remain in the Base EHR definition, and their inclusion of the USCDI, will ensure that any system of certified health IT meeting the Base EHR definition is capable of using and exchanging data on a patient’s medications using content, format, and other standards applicable to each mode of exchange (e.g., standardized API consistent with § 171.315(g)(10), or exchange of C–CDA documents using the transport standards and other protocols in § 171.202). We recognize the critical importance of providers’ and patients’ ability to have, use, and exchange medications information to avoid harms that can arise from interactions and duplications of therapeutic effects amongst newly prescribed drugs and those the patient may already be taking. While the clinical importance of maintaining and referencing current, reconciled medication lists is not limited to those medications with significant risks of misuse or dependency, we agree that it is highlighted by the urgent need to ensure opioids are prescribed and used only with due care when clinically necessary. We believe this clinical importance supports the expectation that the market will ensure this functionality is maintained and will drive innovations that improve its usability for the clinicians who use it in the course of caring for their patients. Moreover, the inclusion of medication information in interoperability-focused criteria in § 170.405(a) will ensure certified health IT can access, use, and exchange medications data according to E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations applicable content and formatting standards, which the ‘‘medication list’’ functionality did not ensure. This interoperability of the data is critical to reducing clinician burden related to manually entering updated drug lists and necessary to enable use of medication information by clinical decision support functionalities. The interoperability-focused criteria will also be subject not only to the Program’s familiar initial certification testing and in-the-field reactive surveillance requirements but also to the new Condition and Maintenance of Certification requirements for developers to test annually their certified Health IT Modules’ interoperability performance in the types of real world settings for which they are marketed. We note that once removed from the 2015 Edition, the criterion will no longer be included in the 2015 Edition ‘‘safety-enhanced design’’ criterion in § 170.315(g)(3). However, as noted above in context of the ‘‘problem list’’ criterion, ONC’s responsibility, pursuant to section 3001(b) of the PHSA, includes ensuring certified health IT does not pose a risk to patient safety or public health. Our responsibility for certified health IT and patient safety or public health is not limited to measuring the conformity of the health IT to specific certification criteria. As discussed in the EOA rule, ONC has the authority to address suspected or confirmed nonconformities to the requirements under the Health IT Certification Program if the certified health IT is causing or contributing to serious risks to public health or safety (81 FR 72406). The EOA final rule established in § 170.580 a regulatory framework for ONC’s direct review of health IT certified under the Program, which expressly addresses the potential for ONC to initiate direct review if we have a reasonable belief that certified health IT may not conform to the requirements of the Program because the certified health IT may be causing or contributing to conditions that present a serious risk to public health or safety. iii. Medication Allergy List We proposed to remove the 2015 Edition ‘‘medication allergy list’’ certification criterion (§ 170.315(a)(8)). The functionality in this criterion was first adopted as a 2011 Edition certification criterion to support the associated meaningful use Stage 1 objective and measure for recording medication allergies information. The criterion does not require use of a vocabulary standard to record VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 medication allergies, and does not directly support interoperability as the criterion does not require representation of medication allergies in standardized nomenclature. The criterion no longer supports a ‘‘recording’’ objective and measure of the CMS PI Programs as such objective and measure no longer exist. This 2015 Edition ‘‘medication allergy list’’ criterion remains functionally the same as the 2011 Edition and 2014 Edition ‘‘medication allergy list’’ criteria. The functionality is essential to clinical care and would be in EHR systems absent certification. Comments. Comments on the proposed removal of the ‘‘medication allergy list’’ criterion were mixed, with several commenters supportive of the removal noting that the criterion would be redundant now that medication allergy data will be included in the USCDI. Commenters expressed concern with the removal of the criterion and questioned the ubiquity of the medication allergy list functionality and whether health IT developers would continue to support the functionality if not required by ONC regulations. Response. We thank commenters for their input. Upon consideration of all comments received on this proposal, we have finalized the removal of the ‘‘medication allergy list’’ certification criterion (§ 170.315(a)(8)). The ‘‘recording’’ objective and measure of the CMS PI Programs that this criterion was originally adopted to support has since been retired from the CMS Programs. However, the functionality remains widespread among EHR systems. While this prevalence may be due in part to its inclusion in the Certified EHR Technology definition since the 2011 Edition, its importance to clinical care suggests the market will drive ongoing availability and enhancement of this functionality over time. Furthermore, because medication allergies are included in the USCDI, all systems of certified health IT meeting the Base EHR definition will be required to be able to exchange and use medication allergy information according to applicable content and formatting standards, which the ‘‘medication allergies’’ criterion did not ensure. This interoperability is critical to reducing clinician burden related to manually entering updated drug lists and necessary to enable use of medication information by clinical decision support functionalities. We believe that requiring the interoperability of medication allergy information will facilitate innovation and improvement in health IT’s ability to meet clinicians’ and patients’ needs more than would the continuation of the PO 00000 Frm 00019 Fmt 4701 Sfmt 4700 25659 ‘‘medication allergies’’ functionallybased criterion. We note that once removed from the 2015 Edition, the ‘‘medication allergy list’’ criterion will also no longer be included in the 2015 Edition ‘‘safetyenhanced design’’ criterion. However, as noted in context of removed criteria above, ONC’s responsibility, pursuant to section 3001(b) of the PHSA includes ensuring certified health IT does not pose a risk to patient safety or public health. Our responsibility for certified health IT and patient safety or public health is not limited to measuring the conformity of the health IT to specific certification criteria. As discussed in the EOA rule, ONC has the authority to address suspected or confirmed nonconformities to the requirements under the Health IT Certification Program if the certified health IT is causing or contributing to serious risks to public health or safety (81 FR 72406). The EOA final rule established in § 170.580 a regulatory framework for ONC’s direct review of health IT certified under the Program, which expressly addresses the potential for ONC to initiate direct review if we have a reasonable belief that certified health IT may not conform to the requirements of the Program because the certified health IT may be causing or contributing to conditions that present a serious risk to public health or safety. iv. Smoking Status We proposed to remove the 2015 Edition ‘‘smoking status’’ criterion (§ 170.315(a)(11)), which would include removing it from the 2015 Edition Base EHR definition (84 FR 7436). We had previously adopted a 2015 Edition ‘‘smoking status’’ certification criterion that does not reference a standard. However, the CCDS definition, which we proposed to remove from regulation in favor of adopting the new USCDI standard, required smoking status to be coded in accordance with a standard value set of eight SNOMED CT® codes defined in § 170.207(h). As with other functionality that was included in 2014 Edition, we believe this functionality is now widespread. Further, smoking status data will continue to be required to be available for access and exchange via the USCDI. Comments. Comments on this proposal were mixed, with a number of commenters expressing support for the removal of ‘‘smoking status’’ criterion in the Program and several noting that it is not needed or duplicative in the context of Program requirements to support the USCDI. A few commenters stated concerns that eliminating the requirement would provide a E:\FR\FM\01MYR3.SGM 01MYR3 25660 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations disincentive for developers to maintain the function in the future. Several commenters expressing concerns about removal of this criterion noted its importance to patient care and to public health, raising points such as the use of smoking status as a key determinant to classify cases of some reportable conditions, such as carbon monoxide poisoning. Concerns raised by commenters opposed to removing smoking status data from providers’ EHR systems included potential for additional provider burden, such as that related to providing complete case reporting data and responding to public health requests for additional information on patient smoking status during case investigation processes. Response. We thank commenters for their input. Upon consideration of the comments, we have finalized the removal of the ‘‘smoking status’’ criterion (§ 170.315(a)(11)). While we continue to believe that accurate, up-todate information on a patient’s smoking status and history has significant clinical value, we believe that its importance to clinical care provides adequate motivation for the market to drive ongoing availability and enhancement of this functionality over time. Because smoking status information is included in the USCDI, all systems of certified health IT meeting the Base EHR definition will now be required to be able to exchange and use smoking status information according to applicable content and formatting standards. The ‘‘smoking status’’ recording functionality criterion we have removed did not ensure smoking status information was captured in a structured, interoperable manner and interoperability of this data is critical to reducing clinician burden related to maintaining complete, current smoking status information. It is also necessary to enable use of smoking status information by clinical decision support and public health reporting functionalities. We believe that interoperability and exchange of smoking status information through the interoperability-focused certification criteria that reference the USCDI standard will better facilitate innovation and improvement in health IT’s ability to meet clinicians’ and patients’ needs than would continuation of the ‘‘smoking status’’ functionally-based recording criterion. Removal of Specific USCDI Smoking Status Code Set Along with the ‘‘smoking status’’ criterion, we proposed to remove the requirement to code smoking status according to the eight smoking status VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 SNOMED CT® codes referenced in the value set adopted in § 170.207(h). These eight codes reflected an attempt to capture smoking status in a consistent manner. Stakeholder feedback indicated that these eight codes do not appropriately and accurately capture all clinically relevant patient smoking statuses. Accordingly, we proposed to no longer require use of only the specific eight SNOMED CT® codes for representing smoking status and remove the value set standard by deleting and reserving § 170.207(h). Comments. Comments specifically addressing this proposal were generally supportive of removing the specific value set of eight SNOMED CT® codes, though many also noted the importance of continuing to require health IT certified under the Program to retain the ability to include or access, exchange, and use appropriately standardized smoking status information. Several comments made specific suggestions related to broadening or revising the vocabulary standard requirements for smoking status information going forward. Other commenters suggested adding other forms of tobacco use, including smokeless and second hand, as well as e-cigarette (vaping) use. Response. We appreciate all commenters’ input and note that no comments received raised concerns that are not addressed by inclusion of smoking status information in the USCDI, which all interoperabilityfocused criteria within the 2015 Edition Base EHR definition, as revised through this final rule, reference. As is the case with patient problems, medications, and medication allergies, we believe having smoking status information available for standards-based exchange is an important facilitator of better care and more effective public health reporting with less data-related burden on clinicians and less need for follow-up by public health professionals to compensate for case reporting data that is incomplete or is not fully interoperable. As is the case with the other removed criteria that were focused on internal recording capabilities, we believe the market can, will, and should be the primary driver for the ongoing maintenance and enhancement of functionalities for end users to record or modify these data. Furthermore, the Program’s focus is more appropriately spent on ensuring that certified health IT supports interoperable access, use, and exchange of these data as the key facilitator for more coordinated patient care and for ongoing innovation and improvement in both provider- and patient-facing functionalities. Because comments on revisions or PO 00000 Frm 00020 Fmt 4701 Sfmt 4700 enhancements to smoking status data standardization moving forward are outside the scope of this section, we will not address them in specific detail here. However, we note that the USCDI v1 references as the standard for smoking status information SNOMED CT®, U.S. Edition.17 Having considered all comments received on this proposal, we have finalized the removal of the eight-code value set standard and removed and reserved § 170.207(h). b. Drug-Formulary and Preferred Drug List Checks We proposed to remove the 2015 Edition ‘‘drug-formulary and preferred drug list checks’’ criterion in § 170.315(a)(10). Comments. Some commenters expressed concern that this criterion’s removal could negatively impact prescribers’ ability to help their patients manage their prescription drug expenses. Although several commenters supported the removal of this criterion in principle, a number of comments expressed concerns about the effect of removal of the ‘‘drug-formulary and preferred drug list checks’’ and other criteria from the Program on health care providers’ ability to comply with CMS and State-specific regulatory requirements for successful participation in the Medicare Quality Payment Program (QPP), or the Medicare or Medicaid PI Programs. One commenter, noting that the DrugFormulary and Preferred Drug List Checks criterion is associated with the CMS e-prescribing objective measures that CMS has finalized for 2019 and subsequent performance years specifically, recommended coordination with CMS to ensure alignment across the policies maintained by these two components of HHS. Response. We thank commenters for their input. As discussed in the Proposed Rule (84 FR 7437), the 2015 Edition ‘‘drug-formulary and preferred drug list checks’’ criterion does call for functionality to check drug formulary and preferred drug lists, but does not require use of any specific interoperability standards. The 2015 Edition ‘‘drug-formulary and preferred drug list checks’’ criterion does not include functionality or advance interoperability beyond what was required by the 2014 Edition ‘‘drugformulary checks’’ criterion. While we 17 For more information on finalized policy regarding adoption of the USCDI standard, see section IV.B.1 of this final rule. USCDI v1 can be accessed freely and directly in its entirety at https:// www.healthit.gov/isa/sites/isa/files/inline-files/ USCDIv12019revised2.pdf. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations believe this functionality is fairly ubiquitous now due in part to the widespread adoption of health IT certified to the 2014 Edition, we do not believe it is necessary to continue to require certification to it under the Program in order to ensure it remains widely available. Instead, we believe, prescribers’ and patients’ interest in assuring patients can get the medications they need at the best available value will provide adequate motivation for the market to drive ongoing availability and enhancement of this functionality over time, including through increasing use of relevant interoperability standards essential to making this functionality more affordable and seamlessly reliable at scale than is feasible in the absence of interoperability driven by ubiquitous use of open standards. Because the ‘‘drug-formulary and preferred drug list checks’’ criterion we proposed to remove does not require use of standards or directly drive interoperability, we do not believe its continued inclusion in the Program would provide sufficient value to providers or patients to justify the burden on developers and providers of meeting Program compliance requirements specific to this criterion. We also recognize the importance of ensuring alignment between ONC Health IT Certification Program regulations and the CMS regulations that reference them. We have been and will continue to work in close partnership with our CMS colleagues to ensure that our regulations remain aligned, and that we provide affected stakeholders with the information they need to understand how the rules work together and how to succeed under CMS’ PI Programs using health IT certified under ONC’s Program. We, therefore, permit ONC–ACBs to issue certificates for this criterion up until January 1, 2022 to align with the requirements of the CMS Medicaid PI Program, as this criterion is associated with measures under the Medicaid program that will continue through 2021; after 2021 there will be no further incentives under the Medicaid Promoting Interoperability Program (84 FR 42592). We have not finalized our proposal to remove the criterion from the CFR but included a provision in § 170.550(m)(1) to only allow ONC– ACBs to issue certificates for this criterion until January 1, 2022. c. Patient-Specific Education Resources We proposed to remove the 2015 Edition ‘‘patient-specific education resources’’ certification criterion in § 170.315(a)(13) (84 FR 7437). We stated VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 that, based on the number of health IT products that have been certified for this functionality as part of 2014 Edition certification and already for 2015 Edition, we believe that health IT’s ability to identify appropriate patient education materials is widespread now among health IT developers and their customers (e.g., health care providers). We also noted that we have recently seen innovative advancements in this field, including the use of automation and algorithms to provide appropriate education materials to patients in a timely manner. These advancements help limit clinical workflow interruptions and demonstrate the use and promise of health IT to create efficiencies and improve patient care. As such, we stated that removal of this criterion would prevent certification from creating an unnecessary burden for developers and providers and an impediment to innovation. Comments. Some commenters expressed concern related to this functionality not yet being consistently used by all providers and to whether removal of this criterion may create a barrier to successful participation for providers in the Medicaid PI Program. One commenter noted that providers’ workflow changes to use this functionality are substantial and expressed concern related to providers potentially not undertaking such changes if the criteria were not required to be included in health IT and used by providers. Response. While we continue to recognize the importance of patient and provider interaction to promote positive health outcomes, we also believe that this criterion, narrowly focused on a specific functionality not connected to interoperability, is no longer the best way to encourage innovation and advancement in health IT’s ability to support clinician-patient interactions and relationships. Having reviewed all comments received on this proposal, we have decided not to remove the ‘‘patientspecific education resources’’ criterion from the Program at this time. We recognize the importance of ensuring alignment between ONC Health IT Certification Program regulations and the CMS regulations that reference them. We will continue to work in close partnership with our CMS colleagues to ensure that our regulations remain aligned and that we provide affected stakeholders with the information they need to understand how the rules work together and how to succeed under CMS incentive programs using health IT certified under ONC’s Program. CMS has identified this criterion as PO 00000 Frm 00021 Fmt 4701 Sfmt 4700 25661 supporting the patient electronic access to health information objective and measure, which is expected to remain operational for Medicaid until January 1, 2022; after 2021, there will be no further incentives under the Medicaid Promoting Interoperability Program (84 FR 42592). We, therefore, will permit ONC–ACBs to issue certificates for this criterion up until January 1, 2022, to align with the requirements of the CMS Medicaid PI Program (84 FR 42592). We have included a provision in § 170.550(m)(1) to only allow ONC– ACBs to issue certificates for this criterion until January 1, 2022. d. Common Clinical Data Set Summary Record—Create; and Common Clinical Data Set Summary Record—Receive As stated in the proposed rule (84 FR 7437), we assessed the number of products certified to the 2015 Edition ‘‘Common Clinical Data Set summary record—create’’ (§ 170.315(b)(4)) and ‘‘Common Clinical Data Set summary record—receive’’ (§ 170.315(b)(5)) criteria that have not also been certified to the 2015 Edition ‘‘transitions of care’’ criterion (§ 170.315(b)(1)) that also requires health IT be capable of creating and receiving Common Clinical Data Set (CCDS) Summary Records using the same interoperability standards. We explained that, based on our findings of only two unique products certified only to these criteria and not to the ‘‘transitions of care’’ criterion at the time of the drafting of the Proposed Rule, there appears to be little market demand for certification to 2015 Edition ‘‘Common Clinical Data Set summary record—create’’ (§ 170.315(b)(4)) and ‘‘Common Clinical Data Set summary record—receive’’ (§ 170.315(b)(5)) criteria alone. Therefore, we proposed to remove these certification criteria from the 2015 Edition. Comments. The comments we received on this proposal supported this removal. Response. We thank commenters for their support and have finalized removal of the 2015 Edition ‘‘Common Clinical Data Set summary record— create’’ (§ 170.315(b)(4)) and ‘‘Common Clinical Data Set summary record— receive’’ (§ 170.315(b)(5)) criteria. e. Secure Messaging We proposed to remove the 2015 Edition ‘‘secure messaging’’ criterion (§ 170.315(e)(2)). As explained in the Proposed Rule (84 FR 7437), ONC strongly supports patient and provider communication, as well as protecting the privacy and security of patient information, but no longer believes that a separate certification criterion focused E:\FR\FM\01MYR3.SGM 01MYR3 25662 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations on a health IT’s ability to send and receive secure messages between health care providers and patients is necessary. This criterion would also no longer be associated with an objective or measure under the CMS PI Programs based on proposals and determinations in recent CMS rulemakings (83 FR 41664; 83 FR 35929). Comments. Several comments specifically referencing this proposal were supportive of removing this criterion. A number of commenters expressed concern with the removal of the ‘‘secure messaging’’ criterion, including whether removal of this criterion may create a barrier to successful participation for providers in the CMS PI Programs. Other commenters expressed concerns about continued availability of secure digital endpoints for health care providers. Some commenters noted that some providers and patients might prefer to continue using ‘‘secure messaging’’ functionality in lieu of other options for a variety of purposes for which they currently use it, while others expressed concern that the separate ‘‘secure messaging’’ functionality will disappear from the market if no longer supported by ONC requirements. Commenters expressed that options for data access and exchange, such as portals and APIs, might satisfy providers’ and patients’ needs for interoperable communication. However, commenters expressed a concern that these options may not ensure continued availability to new market entrants’ health IT without requiring the technology to interact with developer- or system-specific interfaces. Response. We thank commenters for their input. Having reviewed all comments received on this proposal, we have decided not to remove the ‘‘secure messaging’’ criterion from the Program at this time. We recognize the importance of ensuring alignment between ONC Health IT Certification Program regulations and the CMS regulations that reference them. We will continue to work in close partnership with our CMS colleagues to ensure that our regulations remain aligned and that we provide affected stakeholders with the information they need to understand how the rules work together and how to succeed under CMS incentive programs using health IT certified under ONC’s Program. CMS has identified this criterion as supporting the coordination of care through patient engagement objective and measure, which is expected to remain operational for Medicaid until January 1, 2022; after 2021 there will be no further incentives under the Medicaid Promoting Interoperability Program (84 FR 42592). VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 We, therefore, will permit ONC–ACBs to issue certificates for this criterion up until January 1, 2022 to align with the requirements of the CMS Medicaid PI Program (84 FR 42592). We have included a provision in § 170.550(m)(1) to only allow ONC–ACBs to issue certificates for this criterion until January 1, 2022. Limiting certificates to this criterion for this period will help spur further innovations in patient engagement while helping to reduce regulatory burdens and costs for health IT developers and health care providers. The other 2015 Edition certification criteria that support patient engagement, such as the 2015 Edition ‘‘view, download, and transmit to 3rd party,’’ ‘‘API,’’ and ‘‘patient health information capture’’ certification criteria better support interoperability and innovation in patient engagement. We have seen developers integrate secure messaging functionality as part of other patient engagement features, such as patient portals, and integrate messaging with access to and exchange of clinical and administrative data. These integrated technologies currently in use offer more comprehensive options for providers and patients to interact and share information via a secure platform and may render the separate ‘‘secure messaging’’ criterion and functionality redundant to robust integrated options. We also believe removing the standalone ‘‘secure messaging’’ criterion will encourage the market to pursue other innovative means of offering patient engagement and interaction functionalities that providers and patients want, with the convenience and efficiency they demand. Thus, we believe that the removal of this criterion will help reduce burden and costs without negative impact on current or future innovations in patient engagement and secure information exchange. In response to the concern about new market entrants being able to receive data needed to serve their customers, we note that the ‘‘view, download, and transmit to 3rd party’’ criterion remains available for patients who wish to send their health information to a third party of the patient’s choice. Other remaining interoperability-focused criteria, such as ‘‘transitions of care,’’ ensure that systems of health IT certified to at least those criteria remaining in the ‘‘Base EHR’’ definition will remain capable of supporting providers’ use of new entrant and other third party health IT of their choosing without requiring that health IT to integrate or interface with their certified health IT. PO 00000 Frm 00022 Fmt 4701 Sfmt 4700 5. Removal of Certain ONC Health IT Certification Program Requirements We proposed to remove certain mandatory disclosure requirements and a related attestation requirement under the Program. As discussed in the Proposed Rule (84 FR 7437), we believe removal of these requirements will reduce costs and burden for Program stakeholders, particularly for health IT developers and ONC–ACBs. a. Limitations Disclosures We proposed to remove § 170.523(k)(1)(iii)(B), which requires ONC–ACBs to ensure that certified health IT includes a detailed description of all known material information concerning limitations that a user may encounter in the course of implementing and using the certified health IT, whether to meet ‘‘meaningful use’’ objectives and measures or to achieve any other use within the scope of the health IT’s certification. We proposed to remove § 170.523(k)(1)(iv)(B) and (C), which state that the types of information required to be disclosed include, but are not limited to: (B) Limitations, whether by contract or otherwise, on the use of any capability to which technology is certified for any purpose within the scope of the technology’s certification; or in connection with any data generated in the course of using any capability to which health IT is certified; (C) limitations, including but not limited to technical or practical limitations of technology or its capabilities, that could prevent or impair the successful implementation, configuration, customization, maintenance, support, or use of any capabilities to which technology is certified; or that could prevent or limit the use, exchange, or portability of any data generated in the course of using any capability to which technology is certified. Comments. Most of the comments specifically referencing this proposal were supportive. A few commenters raised concerns regarding the utility of mandatory disclosures to health care providers, their health information exchange partners, and ONC, with some commenters offering suggestions for how ONC could use disclosures information in the future. A few commenters’ concerns specifically referenced the disclosure of costs information. Response. We thank commenters for their input. We have finalized removal of § 170.523(k)(1)(iii)(B) and § 170.523(k)(1)(iv)(B) and (C), as proposed (84 FR 7437 and 7438). As E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations discussed in the Proposed Rule (84 FR 7438), these specific disclosure requirements are superseded by the Cures Act information blocking provision and Conditions of Certification requirements, which we proposed to implement in the same Proposed Rule (84 FR 7424). As also noted in the Proposed Rule (84 FR 7438), we proposed (84 FR 7465 and 7466) a complementary Condition of Certification requirement that developers would be prohibited from taking any action that could interfere with a user’s ability to access or use certified capabilities for any purpose within the scope of the technology’s certification discussed further in section VII.2. We also note here to ensure clarity that we did not propose, and have not finalized, a complete removal of the transparency requirements in § 170.523(k)(1). Requirements under § 170.523(k)(1) other than those specifically proposed for removal will remain in place. The transparency requirements remaining in place include: § 170.523(k)(1)(iii)(A), which describes the plain language detailed description of all known material information concerning additional types of costs that a user may be required to pay to implement or use the Complete EHR or Health IT Module’s capabilities, whether to meet meaningful use objectives and measures, or to achieve any other use within the scope of the health IT’s certification; and § 170.523(k)(1)(iv)(A) specification that the types of information required by § 170.523(k)(1)(iii) include, but are not limited to, additional types of costs or fees (whether fixed, recurring, transaction-based, or otherwise) imposed by a health IT developer (or any third party from whom the developer purchases, licenses, or obtains any technology, products, or services in connection with its certified health IT) to purchase, license, implement, maintain, upgrade, use, or otherwise enable and support the use of capabilities to which health IT is certified; or in connection with any data generated in the course of using any capability to which health IT is certified. b. Transparency and Mandatory Disclosures Requirements We proposed to remove the Principle of Proper Conduct (PoPC) in § 170.523(k)(2), which requires ONC– ACBs to ensure health IT developers’ adherence to a requirement that the health IT developer submit an attestation that it will disclose all of the information in its mandatory VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 disclosures per § 170.523(k)(1) to specified parties (e.g., potential customers or anyone inquiring about a product quote or description of services). As discussed in the Proposed Rule (84 FR 7438), we believe this provision is no longer necessary and that its removal is appropriate to further reduce administrative burden for health IT developers and ONC–ACBs. Comments. The majority of commenters specifically discussing this proposal expressed support for the removal of the PoPC in § 170.523(k)(2). A few commenters expressed concern that the high degree of transparency ONC noted in the Proposed Rule might not be maintained as they noted a possibility that the PoPC requiring the ONC–ACBs to ensure the developers submitted an attestation, and, in turn, the developers’ obligation to make the attestation, may be driving the currently observed levels of transparency. Response. We thank commenters for their input. We have decided to finalize the removal of the PoPC in § 170.523(k)(2). We appreciate the importance of holding health IT developers accountable for meeting all requirements of participation in the Program, including meeting or exceeding the minimum required transparency disclosures. We believe that the needed transparency and accountability will be maintained and enhanced by certain Condition and Maintenance of Certification requirements we have finalized in this rule, which include the assurances and attestations specifically discussed in section VII.2 in relation to this proposed removal of § 170.523(k)(2). We believe that the removal of the PoPC requirements in § 170.523(k)(2) will likely aid in the avoidance of unnecessary costs and burden for Program stakeholders, particularly health IT developers and ONC–ACBs. 6. Recognition of Food and Drug Administration Processes Section 618 of the Food and Drug Administration Safety and Innovation Act (FDASIA), Public Law 112–144, required that the Food and Drug Administration (FDA), in consultation with ONC and the Federal Communications Commission (FCC) (collectively referred to as ‘‘the Agencies’’ 18 for this final rule), develop a report containing a proposed strategy and recommendations on an appropriate, risk-based regulatory framework pertaining to health IT, including mobile medical applications, 18 ONC is not an agency, but an office within the Department of Health and Human Services. PO 00000 Frm 00023 Fmt 4701 Sfmt 4700 25663 that promotes innovation, protects patient safety, and avoids regulatory duplication. The FDASIA Health IT Report of April 2014,19 contained a proposed strategy and recommendations on an appropriate, risk-based regulatory framework pertaining to health IT that promotes innovation, protects patient safety, and avoids regulatory duplication. Public comments, received prior to the report’s publication and after,20 recommended that health IT developers/manufacturers apply a single process that satisfies the requirements of all agencies, and existing safety and quality-related processes, systems, and standards should be leveraged for patient safety in health IT. On July 27, 2017, FDA announced a voluntary Software Precertification Pilot Program as part of a broader Digital Health Innovation Action Plan.21 It was developed in order to create a tailored approach toward recognizing the unique characteristics of digital technology by looking first at the firm, rather than primarily at each product of the firm, as is currently done for traditional medical products. The FDA plans to explore whether and how pre-certified companies that have demonstrated a culture of quality, patient safety, and organizational excellence could bring certain types of digital health products to market either without FDA premarket review or with a more streamlined FDA premarket review. a. FDA Software Precertification Pilot Program We proposed (84 FR 7438 and 7439) to establish processes that would provide health IT developers that can document holding pre-certification under the FDA Software Precertification Pilot Program with exemptions to the ONC Health IT Certification Program’s requirements for testing and certification of its health IT to the 2015 Edition ‘‘quality management systems’’ criterion (§ 170.315(g)(4)) and the 2015 Edition ‘‘safety-enhanced design’’ criterion (§ 170.315(g)(3)), as these criteria are applicable to the health IT developer’s health IT presented for 19 https://www.fda.gov/downloads/AboutFDA/ CentersOffices/ OfficeofMedicalProductsandTobacco/CDRH/ CDRHReports/UCM391521.pdf. 20 https://www.federalregister.gov/documents/ 2013/05/30/2013-12817/food-and-drugadministration-safety-and-innovation-act-fdasiarequest-for-comments-on-the, https://blogs.fda.gov/ fdavoice/index.php/2014/04/fda-seeks-commenton-proposed-health-it-strategy-that-aims-topromote-innovation/ and https:// www.regulations.gov/document?D=FDA-2014-N0339-0001. 21 https://www.fda.gov/MedicalDevices/ DigitalHealth/DigitalHealthPreCertProgram/ Default.htm. E:\FR\FM\01MYR3.SGM 01MYR3 25664 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations certification. We also stated that such a ‘‘recognition’’ could, depending on the final framework of the FDA Software Precertification Pilot Program, be applicable to the functionally-based 2015 Edition ‘‘clinical’’ certification criteria (§ 170.315(a)). We noted in the Proposed Rule that the proposed ‘‘recognition’’ could also be appropriate to address any or all of the following functionally-based 2015 Edition criteria in the event their proposed removal were not finalized: ‘‘problem list’’ (§ 170.315(a)(6)), ‘‘medication list’’ (§ 170.315(a)(7)), ‘‘medication allergy list’’ (§ 170.315(a)(8)), ‘‘drug-formulary and preferred drug list checks’’ (§ 170.315(a)(10)),’’ and ‘‘smoking status’’ (§ 170.315(a)(11)). We noted (84 FR 7439) that despite proffered benefits including alignment with both EOs 13563 and 13771 regarding deregulatory, less burdensome, and more effective regulatory schemes and programs, and serving as a regulatory relief for those health IT developers qualifying as small businesses under the Regulatory Flexibility Act (84 FR 7587 and 7588), there may be reasons not to adopt such a ‘‘recognition’’ approach. We noted as examples of such reasons that stakeholders may not agree that the FDA Software Precertification Program sufficiently aligns with our Program, and that stakeholders may have operational concerns. Accordingly, we welcomed comments on these and other aspects of our proposed ‘‘recognition’’ approach, including the 2015 Edition certification criteria that should be eligible for ‘‘recognition.’’ Comments. The majority of commenters commended ONC’s efforts to recognize the FDA Software Precertification Program. However, most commenters expressed concerns that FDA’s program was not yet mature enough to assess the degree of alignment to the ONC Health IT Certification Program. Many commenters expressed concerns that the FDA Software Precertification Pilot Program focuses on development and business practices, with a potential for streamlining requirements for pre-market clearance of specific functionalities, while ONC’s certification Program focuses less on development practices and more on certification of individual software products as meeting Program-specified requirements for functionality and interoperability, including conformance with specific interoperability standards. Many of these commenters indicated that until the FDA program is more fully mature they would prefer to reserve judgment on how recognition could or should be structured to satisfy the needs VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 of ONC’s Program at lower burden on those developers for whom dual participation is a need or an appealing option. Several commenters noted potential for recognition of developers who achieve precertification status under the FDA’s program to streamline or offer them a low-burden option for satisfying certain requirements under ONC’s Program. However, several commenters urged that obtaining FDA precertification status should not be the only way a developer could satisfy any requirement under ONC’s Program, noting that a developer of one or more certified Health IT Modules that is newer to the market or simply smaller and not engaged in development of software subject to FDA regulation could find the FDA Software Precertification Program’s requirements a higher hurdle to entering or remaining in the ONC-certified health IT market sector than the ONC requirements the recognition might replace. Response. Considering commenters’ concerns and the maturity of the FDA Software Precertification Program— which remains in a pilot phase at the time this final rule is being drafted—we have decided not to finalize recognition of the FDA Software Precertification Program at this time. However, we anticipate continuing to consult and coordinate with our colleagues at FDA and to monitor the details and experience of the FDA Software Precertification Program as it continues to mature. We continue to believe that there may be potential for recognition of the FDA Software Precertification Program to contribute in the future to our ongoing goals of reducing burden and promoting innovation while maintaining or enhancing the assurance that the ONC Health IT Certification Program provides, but we have not finalized our proposal at this time. b. Development of Similar Independent Program Processes—Request for Information In the Proposed Rule (84 FR 7439), we included a request for information (RFI) related to the development of similar independent processes to those of the FDA Software Precertification Program for purposes of our Program. We received 21 comments on this RFI and appreciate the input provided by commenters. We will continue to consider whether to develop similar independent processes and whether this should be included in future rulemaking. PO 00000 Frm 00024 Fmt 4701 Sfmt 4700 IV. Updates to the 2015 Edition Certification Criteria In order to capture and share patient data efficiently, health care providers need health IT that store data in structured formats. Structured data allows health care providers to easily retrieve and transfer patient information, and use health IT in ways that can aid patient care. We proposed to update the 2015 Edition by adopting a limited set of revised and new 2015 Edition certification criteria, including new standards, to support these objectives. Some of these criteria and standards are included in the Certified EHR Technology (CEHRT) definition used for participation in HHS Programs, such as the Promoting Interoperability (PI) Programs (formerly the EHR Incentive Programs), some are required to be met for participation in the ONC Health IT Certification Program, and some, though beneficial, are unassociated with the CEHRT definition and not required for participation in any HHS program, including the ONC Health IT Certification Program (Program). Comments. We received a few comments in support of our approach to modify the 2015 Edition health IT certification criteria. One commenter commended ONC for proposing logical updates to the 2015 Edition certification criteria, rather than overhauling the Program or establishing a new edition of certification, stating iterative changes will provide stability and allow the industry to adapt to new market forces. Commenters stated that this incremental approach best serves the health care provider and health IT developer community. One commenter applauded ONC for proposing logical updates to the 2015 Edition health IT certification criteria and recommended that ONC continue to seek to maximize the impact of these certification changes and pursue all opportunities to simplify existing criteria. However, a number of commenters requested that ONC put forth a new edition and suggested varied approaches to a new edition. Commenters suggested that ONC clearly delineate the difference between the editions by creating a new naming convention for the updated criteria, such as a version number. Others recommended a 2020 Edition or the corresponding year in which this rule is effective. Still other commenters recommended the proposed updated 2015 Edition be renamed to the 2021 Edition instead of renamed with a Release 2 at end of the existing name. Some commenters identified the scope of the proposed E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations changes as the reason ONC should establish the updates as a new edition of certification criteria rather than simply updating the 2015 Edition. However, the majority of commenters recommending a new edition based their concern on the potential confusion among providers who purchase and use certified health IT resulting from different products available under the same label. Response. We thank commenters for their input on the tradeoffs associated with modifying the current 2015 Edition versus creating a new edition. We considered a variety of factors when we framed our proposals. First, we reviewed the scope of each proposed update and the cumulative scope of the proposals overall for health IT developers and sought to identify whether it would be more appropriate to require health IT developers participating in the Program to implement updates to Health IT Modules certified to the 2015 Edition or to test and certify health IT products to an entirely new edition of certification criteria. Second, we considered the impact that either approach would have on health care providers, including how such updated Health IT Modules or products certified to a new edition would be implemented by providers participating in CMS programs. We have considered the impact on health IT developers related to the scope of the individual updates as well as the cumulative scope of all updates to the 2015 Edition adopted in this final rule (see also section XIII Regulatory Impact Analysis). In this final rule, we have only adopted two new technical certification criteria in § 170.315(b)(10) and § 170.315(g)(10) to which health IT developers seeking to upgrade their products will need to present Health IT Modules for certification. Unlike the new criteria introduced in prior certification edition rulemakings, both of these new criteria are an expansion or modification of existing criteria within the 2015 Edition which are currently in use in certified health IT. The new criteria in § 170.315(b)(10) relates to the 2015 Edition criteria in § 170.315(b)(6) with an expansion of the data and a removal of the specificity for the standard requirement. The new Standardized API criteria in § 170.315(g)(10) relates to the 2015 Edition API criteria with an expansion of security requirements and the addition of applicable standards. For the remainder of the updated criteria, a developer would not be required to present a Health IT Module for certification in order to update a certified product in accordance with VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 this final rule. Instead, a health IT developer would update their certified Health IT Module, notify the ONC–ACB that they have done so, and make the update available their customers. Additionally, unlike prior certification edition rulemakings, the certification criteria updated to address compliance with the USCDI do not include new functionality nor do they require a complete redesign of Health IT Modules certified to such certification criteria. As noted in the Proposed Rule, the updates to the CCDS to create the USCDI were intentionally limited to a modest expansion that most health IT developers already supported, were already working toward, or should be capable of updating their health IT to support in a timely manner. Please see Table 1 for a list of all certification criteria changes. In consideration of the impact our approach would have on health care providers, we note that impact and potential burden for providers is of particular importance given that CY2019 was the first performance year where eligible clinicians (ECs), eligible hospitals, dual-eligible hospitals, and critical access hospitals (CAHs) participating in CMS programs— including the CMS Promoting Interoperability Program and the Quality Payment Program/Merit-based Incentive Payment System—were required to use health information technology certified to the 2015 Edition to meet the requirements of the CMS CEHRT definition. If we were to adopt a new edition of certification criteria, CMS programs would have to consider establishing a new CEHRT definition and a subsequent requirement for program participants who have only recently completed a full edition update to their technology used for program participation. Historically, with a new edition of certification criteria, health IT developers have packaged Health IT Modules certified to new, modified, and unchanged criteria into a wholly new certified product. Historical data indicates that these complete updates to the edition are particularly challenging for both health IT developers seeking certification and for health care providers as they place deadlines for a significant number of health IT developers to support and implement new products for a significant number of health care providers simultaneously. As a result, the burden of updating the technology is compounded for both health IT developers and health care providers. While ONC does not itself place any such requirements on health care providers, we believe the risk of PO 00000 Frm 00025 Fmt 4701 Sfmt 4700 25665 such significant burden must be considered in health IT policy decisions. Further, we believe the scope of the updates and the impact on health IT developers and health care providers must be considered in tandem— meaning that an entirely new edition should only be established when the scope of the updates is significant enough to warrant the impacts of implementation. When the scope of updates does not warrant implementation of an entirely new edition of certification criteria, we believe it is appropriate to update the existing criteria. For example the 2015 Edition included new criteria that were neither built upon nor updated to existing criteria in the 2014 Edition, which was significantly different than the 2011 Edition. In contrast, health IT developers have been able to employ regular or cyclical updates without modifying all Health IT Modules certified to unchanged criteria in order to implement updates to existing certification criteria such as the annual updates to CMS eCQMs or for changes made to public health reporting standards. In such cases, the changes may be implemented by health IT developers in the manner most appropriate for their product and their customers, such as through routine service and maintenance rather than a completely new implementation. In order to understand the impact these updates would have on participants in the CMS programs which reference them for use by program participants, we compare these updates to the current definition of CEHRT established by CMS at 42 CFR 495.4 for eligible hospitals, CAHs and Medicaid eligible professionals and at 42 CFR 414.1305 for eligible clinicians in MIPS. For 2019 and subsequent years, the CMS CEHRT definition specifies the use of EHR technology certified to 2015 Edition including technology that meets the 2015 Edition Base EHR definition in § 170.102, as well as other certified technology necessary to be a meaningful user. The updates finalized in this final rule impact both certification criteria included in the Base EHR definition as well as criteria required for applicable objectives and measures. Specifically, this final rule updates several criteria currently applicable for certified Health IT Modules used by CMS program participants for the CMS objectives and measures necessary to be a meaningful user, including: • Revisions to the electronic prescribing criterion in § 170.315(b)(3) to reference an updated e-prescribing standard; E:\FR\FM\01MYR3.SGM 01MYR3 25666 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations • Revisions relating to the drugformulary and preferred drug list checks criterion in § 170.315(a)(10) to include at 170.550(m)(1) to only allow ONC– ACBs to issue certificates for this criterion until January 1, 2022; • Replacement of the API criterion in § 170.315(g)(8) with a new API criterion in § 170.315(g)(10) referencing an API standard and related security standards; • Revisions to several criteria to reference the USCDI and implement other standards updates (see Table 1 for specifics); and • Revisions to § 170.315(c)(3), to update quality reporting standards. In general, health IT developers have 24 months from the publication date of the final rule to make technology certified to these updated criteria available to their customers, and during this time developers may continue supporting technology certified to the prior version of certification criteria for use by their customers. For providers participating in CMS programs, this means they can continue to use the certified technology they have available to them to support program participation and can work with their developers to implement any updates in a manner that best meets their needs. For the revisions to electronic prescribing criterion in § 170.315(b)(3) and to the quality reporting standards, in § 170.315(c)(3), the updates adopted for certified health IT align specifically with changes already required by CMS for use by health care providers. This means health IT developers are already implementing and supporting these updates. The implementation of these updates is driven by other requirements and so repackaging such updates in a new edition (or a new product) would create a redundancy and could have unintended cost burden on health care providers. For the updates to the criteria referencing the USCDI, as noted previously, we based the USCDI on the existing CCDS with modest expansion that most health IT developers already supported, were already working toward, or should be capable of updating their health IT to support in a timely manner. Finally, for the removal of the drug-formulary and preferred drug list checks in § 170.315(a)(10), we note that the removal from the Program has negligible impact on health care providers. First, as discussed in past CMS regulations related to the use of these functionalities by participants in CMS programs, health care providers have noted that while formulary checks are a promising approach, the utility of the specific functionality that is certified is not necessarily consistently applicable VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 for all prescriptions (80 FR 62833). Second, as it does not remove the product from the market, any providers who are using the current functionality may continue to use the technology for their purposes. For the replacement of the API criterion in § 170.315(g)(8) with a new Standardized API criterion in § 170.315(g)(10) referencing an API standard and related security standards, we reiterate that health IT developers have 24 months from the date of publication of this final rule to update their technology and make such available to their customers. The 2015 Edition final rule adopted an API criterion in § 170.315(g)(8) which was implemented by many health IT developers using the underlying standard adopted in this final rule for the Standardized API criterion in § 170.315(g)(10). This common use impacted our decision to adopt the standard in our update to the 2015 Edition (see also section VII.B.4.c Standardized API for Patient and Population Services). We, therefore, believe that both the scope of the updates and the potential impact on health IT developers and health care providers do not constitute sufficient justification for the potential burden associated with adopting an entirely new edition of certification criteria. Instead, we believe it is most reasonable and effective for these updates to be part of the existing 2015 Edition as modified in this final rule. We acknowledge the concerns of commenters who expressed the potential risk of confusion about the updates among their customers and how to best communicate that a product meets the updated version of a given certification criterion. We strongly encourage health IT developers to work with their customers to promote understanding of these updates. In addition, we have taken several mitigating steps. First, we revisited our proposed regulatory structure and revised it so that the structure more clearly reflects if a change is updating the previously adopted standard, or a more significant change to the criterion such as adding a new standard. This maintains the prior 2015 Edition regulatory structure for the majority of the updates except for § 170.315(b)(10) and (g)(10) as discussed previously, and establishes a more clear sense of scope. Second, in order to support effective communication of the updates, we are implementing a practical approach to facilitate transparency using the Certified Health IT Product List PO 00000 Frm 00026 Fmt 4701 Sfmt 4700 (CHPL),22 which is the tool that health care providers and the general public may use to identify the specific certification status of a product at any given time, to explore any certification actions for a product, and to obtain a CMS Certification ID for a product used when participating in CMS programs. While we retain the overall 2015 Edition title, we will distinguish the 2015 Edition certification criteria from the new or revised criteria adopted in this final rule by referring to the new or revised criteria as the 2015 Edition Cures Update on the CHPL for products that are certified. The CHPL will also differentiate to what standards the health IT will be certified and will allow health care providers to identify if and when a specific Health IT Module has been updated. This will help to eliminate some of the confusion among providers who are seeking to understand the certification and update the status of the product they are currently using. It can also be a resource for providers who may be making a new purchase of certified health IT to make an informed decision about which products support the most up to date available standards and functionality. We further note that, while in the past ONC has largely relied on creating a new edition to implement changes to certification criteria, in each case, those changes included some updates to existing criteria, but also criteria containing functionality and standards that were entirely new and did not build on the prior edition. In addition, the Cures Act set in motion a shift for the ONC Health IT Certification Program by including Conditions and Maintenance of Certification requirements which allowed for processes such as the Standards Version Advancement Process (SVAP) flexibility within real world testing, which allows better alignment to industry efforts for standards advancement while maintaining accountability. These new provisions help to remove barriers for standards development and version updates, which limit a health IT developer’s ability to provide individually relevant, timely, and innovative solutions to their clients. This change is consistent with our approach to adopt incremental updates in this final rule rather than to adopt a complete new edition of certification criteria. This final rule is the first time we have executed on the concept of Maintenance of Certification requirements for existing certificates, and we foresee the potential for future 22 ONC Certified Health IT Product List: https:// chpl.healthit.gov. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations rulemakings to include incremental updates to certification criteria when such updates are appropriate. 25667 Please see Table 1 for a list of all certification criteria changes. TABLE 1—2015 EDITION CURES UPDATE Certification criteria Reference New/revised/ removed/timelimited certification Problem list .................. § 170.315(a)(6) ..... Removed .............. Medication list .............. § 170.315(a)(7) ..... Removed .............. Medication allergy list .. § 170.315(a)(8) ..... Removed .............. Drug Formulary and Preferred Drug List Checks. § 170.315(a)(10) ... Time-limited Certification. Smoking status ............ § 170.315(a)(11) ... Removed .............. Patient-specific Education Resource. § 170.315(a)(13) ... Time-limited Certification. Transitions of Care ...... § 170.315(b)(1) ..... Revised ................ Update to USCDI/C–CDA companion guide within 24 months after the publication date of final rule. Clinical information reconciliation and incorporation. Electronic prescribing .. § 170.315(b)(2) ..... Revised ................ § 170.315(b)(3) ..... Revised ................ § 170.315(b)(4) ..... Removed .............. Update to USCDI/C–CDA companion guide within 24 months after the publication date of final rule. Update standard within 24 months after the publication of final rule. Effective date of final rule (60 days after publication). § 170.315(b)(5) ..... Removed .............. Effective date of final rule (60 days after publication). § 170.315(b)(6) ..... Time-limited Certification. Security tags—summary of care—send. § 170.315(b)(7) ..... Revised ................ Security tags—summary of care—receive. Care plan ..................... § 170.315(b)(8) ..... Revised ................ § 170.315(b)(9) ..... Revised ................ EHI export .................... § 170.315(b)(10) ... New ...................... Clinical quality measures (CQMs)—report. Auditable events and tamper-resistance. Audit report(s) .............. § 170.315(c)(3) ..... Revised ................ § 170.315(d)(2) ..... Revised ................ § 170.315(d)(3) ..... Revised ................ Auditing actions on health information. Encrypt authentication credentials. § 170.315(d)(10) ... Revised ................ § 170.315(d)(12) ... New ...................... Multi-factor authentication (MFA). § 170.315(d)(13) ... New ...................... View, Download, and Transmit to 3rd Party. § 170.315(e)(1) ..... Revised ................ Secure Messaging ....... § 170.315(e)(2) ..... Time-limited Certification. ONC–ACBs may only issue certificates until 36 months after the publication date of the final rule. Document, section, and entry (data element) level; or Document level for the period until 24 months after publication date of final rule. Document, section, and entry (data element) level; or Document level for the period until 24 months after publication date of final rule. Update to C–CDA companion guide within 24 months after publication date of final rule. Update within 36 months of publication date of final rule. Effective date of final rule (60 days after publication). Update to new ASTM standard within 24 months after publication date of final rule. Update to new ASTM standard within 24 months after publication date of final rule. Update to new ASTM standard within 24 months after publication date of final rule. Effective date of final rule (60 days after publication) (New and updated certifications only). Effective date of final rule (60 days after publication) (New and updated certifications only). Update to USCDI/C–CDA companion guide within 24 months after publication date of final rule. ONC–ACBs only permitted to issue certificates for this criterion until January 1, 2022. Transmission to public health agencies— electronic case reporting. Consolidated CDA creation performance. § 170.315(f)(5) ...... Revised ................ Update to USCDI/C–CDA companion guide within 24 months after publication date of final rule. § 170.315(g)(6) ..... Revised ................ Application Access— Data Category Request. § 170.315(g)(8) ..... Time-limited Certification. Update to USCDI/C–CDA companion guide within 24 months after publication date of final rule. 24 months after publication date of final rule ... Common Clinical Data Set summary record—create. Common Clinical Data Set summary record—receive. Data Export .................. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 PO 00000 2015 Edition cures update—timing Impact on CMS promoting interoperability (PI) programs Effective date of final rule (60 days after publication). Effective date of final rule (60 days after publication). Effective date of final rule (60 days after publication). ONC–ACBs only permitted to issue certificates for this criterion until January 1, 2022. Removed from 2015 Edition Base EHR definition. Removed from 2015 Edition Base EHR definition. Removed from 2015 Edition Base EHR definition. PI Measures: —e-Rx —-Query of PDMP Operational for Medicaid until January 1, 2022. Removed from 2015 Edition Base EHR definition. Operational for Medicaid until January 1, 2022 Supports Patient Electronic Access to Health Information Objective Measure. PI Measures: —Support Electronic Referral Loops by Sending Health Information —Support Electronic Referral Loops by Receiving and Incorporating Health Information. PI Measures: —Support Electronic Referral Loops by Receiving and Incorporating Health Information. PI Measures: —e-Prescribing. Effective date of final rule (60 days after publication). ONC–ACBs only permitted to issue certificates for this criterion until January 1, 2022. Frm 00027 Fmt 4701 Sfmt 4700 Removed from 2015 Edition Base EHR definition effective date of the final rule (60 days after publication). PI Programs. PI Measure: —Provide Patients Electronic Access to Their Health Information. Operational for Medicaid until January 1, 2022 Supports the Coordination of Care through Patient Engagement Objective. PI Measure: —Electronic Case Reporting. PI Measure: —Provide Patients Electronic Access to Their Health Information. E:\FR\FM\01MYR3.SGM 01MYR3 25668 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations TABLE 1—2015 EDITION CURES UPDATE—Continued Certification criteria Reference New/revised/ removed/timelimited certification Application Access—All Data Request. § 170.315(g)(9) ..... Revised ................ Standardized API for patient and population services. § 170.315(g)(10) ... New ...................... 2015 Edition cures update—timing Impact on CMS promoting interoperability (PI) programs Update to USCDI/C–CDA companion guide within 24 months after publication date of final rule. Update within 24 months of publication date of final rule. PI Measure: —Provide Patients Electronic Access to Their Health Information. Added to the 2015 Edition Base EHR definition. Note: The CHPL will be updated to indicate the standards utilized for new or revised certification criteria, as well as denote criteria removed from the Program. A. Standards and Implementation Specifications 1. National Technology Transfer and Advancement Act The National Technology Transfer and Advancement Act (NTTAA) of 1995 (15 U.S.C. 3701 et. seq.) and the Office of Management and Budget (OMB) Circular A–119 23 require the use of, wherever practical, technical standards that are developed or adopted by voluntary consensus standards bodies to carry out policy objectives or activities, with certain exceptions. The NTTAA and OMB Circular A–119 provide exceptions to electing only standards developed or adopted by voluntary consensus standards bodies, namely when doing so would be inconsistent with applicable law or otherwise impractical. Agencies have the discretion to decline the use of existing voluntary consensus standards if determined that such standards are inconsistent with applicable law or otherwise impractical, and instead use a government-unique standard or other standard. In addition to the consideration of voluntary consensus standards, the OMB Circular A–119 recognizes the contributions of standardization activities that take place outside of the voluntary consensus standards process. Therefore, in instances where use of voluntary consensus standards would be inconsistent with applicable law or otherwise impracticable, other standards should be considered that meet the agency’s regulatory, procurement or program needs, deliver favorable technical and economic outcomes, and are widely utilized in the marketplace. Comments. A couple of commenters stated that they do not support Federal programs’ use of the NTTAA voluntary consensus standards exceptions, and asked that the involved Federal programs continue to utilize consensusbased standards developed through 23 https://www.whitehouse.gov/sites/ whitehouse.gov/files/omb/circulars/A119/revised_ circular_a-119_as_of_1_22.pdf. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 work done by organizations such as HL7®. They noted that such work incorporates public health inputs, and stated that it is critical for there to be sufficient discussion and consideration of all stakeholder concerns in adopting such critical technologies such as FHIR®. Response. We thank commenters for their feedback. We clarify that many of the standards we adopt in this final rule are developed and/or adopted by voluntary consensus standards bodies, except where we found that a government unique standard is more appropriate. We are aware of no voluntary consensus standards that could serve as an alternative for the following purposes in this final rule. In this final rule, we use voluntary consensus standards except for: • The standard adopted in § 170.213, the United States Core Data for Interoperability (USCDI), Version 1 (v1), is a hybrid of government unique policy (i.e., determining which data to include in the USCDI) and voluntary consensus standards (i.e., the vocabulary and code set standards attributed to USCDI data elements). We have placed time limitations on the predecessor to this standard, the Common Clinical Data Set (CCDS) definition, under this rule, and replaced it with the USCDI in all applicable criteria except for the data export criterion in § 170.315(b)(6), on which we have also placed a time limit. We refer readers to the ‘‘Revised and New 2015 Edition Criteria’’ in section IV.B of this preamble. • The standards adopted in § 170.205(h)(3) and (k)(3). We replaced the current HL7® QRDA standards with government unique standards, the CMS Implementation Guide for Quality Reporting Document Architecture: Category I; Hospital Quality Reporting; Implementation Guide for 2019, and the CMS Implementation Guide for Quality Reporting Document Architecture: Category III; Eligible Clinicians and Eligible Professionals Programs; Implementation Guide for 2019, that will more effectively support the associated certification criterion’s use case, which is reporting electronic PO 00000 Frm 00028 Fmt 4701 Sfmt 4700 clinical quality measure (eCQM) data to CMS. 2. Compliance With Adopted Standards and Implementation Specifications In accordance with Office of the Federal Register regulations related to ‘‘incorporation by reference,’’ 1 CFR part 51, which we follow when we adopt proposed standards and/or implementation specifications in a final rule, the entire standard or implementation specification document is deemed published in the Federal Register when incorporated by reference therein with the approval of the Director of the Federal Register. Once published, compliance with the standard and/or implementation specification includes the entire incorporated document, unless we specify otherwise. For example, for the HL7® FHIR U.S. Core Implementation Guide (IG) STU 3.1.0 adopted in this final rule (see section VII.B.4), health IT certified to certification criteria referencing this IG would need to demonstrate compliance with all mandatory elements and requirements of the IG. If an element of the IG is optional or permissive in any way, it would remain that way for testing and certification unless we specified otherwise in regulation. In such cases, the regulatory text would preempt the permissiveness of the IG. 3. ‘‘Reasonably Available’’ to Interested Parties The Office of the Federal Register has established requirements for materials (e.g., standards and implementation specifications) that agencies propose to incorporate by reference in the Code of Federal Regulations (79 FR 66267; 1 CFR 51.5(b)). To comply with these requirements, in section XI (‘‘Incorporation by Reference’’) of this preamble, we provide summaries of, and uniform resource locators (URLs) to, the standards and implementation specifications we have adopted and subsequently incorporate by reference in the Code of Federal Regulations. To note, we also provide relevant information about these standards and implementation specifications E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations throughout the relevant preamble policy discussions and regulation text sections of the final rule. B. Revised and New 2015 Edition Criteria 1. The United States Core Data for Interoperability Standard (USCDI) As we noted in the Proposed Rule, the initial focus of the Program was to support the Medicare and Medicaid EHR Incentive Programs (76 FR 1294) now referred to as the Promoting Interoperability (PI) Programs. As such, the 2014 Edition certification criteria mirrored those functions specified by the CMS PI Programs objectives and measures for providers demonstrating meaningful use (MU) of certified health IT. In order to improve efficiency and streamline the common data within our Program’s certification criteria, we created a single definition for all the required data that could be referenced for all applicable certification criteria. We created the term ‘‘Common MU Data Set’’ to encompass the common set of MU data types/elements (and associated vocabulary standards) for which certification would be required across several certification criteria (77 FR 54170). The 2015 Edition final rule modified the Program to make it open and accessible to more types of health IT, and health IT that supports various care and practice settings beyond those included in the CMS PI Programs (80 FR 62604). In comparison to the previous editions, the 2015 Edition focused on identifying health IT components necessary to establish an interoperable nationwide health information infrastructure, fostering innovation and opening new market opportunities, and allowing for more health care provider and patient choices in electronic health information access and exchange. In order to align with this approach, we made changes in the 2015 Edition final rule that resulted in updated vocabulary and content standards to improve and advance interoperability and health information exchange (80 FR 62604). The 2015 Edition final rule further expanded accessibility and availability of data exchanged by updating the definition of Base EHR in the 2015 Edition to include enhanced data export, transitions of care, and application programming interface (API) capabilities, all of which previously required that, at a minimum, the CCDS be available (80 FR 62602 through 62604). We further noted in the Proposed Rule (84 FR 7440) that the regulatory approach to using and referencing a VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 ‘‘definition’’ to identify electronic health information, for access, exchange and use, including associated vocabulary codes, has had its drawbacks. While ONC’s ‘‘CCDS’’ definition served its designed purpose (to reduce repetitive text in each of the certification criteria in which it is referenced), the term CCDS, and the data set it represents, also began to be used by outside organizations such as the Argonaut Project 24 for additional use cases beyond the C–CDA and ONC’s Health IT Certification Program. As these organizations identified the need to expand the content of the CCDS, the CCDS definition in regulation became a limitation to developing additional data access, exchange, and uses outside of ONC’s programs. As we move towards value-based care and the inclusion of Data Classes that go beyond clinical data, and as part of ONC’s continued efforts to evaluate the availability of a minimum baseline of Data Classes that must be commonly available for interoperable exchange, we acknowledge the need to change and improve our regulatory approach to the CCDS. Therefore, in order to advance interoperability by adopting new data and vocabulary codes sets that support data exchange, we proposed to remove the ‘‘Common Clinical Data Set’’ in § 170.315(b)(4) and § 170.315(b)(5), and its references throughout the 2015 Edition and replace it with the ‘‘United States Core Data for Interoperability’’ (USCDI) standard. This first version of USCDI will be designated ‘‘version 1 (v1).’’ The USCDI standard aims to achieve the goals set forth in the Cures Act by specifying a common set of data classes and elements that have been designed to improve data usage and interoperable data exchange. We proposed to adopt the USCDI v1 as a standard defined in § 170.102. Here, ‘‘Standard’’ is defined as a ‘‘technical, functional, or performance-based rule, condition, requirement, or specification that stipulates instructions, fields, codes, data, materials, characteristics, or actions.’’ The USCDI standard would be composed of Data Classes, which may be further delineated into groupings of specific Data Element(s). For example, ‘‘patient demographics’’ is a Data Class, and within that Data Class there is ‘‘patient name,’’ which is a Data Element. As noted in section IV.B.1.b, for the overall structure and organization of the USCDI, please consult www.healthIT.gov/USCDI. We noted in the Proposed Rule (84 FR 7441) that ONC intended to establish and follow a predictable, transparent, 24 https://argonautwiki.hl7.org/Main_Page. PO 00000 Frm 00029 Fmt 4701 Sfmt 4700 25669 and collaborative process to expand the USCDI, including providing stakeholders with the opportunity to comment on the USCDI’s expansion. We indicated that once the Secretary adopts the first version of the USCDI through rulemaking, which we proposed in § 170.213 in the Proposed Rule, health IT developers would be allowed to take advantage of the ‘‘Standards Version Advancement Process’’ (SVAP) flexibility. The SVAP (which we proposed in § 170.405(b) and which is discussed in section VII.B.5, below) would permit health IT developers to voluntarily implement and use a newer version of a Secretary-adopted standard such as the USCDI, subject to certain conditions including a requirement that the newer version is approved for use by the National Coordinator, and does not conflict with requirements under other applicable law. We received a number of comments regarding these proposals, which are outlined in the subsections below. Comments. We received broad support for the adoption of version 1 of the USCDI as a new standard defining critical health care data to promote interoperability. Some commenters from health plans, while supportive of patient and provider access to health care data, voiced concerns about health plans being required to make data available in the USCDI standard. Other commenters noted that USCDI v1 does not include data classes and elements that pertain to all health care settings, including public health, and would therefore not be broadly applicable to all health care settings. Response. We thank commenters for their support of the adoption of USCDI v1 as a standard. We wish to clarify that the adoption of version 1 of the USCDI as a standard for our Program is not specific to a setting of care, a health care specialty, or a specific category of health IT user. Nor is the USCDI specific to a particular content exchange standard (e.g., HL7 C–CDA, HL7 FHIR, HL7 V2, and NCPDP SCRIPT). Rather, it applies to the certification of health IT and certified health IT’s ability to send and receive the Data Elements defined by USCDI without requirements regarding functionality, user interface, or the use of those Data Elements in exchange. While some users may find few opportunities to exchange these Data Elements, many will exchange these Data Elements frequently, and we believe that all health care providers should have certified health IT that can provide them with a means to appropriately share and access the USCDI data set when exchanging data with other providers. Accordingly, we E:\FR\FM\01MYR3.SGM 01MYR3 25670 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations seek to clarify a point with respect to our proposal regarding the USCDI and health IT certification. For the purposes of the ONC Health IT Certification Program, specific certification criteria are the way the USCDI comes into effect. For example, the USCDI is referenced as part of the data requirements in the updated ‘‘transitions of care’’ certification criterion (§ 170.315(b)(1)), which also specifies that for certification to that criterion, the C–CDA must be used as the syntax to hold all of the USCDI data. As we explained, we believe that the adoption of USCDI v1 for all certified health IT will advance interoperability by ensuring utilization of common data and vocabulary code sets, and that standardization will support both electronic exchange and usability of the data. Furthermore, because ONC will establish and follow a predictable, transparent, and collaborative process to expand future versions of USCDI, including providing stakeholders with the opportunity to comment on draft USCDI’s expansion, stakeholders will have ample opportunities to advance additional Data Classes and Data Elements relevant to a wide range of health care use cases. After consideration of these comments and the overall support of commenters, we have adopted the USCDI v1 as a standard in § 170.213. We have also extended the compliance timelines with which a health IT developer needs to update to the USCDI, therefore, we have not removed the CCDS definition from § 170.102 as proposed but revised it to remove references to 2014 Edition standards and provided time limitations for when health IT developers need to update to the USCDI. a. USCDI 2015 Edition Certification Criteria We proposed (84 FR 7441) to adopt the USCDI Version 1 (USCDI v1) in § 170.213.25 The USCDI is a standardized set of health Data Classes and constituent Data Elements that would be required to support nationwide electronic health 25 We note that USCDI v1 is an updated version and distinguished from the Draft United States Core Data for Interoperability (USCDI) previously made available for public review and comment in the course of its development as a prospective standard. The data classes and elements in the USCDI v1 were proposed in § 170.213 and defined in the Proposed Rule, and an additional USCDI v1 document with technical standards information was posted electronically concurrent with the publication of the Proposed Rule in order to provide the public adequate time to fully review and comment on both the proposed regulation and the USCDI v1 technical information. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 information exchange. Once adopted in this final rule, health IT developers would be required to update their certified health IT to support the USCDI v1 for all certification criteria affected by this proposed change. We also proposed conforming changes in the sections below to update the following formerly CCDS-dependent 2015 Edition certification criteria to incorporate the USCDI standard: • ‘‘transitions of care’’ (§ 170.315(b)(1)); • ‘‘view, download, and transmit to 3rd party’’ (§ 170.315(e)(1)); • ‘‘transmission to public health agencies—electronic case reporting’’ (§ 170.315(f)(5)); • ‘‘consolidated CDA creation performance’’ (§ 170.315(g)(6)); and • ‘‘application access—all data request’’ (§ 170.315(g)(9)). We did not include the ‘‘data export’’ criterion (§ 170.315(b)(6)) in the proposed list of criteria that would be revised to include the USCDI standard because we proposed to remove the ‘‘data export’’ criterion (§ 170.315(b)(6)) and instead proposed to adopt a criterion that we referenced as ‘‘EHI export’’ in the Proposed Rule (§ 170.315(b)(10)). For similar reasons, we did not include the ‘‘application access—data category request’’ criterion (§ 170.315(g)(8)) because we proposed to replace it with the API certification criterion (§ 170.315(g)(10)) that derives its data requirements from the USCDI. We also proposed, as a Maintenance of Certification requirement (§ 170.405(b)(3)) for the real world testing Condition of Certification requirement (§ 170.405(a)), that health IT developers with health IT certified to the five above-identified certification criteria prior to the effective date of this final rule would have to update such certified health IT to the proposed revised standards (84 FR 7441 and 7596). We further proposed, as a Maintenance of Certification requirement (§ 170.405(b)(3)) for the real world testing Condition of Certification requirement (§ 170.405(a)), that health IT developers must provide the updated certified health IT to all their customers with health IT previously certified to the identified criteria no later than 24 months after the effective date of this final rule (84 FR 7441 and 84 FR 7596). For the purposes of meeting this compliance timeline, we noted that we expected health IT developers to update their certified health IT and notify their ONC–ACB on the date at which they have reached compliance. We noted that developers would also need to factor these updates into their next real world PO 00000 Frm 00030 Fmt 4701 Sfmt 4700 testing plan as discussed in section VII.B.5 of the Proposed Rule.26 Comments. The majority of commenters supported the proposed adoption of USCDI v1 and incorporation of the USCDI into the revised and new certification criteria. Some commenters expressed concern that incorporation of the USCDI into the ‘‘transmission to public health agencies—electronic case reporting’’ certification criteria could have a negative impact on data received by public health reporting programs. Some commenters stressed the need for reasonable adoption timelines. Some suggested a longer adoption and implementation timeline for incorporation of the USCDI as part of certified health IT. Response. ONC acknowledges that some entities, such as public health agencies, may need to consider what the expanded set of data the USCDI v1 offers may mean to their reporting programs and requirements. To be clear, the USCDI’s existence as a stand-alone standard will not impact or change public health reporting requirements. However, certain data now included in the USCDI, such as clinical notes, would now become more readily available for public health reporting and a State’s public health program’s policy may need to be revisited if a State seeks to make use of the ‘‘new’’ data the adoption of the USCDI stands to make more easily available, and more usable upon receipt. We also believe that the proposed 24-month timeline for updating certified health IT to comply with the new USCDI standard in § 170.213 is an adequate implementation timeline, based on other adoption timelines with similar technical complexities. We, therefore, have finalized revisions for the five above-identified formerly CCDSdependent 2015 Edition certification criteria to incorporate the USCDI standard. We have finalized a modification to the regulation text for these criteria based on public comment related to mitigating the risk of potential confusion caused by updates to existing criteria. As discussed earlier in this preamble (section IV), we received public comment requesting that all revised criteria be included in a new edition of certification criteria. At the start of section IV, we discuss in response to these comments that we do not believe the creation of a new edition is appropriate given that the scope of the updates to the 2015 Edition is tied 26 The finalized real world testing Condition and Maintenance of Certification requirements are discussed in section VII.B.5 of this final rule. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations to standards updates required to keep pace with current industry practices. However, we do plan to distinguish the 2015 Edition certification criteria from the updated criteria in this final rule by referring to them as the 2015 Edition Cures Update on the CHPL. However, as Health IT Modules are updated to the new standards over time, there is a need to define what is required for certification and what is required for compliance to prior certification. Therefore, we have finalized that for criteria being updated from the CCDS to the USCDI, 24 months after publication date of the final rule shall be applicable for a transition from the CCDS to the USCDI. We have finalized that for the period until 24 months after the publication date of the final rule, the CCDS remains applicable for certified Health IT Modules until such Health IT Modules are updated to the USCDI. This means that upon the effective date of the rule, for the identified criteria the following apply for certification and compliance: • The USCDI, or • The CCDS for the period up to 24 months after the publication date of the final rule. This allows for developers to plan the transition for their products more effectively and supports certification continuity. We have finalized a modification to the regulation text to require the USCDI, or the CCDS for the period lasting until 24 months after the publication date of the final rule. We have finalized this modification to the regulation text for the following criteria: • ‘‘transitions of care’’ (§ 170.315(b)(1)); • ‘‘view, download, and transmit to 3rd party’’ (§ 170.315(e)(1)); • ‘‘transmission to public health agencies—electronic case reporting’’ (§ 170.315(f)(5)); • ‘‘consolidated CDA creation performance’’ (§ 170.315(g)(6)); and • ‘‘application access—all data request’’ (§ 170.315(g)(9)). We have finalized in § 170.405(b)(3), as a Maintenance of Certification requirement under the real world testing Condition of Certification requirement, that health IT developers with health IT certified to the five above-identified certification criteria prior to the effective date of this final rule, would have to update such certified health IT to the revisions within 24 months of the publication date of this rule. As of this final rule’s effective date, the ‘‘data export’’ criterion in § 170.315(b)(6) is no longer required as a part of the 2015 Edition Base EHR definition. ONC–ACB’s will not be VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 permitted to issue certificates to this certification criteria after 36 months after the publication date of this final rule. As discussed in the ‘‘EHI export’’ section below, we have retained § 170.315(b)(6) ‘‘as is,’’ without updates to the USCDI. Thus, health IT developers with health IT certified to the prior certification criterion in § 170.315(b)(6) do not have to update such certified health IT to the revisions listed above, but are permitted to maintain or seek new Health IT Module certification to this criterion should they desire this functionality. b. USCDI Standard—Data Classes Included As we noted in the Proposed Rule (84 FR 7441), the USCDI Version 1 (USCDI v1) and its constituent Data Elements incorporated recommendations we had accepted from public comments we had previously received on our Draft USCDI and Proposed Expansion Process,27 which we published January 5, 2018 as well as initial feedback on that draft from the Health IT Advisory Committee, both of which occurred prior to the publication of the Proposed Rule. The standard we proposed to adopt in § 170.213 also reflected and acknowledged the burden that rapidly expanding the USCDI v1 beyond the CCDS could cause. As a result, the USCDI v1 that we proposed was a modest expansion of the CCDS, which we indicated that most health IT developers already supported, were already working toward, or should be capable of updating their health IT to support in a timely manner. Therefore, in our Proposed Rule, we outlined only the delta between the CCDS and the USCDI v1. For the overall structure and organization of the USCDI standard, we urged stakeholders to consult www.healthIT.gov/USCDI. Comments. We received numerous comments proposing new Data Classes, Data Elements, and other changes within the USCDI beyond those we included in the Proposed Rule. Comments recommended including new Data Elements and/or classes within the USCDI v1 related to encounter data, financial transaction and insurance data, and specialty-specific Data Elements related to cancer treatment, social determinants of health, and more. Another commenter identified an error in the Procedures Data Class citing the wrong code set for dental procedures in the USCDI v1. Response. We thank the many commenters for their input on the 27 https://www.healthit.gov/sites/default/files/ draft-uscdi.pdf (January 5, 2018). PO 00000 Frm 00031 Fmt 4701 Sfmt 4700 25671 USCDI. We recognize that the USCDI v1 as proposed represents a modest change over the current CCDS definition. As we indicated in the Proposed Rule (84 FR 7441), we view this initial version of the USCDI standard as a starting point to support improved interoperability. We are also sensitive to requirements related to the development and implementation of adopting the USCDI standard. In the interests of maintaining our proposed implementation timeline of 24 months from the publication of this final rule, and after consideration of these comments and the overall support of commenters, we have finalized the adoption of the Data Classes and elements of the USCDI standard as proposed, with changes outlined in the subsections below. Additionally, in order to address the error pointed out to us via comments in the Procedures Data Class, as was stated in the draft USCDI v1,28 we clarified that the American Dental Association’s Code on Dental Procedures and Nomenclature (CDT) should be used for Dental Procedures in the USCDI v1, not SNODENT as was erroneously stated in the draft USCDI v1. With respect to the USCDI’s expansion in future years, ONC will establish and follow a predictable, transparent, and collaborative process to expand the USCDI, which will provide stakeholders with the opportunity to comment on the USCDI’s expansion and to advance additional Data Classes and Data Elements relevant to a wide range of use cases related to health care. Prior to this final rule, we published our initial thinking as well as examples of Data Classes and Data Elements that we believed could be appropriate to propose for adding to the USCDI.29 We have also solicited feedback and recommendations from the HITAC. As we evaluated public comments and conducted our own research prior to the issuance of this final rule, we also wanted to identify for stakeholders another potential source that could be used to focus efforts around new USCDI Data Classes and Data Elements. As is noted throughout this rule, the HL7® FHIR® standard represents health information in what are called ‘‘FHIR resources.’’ When it comes to logically organizing FHIR resources that relate to one another and share common properties, FHIR uses a concept called a ‘‘compartment.’’ Through the standards development process a ‘‘Patient Compartment’’ has been 28 https://www.healthit.gov/sites/default/files/ draft-uscdi.pdf. 29 https://www.healthit.gov/sites/default/files/ draft-uscdi.pdf. E:\FR\FM\01MYR3.SGM 01MYR3 25672 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations created, which lists all of the FHIR resources that are associated with a patient. The Patient Compartment ‘‘includes any resources where the subject of the resource is the patient, and some other resources that are directly linked to resources in the patient compartment.’’ This organizing framework provides a potentially rich set of a Data Classes and Data Elements to consider for inclusion in the USCDI, including clinical, encounter, specialty, and financial data. As ONC looks to make its own investments to advance the implementation experience associated with prospective USCDI Data Classes and Data Elements, we intend to leverage the Patient Compartment to guide our thinking. In addition, we will also look to and encourage industry to look at other organizing frameworks such as the Clinical Quality/Clinical Decision Support realms and the payerto-provider community (e.g., DaVinci Project 30) to help identify data that would be best to focus on for USCDI expansion. i. Updated Versions of Vocabulary Standard Code Sets We proposed (84 FR 7441) that the USCDI v1 would include the newest versions of the ‘‘minimum standard’’ code sets included in the CCDS available at publication of this final rule. We requested comment on that proposal and on whether it could result in any interoperability concerns. We also noted that criteria such as the 2015 Edition ‘‘family health history’’ criterion (§ 170.315(a)(12)), the 2015 Edition ‘‘transmission to immunization registries’’ criterion (§ 170.315(f)(1)), and the 2015 Edition ‘‘transmission to public health agencies—syndromic surveillance’’ criterion (§ 170.315(f)(2)) reference ‘‘minimum standard’’ code sets; however, we indicated that we were considering updating the versions of these standards listed and incorporated by reference in part 170 subpart B that are referenced by these criteria from the versions adopted in the 2015 Edition final rule. We also noted, for purposes of clarity, that consistent with § 170.555, unless the Secretary prohibits the use of a newer version of an identified minimum standard code set for certification, health IT could continue to be certified or upgraded by developers to a newer version of an identified minimum standard code set than that included in USCDI v1 or the most recent USCDI version that the National Coordinator has approved for use in the Program using the SVAP flexibility. 30 https://www.hl7.org/about/davinci/index.cfm. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 Comments. There was general support from commenters for updating ‘‘minimum standard’’ code sets requirements to the newest versions of these code sets as part of the update from CCDS to the USCDI. One commenter recommended adopting the Data Class requirement first, followed by a delayed requirement of updated versions of the ‘‘minimum standards’’ code sets, in order to allow implementers more time to make changes to their systems. Response. We do not believe that adopting the corresponding ‘‘minimum standards’’ code sets that are updated in the USCDI v1 would impose a significant burden on implementers. In consideration of the overall support from commenters, we have finalized our proposal that the USCDI v1 include the newest versions of the ‘‘minimum standard’’ code sets available at the time of finalization of this final rule. We have not, however, finalized the proposal for the 2015 Edition ‘‘family health history’’ criterion (§ 170.315(a)(12)), the 2015 Edition ‘‘transmission to immunization registries’’ criterion (§ 170.315(f)(1)), and the 2015 Edition ‘‘transmission to public health agencies—syndromic surveillance’’ criterion (§ 170.315(f)(2)) to reference the newest versions of the ‘‘minimum standard’’ code sets for these criteria, because the flexibility already exists to use newer versions of code sets included in these criteria. We note that for these certification criteria, health IT developers may take advantage of the previously established 31 flexibility to seek certification to newer versions of the ‘‘minimum standards’’ code with § 170.555. ii. Address and Phone Number We proposed (84 FR 7442) new Data Elements in the USCDI v1 for ‘‘address’’ and ‘‘phone number.’’ We noted that the inclusion of ‘‘address’’ (to represent the postal location for the patient) and ‘‘phone number’’ (to represent the patient’s telephone number) would improve the comprehensiveness of health information for patient care. We further noted that the inclusion of these Data Elements was consistent with the list of patient matching Data Elements already specified in the 2015 Edition ‘‘transitions of care’’ certification criterion (§ 170.315(b)(1)(iii)(G)), which supports the exchange of patient health information between providers of patient care. Comments. Commenters unanimously supported the addition of address and phone numbers to the USCDI v1. The majority of commenters on this proposal 31 77 PO 00000 FR 54163, 54268–69 (September 4, 2012). Frm 00032 Fmt 4701 Sfmt 4700 recommended the use of the U.S. Postal Service address format to improve address data quality. Commenters also recommended additional elements of address and phone number indicating effective period (e.g., current address, former address); use (e.g., mobile phone number, landline, etc.), and email address. Response. We thank the commenters for their recommendations and agree that these additional Data Elements can be useful to provide better care and assist with patient matching. In consideration of these comments, we have finalized the addition of the following Data Elements within the Patient Demographics Data Class: • ‘‘current address’’; • ‘‘previous address’’; • ‘‘phone number’’; • ‘‘phone number type’’; and • ‘‘email address.’’ We further clarify that ‘‘phone number’’ and ‘‘phone number type’’ must be represented using the same standards, ITU–T E.123 (02/2001) and ITU–T E.164, as already adopted for this data in 45 CFR 170.207(q) and referenced in the 2015 Edition ‘‘transitions of care’’ certification criterion (§ 170.315(b)(1)(iii)(G)). We appreciate commenters’ recommendations to use the U.S. Postal Service Postal Addressing Standards, which include address formatting guidance and a variety of products to improve address quality, such as address element standardization and validation which are published and available for public use.32 The U.S. Postal Service Postal Addressing Standards include standardized names for common unit identifiers, line by line acceptance requirements for mail services, and overall address format guidance that has been specifically designed to support labelling of mail items for acceptance by the U.S. Postal Service automated sorting processes. We acknowledge the potential for its use within health IT to improve patient matching. However, while the U.S. Postal Service Postal Addressing Standards include a single representation for certain data elements (such as rendering apartment as apt, building as bldg, floor as fl, etc.) they also allow variations for other data elements, such as ‘‘acceptable’’ and ‘‘preferred’’ spellings and abbreviations for street and city names. This may result in multiple ‘‘valid’’ addresses. To reconcile this variation, the U.S. Postal Service provides a file listing preferred 32 U.S. Postal Service: Postal Addressing Standards (Publication 28) available at https:// pe.usps.com/text/pub28/welcome.htm. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations city and State combinations as well as a file of street name and zip code combinations and the resulting aggregated address would then require manual reconciliation. We believe the U.S. Postal Service Postal Addressing Standards may be useful guidance for health IT developers. However, because of the variation, the required use of reference files, and the manual reconciliation necessary for implementation, we have not adopted the U.S. Postal Service Postal Addressing Standards as a required standard for the address Data Elements within the USCDI. We encourage the use of standardized elements to accurately represent patient address including use of standardized references in the U.S Post Service Postal Addressing Standards where applicable. In addition, we will continue to work with standards developing organizations to evaluate potential solutions to improve patient matching, including considering the potential adaptability of the U.S. Postal Service formats for health IT use cases. The U.S. Postal Service also maintains web based tools for address validation services and provides implementation guidance to integrate these tools into technical workflows for IT systems in ecommerce and other industries. We agree that these address validation tools have the potential to greatly improve address data quality, and we encourage health IT developers and other relevant health IT users such as health information networks to explore mechanisms by which such address validation might support patient matching. While not specifically designed for patient matching and other health care related applications, USPS address validation has been piloted in these settings. To adapt the address validation tool to a health care purpose requires the services of a third party with licensing of the tool and the development of a bespoke process to execute the tool. The aggregated patient address could then be compared against the USPS address on file and the patient data could be amended where inaccurate, appended where incomplete, or a linked record of secondary address data could be created depending on the percent of confidence in the specific match. This process would then require manual reconciliation. The results of these pilots indicate significant complexity and burden associated with implementation of this process. Given these burdens, we believe it would not be appropriate to require the integration of this distinct functionality into VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 certified health IT at this time. We again encourage the further development and use of standardized approaches for address validation and will continue to monitor and analyze such efforts for consideration in future rulemaking. iii. Pediatric Vital Signs As proposed (84 FR 7442), the USCDI v1 included the pediatric vital sign data elements, which are specified as optional health information in the 2015 Edition CCDS definition. The proposed pediatric vital signs included: head occipital-frontal circumference for children less than 3 years of age, BMI percentile per age and sex for youth 2– 20 years of age, weight for age per length and sex for children less than 3 years of age, and the reference range/scale or growth curve, as appropriate. As explained in section VI.A.2 of this final rule, the inclusion of pediatric vital sign Data Elements in the draft USCDI v1 align with the provisions of the Cures Act related to health IT to support the health care of children. Prior to the publication of the Proposed Rule, stakeholders emphasized the value of pediatric vital sign data elements to better support the safety and quality of care delivered to children. We also note in our Proposed Rule and in the 2015 Edition proposed rule (80 FR 16818 and 16819) that the Centers for Disease Control and Prevention (CDC) recommends as part of best practices the use of these pediatric vital signs for settings of care in which pediatric and adolescent patients are seen. The availability of a reference range/scale or growth curve would help with proper interpretation of the measurements for the BMI percentile per age and sex and weight for age per length and sex. Further, we noted our belief that the inclusion of this health information in the USCDI v1 was the appropriate next step after first specifying them as optional in the CCDS definition as part of the 2015 Edition rulemaking (80 FR 62695), and as a means of supporting patient access to their EHI in a longitudinal format through certified health IT (see section 3009(e)(2)(A)(i) of the PHSA as amended by the Cures Act). We recognized, however, that certain health IT developers and their customers may not find these capabilities and information useful. Therefore, we requested comment on the inclusion of pediatric vital signs in the USCDI v1, including the potential benefits and costs for all stakeholders stemming from its inclusion in the USCDI v1. Comments. Commenters generally supported the inclusion of the pediatric vital signs Data Elements in the USCDI PO 00000 Frm 00033 Fmt 4701 Sfmt 4700 25673 v1. Some commenters opposed their inclusion or believed the inclusion of these Data Elements should be optional since pediatric vital signs are not applicable to all specialties and would add implementation burden and cost without benefit. One commenter stated that only the measurements and associated metadata (units of measure, date/time measurement taken, method of measurement), not the calculated percentiles according to applicable pediatric growth charts, should be required as part of the exchange of patient data. One commenter recommended adding the nutritional status Data Element ‘‘mid-arm circumference.’’ Finally, several commenters suggested or requested clarification on the pediatric vital signs Data Elements we proposed (84 FR 7442). Specifically, stakeholders in the pediatric community asked for clarification of the proposed pediatric vital sign ‘‘weight for age per length and sex for children less than 3 years of age,’’ noting it does not correspond to any existing pediatric growth charts. Rather, they noted that there is a growth chart ‘‘weight-for-length’’ for children less than 3 years of age. Response. We recognize that the adoption of these Data Elements has the potential to add burden and cost for some health IT products, but we believe the inclusion of these Data Elements can contribute significantly to the longitudinal care of patients. Pediatric care is not isolated to a single specialty or setting of care, and clinicians providing health care for children— especially those providing care for children with complex conditions—may practice in a wide range of settings using a wide range of health IT systems. Many key stakeholders believe that the ability to capture, calculate, and transmit key pediatric growth data using health IT is critical to providing care to these populations as well as communicating with other providers, parent/guardians, and patients. We also note that adoption of the USCDI standard and its Data Classes and elements is not specific as to its usage within a setting of care, a health care specialty, or by a specific category of health IT user; rather it applies to certified health IT’s ability to send and receive those Data Elements without requirements regarding functionality, user interface, or the use of those Data Elements in exchange. While some users may find few opportunities to exchange these Data Elements, many will exchange these Data Elements frequently. As we have noted previously, we believe that the adoption E:\FR\FM\01MYR3.SGM 01MYR3 25674 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations of USCDI for all certified health IT will advance interoperability by ensuring compliance with new data and vocabulary codes sets that support the data. We also appreciate the commenter’s suggestion for an additional Data Element. As we have noted, ONC will establish and follow a predictable, transparent, and collaborative process to expand the USCDI, which will provide stakeholders with the opportunity to advance additional Data Classes and Data Elements relevant to a wide range of use cases related to health care. Regarding the request to clarify and better define these proposed pediatric vital signs, we note that these Data Elements, as written and proposed, were previously included as optional health information in the 2015 Edition CCDS definition. The discrepancy between the adopted pediatric vital signs and standardized pediatric growth charts was not identified previously. Therefore, we wish to clarify that the above-referenced pediatric vital signs include both the vital measurements and the percentiles used in the following growth charts currently recommended by the Centers for Disease Control and Prevention: 33 for infants birth to 36 months of age: Weight-forlength; and head occipital-frontal circumference for age; and for children 2–20 years of age: Body mass index (BMI) for age. In consideration of these comments, we have finalized the following pediatric Data Elements in the Vital Signs Data Class of the USCDI v1: Head occipital-frontal circumference percentile (Birth to 36 Months); weightfor-length percentile (Birth to 36 Months); body mass index (BMI) percentile (2–20 Years of Age); and the reference range/scale or growth curve, as appropriate. iv. Clinical Notes We proposed (84 FR 7442) to include in the USCDI v1 a new Data Class entitled ‘‘clinical notes.’’ ‘‘Clinical notes’’ was included in the proposed USCDI v1 based on significant feedback from the industry since the 2015 Edition final rule. We also received similar feedback during the Trusted Exchange Framework and Common Agreement (TEFCA) stakeholder sessions and public comment period. As we noted, ‘‘clinical notes’’ have been identified by stakeholders as highly desirable data for interoperable exchange. The free text portion of the clinical notes was most often relayed by clinicians as the data they sought, but were often missing 33 https://www.cdc.gov/growthcharts/index.htm. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 during electronic health information exchange. We additionally noted that clinical notes can be composed of text generated from structured (pick-list and/ or check the box) fields as well as unstructured (free text) data. We explained that a clinical note may include the assessment, diagnosis, plan of care and evaluation of plan, patient teaching, and other relevant data points. We recognized that a number of different types of clinical notes could be useful for stakeholders. We indicated our understanding that work is being done in the community to focus on a subset of clinical notes. We considered three options for identifying the different ‘‘note types’’ to adopt in USCDI v1. The first option we considered allowed for the community to offer any and all recommended notes. The second option we considered set a minimum standard of eight note types. This option was derived from the eight note types identified by the Argonaut Project participants.34 The third option we identified looked to the eleven HL7 Consolidated Clinical Document Architecture (C–CDA) document types identified in the C–CDA Release 2.1, which also included the note types being identified by the Argonaut Project participants. We ultimately proposed the second option because it unites public and private interests toward the same goal. We indicated that the eight selected note types were a minimum bar and, in the future, the USCDI could be updated to include other clinical notes. Specifically, we proposed to include the following clinical note types for both inpatient and outpatient (primary care, emergency department, etc.) settings in USCDI v1 as a minimum standard: (1) Discharge Summary note; (2) History & Physical; (3) Progress Note; (4) Consultation Note; (5) Imaging Narrative; (6) Laboratory Report Narrative; (7) Pathology Report Narrative; and (8) Procedures Note (84 FR 7442). We requested comment on whether to include additional note types as part of the USCDI v1. Comments. Commenters broadly supported adding ‘‘clinical notes’’ as a new Data Class to the USCDI v1, in particular to enable the use of free text for data exchange. Several commenters requested clarity as to whether the proposal to adopt this new Data Class would require the capture and exchange of unstructured, or ‘‘raw’’ or ‘‘free’’ text, narrative clinical information or more comprehensive documents such as 34 Link to the Clinical Notes Argonaut Project identified (to clarify: Seven bullets are listed, however, we split laboratory and pathology note types into their own note) https://wiki.hl7.org/ index.php?title=201805_Clinical_Notes_Track. PO 00000 Frm 00034 Fmt 4701 Sfmt 4700 those defined by C–CDA. Some commenters recommended adding certain note types—including continuity of care, operative, and nursing notes— while others recommended removing some of the proposed note types. In particular, Laboratory/Pathology Report Narrative note types were thought to be duplicative of content in the Laboratory Data Class and element Value/Results. Some commenters recommended Imaging Narrative not be used, but added to a new Data Class, Diagnostic Tests, which would combine Laboratory and Radiology tests and results. Response. We thank commenters for their support and recommendations. While we recognize that there may be alternative methods of organizing different clinical note types, we believe there is value in grouping all clinical notes into a single Data Class within the USCDI. As we noted above and in the Proposed Rule, we have adopted the eight note types identified by the Argonaut Project participants because it unites public and private interests toward the same goal. As we indicated, the eight selected note types are a minimum bar and, in the future, the USCDI could be updated to include other clinical note types. The eight selected note types reflect the most clearly and consistently recommended set of clinical note type. While a variety of additional note types were recommended, there was no consensus for additional note types beyond these eight. In consideration of these comments, we have finalized the clinical notes as a Data Class in the USCDI v1, with only the following eight clinical note types for both inpatient and outpatient (primary care, emergency department, etc.) settings as a minimum standard as proposed: (1) Discharge Summary Note; (2) History & Physical; (3) Progress Note; (4) Consultation Note; (5) Imaging Narrative; (6) Laboratory Report Narrative; (7) Pathology Report Narrative; and (8) Procedures Note. We wish to further clarify that we have adopted the new Clinical Notes Data Class in order to enable capture and exchange of free text clinical information categorized by the above clinical note types. We refer commenters to our response in section IV.B.1.d of the final rule—Clinical Notes C–CDA Implementation Specification— that addresses the relationship of the clinical notes Data Class to C–CDA implementation specification. We also seek to clarify two points. First, that these clinical note types are content exchange standard agnostic. They should not be interpreted or associated with the specific C–CDA Document Templates that may share the E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations same name. Secondly, we clarify that these note types are required to be represented in their plain-text form when included in various content exchange standards (e.g., C–CDA, FHIR) as may be applicable to the certification criteria in which the USCDI is referenced. v. Provenance We proposed (84 FR 7442) for the USCDI v1 to include a new Data Class, entitled ‘‘provenance.’’ As we indicated, stakeholders 35 have identified ‘‘provenance’’ as valuable for interoperable exchange. Stakeholders also referenced the provenance of data as a fundamental need to improve the trustworthiness and reliability of the data being exchanged. Provenance describes the metadata, or extra information about data, that can help answer questions such as who created the data and when. In the Proposed Rule, we noted that the inclusion of ‘‘provenance’’ as a Data Class in the USCDI v1 would also complement the Cures Act requirement in section 4002(a) to support the exchange of data through the use of APIs. This approach differs from the exchange of data via the C–CDA. While C–CDAs are often critiqued due to their relative ‘‘length,’’ the C–CDA represents the output of a clinical encounter and includes relevant context. The same will not always be true in an API context. APIs facilitate the granular exchange of data and, as noted in the original 2015 Edition final rule, offer the potential to aggregate data from multiple sources using a web or mobile application (80 FR 62675). The inclusion of provenance would help retain the relevant context so the recipient can better understand the origin of the data. We proposed to further delineate the provenance Data Class into three Data Elements: ‘‘the author,’’ which represents the person(s) who is responsible for the information; ‘‘the author’s time stamp,’’ which indicates the time the information was recorded; and ‘‘the author’s organization,’’ which would be the organization the author is associated with at the time they interacted with the data (84 FR 7442). We indicated that we identified these three Data Elements as fundamental for data recipients to have available and noted that they are commonly captured and currently available through standards. We requested comment on the inclusion of these three Data Elements and whether any other 35 https://www.healthit.gov/topic/interoperability/ trusted-exchange-framework-and-commonagreement. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 provenance Data Elements, such as the identity of the individual or entity the data was obtained from or sent by (sometimes discussed in standards working groups as the provenance of the data’s ‘‘last hop’’), would be essential to include as part of the USCDI v1 standard. We acknowledged that there is currently work to help define provenance in a standard robust manner, and that we anticipated adopting the industry consensus once it became available. Comments. Commenters overwhelmingly supported the addition of provenance as a new Data Class for USCDI v1. Several commenters stated that the proposed elements were insufficient for the purpose of audit logs for use and disclosure of health data, citing the existing standard specification ASTM E2147.36 Other commenters stated that these proposed elements did not apply to all use cases of exchanged data and requested clarification regarding applicability, including whether provenance would have to be created for elements created before the implementation deadline of USCDI v1. Because this is a new Data Class, some commenters also requested additional time to adopt and implement this new requirement. Some commenters stated that there could be ambiguity in designating ‘‘author’’ for certain clinical information such as patient-reported medications, while in certain other cases, there could be multiple authors for the same clinical information, such as clinical notes. Additionally, some commenters suggested that the ‘‘author’’ be limited to only a limited set of Data Elements and not to all the Data Elements. Another commenter specifically addressed several concerns related to the definition of ‘‘author’’ for this purpose. Commenters specifically stated they understood author to be the person entering the data into the EHR, but noted that data may also be historical, captured from a device, started by a patient and completed by clinical staff, entered by a patient, entered by resident/students working under a supervising physician, or reported by a patient. The commenter noted that there are additional documentation scenarios such as dictation to scribes or other medical staff, which conflate ‘‘responsibility’’ for authorship, and that defining author for every Data Element can be complex. Finally, one health IT developer recommended a 36-month implementation period to begin only after test procedures, implementation guides, and test and validation tools are 36 https://www.astm.org/Standards/E2147.htm. PO 00000 Frm 00035 Fmt 4701 Sfmt 4700 25675 available and after ONC has consulted at least five CEHRT developers. Response. We acknowledge that these Data Elements may not be able to fully support the needs of all use cases, but we believe their adoption will improve the trustworthiness and reliability of data being exchanged. For this Data Class, it appears that many commenters over-interpreted our proposal and the effect of having these data in the USCDI. As we noted earlier, the adoption of the USCDI standard and its Data Classes and elements is not specific as to its usage within a setting of care, a health care specialty, or by a specific category of health IT user. Rather it applies to certified health IT’s ability to send and receive those Data Elements without requirements regarding functionality, user interface, or the use of those Data Elements in exchange. Therefore, with respect to our reference to provenance data in the USCDI, we have no preset notion or explicit upfront requirement for how this data should be used. We believe that having provenance data is highly impactful, essential for trustworthy interoperability, and will generate greater value for stakeholders as they identify new ways to put this data to use. Regarding ‘‘author’’ as a Data Element within the provenance Data Class, we agree that significant practical scope challenges may arise. Our analysis of the concerns raised by commenters identified a risk of unintended burden and potential risk of error and misattribution associated with this particular Data Element. In most use cases, the inclusion of author organization and author time stamp is sufficient to convey provenance. As a result, we have not finalized the ‘‘author’’ as a required Data Element within the provenance Data Class in USCDI. However, we understand that for exchanging certain data elements, such as ‘‘clinical notes,’’ it is critical to also send the ‘‘author’’ information if available. Our analysis of the various content exchange standards and specifications (e.g., C–CDA and FHIR) indicates that even though the ‘‘author’’ Data Element is not explicitly required in USCDI, the health IT specifications in which USCDI Data Elements are represented also set specific data element requirements for certain contexts. For example, in the context of clinical notes, these content exchange standards require health IT systems to be capable of exchanging ‘‘author’’ information when it is available. Further, ‘‘author’’ is treated as a ‘‘Must Support’’ data element in the FHIR US Core Implementation Guide STU 3.1.0 and has a ‘‘SHALL’’ constraint (with E:\FR\FM\01MYR3.SGM 01MYR3 25676 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations appropriate null flavor value) in the C– CDA 2.1. As we have noted previously, we believe that the proposed 24-month timeline for updating certified health IT to comply with the new USCDI standard in § 170.213 is an adequate implementation timeline and will maintain this requirement as finalized earlier in this section. Therefore, in consideration of the comments received, we have finalized the provenance Data Class in the USCDI v1 and the following two Data Elements: • ‘‘author time stamp,’’ which indicates the time the information was recorded; and • ‘‘author organization,’’ which would be the organization the author is associated with at the time they interacted with the data. We believe these two provenance Data Elements, ‘‘author organization’’ and ‘‘author time stamp,’’ within the USCDI v1, which are also used in the C–CDA and FHIR-based certification criteria we have adopted that incorporate the USCDI, will serve as a foundation on which industry stakeholders can subsequently work together to build out additional provenance data requirements in the USCDI. As noted above, we have not finalized the proposed Data Element ‘‘the author,’’ which represents the person(s) who was responsible for the information. vi. Medication Data Request for Comment In the Proposed Rule, we proposed (84 FR 7443) that the USCDI v1 ‘‘Medication’’ Data Class include two constituent Data Elements within it: Medications and Medication Allergies. With respect to the latter, Medication Allergies, we requested comment on an alternative approach. This approach would remove the Medication Allergies Data Element from the Medication Data Class and add it to a new Data Class titled ‘‘Substance Reactions,’’ which would include the concept of ‘‘Medication Allergies.’’ The new ‘‘Substance Reactions’’ Data Class would include the following Data Elements: ‘‘Substance’’ and ‘‘Reaction,’’ and include SNOMED CT as an additional applicable standard for nonmedication substances. Comments. The majority of commenters supported the creation of a new Data Class ‘‘Substance Reactions’’ but requested we preserve the Medication Allergy element because of patient safety concerns related to the adoption of an entirely new Data Element. One commenter supported the change but recommended the new Data Class name be aligned with the HL7 FHIR resource ‘‘AllergyIntolerance.’’ VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 This would also be consistent with the C–CDA 2.1 ‘‘Allergy and Intolerance’’ section. Response. We thank the commenters for their input. While we appreciate that there may be some risk associated with the adoption of a new Data Element, we believe this alternative approach better aligns with other standards representing substance reactions, including medication allergies, and this alignment enhances patient safety. Additionally, we agree with the commenter who suggested renaming this new Data Class to align with FHIR and C–CDA approaches. In consideration of comments, we have finalized the creation of a Data Class in USCDI v1 entitled ‘‘Allergies and Intolerances,’’ instead of ‘‘Substance Reactions’’ from the original USCDI v1 proposal. The Allergies and Intolerances Data Class in USCDI v1 consists of the following Data Elements: ‘‘Substance—(Medication),’’ ‘‘Substance—(Drug Class),’’ and ‘‘Reaction.’’ ‘‘Substance—(Medication)’’ must be represented by RxNorm codes and ‘‘Substance—(Drug Class)’’ must be represented by SNOMED CT codes. The addition of the ‘‘Substance—(Drug Class)’’ better represents when an individual may have a reaction to an entire drug class as opposed to a specific medication. Additionally, we believe having the Allergy and Intolerances Data Class separated from the Medication Class will accommodate potential additions of other substance Data Elements such as food, environmental, and biologic agents. The Data Element ‘‘Reaction’’ is meant to include, but is not limited to, medication allergies. As the USCDI is updated over time to include substances other than medications, we can also see the need to have substance reactions updated as part of this Data Class. To reflect this change, we have updated the terminology in the regulatory text in § 170.315 to remove ‘‘medication allergy’’ and replace with ‘‘allergy and intolerance.’’ c. USCDI Standard—Relationship to Content Exchange Standards and Implementation Specifications In recognition of the evolution of standards over time and to facilitate updates to newer versions of standards, we proposed (84 FR 7443) that the USCDI v1 (§ 170.213) would be agnostic as to ‘‘content exchange’’ standard. As we noted, the USCDI v1 establishes ‘‘data policy’’ and does not directly associate with the content exchange standards and implementation specifications which, given a particular context, may require the exchange of the PO 00000 Frm 00036 Fmt 4701 Sfmt 4700 entire USCDI, a USCDI Data Class, or some or all of the Data Elements within a given Data Class or classes. We further indicated that, to our knowledge, all Data Classes in the USCDI v1 can be supported by commonly used ‘‘content exchange’’ standards, including HL7 C– CDA Release 2.1 and FHIR. We received no comments on this specific proposal and we have finalized our proposal to make USCDI v1 agnostic as to ‘‘content exchange standard’’ as described. 2. Clinical Notes C–CDA Implementation Specification In conjunction with our proposal to adopt the USCDI v1, we proposed to adopt the HL7 CDA® R2 IG: C–CDA Templates for Clinical Notes R1 Companion Guide, Release 1 in § 170.205(a)(5) (‘‘C–CDA Companion Guide’’). The C–CDA Companion Guide provides supplemental guidance and additional technical clarification for specifying data in the C–CDA Release 2.1.37 As we noted in the Proposed Rule (84 FR 7443), the proposed USCDI v1 included new Data Classes, such as ‘‘clinical notes,’’ which were further supported through the C–CDA Companion Guide. For example, the C– CDA Companion Guide provides specifications for clinical notes by indicating that clinical notes should be recorded in ‘‘note activity’’ and requires references to other discrete data, such as ‘‘encounters.’’ The C–CDA Companion Guide also enhances implementation of the updated 2015 Edition certification criteria that reference the C–CDA Release 2.1 (§ 170.205(a)(4)). As noted by stakeholders, the C–CDA Release 2.1 includes some optionality and ambiguity with respect to Data Element components, such as the locations and value sets. We attempted to address some of this optionality by clarifying requirements using Certification Companion Guides (CCGs) 38 and by specifying in the CCDS definition where certain data should be placed in the C– CDA Release 2.1 templates (e.g., ‘‘goals’’ in the goals section).39 The C–CDA Companion Guide, which was released in August, 2015, provides similar, but additional C–CDA implementation structure. For example, race and ethnicity are required Data Elements in the USCDI and must be included in C– CDA exchanges if known, or they may be marked with a nullFlavor value ‘‘UNK’’ (unknown) if not known. The 37 https://www.hl7.org/implement/standards/ product_brief.cfm?product_id=447. 38 https://www.healthit.gov/topic/certificationehrs/2015-edition-test-method. 39 https://www.healthit.gov/sites/default/files/ topiclanding/2018-04/2015Ed_CCG_CCDS.pdf. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations C–CDA Release 2.1 is unclear on the location and value set, but the C–CDA Companion Guide clarifies the location and value set. We noted in the Proposed Rule that the adoption of the C–CDA Companion Guide would align with our goal to increase the use of consistent implementation of standards among health IT developers and improve interoperability. We proposed to adopt this C–CDA Companion Guide to support best practice implementation of USCDI v1 Data Classes and 2015 Edition certification criteria that reference C– CDA Release 2.1 (§ 170.205(a)(4)). The criteria include: • ‘‘transitions of care’’ (§ 170.315(b)(1)); • ‘‘clinical information reconciliation and incorporation’’ (§ 170.315(b)(2)); • ‘‘care plan’’ (§ 170.315(b)(9)); • ‘‘view, download, and transmit to 3rd party’’ (§ 170.315(e)(1)); • ‘‘consolidated CDA creation performance’’ (§ 170.315(g)(6)); and • ‘‘application access—all data request’’ (§ 170.315(g)(9)). We proposed, as a Maintenance of Certification requirement for the real world testing Condition of Certification requirement, that health IT developers with health IT certified to the six aboveidentified certification criteria prior to the effective date of a subsequent final rule would have to update such certified health IT to the proposed revisions (84 FR 7443).40 We further proposed as a Maintenance of Certification requirement for the real world testing Condition of Certification requirement, that health IT developers would be required to provide the updated certified health IT to all their customers with health IT previously certified to the identified criteria no later than 24 months after the effective date of a final rule (84 FR 7443). For the purposes of meeting that compliance timeline, we indicated that we expected health IT developers to update their certified health IT without new mandatory testing and notify their ONC–ACB on the date at which they have reached compliance. Developers would also need to factor these updates into their next real world testing plan as discussed in section VII.B.5 of the Proposed Rule.41 Comments. One commenter supported the use of C–CDA for Clinical Notes. One commenter sought clarity on testing for Clinical Notes conformance to C–CDA 2.1, noting that all C–CDA 40 We proposed to codify this requirement in § 170.405(b)(4) (84 FR 7596). 41 The finalized real world testing plan requirements, codified in § 170.405(b)(2) are discussed in section VII.B.5 of this final rule. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 documents are the same except for the document header. Two commenters recommended review of the Common Well Concise Consolidated CDA white paper. Response. We thank the commenters for their suggestions and support. During the past few months, industry stakeholders updated the C–CDA Companion Guide to a newer version to best address how clinical notes should be handled in the C–CDA. In consideration of the update to the C– CDA Companion Guide and the comments, we have finalized the adoption of the most up-to-date version, HL7 CDA R2 IG: C–CDA Templates for Clinical Notes STU Companion Guide, Release 2 in § 170.205(a)(5) (‘‘C–CDA Companion Guide’’) and have incorporated by reference in § 170.299. This includes adoption of the USCDI v1 and the associated Data Classes. In order to align ‘‘clinical information reconciliation and incorporation’’ (§ 170.315(b)(2)) with the updated Data Classes in the USCDI v1 as proposed in 84 FR 7441, we have replaced the ‘‘medication allergies’’ data element in § 170.315(b)(2)(iii)(D)(2) criterion to ‘‘Allergies and Intolerances’’ Data Class and require reconciliation of all the data elements in ‘‘Allergies and Intolerances’’ Data Class, which includes Substance (Medication), Substance (Drug Class), and Reaction Data Elements. We have revised the regulation text (§ 170.315(b)(2)) to align with this change. We decline to accept the recommendation to adopt the CommonWell specification as we believe the criterion is best met following the C–CDA specification published by HL7. We have additionally finalized the timeline for the update to the use of the C–CDA companion guide of 24 months after the publication date of this final rule for the following criteria: • ‘‘transitions of care’’ (§ 170.315(b)(1)); • ‘‘clinical information reconciliation and incorporation’’ (§ 170.315(b)(2)); • ‘‘care plan’’ (§ 170.315(b)(9)); • ‘‘view, download, and transmit to 3rd party’’ (§ 170.315(e)(1)); • ‘‘consolidated CDA creation performance’’ (§ 170.315(g)(6)); and • ‘‘application access—all data request’’ (§ 170.315(g)(9)). 3. Unique Device Identifier(s) for a Patient’s Implantable Device(s) C–CDA Implementation Specification We noted in the Proposed Rule (84 FR 7443) our awareness of a recently published implementation guide (IG) by HL7 that provides further guidance on the unique device identifier (UDI) PO 00000 Frm 00037 Fmt 4701 Sfmt 4700 25677 requirements. The Health Level 7 (HL7) CDA R2 Implementation Guide: C–CDA Supplemental Templates for Unique Device Identification (UDI) for Implantable Medical Devices, Release 1–US Realm (UDI IG Release 1), identifies changes needed to the C–CDA to better facilitate the exchange of the individual UDI components in the health care system when devices are implanted in a patient. The UDI components include the Device Identifier (DI) and the following individual production identifiers: The lot or batch number, serial number, manufacturing date, expiration date, and distinct identification code. As this new IG had been recently published, we requested comment on whether we should add this UDI IG as a requirement in § 170.299(f)(35) for health IT to adopt in order to meet the requirements for content exchange using C–CDA. In addition, we indicated that we did not have a reliable basis on which to estimate how much it would cost to meet the requirements outlined in the UDI IG; and, therefore, we requested comment on the cost and burden of complying with this proposed requirement. Comments. Commenters unanimously supported adoption of the UDI IG Release 1 as a new requirement for health IT to meet the requirements for the USCDI UDI Data Class. One commenter requested additional guidance regarding the determination of the ‘‘person responsible for the information’’ contained in the ‘‘Device’’ entry. None of the commenters provided a basis of estimate for the cost to meet the requirements outlined in the UDI IG Release 1. Response. We thank the commenters for their support. As we noted earlier, the adoption of the USCDI standard and its Data Classes and elements is not specific as to its usage within a setting of care, a health care specialty, or by a specific category of health IT user; rather it applies to certified health IT’s ability to send and receive those Data Elements without requirements regarding functionality, user interface, or the use of those Data Elements in exchange. Therefore, we do not specify who must enter such data. We note also that the C–CDA Companion Guide referenced in subsection (d) below of this final rule now includes the content of the UDI IG Release 1 named in the Proposed Rule. In consideration of comments, we have finalized the proposed UDI Data Class within the USCDI v1, and have adopted the UDI Organizer Template defined in the UDI IG Release 1 and subsequently published as Appendix B of the HL7® E:\FR\FM\01MYR3.SGM 01MYR3 25678 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations CDA® R2 IG: C–CDA Templates for Clinical Notes, Release 2.1 Companion Guide, Release 2—US Realm, October 2019, as a new requirement for Health IT Modules to meet the requirements for C–CDA-based exchange. We note that the UDI Organizer Template, though subsequently published in Appendix B of the HL7 CDA R2 IG: C–CDA Templates for Clinical Notes STU Companion Guide, Release 2, September 2019, remains substantially unchanged from its previous publication in the UDI IG Release 1 in November 2018 and has been thoroughly reviewed and subjected to balloting and a public comment process. 4. Electronic Prescribing Criterion We proposed to adopt a new version of the NCPDP SCRIPT standard in 45 CFR 170.205(b)(1), specifically NCPDP SCRIPT standard version 2017071 (84 FR 7444). Because we proposed to adopt a new standard for electronic prescribing (e-Rx), we also proposed to adopt a new certification criterion in § 170.315(b)(11) for the proposed e-Rx standard to replace the old standard in § 170.315(b)(3). The proposed new certification criterion reflected our proposed adoption of NCPDP SCRIPT standard version 2017071 as well as all transactions adopted for the CMS Medicare Part D E-prescribing Program (84 FR 23832). These proposals were made to realign ONC’s Health IT Certification Program (Program) policies with those of CMS’ Part D E-prescribing rules. ONC and CMS have historically aligned standards adopted under their programs such as those for e-Rx and medication history (MH) to ensure that entities regulated under both schemes can comply with the different programs’ requirements. For this reason, we stated that should our proposal to adopt the new e-Rx criterion (§ 170.315(b)(11)) be finalized prior to January 1, 2020, we also proposed to permit continued certification to the current 2015 Edition ‘‘electronic prescribing’’ criterion (§ 170.315(b)(3)) that references NCPDP SCRIPT standard version 10.6 for the period of time in which that version of the NCPDP SCRIPT standard would continue to be used in the CMS Medicare Part D E-prescribing Program or the CMS Promoting Interoperability Programs. Finally, we proposed in 84 FR 7445 that once NCPDP SCRIPT standard version 10.6 is no longer used in those Programs, we would no longer permit certification to that criterion and would remove it from the Code of Federal Regulations, and that we would consider setting an effective date for such actions in a subsequent final rule VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 based on stakeholder feedback and CMS policies at the time. In addition to continuing to reference the current transactions included in § 170.315(b)(3), in keeping with CMS’ Modernizing Part D and Medicare Advantage To Lower Drug Prices and Reduce Out-of-Pocket Expenses final rule (84 FR 23832), we also proposed in 84 FR 7445 and in § 170.315(b)(11) to require the support of all of the NCPDP SCRIPT standard version 2017071 transactions CMS has adopted for the Part D E-prescribing regulations in 42 CFR 423.160(b)(2)(iv). Given the January 1, 2020 effective date in CMS rulemaking (83 FR 16440) and the effective date of this final rule, we have finalized our proposed update to the new version of the standard for the electronic prescribing criterion in § 170.315(b)(3) instead of creating a new criterion as proposed in 84 FR 7427 in § 170.315(b)(11). Unlike other criteria in this final rule that allow testing to either version of a required standard until 24 months after the publication date of this final rule, we will not allow certification testing to version 10.6 of the NCPDP SCRIPT standard, as the implementation date for CMS’ new Part D E-prescribing Program of January 1, 2020 has passed. However, based on stakeholder feedback, we have finalized a transition period in 45 CFR 170.405(b)(4)(ii) of 24 months from the date of publication of this final rule for certification so developers may test and certify to the updated criterion with all associated transactions. Comments. The majority of commenters were supportive of our proposal and recommended moving to the NCPDP SCRIPT standard version 2017071 for the e-Rx certification criterion in alignment with CMS’ adoption of the standard for the Part D E-prescribing Program. However, a number of commenters expressed concern that while EHRs or other electronic prescribing systems may become certified, pharmacy information systems (PIS) lack a similar certification program and associated standards and technical capability requirements, thus creating a mismatch between the eprescribing system requirements for EHR users and PIS users. Several commenters specifically noted that PIS, which send or receive these transactions, are not required to adopt the capability to support these transactions as they are out of scope for the Program. Response. First, we note that the comments suggesting that pharmacies on the sending or receiving end of Part D e-Rx transactions are not required to utilize NCPDP SCRIPT standard version PO 00000 Frm 00038 Fmt 4701 Sfmt 4700 2017071 transactions are inaccurate. To the extent that a pharmacy conducts electronic prescribing with prescribers e-prescribing Part D covered drugs for Part D eligible individuals, those pharmacies are required to use the NCPDP SCRIPT version 2017071 standard. While there may not be 2015 Edition certification criteria to which pharmacy information systems can be certified, the Part D rules require support of the standard under the Part D E-prescribing Program. Thus, we believe the mismatch concerns raised by commenters are unfounded. As a general matter, Part D prescribers need health IT systems capable of conducting compliant transactions (regardless of ONC certification) and so too do Part D receiving pharmacies. ONC health IT certification will provide an added layer of assurance for Part D prescribers that their e-Rx systems have been tested and certified as being capable of accurately conducting the adopted NCPDP SCRIPT standard version 2017071 transactions.42 In addition, we received several comments related to the readiness of PIS for specific transactions beyond those defined for Part D. We include these comments as applicable in the discussion of each transaction below. We reiterate that PIS are outside the scope of the ONC Health IT Certification Program, and we acknowledge the challenge of pharmacy readiness to support all transactions at this time, but if they conduct e-Rx for part D covered drugs prescribed to Part D eligible Medicare beneficiaries, they will be required to use the standard we are adopting for our program by the Medicare Part D e-Rx Program—so if they do e-prescribing at all, we expect that they will be able to conduct transactions using the standard adopted here. Generally, the goal of certification is to ensure that Health IT Modules voluntarily submitted for the Program are capable of conducting the transactions as specified. This ensures that providers have the capability to use the certified product for these transactions where feasible. For this reason, we have finalized the transactions as described below for certified Health IT Modules and encourage pharmacy information system developers to advance their capacity to support a nationwide network of fully interoperable pharmacy information systems. Comments. As noted, the majority of commenters were supportive of the proposal to remove the 2015 Edition 42 https://www.govinfo.gov/content/pkg/FR-201510-16/pdf/2015-25597.pdf. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations certification criterion (codified in § 170.315(b)(3)) that references NCPDP SCRIPT standard version 10.6 and replace it with an updated e-Rx criterion (proposed to be codified in § 170.315(b)(11)). Commenters requested that ONC work with CMS on a smooth transition and timeline that would allow adequate time for the development, testing, and full adoption of these updates. A number of commenters stated that the NCPDP SCRIPT standard version 2017071 is not backward compatible with NCPDP SCRIPT standard version 10.6, and therefore there should be no transition period where both standards are applicable. Commenters sought clarity on the timing of the change and expressed concerns that developers and providers may face operational issues in their adoption of version 2017071 of the NCPDP SCRIPT standard by January 1, 2020. Commenters recommended that ONC allow certification timelines that support compliance with Part D while allowing adequate time to mitigate the risk associated with the additional requirements for certification to the proposed criterion. Response. We appreciate the support expressed by commenters as well as the concern about maintaining alignment between required standards across HHS. We note that the CMS requirement for Part D e-Rx transactions includes a compliance date of January 1, 2020, and that industry feedback notes a consistent and deliberate move toward readiness for the adoption of the new standard for Part D e-Rx, including by health IT industry leaders supporting pharmacy implementation. We believe that this overall industry readiness supports our adoption of the update to the standard for certification purposes and to be in alignment with the required standard update for Part D e-Rx purposes. In response to the request for a smooth transition and continuity of certification for health care providers, we have finalized a revision to the existing criterion in § 170.315(b)(3) rather than removing and replacing the criterion. In order to support the transition to the new standard for Part D, at the request of stakeholders, ONC issued guidance 43 in the third quarter of CY2019 stating, ‘‘. . . developers of 2015 Edition certified Health IT Modules certified to the e-prescribing criterion adopted at 45 CFR 170.315(b)(3) are permitted to update 43 For Part D covered drugs prescribed for Part D eligible individuals. ONC Electronic Prescribing Certification Companion Guide: https:// www.healthit.gov/test-method/electronicprescribing. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 their products to use the NCPDP SCRIPT standard version 2017071 to meet CMS’ compliance requirements . . .’’ This guidance also noted that ONC would discontinue certification of new products to the electronic prescribing certification criterion using version 10.6 of the NCPDP SCRIPT standard as of January 1, 2020. In consideration of the comments we received, we have finalized our proposal to update the electronic prescribing (eRx) NCPDP SCRIPT standard used for electronic prescribing in the 2015 Edition to NCPDP SCRIPT standard version 2017071, which results in a new e-Rx standard becoming the baseline for certification. As the effective date of this final rule will occur after January 1, 2020, we have not finalized our proposal to permit new products to continue to be certified to the prior standard until the January 1, 2020 date. Instead, we discontinued certification of new products to the former electronic prescribing criterion using the NCPDP SCRIPT standard version 10.6 to align with CMS requirements. We have finalized this update as a modification to the existing certification criterion rather than as a separate new certification criterion to allow for a smooth transition, and to allow for continuity with the certification(s) issued to Health IT Modules for § 170.315(b)(3) prior to January 1, 2020 that are updated under the ONC guidance. This approach will also continue to allow for compliance with the January 1, 2020 timeline for CMS’ Medicare Part D e-Rx and Medication History standards. As noted by commenters, we understand that there is a lack of backward compatibility between the two standards. In order to allow for a reasonable transition period to certification to the full set of NCPDP SCRIPT transactions and other requirements defined in the updated eRx certification criterion, we have framed our Maintenance of Certification in section 45 CFR 170.405(b)(5)(ii) with flexibility that will allow health IT developers up to 24 months from the date of publication of this final rule to test and certify to the updated criterion reflective of all NCPDP SCRIPT 2017071 transactions to demonstrate full conformance with the updated criterion. After January 1, 2020, use of the NCPDP SCRIPT 10.6 standard will be prohibited under the Part D program, so we do not expect or anticipate health IT systems certified to § 170.315(b)(3) will conduct Part D transactions using that standard. We also recognize, however, for the purposes of maintaining a product certificate with § 170.315(b)(3) in its PO 00000 Frm 00039 Fmt 4701 Sfmt 4700 25679 scope, that these 24 months from the date of publication from this final rule enable continued compliance and oversight associated with other capabilities in § 170.315(b)(3) that are not applicable for Part D, and for which conformance is still required. We have finalized this 24-month period for the update for this criterion under the real world testing provisions in § 170.405(b)(5) as follows: • Electronic Prescribing. A health IT developer with health IT certified to § 170.315(b)(3) prior to June 30, 2020, must: Æ Update their certified health IT to be compliant with the revised versions of this criterion adopted in § 170.315(b)(3)(ii); and Æ Provide its customers of the previously certified health IT with certified health IT that meets paragraph (b)(5)(i) of this section by May 2, 2022. a. Electronic Prescribing Standard and Certification Criterion Comments. Commenters expressed concerns about standardization generally within the context of eprescribing. Several commenters expressed concern about using the NCPDP SCRIPT standard version 2017071, the RxNorm standard, as a requirement for e-prescribing, and other standards such as Fast Healthcare Interoperability Resources (FHIR). One commenter further stated that only inventory (packaging or unit dose strength) codes are standardized in RxNorm, and that drug regimens should be standardized and made computable in RxNorm for safety reasons. Another commenter noted that RxNorm does not index brand names exhaustively with a single unique ID for each branded drug, but that current indexing only allows for generic-level interoperability and only at unit dose level. One commenter expressed concern that the criterion as proposed does not appear to support medication assisted treatment (MAT) for opioid use disorder (OUD) and other long-acting medications. Another commenter stated a hope that standards such as the NCPDP SCRIPT version 2017071 standard can ease data integration into the workflow, lessen burden, and help achieve greater compliance with policy and legal requirements for querying State prescription drug monitoring programs (PDMP). Another commenter supported the adoption of the NCPDP SCRIPT standard version 2017071 because the standard supports the prescribing of compound medications and the sig (i.e., instructions) field is not limited to 140 characters. E:\FR\FM\01MYR3.SGM 01MYR3 25680 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations Some commenters also provided suggestions to improve the NCPDP SCRIPT 2017071 standard and its availability to the public by the standards developing organization. Another commenter stated that today’s NCPDP standards are not in an APIready format, and recommended CMS and ONC collaborate with NCPDP to explore API FHIR standards specific to the HL7 Da Vinci Project for a January 2022 effective date or later. A few commenters stated that because many NCPDP standards are not openly accessible and require a paid membership to obtain the technical specifications, our adoption could limit widespread adoption and a standardized implementation nationwide. Several commenters suggested that ONC adopt FHIR as a standard for the Program, and for the eRx criterion specifically. We also received several comments that are out of scope which are not addressed in this rulemaking. Response. We appreciate the commenters’ consideration of the standards. We note that RxNorm is a standard maintained by the National Library of Medicine (NLM). ONC adopted RxNorm to represent medication information as a vocabulary standard in § 170.207(d) (80 FR 62612). We encourage all developers who have experience with, and feedback relevant to, RxNorm to contact NLM. As a reminder, RxNorm is considered a minimum standard code set under the Program, and developers are permitted to upgrade their products to comply with a newer version of RxNorm without adversely affecting a product’s certification status pursuant to 45 CFR 170.555(b)(2) as long as no other law prohibits such action. In reference to the OUD prevention and treatment-related concerns that commenters expressed, we note that the NCPDP SCRIPT 2017071 standard does support the exchange of medicines used in medication-assisted treatment (MAT) for opioid use disorder treatment purposes. An electronic prescription of controlled substances transaction containing a MAT drug such as buprenorphine can be sent from a prescriber to a pharmacy through the specified transactions, and the updated § 170.315(b)(3) criterion also requires the inclusion of a reason for the prescription using <Diagnosis><Primary> or <Secondary> elements, or optionally, the technology must be able to receive and transmit the reason for the prescription using the <IndicationforUse> element. In addition, the RxHistoryRequest transaction contains a patient consent VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 indicator that the receiving entity must evaluate for accurate reporting. We are also aware that many PDMPs across the country accept reporting of medication history transactions containing buprenorphine, naltrexone, and other medications that could be used in the treatment of OUD. We thank commenters for their input related to improvements that could be made to the NCPDP SCRIPT version 2017071 standard, however NCPDP is a member-driven standards developing organization that requires membership in order to participate in standards developing and to access standards and implementation guides. We appreciate the suggestion to provide a direct link to the appropriate NCPDP SCRIPT standard implementation guide, but we have no authority over the business processes of standards developing organizations like NCPDP. We encourage any and all participants with an interest in improving the standard to engage with NCPDP. Regarding the recommendation for ONC to collaborate with NCPDP to explore FHIR, we appreciate the suggestion and support any advancements in technical standards and frameworks that support interoperability. At this time, NCPDP SCRIPT standard version 2017071 has not been mapped to FHIR, but ONC will continue to monitor the industry for opportunities to align the ONC Health IT Certification Program with industry developments. Comments. Five commenters fully supported all proposed transactions and requirements detailed in the Proposed Rule. The vast majority of commenters noted concerns about the proposed criterion specific to the transactions proposed for adoption in the § 170.315(b)(11) e-Rx certification criterion; details in support or not in support of adoption as proposed are further detailed for each type of transaction below. As a whole, the primary concerns for the transactions and requirements as proposed include the following: (1) EHRs are required to comply with the new transactions and requirements, while receiving pharmacy information systems are not; (2) lack of pharmacy adoption and readiness, as sufficient adoption should occur prior to making the transactions required; and (3) implementation of the proposed transactions and requirements is resource intensive, if not prohibitive, in order to meet the January 1, 2020 deadline set by CMS. Several commenters suggested either an extension or that certain transactions should be made optional. Response. We appreciate all of the public comments and have modified the PO 00000 Frm 00040 Fmt 4701 Sfmt 4700 transactions to specify which transactions are finalized as required for Health IT Modules for purposes of obtaining or retaining certification to § 170.315(b)(3), which are optional for Health IT Modules for purposes of obtaining or retaining certification to § 170.315(b)(3), and any other § 170.315(b)(3) requirements below. Additional public comment received and related responses are grouped below based on the comment’s relation to the specific transactions. We note that ‘‘optional’’ for the purposes of certification does not mean, and should not be interpreted as, ‘‘optional’’ for Part D E-prescribing Program compliance. To the extent that prescribers and pharmacies conduct electronic prescribing with Part D covered drugs prescribed for Part D eligible individuals they will be required to use the NCPDP SCRIPT 2017071 standard to conduct those transactions under the Part D E-prescribing Program. Thus, a transaction designated as ‘‘optional’’ for the purposes of certification means a health IT developer can elect to have that transaction explicitly tested as part of certification for its product or can choose not to do so—either will allow its product to be certified to § 170.315(b)(3). We reiterate that comments regarding CMS’ January 1, 2020 timeline are out of scope as we cannot change CMS’ policy or its timeline. b. Electronic Prescribing Transactions In addition to adopting the NCPDP SCRIPT version 2017071 standard for the transactions that are listed in the current ‘‘electronic prescribing’’ criterion (§ 170.315(b)(3)), we also proposed to adopt and require conformance to all of the NCPDP SCRIPT version 2017071 standard transactions CMS adopted in 42 CFR 423.160(b)(2)(iv). We proposed this updated 2015 electronic prescribing criterion to therefore include the following transactions: i. Create and Respond to New Prescriptions (NewRx, NewRxRequest, NewRxResponseDenied) We proposed in 84 FR 7444 to enable a user to perform the related electronic transactions for NewRx, NewRxRequest and NewRxResponseDenied. A NewRx transaction is a new prescription from a prescriber to a pharmacy so that it can be dispensed to a patient. A NewRxRequest is a request from a pharmacy to a prescriber for a new prescription for a patient. A NewRxResponseDenied is a denied response to a previously sent NewRxRequest (if approved by the E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations prescriber, a NewRx would be sent instead). A NewRxResponseDenied response may occur when the NewRxRequest cannot be processed or if information is unavailable. Comments. While the NewRx transaction received unanimous support as a required transaction for adoption in the updated § 170.315(b)(3) criterion, the vast majority of commenters opposed adopting the NewRxRequest and NewRxResponseDenied transactions as required transactions primarily due to a lack of adoption by the PIS involved in the exchange. Several commenters stated that the NewRxRequest and NewRxResponseDenied is not yet in broad use. A commenter who supported adoption of NewRxRequest and NewRxRequestDenied believed that they may be beneficial for electronic prescribing of controlled substances (EPCS) and noted that pharmacies have expressed interest in implementation. Response. In consideration of public comments, we have adopted NewRx as a required transaction, and NewRxRequest and NewRxResponseDenied as optional transactions in the updated § 170.315(b)(3) electronic prescribing criterion. We have finalized these latter two transactions as optional in response to commenters’ concerns regarding a lack of adoption by the PIS that would be involved in the exchange. Additionally, we note that pursuant to the certification criterion, health IT presented for certification must be capable of including the reason for the prescription as referenced in the updated § 170.315(b)(3)(ii) or § 170.315(b)(3)(ii)(D) in the NewRx transaction. ii. Request and Respond to Change Prescriptions (RxChangeRequest, RxChangeResponse) We proposed in 84 FR 7444 to enable a user to perform the related electronic transactions for RxChangeRequest and RxChangeResponse. An RxChangeRequest transaction originates from a pharmacy and may be sent to a prescriber to: Request a change in the original prescription (new or fillable); validate prescriber credentials; request a review by a prescriber of the drug requested; or obtain prior authorization from the payer for the prescription. An RxChangeResponse transaction originates from a prescriber to respond to: A prescription change request from a pharmacy; a request for a prior authorization from a pharmacy; or a prescriber credential validation request from a pharmacy. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 25681 iii. Request and Respond to Cancel Prescriptions (CancelRx, CancelRxResponse) adoption in place before it is a certification requirement. Response. We thank commenters for their overall support of the proposed CancelRx and CancelRxResponse transactions. In light of the commenters’ overall support for the proposed CancelRx transactions and in order to support patient safety and the free flow of communication between prescribers and pharmacies, we have included these transactions as required in the revised § 170.315(b)(3) electronic prescribing criterion. We reiterate that although PIS are outside the scope of the ONC Health IT Certification Program, we encourage pharmacy information system developers to advance their capacity to support a nationwide network of fully interoperable PIS. Additionally, we note that pursuant to the certification criterion, health IT presented for certification must be capable of including the reason for the prescription as referenced in the updated § 170.315(b)(3)(ii) or § 170.315(b)(3)(ii)(D) in the CancelRx transaction. We proposed in 84 FR 7444 to enable a user to perform the related electronic transactions for CancelRx and CancelRxResponse. A CancelRx transaction is a request from a prescriber to a pharmacy to not fill a previously sent prescription. A CancelRx must contain pertinent information for the pharmacy to be able to find the prescription in their system (patient, medication (name, strength, dosage, form), prescriber, and prescription number if available). A CancelRxResponse is a response from a pharmacy to a prescriber to acknowledge a CancelRx, and is used to denote if the cancellation is approved or denied. Comments. The majority of public comments reflected support for finalizing CancelRx and CancelRxResponse as required transactions. One commenter stated that the CancelRx transaction will reduce cost and improve patient safety, as patients may have remaining refills available that are subsequently modified based on a physician’s new assessment. Another commenter noted that certified technology currently supports CancelRx transactions in version 10.6 of the NCPDP SCRIPT standard and encouraged developers to upgrade their technology to support CancelRx transactions in NCPDP SCRIPT standard version 2017071, as these transactions provide great value to end users. One commenter expressed concern for pharmacy readiness for CancelRx, and felt there should be sufficient industry iv. Request and Respond to Renew Prescriptions (RxRenewalRequest, RxRenewalResponse) We proposed in 84 FR 7444 to enable a user to perform the related electronic transactions for RxRenewalRequest and RxRenewalResponse. An RxRenewalRequest transaction originates from a pharmacy to request additional refills beyond those originally prescribed. An RxRenewalResponse transaction originates from a prescriber to respond to the request from the pharmacy. Comments. Commenters supported adoption of the RxRenewalRequest and RxRenewalResponse transactions as proposed. One commenter stated that these transactions could be implemented after the CMS deadline of January 1, 2020 without loss of current functionality. Another commenter said that these transactions are widely used in the industry and provide great value to end users. Response. We appreciate the support for the RxRenewalRequest and RxRenewalResponse transactions and have included these transactions as required in the updated § 170.315(b)(3) electronic prescribing criterion. We reiterate that the entire updated § 170.315(b)(3) criterion and requirements must be met before certification can be granted. Additionally, we note that pursuant to the certification criterion, health IT presented for certification must be capable of including the reason for the prescription as referenced in the Comments. Most commenters supported the proposed adoption of the RxChangeRequest and RxChangeResponse transactions. One commenter recommended against adoption until industry adoption is more widely spread across retail pharmacies and demonstrates value. Response. Because the majority of commenters were in support of adoption of the RxChangeRequest and RxChangeResponse transactions as proposed, we have included these transactions as required in the updated § 170.315(b)(3) electronic prescribing criterion. Additionally, we note that pursuant to the certification criterion, health IT presented for certification must be capable of including the reason for the prescription as referenced in the updated § 170.315(b)(3)(ii) or § 170.315(b)(3)(ii)(D) in the RxChangeRequest and RxChangeResponse transactions. PO 00000 Frm 00041 Fmt 4701 Sfmt 4700 E:\FR\FM\01MYR3.SGM 01MYR3 25682 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations updated § 170.315(b)(3)(ii) or § 170.315(b)(3)(ii)(D) in the RxRenewalRequest and RxRenewalResponse transactions. v. Receive Fill Status Notifications (RxFill, RxFillIndicatorChange) We proposed in 84 FR 7444 to enable a user to perform the related electronic transactions for RxFill and RxFillIndicatorChange. An RxFill transaction is sent from a pharmacy to a prescriber or long term and post-acute care (LTPAC) facility indicating the FillStatus (dispensed, partially dispensed, not dispensed or returned to stock, or transferred to another pharmacy) of the new, refill, or resupply prescriptions for a patient. RxFillIndicator informs the pharmacy of the prescriber’s intent for fill status notifications for a specific patient/ medication. An RxFillIndicatorChange is sent by a prescriber to a pharmacy to indicate that the prescriber is changing the types of RxFill transactions that were previously requested, and in which the prescriber may modify the fill status of transactions previously selected or may cancel future RxFill transactions. Comments. While the RxFill transaction received unanimous support as a required transaction, the vast majority of comments opposed adopting the RxFillIndicatorChange as proposed due to a lack of industry adoption and broad use by PIS. One commenter stated that there has not been a significant use case for the RxFillIndicatorChange transaction to prescribers. A few commenters suggested that ONC wait to require the RxFillIndicatorChange until this transaction is more widely adopted by both prescribers and pharmacies and value is realized in the industry, and suggested either removing RxFillndicatorChange from the proposed criterion or making this transaction optional. Another commenter argued that RxFillIndicatorChange should be optional as development to support this transaction in NCPDP SCRIPT standard version 2017071 would be resource intensive. Commenters in support of the adoption of the RxFillIndicatorChange transaction stated it is the only way to alter the prescriber notification preferences in an ambulatory or acute setting outside of a fillable message. Commenters supporting adoption of the RxFillIndicatorChange transaction further noted that, historically, the lack of prescriber control over notification messages may have had an impact on hindering adoption. One commenter suggested that, in lieu of the RxFillIndicatorChange transaction, VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 EHRs receive all fill notifications and subsequently use logic to bring the clinician’s attention to only important indicators. Response. We appreciate all of the comments that supported the RxFill transaction and the RxFillIndicatorChange transaction. After consideration of comments received on the RxFill and RxFillIndicatorChange transactions, we have adopted the RxFill transaction as required and the RxFillIndicatorChange transaction as optional in the updated § 170.315(b)(3) electronic prescribing criterion. We encourage further development and innovation to address the concerns that we heard from commenters, and we will continue to monitor advancements in standards and technology for future rulemaking. We reiterate that PIS are outside the scope of the ONC Health IT Certification Program and encourage pharmacy information system developers to advance their capacity to support a nationwide network of fully interoperable PIS. Additionally, we note that pursuant to the certification criterion, health IT presented for certification must be capable of including the reason for the prescription as referenced in the updated § 170.315(b)(3)(ii) or § 170.315(b)(3)(ii)(D) in the RxFill transaction. vi. Request and Receive Medication History (RxHistoryRequest, RxHistoryResponse) We proposed in 84 FR 7444 to enable a user to perform the related electronic transactions for RxHistoryRequest and RxHistoryResponse. An RxHistoryRequest transaction is a request from a prescriber to a pharmacy for a list of medications that have been prescribed, dispensed, claimed, or indicated by a patient. An RxHistoryResponse is a response to an RxHistoryRequest containing a patient’s medication history. It includes the medications that were dispensed or obtained within a certain timeframe, and optionally includes the prescriber that prescribed it. Comments. Commenters supported adoption of the RxHistoryRequest and RxHistoryResponse transactions as proposed. One commenter also stated that both transactions could facilitate EHR and other health IT data integration with PDMP systems, yet noted that in many cases, State law or policy prohibits data integration between EHRs and PDMPs. Another commenter stated that these transactions are widely used in the industry and provide great value to end users. PO 00000 Frm 00042 Fmt 4701 Sfmt 4700 Response. We appreciate all comments we have received on the use of the RxHistoryRequest and RxHistoryResponse transactions. We agree with the commenter that the RxHistoryRequest and RxHistoryResponse transactions support data integration between health IT systems such as EHRs and other information technology systems such as PDMPs, and encourage any efforts made by developers to fully integrate prescription and other health data into a provider’s workflow within allowable law. We reiterate that ONC does not have control over State laws that govern PDMPs. We will continue to monitor regulatory and industry advancements in this area and will take them into consideration in future rulemaking. We have adopted these transactions as required in the updated § 170.315(b)(3) electronic prescribing criterion. Additionally, we note that pursuant to the certification criterion, health IT presented for certification must be capable of including the reason for the prescription as referenced in the updated § 170.315(b)(3)(ii) or § 170.315(b)(3)(ii)(D) in the RxHistoryResponse transaction. vii. Ask the Mailbox If There Are Any Transactions (GetMessage) We proposed in 84 FR 7444 to enable a user to perform the electronic transaction GetMessage for Ask the Mailbox. This transaction is used by the prescriber or pharmacy when asking the mailbox if there are any transactions. It is the basis for the mechanism used by a prescriber or pharmacy system to receive transactions from each other, from a payer, or from the Risk Evaluation and Mitigation Strategy (REMS) Administrator via a switch acting as a mailbox. Comments. Approximately half of commenters opposed adoption of the GetMessage transaction and the other half supported adoption in the updated § 170.315(b)(3) electronic prescribing criterion. Commenters not in support of the GetMessage transaction asserted that it is not in use by prescribers and that it is an obsolete method of message retrieval. Commenters in support of adoption argued that it is applicable when not transacting with real-time messaging, and should be adopted as an optional transaction. Response. We thank commenters for their input. After careful consideration of all comments received, and in our ongoing efforts to align with CMS Part D requirements, we have determined to adopt the GetMessage transaction as optional for the updated § 170.315(b)(3) electronic prescribing criterion. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations viii. Relay Acceptance of a Transaction Back to the Sender (Status) We proposed in 84 FR 7444 to enable a user to perform the related electronic transaction to relay acceptance of a transaction back to the sender. A Status transaction in response to any applicable transaction other than GetMessage indicates acceptance and responsibility for a request. A Status transaction in response to GetMessage indicates that no mail is waiting for pickup. A Status transaction cannot be held in an electronic mailbox and may not contain an error. Comments. Commenters supported adoption of the Status transaction as proposed. Two commenters noted that since the transaction is an acknowledgement, it would not contain the reason for the prescription as referenced in the updated § 170.315(b)(3)(ii) or § 170.315(b)(3)(ii)(D). Response. We appreciate all comments in support of the Status transaction and have included this transaction as required in the updated § 170.315(b)(3) electronic prescribing criterion. As an acknowledgement, we agree that the NCPDP SCRIPT version 2017071 standard does not support the conveying the reason for the prescription in the Status transaction, and have modified the requirement to reflect this. ix. Respond That There Was a Problem With the Transaction (Error) We proposed in 84 FR 7444 to enable a user to perform the related electronic transaction for Error response. This transaction indicates an error has occurred and that the request was terminated. An Error can be generated when there is a communication problem or when the transaction actually had an error. An Error can be held in an electronic mailbox, as it may be signifying to the originator that a transaction was unable to be delivered or encountered problems in the acceptance. The Error must be a different response than a Status, since the communication between the system and the mailbox must clearly denote the actions taking place. An Error is a response being delivered on behalf of a previous transaction, while Status signifies no more mail. Comments. Commenters supported adoption of the Error transaction as proposed. Two commenters noted that since the transaction is an acknowledgement, it would not contain the reason for the prescription as referenced in the updated VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 § 170.315(b)(3)(ii) or § 170.315(b)(3)(ii)(D). Response. We appreciate all comments in support of the Error transaction and have included this transaction as required in the updated § 170.315(b)(3) electronic prescribing criterion. As an acknowledgement, we agree that the NCPDP SCRIPT version 2017071 standard does not support the reason for the prescription in the Error transaction, and we have modified that requirement to reflect this. x. Respond That a Transaction Requesting a Return Receipt Has Been Received (Verify) We proposed in 84 FR 7445 to enable a user to perform the related electronic transaction for Verify. This transaction is a response to a pharmacy or prescriber indicating that a transaction requesting a return receipt has been received. Verifications result when a ‘‘return receipt requested’’ flag is set in the original request. Upon receiving a transaction with ReturnReceipt set, it is the responsibility of the receiver to either generate a Verify in response to the request (recommended), or generate a Status in response to this request, followed subsequently by a freestanding Verify transaction. This transaction notifies the originator that the transaction was received at the software system. It is not a notification of action taking place, since time may elapse before the ultimate response to the transaction may take place. Comments. Commenters supported adoption of the Verify transaction as proposed. Two commenters noted that since the transaction is an acknowledgement, it would not contain the reason for the prescription as referenced in the updated § 170.315(b)(3)(ii) or § 170.315(b)(3)(ii)(D). Response. We appreciate all comments in support of the Verify transaction and have included this transaction as required in the updated § 170.315(b)(3) electronic prescribing criterion. As an acknowledgement, we agree that the NCPDP SCRIPT standard version 2017071 does not support the reason for the prescription in the Verify transaction, and we have modified that requirement to reflect this. xi. Request to Send an Additional Supply of Medication (Resupply) We proposed in 84 FR 7445 to enable a user to perform the related electronic transaction for Resupply. This transaction is a request from a Long Term and Post-Acute Care (LTPAC) organization to a pharmacy to send an additional supply of medication for an PO 00000 Frm 00043 Fmt 4701 Sfmt 4700 25683 existing order. An example use case is when a medication supply for a resident is running low (e.g., 2–3 doses) and a new supply is needed from the pharmacy. In such a circumstance, the LTPAC organization sends the Resupply transaction as a way to notify the pharmacy that an additional supply for the medication is needed. Comments. Commenters expressed concern over adopting this transaction as a required transaction for a few reasons. Some commenters noted that the Resupply transaction is only applicable to LTPAC practice settings for management of on-site pharmacy inventory and for communication between a LTPAC facility and a contracted pharmacy. Other commenters mentioned that PIS on the sending or receiving end of the transaction are not required to support this transaction. Some commenters stated that this transaction is not widely adopted among prescribers, and that it should not be adopted until this occurs. Two commenters requested that we either remove the transaction from the final rule or make the Resupply transaction optional. Other commenters stated that while this transaction may be beneficial in the future, it was their opinion that it is premature to require the Resupply transaction in the electronic prescribing criterion at this time. Response. We appreciate all comments related to the Resupply transaction and have included this transaction as optional in the updated § 170.315(b)(3) electronic prescribing criterion. We are aware of several ONCcertified EHRs and other health IT that were either designed exclusively for, or were expressly designed to support, LTPAC providers in addition to other institutions, and encourage those and other developers to undergo certification testing to the Resupply transaction. Additionally, we note that pursuant to the certification criterion, health IT presented for certification must be capable of including the reason for the prescription as referenced in the updated § 170.315(b)(3)(ii) or § 170.315(b)(3)(ii)(D) in the Resupply transaction. We reiterate that PIS are outside the scope of the ONC Health IT Certification Program and encourage pharmacy information system developers to advance their capacity to support a nationwide network of fully interoperable PIS. xii. Communicate Drug Administration Events (DrugAdministration) We proposed in 84 FR 7445 to enable a user to perform the related electronic transaction for DrugAdministration. E:\FR\FM\01MYR3.SGM 01MYR3 25684 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations This transaction communicates drug administration events from a prescriber or care facility to the pharmacy or other entity. It is a notification from a prescriber or care facility to a pharmacy or other entity that a drug administration event has occurred (e.g., a medication was suspended or administration was resumed). Comments. Commenters expressed concern over adopting this transaction as a required transaction for a few reasons. Some commenters noted that the DrugAdministration transaction is only applicable to LTPAC practice settings and is therefore not relevant to the scope of all certified health IT products, though one commenter noted that there could be possible value of this transaction in ambulatory and acute care settings as well. In addition, one commenter reported LTPAC organizations interested in potentially using e-prescribing transactions rated DrugAdministration as a low priority transaction type, meaning there may not be a wide user base interested in implementing it. Response. We appreciate comments related to the DrugAdministration transaction and have included this transaction as optional in the updated § 170.315(b)(3) electronic prescribing criterion. We are aware of several ONCcertified EHRs and other health IT that were either designed exclusively for, or are used in support of, LTPAC providers, and encourage those and other developers to undergo certification testing to the DrugAdministration transaction. In light of the commenters’ concerns, we have adopted the DrugAdministration transaction as optional because the ONC Health IT Certification Program is agnostic to care settings and programs, yet still supports many different use cases. This allows the ONC Health IT Certification Program to support multiple program and setting needs, including but not limited to the Promoting Interoperability Programs and long term and post-acute care. Because the transaction will be optional in the updated (b)(3) criterion, developers whose clients do not support long term care settings will not be required to demonstrate their capacity to send this transaction. xiii. Request and Respond to Transfer One or More Prescriptions Between Pharmacies (RxTransferRequest, RxTransferResponse, RxTransferConfirm) We proposed in 84 FR 7445 to enable a user to perform the related electronic transactions for RxTransferRequest, RxTransferResponse and VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 RxTransferConfirm. The RxTransferRequest transaction is used when the pharmacy is asking for a transfer of one or more prescriptions for a specific patient to the requesting pharmacy. The RxTransferResponse transaction is the response to the RxTransferRequest which includes the prescription(s) being transferred or a rejection of the transfer request. It is sent from the transferring pharmacy to the requesting pharmacy. The RxTransferConfirm transaction is used by the pharmacy receiving (originally requesting) the transfer to confirm that the transfer prescription has been received and the transfer is complete. Comments. The vast majority of commenters expressed concerns with the proposal to adopt RxTransferRequest, RxTransferResponse, and RxTransferConfirm transactions as proposed because they are only used in pharmacy-to-pharmacy transactions and are not applicable to EHRs. Further, two commenters noted that PIS are not required to support these transactions. Conversely, the two commenters that supported these transactions cited the benefit of allowing pharmacies to transfer unfilled controlled substance prescriptions, including Schedule 2, between pharmacies. Response. We thank commenters for their input. We proposed to require all of the NCPDP SCRIPT 2017071 standard transactions CMS adopted in 42 CFR 423.160(b)(2)(iv) to illustrate our continued dedication to establish and maintain complementary policies to ensure that the current standard for certification to the electronic prescribing criterion permits use of the current Part D e-Rx and MH standards. With consideration of comments, and because it was not the intent of this certification criterion to include pharmacy specific transactions for the purposes of certification, we have adopted RxTransferRequest, RxTransferResponse, and RxTransferConfirm as optional in the updated § 170.315(b)(3) electronic prescribing criterion. We reiterate that PIS are outside the scope of the ONC Health IT Certification Program and encourage pharmacy information system developers to advance their capacity to support a nationwide network of fully interoperable PIS. xiv. Recertify the Continued Administration of a Medication Order (Recertification) We proposed in 84 FR 7445 to enable a user to perform the related electronic transaction for Recertification. This transaction is a notification from a PO 00000 Frm 00044 Fmt 4701 Sfmt 4700 LTPAC facility, on behalf of a prescriber, to a pharmacy recertifying the continued administration of a medication order. An example use is when an existing medication order has been recertified by the prescriber for continued use. Comments. Commenters expressed concern over adopting the Recertification transaction as proposed primarily because it is only applicable to LTPAC practice settings. One commenter stated that LTPAC organizations interested in potentially using e-prescribing transactions rated Recertification as a low priority transaction type, suggesting that there may not be a wide user base interested in using it. Response. We appreciate all comments in support of the Recertification transaction. In light of commenters concerns, we have adopted this transaction as optional in the updated § 170.315(b)(3) electronic prescribing criterion. We are aware of several ONC-certified EHRs and other health IT that were either designed expressly for or in support of LTPAC providers, among other institutions, and encourage those and other developers to undergo certification testing to the Recertification transaction. xv. Complete Risk Evaluation and Mitigation Strategy (REMS) Transactions (REMSInitiationRequest, REMSInitiationResponse, REMSRequest, and REMSResponse) We proposed in 84 FR 7445 to enable a user to perform the related electronic transactions for REMSInitiationRequest, REMSInitiationResponse, REMSRequest, and REMSResponse. With CMS’ adoption of these transactions in their recently issued final rule associated with e-Rx for Medicare Part D (42 CFR 423.160(b)(2)(iv)(W)–(Z)), we believe that it will be beneficial to include these four REMS transactions as part of this certification criterion: REMSInitiationRequest, REMSInitiationResponse, REMSRequest, and REMSResponse. Furthermore, under the Food and Drug Administration Amendments Act (FDAAA) of 2007 (Pub. L. 110–85), the Food and Drug Administration (FDA) requires REMS from a pharmaceutical manufacturer if the FDA determines that a REMS is necessary to ensure the benefits of a drug outweigh the risks associated with the drug. In support of our sister agencies’ work, we therefore proposed to include the REMS transactions as part of this certification criterion. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations Comments. The vast majority of commenters supported adoption of REMSInitiationRequest, REMSInitiationResponse, REMSRequest, and REMSResponse as optional, not required, transactions. Those in support of the transactions as proposed suggested that ONC should develop strategies to encourage providers to consciously consider and appropriately act on alerts to reduce the risk that these messages can easily be clicked through and missed, particularly if that provider is experiencing alert fatigue. Multiple reasons were provided by commenters who stated that the proposed REMS transactions should be adopted as optional in the proposed certification criterion. These reasons included the state of system readiness and adoption by manufacturers, REMS administrators, and pharmacy information systems. Another commenter stated that these REMS transactions are not yet in widespread use and should be piloted before being required as they require extensive design and development effort. Response. Given comments in support of the REMSInitiationRequest, REMSInitiationResponse, REMSRequest, and REMSResponse transactions, we have included these transactions as optional in the updated § 170.315(b)(3) electronic prescribing criterion. We encourage commenters, developers, and other stakeholder to review and provide feedback on sections related to REMS (https:// www.healthit.gov/isa/allows-aprescriber-communicate-a-remsadministrator) and all other electronic prescribing use cases on the ONC Interoperability Standards (ISA) and post suggested edits and updates on these transactions as the industry advances. We encourage manufacturers, REMS administrators, and pharmacy information system developers to adopt these and other NCPDP SCRIPT standard version 2017071 transactions to improve safe prescribing practices and patient safety, and encourage developers to test their capacity to send and receive REMS messages by utilizing the testing tools that are available. xvi. Electronic Prior Authorization The Part D E-prescribing prior authorization process in 84 FR 28450 through 28458 requires that providers supply additional clinical information to verify that the medication can be covered under the Medicare Part D benefit. The prior authorization process is intended to promote better clinical decision-making and ensure that patients receive medically necessary prescription drugs. We are looking for VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 ways that would streamline the process for exchanging clinical and financial data amongst prescribers and payers for prior authorization and improve patients’ access to needed medications. Electronic prior authorization (ePA) automates this process by allowing providers to request and respond to electronic prior authorization transactions within their workflow. Using electronic prior authorization (ePA) transactions in the NCPDP SCRIPT standard version 2017071 provides a standard structure for exchanging prior authorization (PA) questions and answers between prescribers and payers, while allowing payers to customize the wording of the questions. Electronic prior authorization transactions will additionally support the automation of the collection of data required for PA consideration, allowing a health IT developer to systemically pull data from a patient’s medical record. The efficiency gains offered by the ePA transactions in the NCPDP SCRIPT standard version 2017071 are the primary driver behind the development of this new capability. We believe the adoption of the ePA transactions included in version 2017071 of the NCPDP SCRIPT standard as optional transactions aligns with CMS’ proposals for Part D ePA, and therefore, will not be adopting NCPDP SCRIPT standard version 2013101 as suggested by the commenter. On June 17, 2019, CMS issued the Secure Electronic Prior Authorization for Medicare Part D proposed rule (84 FR 28450), including a proposed new transaction standard for the Medicare Prescription Drug Benefit program’s (Part D) e-prescribing program. Under this proposal, Part D plan sponsors would be required to support version 2017071 of the NCPDP SCRIPT standard for four ePA transactions, and prescribers would be required to use that standard when performing ePA transactions for Part D covered drugs they wish to prescribe to Part D eligible individuals. While not currently adopted as part of the Part D eRx standard, the NCPDP SCRIPT standard version 2017071 includes eight transactions that would enable the prescribers to initiate medication ePA requests with Part D plan sponsors at the time of the patient’s visit. The eight transactions are: PAInitiationRequest, PAInitiationResponse, PARequest, PAResponse, PAAppealRequest, PAAppealResponse, PACancelRequest, and PACancelResponse. Comments. Several commenters recommended the adoption of the ePA transactions available in the NCPDP PO 00000 Frm 00045 Fmt 4701 Sfmt 4700 25685 SCRIPT standard version 2017071 for a variety of reasons, including improving efficiencies in the prior authorization process, improving patient outcomes, reducing point-of-sale rejections, increasing health IT developer adoption, and improving the Medicare Part D member experience. Several commenters indicated that lack of vendor support for the ePA transactions is a major barrier to physician use of the transactions. One commenter also suggested ONC adopt the NCPDP SCRIPT standard version 2013101 prior authorization transactions. Response. We thank commenters for their feedback. In consideration of comments, we have adopted the ePA transactions in the NCPDP SCRIPT standard version 2017071 as optional for the updated § 170.315(b)(3) electronic prescribing criterion. We believe the adoption of the ePA transactions included in version 2017071 of the NCPDP SCRIPT standard as optional transactions aligns with CMS’ proposals for Part D ePA. We note that this final rule allows only for the voluntary certification of Health IT Modules by health IT developers to support these transactions, and does not require the certification, adoption, or use of such Health IT Modules by health care providers for this or any other purpose. We also note that development, testing, and implementation to support these transactions are important first steps toward integrating pharmacies in the prior authorization process for Part D prescriptions, while supporting widespread industry adoption and reducing burden on providers. We refer readers to the ONC Strategy on Reducing Regulatory and Administrative Burden Relating to the Use of Health IT and EHRs,44 drafted in partnership with CMS, for further discussion of potential opportunities to ease related clinician burden through improved health IT enabled processes. xvii. Reason for the Prescription For each transaction specified, the technology must be able to receive and transmit the reason for the prescription. Comments. Commenters supported continued adoption of the reason for the prescription in specific electronic prescribing transactions. Some commenters noted that some of the proposed transactions would not contain the reason for the prescription as referenced in the updated 44 https://www.healthit.gov/topic/usability-andprovider-burden/strategy-reducing-burden-relatinguse-health-it-and-ehrs. E:\FR\FM\01MYR3.SGM 01MYR3 25686 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations § 170.315(b)(3)(ii) or § 170.315(b)(3)(ii)(D). Response. We thank commenters for their feedback. We reiterate our decision to require Health IT Modules seeking certification to the updated electronic prescribing certification criterion to be capable of including the reason for the prescription as referenced in the updated § 170.315(b)(3)(ii) or § 170.315(b)(3)(ii)(D) within relevant electronic prescription transactions to support patient safety and align with HHS goals to expand safe, high quality health care. Health IT certified to the updated § 170.315(b)(3) criterion must have the capacity to enable a user to receive and transmit the reason for the prescription using the diagnosis elements: <Diagnosis><Primary> or <Secondary>, or optionally, the technology must be able to receive and transmit the reason for the prescription using the <IndicationforUse> element, and be consistent with the International Statistical Classification of Diseases and Related Health Problems (ICDs) sent in the diagnosis element(s). The <IndicationforUse> element defines the indication for use of the medication as meant to be conveyed to the patient, and is included in the Sig. This requirement would apply to the following NCPDP SCRIPT standard version 2017071 transactions that we have adopted in this criterion (see discussion above): NewRx, RxChangeRequest, RxChangeResponse, CancelRx, RxRenewalRequest, RxRenewalResponse, RxFill, RxHistoryResponse, Resupply, RxTransferRequest, RxTranferResponse, REMSInitiationRequest, REMSInitiationResponse, REMSRequest, REMSResponse, PAInitiationRequest, PAInitiationResponse, PARequest, PAResponse, PAAppealRequest, PAAppealResponse, PACancelRequest, and PACancelResponse. xviii. Oral Liquid Medications Limit a user’s ability to prescribe all oral liquid medications in only metric standard units of mL (i.e., not cc). Comments. While not within the scope of the Proposed Rule, one commenter did not support the continued requirement to prescribe oral liquids in ‘‘mL’’ units. The commenter supported the use of metric units, but did not agree with the requirement of the ONC Health IT Certification Program to limit this to only milliliters. The commenter recommended that the unit of measure used by a prescriber be at their discretion, as long as it is appropriate for the dosage. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 Response. We thank the commenter for the input. Because this requirement is out of scope for the Proposed Rule in that we did not propose to change this conformance requirement, we decline to relax or retire the requirement for oral liquid medications to be prescribed in mL units. When we first adopted this requirement for the 2015 Edition Proposed Rule, several commenters were supportive of improving patient safety through use of the metric standard for dosing, but recommended that this requirement only apply to oral liquid medications. Incorrect dosage is a common error with liquid medication, often resulting from confusion between different dose measurements (e.g., mL and teaspoons). If these measurements are confused with each other, too much or too little of the medicine can be given. This requirement is also in alignment with NCPDP SCRIPT implementation recommendations. xix. Signatura (Sig) Element The Signatura (Sig) element is used to support electronic prescribing for the consistent expression of patient directions for use by relaying this information between a prescriber and a pharmacist. It must be legible, unambiguous, and complete to ensure the prescriber’s instructions for use of the medication are understood. For each transaction, the technology must be able to receive and transmit the reason for the prescription using the indication elements in the SIG Segment. Comments. One commenter requested that the Sig element be required rather than optional to aid in future medication reconciliation and clinical reporting. Another commenter noted that the NCPDP SCRIPT standard version 2017071 allows for an increase in Sig length. Response. Given the lack of attention paid to and support for modifying the electronic prescribing criterion for Sig from optional to required, we have decided to retain Sig as optional in the updated § 170.315(b)(3) criterion. As discussed in the Reason for Prescription section, health IT may optionally seek certification to the updated electronic prescribing criterion by demonstrating their capacity to receive and transmit the reason for the prescription using the Sig element. xx. Real Time Pharmacy Benefit While development is still currently underway by NCPDP, the Real-Time Pharmacy Benefit (RTPB) standard is not yet complete. When complete, the RTPB standard is expected to facilitate the ability for pharmacy benefit payers/ processors to communicate formulary PO 00000 Frm 00046 Fmt 4701 Sfmt 4700 and benefit information to providers. In the absence of that or another similar standard, CMS has adopted policies requiring the development and/or implementation of Real Time Benefit Transaction (RTBT) standards in the Part D e-Rx Program in the context of recent rulemaking. On May 16, 2019, CMS issued the Modernizing Part D and Medicare Advantage to Lower Drug Prices and Reduce Out-of-Pocket Expenses final rule, which includes a requirement under the electronic prescribing standards that Part D plan sponsors implement one or more electronic real-time benefit tools that are capable of integrating with at least one prescriber’s electronic prescribing system or electronic health record no later than January 1, 2021 (84 FR 23832). One commenter recommended that CMS and ONC coordinate with NCPDP on requirements for real-time benefit functionality. We are also aware of industry efforts to develop a consumer-facing real-time pharmacy benefit functionality FHIR®-based implementation guide that we anticipate will be balloted in 2020. ONC will continue to monitor these efforts and consider proposing the NCPDP RTPB standard or a similar standard to enable real-time benefit transactions in future rulemaking. xxi. Other Comments Received Outside the Scope of This Rule We note that we received several comments specifically addressing the electronic prescribing of controlled substances and prescription drug monitoring programs. We note that these specific comments are outside the scope of the proposals finalized in this rule. However, we note that we included a discussion of these topics in relation to the discussion of the RFI on OUD prevention and treatment in the Proposed Rule in 84 FR 7461. 5. Clinical Quality Measures—Report Criterion In the 2015 Edition final rule, ONC adopted four clinical quality measure (CQM) certification criteria, § 170.315(c)(1) CQMs—record and export, § 170.315(c)(2) CQMs—import and calculate, § 170.315(c)(3) CQMs— report, and § 170.315(c)(4) CQMs—filter (80 FR 62649 through 62655). These four criteria were adopted with the intent to support providers’ quality improvement activities and in electronically generating CQM reports for reporting with certified health IT to programs such as the EHR Incentive Programs, Quality Payment Program, and Comprehensive Primary Care plus initiative. The ‘‘CQMs—report’’ E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations certification criterion (§ 170.315(c)(3)) included an optional certification provision for demonstrating that the health IT can create Quality Reporting Document Architecture (QRDA) reports in the form and manner required for submission to CMS programs, which is in accordance with CMS’ QRDA Implementation Guide (IGs). The CMS QRDA IGs provide technical guidance and specific requirements for implementing the HL7 QRDA Category I (QRDA I) and Category III (QRDA III) standards for reporting to CMS quality reporting programs.45 The CMS QRDA IGs include the formal template definitions and submission criteria for submitting QRDA documents to the Comprehensive Primary Care Plus (CPC+) and Merit Based Incentive Payments System (MIPS) Programs. Some of the conformance statements in the HL7 QRDA standards have been further constrained to meet the specific requirements from these CMS programs. The CMS QRDA IGs also only list the templates specifying CMS-specific reporting requirements from the base HL7 QRDA standards. QRDA I is an individual-patient-level report. It contains quality data for one patient for one or more electronic clinical quality measures (eCQMs). QRDA III is an aggregate quality report. A QRDA III report contains quality data for a set of patients for one or more eCQMs. Since the 2015 Edition final rule was published, we have gained additional certification experience and received feedback from the industry that health IT certified to the ‘‘CQMs—report’’ criterion (§ 170.315(c)(3)) are only/ primarily being used to submit eCQMs to CMS for participation in CMS’ programs. Therefore, as a means of reducing burden, we proposed to remove the HL7 CDA® Release 2 Implementation Guide: QRDA I; Release 1, Draft Standard for Trial Use (DSTU) Release 3 (US Realm), Volume 1 (§ 170.205(h)(2)), as well as the QRDA Category III, Implementation Guide for CDA® Release 2 (§ 170.205(k)(1)) and the Errata to the HL7 Implementation Guide for CDA® Release 2: QRDA Category III, DSTU Release 1 (US Realm), September 2014 (§ 170.205(k)(2)) standard requirements (HL7 QRDA standards) from the current 2015 Edition CQMs—report criterion in § 170.315(c)(3), and we also proposed to 45 The following resources provide additional information on the differences between the CMS QRDA and the HL7 QRDA standards: https:// ecqi.healthit.gov/system/files/QRDA_HQR_2019_ CMS_IG_final_508.pdf (pg. 38) and https:// ecqi.healthit.gov/sites/default/files/2019-07/2020CMS-QRDA-III-Eligible-Clinicians-and-EP-IG07182019-508.pdf (pg. 18). VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 require that health IT certified to the current 2015 Edition CQMs—report criterion support the CMS QRDA IGs (84 FR 7446). We stated that this change would directly reduce burden on health IT developers and indirectly providers as they would no longer have to develop and support two forms of the QRDA standard. We also solicited comment in the Proposed Rule on the future possibility of FHIR-enabled APIs replacing or complementing QRDA-based quality reporting. We also noted in the Proposed Rule that the Fast Health Interoperability Resources (FHIR®) standard offers the potential for supporting quality improvement and reporting needs, and holds the potential of being a more efficient and interoperable standard to develop, implement, and utilize to conduct quality reporting through APIs. We believe until the potential benefits of FHIR® APIs can be realized for quality reporting, and that solely requiring the CMS QRDA IGs for the updated 2015 Edition ‘‘CQMs—report’’ criterion will balance the burden on developers, while still ensuring module users’ abilities to meet their quality reporting obligations to CMS (84 FR 7446). To support the proposal, we proposed to incorporate by reference in § 170.299 the latest annual CMS QRDA IGs, specifically the 2019 CMS QRDA I IG for Hospital Quality Reporting 46 (§ 170.205(h)(3)) and the 2019 CMS QRDA III IG for Eligible Clinicians and Eligible Professionals (§ 170.205(k)(3)).47 We noted in the Proposed Rule that developers would be able to update certified health IT to newer versions of the CMS QRDA IGs through the real world testing Maintenance of Certification provision for standards and implementation specification updates in § 170.405(b). We also proposed that a Health IT Module would need to be certified to both standards to ensure flexibility for Health IT Module users. We solicited comment on whether to consider an approach that would permit certification to only one of the standards depending on the care setting for which the Health IT Module is designed and implemented. Comments. The majority of commenters were supportive of the proposal to remove the HL7 QRDA standard requirements from the 2015 Edition CQMs—report criterion in 46 https://ecqi.healthit.gov/system/files/QRDA_ HQR_2019_CMS_IG_final_508.pdf. 47 https://ecqi.healthit.gov/system/files/2019_ CMS_QRDA_III_Eligible_Clinicians_and_EP_IG508.pdf. PO 00000 Frm 00047 Fmt 4701 Sfmt 4700 25687 § 170.315(c)(3), and to require that health IT certified to the criterion support the proposed CMS QRDA IGs. Some commenters observed that the main use cases for the certified QRDA export functionality (which is specific to CMS eCQMs) are to support direct data submission to CMS at the conclusion of reporting periods, to enable use of third party data submission Health IT Modules to meet CMS reporting requirements, and to support data extraction for registry reporting for participation in CMS programs such as MIPS. Commenters noted that while in some cases the extraction of data using a QRDA may also support other use cases—for example for a registry—because of the specificity of the criteria to the CMS eCQMs, such a transaction using the certified functionality is primarily for CMS reporting. Commenters noted the use of the CMS QRDA IG does not impede use of the data for other purposes. Finally, commenters noted that ONC should continue to provide health IT developers the flexibility to offer a non-certified QRDA functionality that could support eCQMs beyond those included for CMS programs. One commenter observed that while some health IT systems also provide tools for internal quality performance monitoring, those tools often do not rely on the generation of QRDA exports. Some commenters reported that the technical support of multiple versions of QRDA standards is unnecessary. Other commenters recommended maintaining only the HL7 standard or offering certification to the HL7 standard as an optional alternative to the CMS QRDA IG. One commenter who recommended maintaining both the HL7 standard and the CMS QRDA IGs suggested that ONC cite the CMS version(s) of the QRDA IG as a technical resource in the same manner the C–CDA companion guide is cited for the transition of care criteria and only require certifying to the HL7 version. These commenters agreed that developers should not have to certify to both HL7 QRDA and CMS QRDA IGs, but suggested if a developer passed certification for the CMS QRDA IGs, they should be deemed to have achieved certification to the HL7 QRDA standard as well. Commenters noted that the CMS QRDA apply specifications to the HL7 QRDA to support CMS eCQM reporting requirements. Other commenters specifically stated that the HL7 QRDA should remain as an optional certification criterion, since other organizations (e.g., certain hospital accreditation organizations such as The Joint Commission) use the E:\FR\FM\01MYR3.SGM 01MYR3 25688 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations HL7 QRDA, and there is need to assure the same style for submission across programs. They recommended that the HL7 QRDA IG persist as a continuing option in the Program to enhance alignment with other standards and C– CDA, and to encourage a base standard alignment across implementers such as CMS and The Joint Commission. They stated that citing only to the CMS QRDA IG may lead to misalignment with the base standards and reduce incentives to update the base standard. Some commenters expressed concern over the proposed removal of HL7 QRDA standards from the original 2015 Edition CQMs, stating it may undermine private sector efforts to self-regulate and stated that the removal of the HL7 QRDA may not achieve the envisioned burden reduction through the mere elimination of developers’ need to certify and maintain multiple standards. While some commenters suggested that removing HL7 QRDA from the certification criteria could simplify the reporting process by recognizing the widespread use of CMS’ QRDA IGs, they noted that the HL7 QRDA is currently the standard for most EHR systems and questioned how ONC proposed to implement this change given the prominence of HL7 standards in EHR systems. Several commenters noted that the disconnect between what the certification testing required, and how the standard was really being used in the industry (primarily but not exclusively to meet the CMS QRDA IG) created unnecessary certification testing burden, and asserted that the adoption of the CMS proprietary IG was more appropriate than to maintain HL7 QRDA. Response. We thank commenters for their support for the proposal and comments regarding the versions of standards. We understand the concerns expressed in opposition to this proposal, and we appreciate specifically the identification of potential risk for the elimination of the HL7 standard as applicable for other use cases. As noted previously, since the 2015 Edition final rule was published (October 16, 2015), we have gained received feedback from the industry that health IT certified to the ‘‘CQMs—report’’ criterion (§ 170.315(c)(3)) are only or primarily being used to submit eCQMs to CMS for participation in CMS’ programs. In addition, we note that while the HL7 QRDA may be used for other purposes, the ‘‘CQMs—report’’ criterion (§ 170.315(c)(3)) is specific to the CMS eCQMs specified for participation in CMS reporting programs and no other eCQMs are tested under that criterion. This specificity applies not only to the VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 current 2015 Edition ‘‘CQMs—report’’ criterion, but also to the other 2015 Edition CQM criteria and the prior 2014 Edition CQM criteria. This specificity is intended to provide assurances through testing and certification of the accuracy and standardization of CMS program measures across platforms, while recognizing that it would not be possible to specifically test to the entire universe of potential eCQMs in use by health care providers. Because of this dependency, testing and certification of both the HL7 QRDA for CQMs-report and the CMS QRDA IG is redundant to support eCQM data reporting. This has a dual impact on our considerations to finalize our proposal to require only the CMS QRDA IG. First, for use cases that are not related to CMS eCQM reporting, the certified functionality would not specifically support third party non-CMS eCQM reporting requirements, and so the modification to the functionality does not change the inability to use the certified version of the functionality for such purposes. Second, for those use cases involving registries or other third parties that are implementing or supporting CMS eCQM reporting, use of the CMS QRDA IG could additionally support such purposes. In addition, we are not restricting health IT developers from creating and providing to customers a non-certified functionality that supports the HL7 QRDA for the extraction of data for eCQMs that are not CMS eCQMs. We note that this is not a change from the prior policy allowing such flexibility. The prior certification for the QRDA IG included testing of CMS eCQMs only and it neither supported nor restricted any development of a QRDA functionality for non-CMS eCQMs. We also agree that this approach will support closer alignment between the testing to the CMS QRDA IG specifications for a certified health IT module and the technical requirements for CMS program reporting. As part of the development of the CMS QRDA IGs, CMS strives to use the annual update process to resolve issues with CQMs based on updates to clinical guidelines and to advance the requirements as the standard for reporting eCQM data matures. In this way, aligning the criterion to the CMS program requirements that it specifically supports allows for alignment between these efforts as well as allowing for continued updates through the standards version advancement process. We also believe our finalized proposal will not impede private sector initiatives as the CMS IGs support the continued efforts by public/private PO 00000 Frm 00048 Fmt 4701 Sfmt 4700 collaboration through standards developing organizations (SDOs) to refine standards. Therefore, as a means of reducing burden, we have finalized our proposal to remove the HL7 QRDA standard requirements from the 2015 Edition CQMs—report criterion in § 170.315(c)(3). We maintain our position that this would directly reduce burden on health IT developers and indirectly for health care providers as there would no longer be a requirement to develop and support two forms of the QRDA standard. We note that this does not preclude developers from continuing to support the underlying standard, especially where such standard may support reporting or health information exchange for other quality or public health purposes. Instead, we are simply not requiring testing and certification of any such standards, thereby eliminating testing and certification burden from a criterion that is at this time scoped to the purpose of reporting for CMS quality programs. Comments. A few commenters did not support the proposal but instead recommended that CMS adopt the HL7 QRDA standard and do away with its own. However, several commenters offered suggestions to CMS on the development of the CMS QRDA IG and the alignment to the HL7 QRDA standard. A number of commenters noted the National Technology Transfer and Advancement Act of 1995 principle that Federal agencies are generally required to use technical standards that are developed by voluntary consensus standards bodies rather than a proprietary standard specific to an HHS program. Commenters also stated if CMS wanted to retain certain aspects of its standard, it should work with HL7 to get these vetted, balloted and approved for inclusion within the HL7 standard. Commenters also recommended working with SDOs or other organizations to sufficiently support CMS QRDA IGs. Some commenters suggested that consolidation of QRDA standards would be more likely result in reducing provider burdens than what ONC proposed. Response. We thank the commenters for their recommendations to improve the CMS QRDA IGs, or for CMS to work toward including the aspects of CMS QRDA IGs that they require for their program operations in SDO-balloted and approved consensus standards. Specific suggestions for CMS IG development are outside the scope of this rule. ONC had previously included the HL7 QRDA standards for certification in the 2015 Edition in order to potentially support a broader range of use cases than E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations reporting for CMS programs. However, the specificity of the criterion to the CMS eCQMs limits the utility of the certified functionality beyond use with CMS eCQMs and as stated in the Proposed Rule, since the 2015 Edition final rule, ONC and CMS received significant stakeholder feedback that health IT modules certified to the ‘‘CQMs—report’’ criteria at 170.314(c)(3) in the 2014 Edition and 170.315(c)(3) for the 2015 Edition are used only or primarily for reporting to CMS programs. While we reiterate that these comments are outside the scope of this rule, we will continue to take this and other feedback into consideration and will continue to work with CMS, standards developing organizations, and health IT industry partners to explore the concerns raised in relation to reducing burden and promoting interoperable standards for quality reporting. Comments. Commenters provided mixed feedback on whether the updated 2015 Edition ‘‘CQMs—report’’ criterion should require adherence to both CMS QRDA IGs, specifically the 2019 CMS QRDA I IG for Hospital Quality Reporting 48 and the 2019 CMS QRDA III IG for Eligible Clinicians and Eligible Professionals.49 The majority of commenters recommended that to reduce burden, ONC should consider a certification approach that permits developers to seek certifications based on the care setting(s) their health IT modules are intended serve. For example, commenters suggested that ONC should only require certification to the 2019 QRDA I IG for Hospital Quality Reporting if a Health IT Module is designed exclusively for the reporting of hospital measures, and only require certification to the 2019 QRDA III IG for Eligible Clinicians and Eligible Professionals when a Health IT Module is designed exclusively for the reporting of ambulatory measures. In instances in which both populations are served, the developer would then seek certification to both standards. Commenters suggested this approach would avoid the unnecessary burden of certifying to a standard that the Health IT Module was not intended to serve. Other commenters stated that the certification requirements should ensure that certified Health IT Modules can support quality measure reporting by all potential users, especially given the potential expansion of eligible https://ecqi.healthit.gov/system/files/QRDA_ HQR_2019_CMS_IG_final_508.pdf. 49 https://ecqi.healthit.gov/system/files/2019_ CMS_QRDA_III_Eligible_Clinicians_and_EP_IG508.pdf. 48 VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 participants in certain CMS programs (e.g., should a program expand from hospital-based only to include ambulatory measures). These commenters recommended the adoption of a requirement for certified Health IT Modules to calculate and export both CMS QRDA I patient-level reports for Hospital Quality Reporting and CMS QRDA III aggregate summary reports for Eligible Clinicians and Eligible Professionals. These commenters noted that if a certified Health IT Module can only send an aggregate report without a patient level report, then this would greatly diminish the ability to verify the underlying calculations. However, commenters recommended that ONC clarify that the transition to CMS QRDA I IG-based reports (patient-level, QRDA I IG for Hospital Quality Reporting) does not necessarily mean that a hospital quality measure must be certified by any system (i.e., an ambulatory Health IT Module can certify to only CMS QRDA III IG requirements). Commenters also sought clarity that the transition to QRDA III reports (aggregate-level, IG for Eligible Clinicians and Eligible Professionals) does not necessarily mean that an ambulatory quality measure must be certified by any system (i.e., a hospital system can certify to only hospital measures). Finally, one commenter noted that certifying ambulatory quality measures for the QRDA I to a hospital IG is not effective and will interfere with the use case of using QRDA I to combine data between multiple ambulatory systems such as for group reporting. Response. We thank commenters for their comments regarding whether a Health IT Module should be certified to both CMS QRDA IG standards or whether to consider an approach that permits certification to only one of the standards depending on the care setting for which the Health IT Module is designed and implemented. We agree with commenters that our certification approach should prevent unintended burden by tailoring the requirements to the type of measures being tested. This would mean that for the updated certification criterion ‘‘CQMs—report’’ in § 170.315(c)(3) a Health IT Module testing only ambulatory measures would test only with the CMS QRDA III IG for ambulatory measures and a Health IT Module testing only inpatient measures would test only with the QRDA I CMS IG for inpatient measures. A Health IT Module supporting both ambulatory and inpatient measures would be required to test to both the CMS QRDA I IG and the CMS QRDA III IG. We clarify that testing for the 2015 Edition ‘‘CQM— PO 00000 Frm 00049 Fmt 4701 Sfmt 4700 25689 capture and export’’ criterion in § 170.315(c)(1) criteria includes demonstrating the capability to export a QRDA I report specific to the eCQM being tested—which would support use case noted by the commenter to combine data across multiple ambulatory systems. We have not proposed and have not finalized a change to the 2015 Edition ‘‘CQM— capture and export’’ criterion in § 170.315(c)(1). We further note that health IT developers may leverage QRDA file formats for a wide range of use cases and that our inclusion of the CMS QRDA I and QRDA III IGs does not prohibit the use of the QRDA standard for any other purpose. As noted above, we have finalized the adoption of the CMS QRDA IGs for the ‘‘CQMs—report’’ criterion in § 170.315(c)(3) for which the Health IT Module is presented for certification. Comments. The majority of commenters supported the proposal to adopt the latest CMS QRDA IGs at the time of final rule publication, as CMS updates their QRDA IGs annually to support the latest eCQM specifications and only accepts eCQM reporting to the latest version. However, a few commenters recommended that ONC monitor this part of the certification process for unintended consequences since CMS’ IGs are updated on a yearly basis. Some commenters noted that given the lack of alignment with timing, eCQM measures and standards will continue to lack testing. Other commenters recommended the IGs be updated in alignment with updates to the certification standards. A few commenters requested clarification of the effective dates and asked ONC to evaluate and propose a timeline for the implementation of an alignment between the programs. In addition, commenters asked for clarification on whether ONC will propose penalties for providers who may be unable to meet the timeline if it is insufficient. Response. We thank commenters for their input and have adopted the latest CMS QRDA IG versions available at the time of publication of this final rule. For details on the latest CMS QRDA IGs, we refer readers to the CMS QRDA I Implementation Guide for Hospital Quality Reporting and CMS QRDA III Implementation Guide for Eligible Clinicians and Eligible Professionals available on the eCQI Resource Center website.50 We note that CMS updates 50 The Electronic Clinical Quality Improvement (eCQI) Resource Center. CMS QRDA I Implementation Guide for Hospital Quality Reporting and CMS QRDA III Implementation Guide for Eligible Clinicians and Eligible E:\FR\FM\01MYR3.SGM Continued 01MYR3 25690 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations the CMS eCQMs on an annual basis as well as the CMS QRDA IGs for reporting to CMS programs. As in prior years going back to the 2014 Edition, HHS will continue to update the Cypress testing tool to support health IT developer testing to the most recent annual update. We note that CMS has previously required that EHR technology used for eCQM reporting be certified to all eCQMs but does not need to be recertified each time it is updated to a more recent version of the eCQM electronic specifications, unless the EHR technology is supporting new eCQMs or functionality (such as the ‘‘CQM—filter’’ criterion in § 170.315(c)(4)) (84 FR 42505). This approach allows for continued updates to and testing of eCQMs while minimizing the burden on developers and providers to support those updates in time for each annual performance period. Finally, we note that ONC has no authority to set requirements, incentives, or penalties for health care providers related to the use of health IT, and we direct readers to CMS for information on health IT requirements in CMS programs. Comments. The majority of commenters agreed with ONC’s assessment in the Proposed Rule that quality reporting is not yet ready to transition to FHIR and that more testing and validation of FHIR is needed before requiring a new API-based reporting functionality as a part of the Program. Some commenters supported the adoption of FHIR Release 4-enabled APIs as a replacement for QRDA-based reports, but stated that published documentation aligning HL7 C–CDA, QRDA, and/or FHIR standards to CMS’ ‘‘Quality Data Model,51’’ which is an information model that defines relationships between patients and clinical concepts in a standardized format to enable electronic quality performance measurement and that would allow for more consistent eCQM reporting and improved interoperability in clinical quality feedback between health systems and data registries. Other commenters stated that FHIR standards will likely strengthen standardized data element availability and flexibility to improve the types of eCQMs that may be developed, and suggested that CMS continue to work with the National Quality Forum, measure stewards, and measure developers to advance both existing evidence-based measures (e.g., either administrative or hybrid measures) and evolving outcome Professionals. Available at: https:// ecqi.healthit.gov/qrda. 51 https://ecqi.healthit.gov/qdm. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 measures that utilize population-based electronic clinical data. Response. We thank commenters for their support. We believe there are potential benefits to be gained by exploring both near-term, program specific implementations of APIs to support current quality reporting submission mechanisms such as for CMS eCQM reporting as well as the long-term potential to reimagine quality measurement by leveraging API technologies. We believe that these technology approaches could help providers and payers, including CMS, move from the current approach, in which providers are required to calculate and submit results on specific quality measures, to one in which payers, including CMS, could obtain clinical data for quality measurement directly through an API. This could potentially include the ability to obtain clinical data for a defined group or sample set of patients to assess quality across patient populations, as well as to compare clinical data for patients over time to assess quality impacts through longitudinal measurement. We believe emerging innovative standards are now available to support such models, specifically the ability to respond with clinical data for a defined group or sample set of patients using the bulk data capabilities in FHIR Release 4. We note that readiness for such an approach, both for recipients of quality data and for health IT developers supporting quality improvement solutions, is not yet mature for adoption of such a criterion in the Program. However, we are committed to continuing to work with HHS partners, health care providers, health IT developers and SDOs to explore the potential for such solutions in the future. Comments. Several commenters recommended additional changes not considered in the Proposed Rule. For example, one commenter recommended ONC require that to be certified in § 170.315(c)(1) ‘‘CQMs—record and export,’’ § 170.315(c)(2), ‘‘CQMs— import and calculate,’’ and § 170.315(c)(3) ‘‘CQMs—report,’’ a Health IT Module be certified in a minimum of 9 eCQMs instead of one eCQM and that the § 170.315(c)(1) criterion should require the ability to export all patients for a given eCQM. Currently, the ability to export a QRDA I file can be limited to one patient at a time. Commenters noted that this limitation defeats the purpose of data interoperability and does not advance the goals of ONC to increase access to data and the interoperability of Health IT Modules. And another commenter PO 00000 Frm 00050 Fmt 4701 Sfmt 4700 recommended that, in addition to the adoption of the CMS IGs under the § 170.315(c)(3) criterion, that the CMS IGs replace the corresponding HL7 QRDA IGs as ONC’s Program standard under the § 170.315(c)(1) criterion (which currently references QRDA I exclusively) and § 170.315(c)(2) criterion (which currently references only QRDA I as standard, but also involves use of QRDA III for purposes of verifying appropriate calculation of measures from imported QRDAs). Response. We thank commenters for input and clarifications. While we appreciate comments suggesting changes to § 170.315(c)(1) ‘‘CQMs— record and export,’’ and § 170.315(c)(2) ‘‘CQMs—import and calculate,’’ the recommended changes are outside the scope of our proposal. Therefore, while we may consider these recommendations for future Program rulemaking, we have not adopted the suggested changes to § 170.315(c)(1) ‘‘CQMs—record and export,’’ or § 170.315(c)(2) ‘‘CQMs—import and calculate in this final rule. As noted previously, we have finalized the update to the ‘‘CQMs— report’’ criterion in § 170.315(c)(3) to require that health IT developers use the CMS QRDA IG appropriate to the measures being submitted for testing and certification to read as follows: ‘‘Clinical quality measures—report. Enable a user to electronically create a data file for transmission of clinical quality measurement data in accordance with the applicable implementation specifications specified by the CMS implementation guides for Quality Reporting Document Architecture (QRDA), category I, for inpatient measures in § 170.205(h)(3) and CMS QRDA, category III, for ambulatory measures in § 170.205(k)(3).’’ 6. Electronic Health Information (EHI) Export Criterion We proposed to adopt a new 2015 Edition certification criterion referred to as ‘‘EHI Export’’ in § 170.315(b)(10). The criterion’s conformance requirements were intended to support two contexts in which we believed that all EHI produced and electronically managed by a developer’s technology should be made readily available for export as a capability of certified health IT. First, we proposed in § 170.315(b)(10)(i) at 84 FR 7447 that health IT certified to this criterion would support single patient EHI export upon a valid request by a patient or a user on the patient’s behalf. Second, we proposed in § 170.315(b)(10)(ii) at 84 FR 7447 that the proposed criterion would support the export of all EHI when a health care E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations provider chooses to transition or migrate information to another health IT system. Third, we proposed in § 170.315(b)(10)(iii) that the export format(s) used to support the exports must be made available via a publicly accessible hyperlink, including keeping the hyperlink up-to-date with the current export format. At the time of the Proposed Rule, we indicated our belief that this proposed certification criterion provided a useful first step toward enabling patients to have electronic access to their EHI and equipping health care providers with better tools to transition patient EHI to another health IT system. We noted that this criterion would create a baseline capability for exporting EHI. We requested comments regarding the proposed single patient EHI export and the proposed database export functionalities, as well as the proposed scope of data export and other criterion elements throughout the Proposed Rule section at 84 FR 7447 through 7449. Comments. Commenters generally supported the intent of the proposed ‘‘EHI export’’ criterion to advance the access, exchange, and use of EHI. Commenters in favor of the criterion and its proposed conformance requirements stated that it would foster innovative export capabilities and inform areas where additional standards development could be needed. We also received a variety of comments asking for adjustments to proposed requirements. A majority of commenters requested revisions to the criterion, including calling for a defined set of data elements for export and specific data transport standards. Many commenters offered recommended standards or requested that we provide specific standards to reduce variation. These commenters indicated that no defined standard could lead to broad interpretation and potential inadequacies of the data export. Some commenters expressed a medical record keeping concern that the proposed standards-agnostic approach for the export functionality could be problematic, stating that the export could create a dissonance if the EHI renders health record content in a form or format that is different from what a provider produces or utilizes as output. Other commenters opposed the adoption of this proposed criterion. These commenters expressed concern that later implementation of standards, such as APIs, would make developers invest time and funding into the proposed requirements only for the work to be discarded in the future. Response. We thank commenters for their feedback on the proposed ‘‘EHI VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 export’’ criterion at 84 FR 7446 of the Proposed Rule (§ 170.315(b)(10)). We have considered commenters’ concerns, support, and recommendations and adopted a revised version of this certification criterion. This final certification criterion is designed to align with section 4006(a) of the Cures Act, which requires the Secretary, in consultation with the National Coordinator, to promote policies that ensure that a patient’s EHI is accessible to that patient and the patient’s designees, in a manner that facilitates communication with the patient’s health care providers and other individuals (84 FR 7447). In addition, this criterion complements other provisions that support patients’ access to their EHI and health care providers use of EHI, such as the secure, standardbased API certification criterion (proposed in 84 FR 7427 and finalized in § 170.315(g)(10)), and also supports longitudinal data record development. Therefore, we have finalized the criterion with revisions. Notably, in response to comments on this criterion and the proposed information blocking policies, we have adopted a focused definition of EHI in § 170.102 and § 171.102. For context purposes, the EHI definition is focused on ‘‘electronic protected health information as defined in 45 CFR 160.103 to the extent that it would be included in a designated record set as defined in 45 CFR 164.501’’ with additional caveats not repeated here for briefness. Put simply, the EHI definition represents the same ePHI that a patient would have the right to request a copy of pursuant to the HIPAA Privacy Rule. This is a regulatory concept with which the industry has nearly 20 years of familiarity. Health IT developers’ customer base includes health care providers who are HIPAA covered entities, and in many cases developers serve as HIPAA business associates to their covered-entity customers. Thus, health IT developers should be accustomed to identifying ePHI so that their products support appropriately securing it, the fulfillment of patient access requests, and the identification and reporting on breaches. They should, therefore, be well prepared to identify what EHI their product(s) would need to export in order to support a patient’s HIPAA right of access. The finalized criterion requires a certified Health IT Module to include export capabilities for a single patient (§ 170.315(b)(10)(i)) and patient population (§ 170.315(b)(10)(ii)) related to EHI. More specifically, the export(s) will need to include the EHI that can be PO 00000 Frm 00051 Fmt 4701 Sfmt 4700 25691 stored at the time of certification by the product, of which the Health IT Module is a part. We emphasize that such ‘‘stored’’ data applies to all EHI and is agnostic as to whether the EHI is stored in or by the certified Health IT Module or in or by any of the other ‘‘noncertified’’ capabilities of the health IT product of which the certified Health IT Module is a part. The scope of EHI applies across the product as a whole as a means to further promote the access, exchange, and use of EHI for the use cases required to be supported by this certification criterion. The finalized scope of data included in the criterion export is discussed in greater detail under the ‘‘Scope of Data Export’’ (IV.B.6.c) section below. While the data that must be exported has been more specifically scoped, the certification criterion does not require a specific standard format be used for the purposes of representing the exported EHI. We also modified the certification criterion’s documentation requirements in § 170.315(b)(10)(iii) to be more concise. As finalized, the documentation required for the export format(s) used to support (b)(10)(i) and (ii) functionality must be kept up-todate and made available via a publicly accessible hyperlink. Additional information is included under ‘‘Export Format’’ below. We appreciate the comments received regarding the specific data sets and data transmission standards for this certification criterion. We reiterate that the finalized certification criterion is specific to EHI, as defined, that can be stored at the time of certification by the product, of which the Health IT Module is part, and is not limited to a predefined data set or to specific data transmission standards. Developers are required to ensure the health IT products they present for certification are capable of exporting all of the EHI that can be stored at the time of certification by the product. We acknowledge that the amount of EHI exported and format in which such EHI is represented will differ by developer and products of which certified Health IT Modules are a part. Each product presented for certification, of which the Health IT Module is a part, will likely vary in the amount of EHI it can store. As a result, the amount of EHI that will need to be able to be exported in order to demonstrate conformance with this certification criterion will vary widely because of the diversity of products presented for certification. For example, small software components only capable of storing a certain scope of EHI (and only certified to a few certification criteria) will only need to be able to E:\FR\FM\01MYR3.SGM 01MYR3 25692 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations export that stored EHI in order to meet this certification criterion. In contrast, a more comprehensive product with an EHI storage scope well beyond all of the adopted certification criteria would by its nature need to demonstrate it could export a lot more EHI. But even in this latter case, it is important to note that while that scope of EHI may be comprehensive for that product, it may still not be all of the health information for which a health care provider is the steward and that meets the EHI definition within the health IT products deployed within their organization. In other words, a health IT user may have other health IT systems with no connection to the Certification Program that store EHI and such EHI would still be in scope from an information blocking perspective. We note all of these distinctions to make clear for and to dissuade readers from jumping to an improper conclusion that the EHI export criterion in the Certification Program is a substitute for or equivalent to the EHI definition for the purposes of information blocking. We direct readers to the information blocking section (VIII) for additional information. Unless a health care provider (which is an ‘‘actor’’ regulated by the information blocking provision) only used a single health IT product to store EHI that was also certified to this certification criterion, the EHI definition will always be larger. Regardless of the amount of EHI each product has within its scope to export, the purpose of this certification criterion is to make the EHI already available in such health IT products more easily available for access, exchange, and use by patients and their providers, which is a fundamental principle established by the Cures Act. As technology continues to advance, and as stated in the Proposed Rule at 84 FR 7447, this criterion may not be needed in the future. However, the comments suggesting we not adopt this certification criterion at all because it will be outmoded at some point in the future did not appear to acknowledge that all technology is eventually replaced for a variety of reasons. We too look forward to a day where standardsbased APIs are the predominant method for enabling electronic health information to be accessed, exchanged, and used. We strongly encourage industry partners to engage in their own consortiums, with ONC and other Federal agencies, and other stakeholders in the health IT ecosystem to advance standards development, prototypes, and pilot testing in order to ultimately build a body of evidence that could accelerate VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 the adoption and implementation timeline of technology that could either add more structure to or remove the need for this certification criterion in the future. However, we do not accept the promise of this future state as a reason to simply wait, nor do we believe that the potential of this future justifies delaying the incremental progress the industry can make. In this case, had we followed such commenters direction, we would be withholding from patients and health care providers the certainty that there would be technical capabilities within a defined time that could be used to enable the access, exchange, and use of EHI. We note that suggestions by commenters to structure the certification criterion to only move information within specific data sets or via specific standards-based export functionality would delay the ability of patients and users of health IT to access, exchange, and use the information they need and would run counter to the underlying principles supporting this certification criterion—that the electronic health information should be accessible for access, exchange, and use. For this reason, we have not included specific data set or export requirements in this certification criterion as some commenters suggested. In consideration of comments, the finalized ‘‘EHI export’’ criterion in § 170.315(b)(10) is not included in the 2015 Edition Base EHR definition, which is a modification from what we proposed. We revised the policy in recognition of comments received, including comments regarding the structure and scope of the criterion as proposed and the development burden of the criterion. As finalized here, we believe that including this certification criterion in the Conditions and Maintenance of Certification is the best place to include the requirement associated with the criterion. Thus, we have finalized the § 170.315(b)(10) certification criterion as a general certification requirement for the ONC Health IT Certification Program, and have not included it in the 2015 Edition Base EHR Definition. In general, we also note that those who use Health IT Module(s) certified to the ‘‘EHI export’’ criterion remain responsible for safeguarding the security and privacy of individuals’ EHI consistent with applicable laws and regulations related to health information privacy and security, including the HITECH Act, HIPAA Privacy and Security Rules, 42 CFR part 2, and State laws. The existence of a technical capability to make EHI more accessible and useable by Health IT Module users does not alter or change any of their PO 00000 Frm 00052 Fmt 4701 Sfmt 4700 data protection responsibilities under applicable laws and regulations. Comments. Comments received included concerns with the development and use of the certification criterion. Some commenters expressed support for the criterion’s overall flexibility but cautioned ONC to be realistic regarding the goals and expectations for the certification criterion. These commenters also expressed concern that the proposed certification criterion would result in development for an ambiguous scope of data export and would divert from work needed to achieve other interoperability goals. Other commenters stated concerns that development costs could potentially be passed onto health IT users, such as health care providers. These commenters also anticipated use and implementation challenges for users that work with multiple systems. Response. We thank commenters for sharing their concerns. In regards to the use of the capabilities required by this certification criterion, we interpreted from comments some confusion related to potential ‘‘users’’ of the health IT. As previously defined under the Program, ‘‘user’’ is a health care professional or their office staff; or a software program or service that would interact directly with the certified health IT (80 FR 62611, 77 FR 54168). We also appreciate the comments and concerns regarding the potential development burden that could result to meet the requirements of the proposed criterion. In consideration of those expressed concerns, we have narrowed the scope of data that must be exported. This more focused scope should measurably reduce the stated ambiguity by commenters and development burden for health IT developers in contrast to what was proposed (84 FR 7448). We appreciate the concerns expressed for the potential user(s) of Health IT Modules, but note that the certification criterion is designed to advance the electronic movement of data out of a product while factoring in the current variability in health IT. As always, we encourage developers to seek innovative and expedient capabilities that, at minimum, meet the requirements of the certification criterion, as well as the developing needs of their health IT users. Comments. Commenters provided alternative ideas for the criterion specific to USCDI. Some recommended amending the criterion to require the specific structure and applicable standards for USCDI elements, or starting this criterion with a minimum of USCDI data elements. Several commenters recommended expanding E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations the existing 2015 Edition ‘‘data export’’ criterion to include USCDI in lieu of the proposed ‘‘EHI export’’ criterion. Response. We thank commenters for sharing these ideas. We have finalized the ‘‘EHI export’’ criterion as described above. Our intent under this finalized criterion is to advance export functionality for single patient and patient population EHI exports, while leaving flexibility in regard to format and without assigning specific data sets due to the different scopes of data that health IT may include. Toward those ends, limiting the scope of this certification criterion to solely the data represented by the USCDI would make it no different than other USCDI bounded certification criteria already adopted and would not advance the policy interests we have expressed. In regards to comments on the existing 2015 Edition ‘‘data export’’ criterion (§ 170.315(b)(6)), we refer readers to our discussion of the criterion below. Comments. Some comments expressed confusion and asked for guidance on how this certification criterion would apply to health IT that is no longer certified. Commenters also asked for guidance on how this criterion applies to other systems that interact with Health IT Modules certified to this criterion based on the proposed scope of data for export. Response. We thank commenters for requesting clarification. We first clarify that the export functionality under this certification criterion applies to Health IT Modules presented for certification under the Program. More specifically, if a health IT developer presents for certification a health IT product of which a Health IT Module is a part and the product electronically stores EHI, certification to § 170.315(b)(10) is required. As noted in our response above, this would include the EHI that can be stored at the time of certification by the product, of which the Health IT Module is a part. This includes all EHI stored by the product’s certified and ‘‘non-certified’’ capabilities. For example, if a health IT product includes a component(s) that is presented for certification and that component stores EHI, then that EHI must be made available for export, in accordance with § 170.315(b)(10). Importantly, the scope of data required to be exported in accordance with § 170.315(b)(10) includes only to the EHI that can be stored at the time of certification by the product. We emphasize that such ‘‘stored’’ data applies to all EHI and is agnostic as to whether the EHI is stored in or by the certified Health IT Module or in or by any of the other ‘‘noncertified’’ capabilities of the health IT VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 product of which the certified Health IT Module is a part. The scope of EHI applies across the product as a whole as a means to further promote the access, exchange, and use of EHI for the use cases required to be supported by this certification criterion. a. Single Patient Export To Support Patient Access As part of this criterion, we proposed a functionality for single patient EHI export at 84 FR 7447 which would enable a user of certified health IT to timely create an export file(s), with the proposed scope of data export of all of the EHI the health IT product produces and electronically manages on a single patient. The functionality would also require a user to be able to execute this capability at any time the user chooses and without subsequent developer assistance to operate. In addition, we proposed that health IT certified to this criterion would be required to enable the ability to limit the users who could create such export file(s) in at least one of two ways: To a specific set of identified users, and (2) as a system administrative function. We also proposed that the export file(s) created must be electronic and in a computable format and that the export file(s) format, including its structure and syntax, must be included with the exported file(s). Comments. We received many comments in support of the proposal for single patient export to support patient access under the certification criterion. The majority of these commenters provided recommended revisions, including suggested transmission formats and data export content standards. Some commenters recommended the addition of this certification criterion to the list of criteria subject to real world testing. Response. We thank commenters for their feedback. We have finalized the single patient export functionality in § 170.315(b)(10)(i) with some modifications. We finalized a focused data export scope, which applies to the data expected to be available for export under the single patient export capability. We defined the scope of data that needs to be exported to EHI that can be stored at the time of certification by the product, of which the Health IT Module is a part. Thus, we have modified the title of § 170.315(b)(10)(i) to ‘‘single patient electronic health information export’’ to reflect the scope of this data export. We finalized that the capability for a user to execute a single patient export must be able to be limited at least one of two ways: To a specific set of identified users, and as a system administrative function. While we PO 00000 Frm 00053 Fmt 4701 Sfmt 4700 25693 finalized as proposed in § 170.315(b)(10)(i)(D) that the export files must be electronic and in a computable format, we modified in § 170.315(b)(10)(ii)(E) that the publicly accessible hyperlink of the export’s format must be included with the exported file(s). This modification clarifies that the user is able to access the format, and that the developer will keep their hyperlink up-to-date. We appreciate commenter’s recommendations for specific data transmission formats and data content standards, and considered the range of recommendations when developing the finalized scope of data export required for this criterion. We believe the definition of EHI as focused in § 171.102, as well as the modifications to the scope of data export, addresses the data ambiguity concerns received by commenters. We direct readers to our detailed discussion of the scope of data export below. As finalized, the certification criterion’s export, for both single and patient population EHI Export, remain standards-agnostic. We believe that the finalized certification criterion will serve as an initial step towards increased access, exchange, and use of electronically available data. We will continue working alongside industry stakeholders and will revisit export strategies as standards continue to develop and mature. We appreciate confirmation that commenters support inclusion of the criterion in § 170.315(b)(10) alongside the rest of the care coordination criteria in § 170.315(b), and have finalized that this certification criterion is part of the real world testing Condition of Certification requirement. Comments. Some commenters asked ONC to clarify how health IT developers may limit the users’ ability to access and initiate the export function in § 170.315(b)(10)(i), and to include examples of potential permissible and non-permissible behaviors. Response. We appreciate the comments received. We again clarify that ‘‘user’’ is a health care professional or their office staff; or a software program or service that would interact directly with the certified health IT (80 FR 62611, 77 FR 54168). In regards to questions on permissible behaviors for developers, the ability to limit the health IT users’ access to the single patient EHI export functionality in § 170.315(b)(10)(i) is intended to be used by and at the discretion of the organization implementing the technology. We reiterate that similar to the 2015 edition ‘‘data export’’ criterion in § 170.315(b)(6), this cannot be used by health IT developers as a way to E:\FR\FM\01MYR3.SGM 01MYR3 25694 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations thwart or moot the overarching userdriven aspect of this capability (80 FR 62646). We do not wish to limit this functionality to specific permissible or non-permissible behaviors at this time, but reaffirm in § 170.315(b)(10)(i)(B) that a user must be able to execute the single patient EHI export capability at any time the user chooses and without subsequent developer assistance to operate. To be clear, the user must be able to execute the export without the intervention of the developer. We also finalize, as proposed, in § 170.315(b)(10)(i)(C) that this capability must limit the ability of user who create such export files(s) in at least one of two ways; (1) to a specific set of identified users, and (2) as a system administrative function. Comments. The majority of comments received asked for further clarity on ‘‘timely’’ regarding a health IT user’s request to create an export file(s). Response. We thank commenters for the questions. We specify that ‘‘timely’’ means near real-time, while being reasonable and prudent given the circumstances. Comments. Commenters also sought clarity on data in electronic health records that may be shared between patients and possibly included in the export. These commenters asked if under the proposed criterion, patients have a right to information about others that may be contained in their medical record. Response. We thank commenters for submitting these questions. In regards to shared patient data concerns, we note that the export functionality requirements apply to what a product with a Health IT Module certified to this criterion must be able to do regardless of whether the developer is operating the export for a health care provider or a health care provider is maintaining and operating the technology in their own production environment. Under the HIPAA Privacy Rule, when a covered health care provider, in the course of treating an individual, collects or otherwise obtains an individual’s family medical history, this information may become part of the medical record for that individual and thus be included in the ‘‘designated record set’’ (defined at 45 CFR 164.501)). Thus, if the family medical history becomes part of the designated record set, the individual/ patient may exercise the right of access (45 CFR 164.524) under the HIPAA Privacy Rule to this information in the same fashion as any other information in the medical record. The HIPAA Privacy Rule does not prevent individuals, themselves, from gathering medical information about their family VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 members or from deciding to share this information with family members or others, including their health care providers. Thus, individuals are free to provide their doctors with a complete family medical history or communicate with their doctors about conditions that run in the family. To the degree that, for example, Patient A’s medical record include that their mother had breast cancer, that information would be accessible to Patient A because it was provided by Patient A and included as part of their medical record. Under this criterion, patients would not have a ‘‘right’’ to other patient’s records, consistent with existing laws. In general, with respect to patient access to information, we note that Health IT Module users must ensure that any disclosures of data conform to all applicable laws and regulations, including but not limited to alignment between this rule and the HIPAA Privacy Rule, as discussed in IV.B.6 above. We also refer readers to the information blocking section at VIII in this preamble, as well. Comments. Commenters requested clarity on how ONC will monitor a developer’s compliance with exporting in a timely manner and what penalties ONC will impose if there is a delay in regards to a Health IT Module user’s request. Commenters requested ONC release sub-regulatory guidance that describes how users may file complaints and recommended ONC work with the HHS Office for Civil Rights (OCR) on patient education. Response. Any noncompliance by developers with the finalized ‘‘EHI export’’ certification criterion (§ 170.315(b)(10)) or the associated Conditions and Maintenance of Certification requirements (e.g., § 170.402(a)(4) and (b)(2)) would be subject to review, corrective action, and enforcement procedures under the Program. We refer readers to the enforcement (VII) and information blocking (VIII) sections of this preamble for further information. We do not believe there is a general need to work with OCR further on this particular issue or to issue further sub-regulatory guidance. The functionality of the ‘‘EHI export’’ criterion in § 170.315(b)(10) provides a user (e.g., a health care provider) with the ability to export a file for a single patient and multiple patients. If a user or other stakeholder has concerns about ongoing compliance of health IT certified to this criterion, with the required functionality of the criterion, or the associated Conditions and Maintenance of Certification requirements, they may file a complaint PO 00000 Frm 00054 Fmt 4701 Sfmt 4700 with the health IT developer, an ONC– ACB, or ONC. Comments. Some commenters requested specific stakeholder exemptions from this requirement, such as health plans. Response. We thank commenters for the recommendations. We note that the ‘‘EHI export’’ criterion is applicable only to health IT products presented by developers for certification under the Program that meet the criterion and ‘‘Assurances’’ Condition of Certification requirements in § 170.402. In addition, we note that the information subject to the export requirements is EHI that can be stored at the time of certification by the product, of which the Health IT Module is a part. i. EHI Export for Patient-Initiated Requests In the Proposed Rule, we reiterated that the ‘‘user’’ of the single patient export functionality would typically be a provider or their office staff on behalf of the patient (80 FR 62611, 77 FR 54168). We also recognized that in service to innovative and patient-centric approaches, a health IT developer could develop a method that allows a patient to execute the request for data export without needing a provider to do so on their behalf. Under this scenario, we sought comments on whether the single patient export functionality should be made more prescriptive and require that the developers design the health IT to allow only the patient and their authorized representative to be the requestor of their EHI (84 FR 7447). Comments. In the scenario of patientcentric approaches created by developers, the majority of commenters were in favor of developers designing the export capability to make the patient and their authorized representative able to be the direct requestors of their EHI without needing a provider to execute this capability on their behalf. We also received recommended terms to further define ‘‘authorized representative’’ under this scenario. Several commenters advised against specifying or restricting the potential additional user roles able to initiate a single patient export. Some commenters recommended additional requirements for developers, including requiring developers to create this capability to enable the patient or their ‘‘proxy’’ to request their information through and receive information from the patient’s health portal or an application. Commenters asked for the final rule to include clarification on what the patient and their authorized representative can access. We did receive some comments that requested clarification of this potential approach. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations We also received comments expressing confusion with the patient and authorized representative requests applying across the certification criterion, as opposed to the proposed and previously defined ‘‘users’’ of health IT that will typically perform the request on behalf of a patient. Response. We thank commenters for their input and requests for clarification. In response to the concerns and potential confusion, we clarify the following. This certification criterion does not require ‘‘direct-to-patient’’ functionality in order to demonstrate conformance. Providing such a capability and demonstrating conformance to this certification criterion with such a capability would be at the sole discretion of the health IT developer. In general, just like with the ‘‘data export’’ criterion in § 170.315(b)(6), the capability to execute this certification criterion can be health care provider/health care organization initiated (presumably upon that organization receiving a request by patient for their EHI). In instances where the functionality certified to this criterion is implemented in a ‘‘direct-topatient’’ way such that the patient can request and accept EHI export without assistance from a user, we recognize that further configuration of the functionality or product in which it is implemented may be needed in order to account for applicable laws related to the patient’s information access rights and other privacy and information blocking policies that apply to the configuration and use of the Health IT Module. While this specific capability within the certification criterion emphasizes health IT developer assistance must not be needed to operate the export, we recognize that user assistance (e.g., a provider) may be necessary to initiate such capability in the user’s product. b. Patient Population EHI Export for Transitions Between Health IT Systems In addition to the single patient export functionality in § 170.315(b)(10)(i), we proposed in § 170.315(b)(10)(ii) that health IT certified to this criterion would also facilitate the migration of EHI to another health IT system. We proposed that a health IT developer or health IT certified to this criterion must, at a user’s request, provide a complete export of all EHI that is produced or electronically managed (84 FR 7447 through 7448) by means of the developer’s certified health IT. Comments. We received many comments in support of the functionality under this criterion for VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 transitions between health IT systems. Many commenters recommended format and content specifications, such as the use of bulk FHIR®-based APIs for export transmission. Some commenters stressed that ONC should determine and require standards, as well as clarify the scope of data export specific to this use case. Some commenters expressed concerns, including gathering patient consent and the developer burden that may exist with gathering data from disparate systems under the proposed scope terminology. One commenter was against the transitions between health IT systems capability, citing that data structured for one system will not necessarily work in another. Response. We thank commenters for their feedback specific to the functionality of transitions between health IT systems under this criterion. We finalized this export functionality with modifications. First, this functionality is now referred to as ‘‘patient population electronica health information export’’ in § 170.315(b)(10)(ii) to better reflect the policy intent of patient data transitions in instances of providers switching health IT systems, and to reflect the finalized scope of data that a product with a certified Health IT Module must be capable of exporting. Similar to the modifications in § 170.315(b)(10)(i), we finalized in § 170.315(b)(10)(ii)(A) that the export files must be electronic and in a computable format and we modified in § 170.315(b)(10)(ii)(B) that the publicly accessible hyperlink of the export’s format must be included with the exported file(s). This modification clarifies that the user is able to access the format, and that the developer will keep their hyperlink up-to-date. In response to comments on defining a separate scope of data export specific to the patient population export functionality, it is our final policy for this certification criterion to align both the single patient and patient population export data to EHI, as defined in this rule, that can be stored at the time of certification by the product, of which the Health IT Module is a part. This narrower scope also addressed concerns received regarding development burden expressed regarding gathering data from disparate systems under the proposed scope terminology. In regards to the comments on enforcing format and standards for data transmission, it is our intent under this certification criterion that health IT developers have flexibility regarding how the export outcome is achieved. We again encourage the industry to work together toward this common goal and PO 00000 Frm 00055 Fmt 4701 Sfmt 4700 25695 to create an industry-wide approach. We do acknowledge the comments received that data structured for one system may not necessarily seamlessly align with another, and refer commenters to the export format requirements of this certification criterion. As finalized in § 170.315(b)(10)(ii)(A), the export created must be electronic and in a computable format. In contrast with the single patient EHI export capability, which must be available to a user without subsequent developer assistance to operate, the patient population EHI export capability of this criterion could require action or support on the part of the health IT developer. We acknowledged in the Proposed Rule (84 FR 7448) that because of anticipated large volume of electronic health information that could be exported under this specific proposed capability, developer action or support could be needed. Our thinking remains the same post-public comments even with the narrowed scope of data export. While exporting one patient’s data on an asneeded basis is a capability that should be executable by a user on their own, orchestrating an entire export of EHI for migration to another health IT system is an entirely different task and dependent on a variety of factors such as the organization’s overall infrastructure and deployment footprint. Additionally, developers of health IT certified to this criterion are required to provide the assurances in § 170.402, which include providing reasonable cooperation and assistance to other persons (including customers, users, and third-party developers) to enable the use of interoperable products and services. Thus, while developers have flexibility regarding how they implement the export functionality for transitions between systems, they are ultimately responsible for ensuring that the capability is deployed in a way that enables a customer and their third-party contractors to successfully migrate data. Such cooperation and assistance could include, for example, assisting a customer’s third-party developer to automate the export of EHI to other systems. We refer readers to the export format section below for additional details. We note that the narrowed scope of data that certified Health IT Modules must be capable of exporting does not reduce contractual obligations of health IT developers to continue to support providers if they do want to change systems, and direct readers to the information blocking section (VIII) for additional information. E:\FR\FM\01MYR3.SGM 01MYR3 25696 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations c. Scope of Data Export We proposed in 84 FR 7448 and in § 170.315(b)(10) that for both use cases supported by this criterion, the scope of data that the certified health IT product must be capable of exporting would encompass all the EHI that the health IT system produces and electronically manages for a patient or group of patients. Our intention was that ‘‘produces and electronically manages’’ would include a health IT product’s entire database. In the Proposed Rule, our use of the term EHI was deliberate. At the time of rulemaking, the proposed definition of the EHI term in § 171.102 was intended to support the consistency and breadth of the types of data envisioned by this proposed criterion. We requested comment on the terminology used (‘‘produces and electronically manages’’) or whether there were alternatives to the proposed language. Comments. Some commenters were supportive of our proposed scope of data export requirements, while a few others offered alternative specific terminology options. Those commenters suggested terminology such as all EHI the health IT system ‘‘collects and retains,’’ or ‘‘produces or can electronically access, exchange, or use.’’ A majority of commenters, however, stated that the proposed terminology, including the proposed EHI definition, left broad interpretations of the scope of data a Health IT Module would have to be capable of exporting under this criterion. These commenters expressed concerns that the ambiguity and potentially vast amounts of data would create undue burden on health IT developers for development and upkeep of export capabilities, as well as compliance issues with other applicable laws. A majority of commenters requested and highlighted a need for further specificity regarding the terminology used to define data exported under this criterion. Some commenters expressed concerns that a developer presenting a Health IT Module for certification may not know all systems a user may later connect to the health IT capabilities. We also received many comments reflecting varied thoughts on what should or should not be included in the criterion’s data export. Some commenters strongly opposed any data limits, citing existing regulations such as the HIPAA Privacy Rule right of access, while others proposed alternatives to constrain data export requirements, citing development infeasibility. Recommendations to constrain the proposed criterion’s scope included VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 alignment with other regulations and data standards, such as the USCDI. We also received a recommended requirement for health IT developers to provide a plain language definition of the EHI typically included in their Health IT Module’s export. Some commenters expressed confusion on how the criterion’s proposed scope of data export may apply to EHI ‘‘produced or electronically managed’’ by both the product’s certified and ‘‘non-certified’’ capabilities as well as data from third parties. Response. We thank commenters for feedback on our proposed terms and for specific recommendations. The finalized criterion draws the upper bound of its data scope from the focused definition of EHI as finalized. The criterion export includes the EHI, as defined, that can be stored at the time of certification by the product, of which the Health IT Module is a part. As defined in this rule, EHI means electronic protected health information as defined in 45 CFR 160.103 to the extent that it would be included in a designated record set as defined in 45 CFR 164.501 (other than psychotherapy notes as defined in 45 CFR 164.501 or information compiled in reasonable anticipation of, or for use in, a civil, criminal, or administrative action or proceeding), regardless of whether the actor is a covered entity as defined in 45 CFR 160.103. In response to comments received, this revised scope of data for export provides a more manageable and less administratively burdensome certification criterion for health IT developers for several reasons. We agree with commenters that our proposed terms of all EHI a health IT system ‘‘produces and electronically manages’’ (84 FR 7448) raised the potential for broad variance in interpretations and concerns about the breadth of data intended for export under this criterion and potential development burden. We also considered the comments noting that a developer presenting a Health IT Module for certification may not, at the time of certification, know all systems a user will later connect to the health IT capabilities. Ultimately, we considered several approaches to better reflect the policy intent and to alleviate confusion related to the proposed criterion. In consideration of the public comments and the policy outcome we sought to address, we revised the final criterion‘s phrasing to describe what information health IT products with Health IT Module(s) certified to the criterion must be capable of exporting. The revised scope of data export applies to both the single patient and patient population PO 00000 Frm 00056 Fmt 4701 Sfmt 4700 export functionalities as well as the Conditions and Maintenance of Certification requirements tied to this criterion. First, we agree with comments received and acknowledge that a health IT developer is best positioned to know (and would be solely responsible for only) the EHI that can be stored by the health IT product at the time the Health IT Module is presented for certification. In response to comments regarding the applicability of the scope of export to the product’s certified and ‘‘noncertified’’ capabilities, as well as data from third parties, we clarify and reiterate the following from our prior responses. We emphasize that such ‘‘stored’’ data applies to all EHI and is agnostic as to whether the EHI is stored in or by the certified Health IT Module or in or by any of the other ‘‘noncertified’’ capabilities of the health IT product of which the certified Health IT Module is a part. To be clear, conformance ‘‘at the time of certification’’ means the combined data that can be stored by the product, of which the Health IT Module is a part, at the time the Health IT Module is presented for certification. As such, for the purposes of this certification criterion, the EHI that must be exported does not include any data generated from unique post-certification in response to a particular customer (though such data could meet the definition of EHI for the purposes of information blocking). Such modifications could include custom interfaces and other data storage systems that may be subsequently and uniquely connected to a certified Health IT Module post-certification. Additionally, to remain consistent with ‘‘at the time of certification,’’ we clarify that any new EHI stored by the product due to ongoing enhancements would need to be included within the scope of certification only when a new version of the product with those new EHI storage capabilities is presented for certification and listing on the CHPL. In consideration of comments, we believe that this approach to define storage at the time the product is presented for certification of a Health IT Module will make the certification requirements more clear for health IT developers and more efficient to administer from a Program oversight perspective. In addition, the use of ‘‘can be stored by’’ refers to the EHI types stored in and by the health IT product, of which the Health IT Module is a part. This is meant to be interpreted as the combination of EHI a heath IT product stores itself and in other data storage locations. Thus, the cumulative data E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations covered by these storage techniques would be in the scope of data export. Per our policy intent, by focusing the definition of EHI and defining the data for export under this criterion, users of certified Health IT, such as health care providers, will have the ability to create ‘‘readily producible’’ exports of the information of a single patient upon request by the user, which increases patient access as reflected in the Cures Act. Lastly, in support of the second functionality we finalized for patient population export, the EHI exported (within the Health IT product’s scope of data export) would likely be of significant importance to health care providers for the purposes of transitioning health IT systems and maintaining continuity of care for patients, and also helps remove potential barriers to users switching systems to meet their needs or their patient’s needs. In finalizing this policy, we emphasize that health IT developers may provide the export of data beyond the scope of EHI and for functionalities beyond those discussed under this criterion. In such cases, for additional export purposes, it is advised that health IT developers and users discuss and agree to appropriate requirements and functionalities. We again emphasize that health IT product users must ensure that any disclosures of data conform to all applicable laws, including the HIPAA Rules and 42 CFR part 2. Stakeholders should review applicable laws and regulations, including those regarding patients’ right of access to their data, in order to determine the appropriate means of disclosing patient data. We also refer readers to the information blocking section at VIII. i. Image, Imaging Information, and Image Element Export In the Proposed Rule, we noted at 84 FR 7448 that clinical data would encompass imaging information, both images and narrative text about the image. However, we addressed that EHRs may not be the standard storage location for images. We solicited additional feedback and comments on the feasibility, practicality, and necessity of exporting images and/or imaging information. We requested comment on what image elements, at a minimum, should be shared such as image quality, type, and narrative text. We did not make any proposals in 84 FR 7448. Comments. Most commenters were supportive of sharing images and/or related data elements, expressing that interoperability should include electronic ordering of imaging studies, VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 which they asserted would assist health care providers in delivering care. Other commenters expressed burden concerns with data image export, particularly challenges around the movement and storage of large amounts of data and accumulating data from disparate health IT systems. A few commenters requested specific exclusion of images or videos created as a byproduct of procedures. As for minimum image data elements to share, recommendations varied and included Digital Imaging and Communications in Medicine (DICOMTM) data elements or file type recommendations. Comments included additional policy recommendations, such as making Picture Archiving and Communication Systems (PACS) developers subject to certification rules and requiring EHI export data to include links for remote authorized access to externally hosted images. Response. We thank commenters for their shared insight and recommendations regarding the export of images, imaging information, and image elements. Health IT Modules certified to the finalized criterion must electronically export all of the EHI, as defined, that can be stored at the time of certification by the product, of which the Health IT Module is a part. Thus, any images, imaging information, and image elements that fall within this finalized scope of EHI that can be stored at the time of certification in or by the product, of which the Health IT Module is a part will need to be exported under this certification criterion. We appreciate the recommendations received for image transfer methods and encourage the stakeholder community to continue exploring innovative image transfer methods, including for image transfer that would fall outside of this certification criterion. We appreciate the policy recommendations, such as including PACS developers. The ‘‘EHI export’’ certification criterion only applies to developers of health IT seeking or maintaining certification under the Program. To the extent such providers are developers of health IT under the Program they would be included. If they are not developers under the Program, they would not be included. We also thank commenters for their suggestions to require data export to include links for remote authorized access to externally hosted images. We note that the export requirements of this certification criterion refers to the EHI that can be stored at the time of certification by the product, of which the Health IT Module is a part. In the context of imaging, if the only EHI stored in or by the product to which this PO 00000 Frm 00057 Fmt 4701 Sfmt 4700 25697 certification criterion applies are links to images/imaging data (and not the images themselves, which may remain in a PACS) then only such links must be part of what is exported. We encourage developers to work with their customers to achieve innovative ways to share all relevant data, including situations outside of the scope of data export under this criterion where images could be made more accessible. ii. Attestation of Information a Health IT Developer Cannot Support for Export In the Proposed Rule (84 FR 7448), we also solicited comment on whether we should require, to support transparency, health IT developers to attest or publish as part of the export format documentation the types of EHI they cannot support for export. We did not have any specific proposals. Comments. The majority of commenters supported public attestation regarding the information a Health IT Module is unable to export. Some commenters requested that we add to the regulatory text to state that developers attest to information they cannot support for export ‘‘and/or ingestion.’’ Some commenters questioned if it is fair for EHI developers to delineate what is in their Health IT Module’s scope of data for export under this criterion. Another felt that this requirement should be extended to health care delivery organizations and that the attestation should be included within patient portals or other communications. Response. We thank commenters for their feedback. We again note the revised scope of data export under this finalized criterion. Under the finalized approach, which focuses on the export of the EHI that can be stored at the time of certification by the product, we have determined that our final requirements provide sufficient clarity and have not included any additional requirements such as those on which we sought comment. Additionally, we believe the recommendation for ingestion would be impracticable as part of this certification criterion due to the flexibility we permit for the output format(s). It would not be possible from a regulatory enforcement perspective to administer a certification criterion that included within its scope a conformance requirement for a Health IT Module’s capability to import any proprietary format that may exist without prior knowledge of such formats. iii. Export Exclusion Request for Comments In the Proposed Rule, we proposed metadata categories at 84 FR 7448 for E:\FR\FM\01MYR3.SGM 01MYR3 25698 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations exclusion from this criterion. We also requested feedback on what metadata elements should remain included for export or added to the list of excluded data. Metadata proposed for exclusion from the criterion included metadata present in internal databases used for physically storing the data, metadata that may not be necessary to interpret the EHI export, and metadata that refers to data that is not present in the EHI export. Examples of these proposed exclusions are provided at 84 FR 7448. Comments. Commenters offered varied recommendations for metadata elements to remain excluded, or to be included under the scope of data export for this criterion. We received several comments strongly supporting the inclusion of audit log metadata. Commenters noted that the inclusion of audit log metadata had potential legal utility and could aid in the patient’s ability to have all of their data and knowing who has accessed their data. Commenters also requested increased clarity on the definition of metadata, audit log, and access log in regards to this rulemaking, and requested the use of standards to further clarify policy intentions. We note, however, that other commenters were against the inclusion of audit log data as part of the EHI export. Those against inclusion stated that this information was not necessary to interpret the EHI export, could be burdensome for development of export capabilities, and potentially contain personally identifiable information of the health care staff. Response. We thank commenters for their input on potential metadata exclusions. As noted above, we have finalized that EHI that can be stored at the time of certification by the product is the scope of data that must be included in exports pursuant to § 170.315(b)(10). Under this revised and specified scope of data export, it is no longer necessary to list specific metadata exclusions or inclusions. We direct readers to the discussion of scope of data export (IV.B.6.c) under this criterion for further details. d. Export Format We did not propose a content standard for the export. However, we did propose to require documentation in § 170.315(b)(10)(iii) that health IT developers include the export file(s) format, including its structure and syntax, such as a data dictionary or export support file, for the exported information to assist the user requesting the information in processing the EHI (84 FR 7448). This was to prevent loss of information or its meaning to the extent reasonably practicable when VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 using the developer’s certified Health IT Module(s). We also proposed in § 170.315(b)(10)(iii) that the developer’s export format must be made available via a publicly accessible hyperlink and kept up-to date. Comments. Comments received were in favor of this proposal in § 170.315(b)(10)(iii). Several commenters were supportive of the flexibility of export format for developers, as long as export documentation is provided as specified in the Proposed Rule, citing specifically how this would support the export capability in § 170.315(b)(10)(ii). Some commenters recommended additional clarification for the publicly accessible hyperlink, specifically to ensure that information is available without login or other associated requirements. Commenters also provided export format suggestions. Response. We thank commenters for their feedback regarding developers’ export format. We have finalized § 170.315(b)(10)(iii) with modifications to clarify the regulatory text. We finalized that the export format(s) used to support § 170.315(b)(10)(i) and § 170.315(b)(10)(ii) of this section must be kept up-to-date. We clarify that the documentation for the export format(s) in § 170.315(b)(10)(iii) consists of information on the structure and syntax for how the EHI will be exported by the product such as, for example, C–CDA document(s) or data dictionary for comma separated values (csv) file(s), and not the actual EHI. The user will use the export format documentation to process the EHI after it is exported by the product. We also require that health IT developers keep the export format(s) used to support § 170.315(b)(10)(i) and § 170.315(b)(10)(ii) must be ‘‘up-todate.’’ For example, if the health IT developer had previously specified the C–CDA standard as the export format for meeting the criterion, but subsequently updated their product to use the FHIR standard and stopped supporting C–CDA export format then the documentation for export format would need to be updated so that users are able to continue to accurately process the EHI exported by the product. We appreciate suggestions received regarding ensuring that such information is available without login or other associated requirements. In response to these comments, our policy intent to foster transparency, and in alignment with other certification criterion requirements set forth in this rule, we note our modifications in § 170.315(b)(10)(i)(E) and § 170.315(b)(10)(ii)(B) that the publicly PO 00000 Frm 00058 Fmt 4701 Sfmt 4700 accessible hyperlink of the export’s format must be included with the exported file(s). We clarify that the hyperlink must allow any person to directly access the information without any preconditions or additional steps. We note that the export format need not be the same format used internally by the certified health IT and the health IT developer does not need to make public their proprietary data model. This certification criterion also does not prescribe how (i.e., media/medium) the exported information is to be made available to the user, as this may depend on the size and type of information to be exported. While file formats and related definitions are not finalized as specific certification requirements, we encourage developers to continue to foster transparency and best practices for data sharing, such as machinereadable format, when they create and update their export format information. e. Initial Step Towards Real-Time Access In the Proposed Rule at 84 FR 7449, we offered a clarifying paragraph to highlight that the criterion in § 170.315(b)(10) was intended to provide a step in the direction of realtime access goals, as well as a means to, within the confines of other applicable laws, encourage mobility of electronic health data while other data transfer methods were maturing. In that section, we clarified that ‘‘persistent’’ or ‘‘continuous’’ access to data is not required to satisfy the proposed ‘‘EHI export’’ criterion’s requirements, and that the minimum requirement of developers presenting Health IT Module(s) for certification to this criterion is for a discrete data export capability. In this clarification section, we did not have specific proposals or requests for comments. Comments. We received recommendations to further specify the use of ‘‘persistent’’ and ‘‘continuous’’ in context of access to EHI. Additional commenters recommended specifying Representational state transfer (REST) or ‘‘RESTful’’ transfer, or specifying data transport methods. Response. We thank commenters for their input. We first clarify that this section was added to the Proposed Rule for additional clarification and to provide prospective context on the proposed certification criterion. However, we recognize from the comments received that our reference to ‘‘persistent’’ or ‘‘continuous’’ access in the Proposed Rule may have created confusion. We again note that ‘‘persistent’’ or ‘‘continuous’’ access is not required by health IT developers E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations presenting Health IT Module(s) to satisfy the requirements of this certification criterion. We have finalized the ‘‘EHI export’’ criterion as described above in response to comments received on proposals we have made. We appreciate the responses to our future looking points in the Proposed Rule but have not made further revisions to the final certification criterion in response. f. Timeframes We requested input and comments on the criterion and timeframes at 84 FR 7449. In particular, beyond the proposal to export all the EHI the health IT system produces and electronically manages, we sought comment on whether this criterion should include capabilities to permit health care providers to set timeframes for the EHI export, such as only the ‘‘past two years’’ or ‘‘past month’’ of EHI (84 FR 7449). Comments. A majority of commenters were against the concept of allowing providers to set timeframes for the export functionality. Commenters were concerned that creating the capability to limit timeframes would involve significant technical complexity for health IT developers. Commenters also expressed concern that allowing providers the capability to limit timeframes would not align with the HIPAA Privacy Rule right of access at 45 CFR 164.524 and could potentially implicate information blocking. Commenters provided alternative approaches and concepts to implement timeframe capabilities for this criterion, including use of APIs, granting flexibility to developers, allowing intervals or dynamic timeframe requirements, and considering permitted fees. Commenters asked for clarification on how far back the data request capabilities could go and requested clarification regarding how this criterion aligns with other APIrelated criteria within this rule. Response. We thank commenters for their feedback. We will not require the Health IT Module support a specific or user-defined timeframe range or time limit capability for the purposes of demonstrating conformance to this certification criterion. We agree with commenters concerns regarding potential development complexity for health IT developers if we included such a requirement upfront. What this means, however, is that for the purposes of testing and certification, a health IT developer will need to prove that the product, of which a Health IT Module is part, can perform the capabilities required by the certification criterion, inclusive of all EHI that could be VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 exported. In turn, when these capabilities are deployed in production they will need to be capable of exporting all of the EHI that can be stored at the time of certification by the product, of which the Health IT Module is a part. We also agree with the points received regarding the HIPAA Privacy Rule right of access at 45 CFR 164.524 and emphasize the importance of HIPAA covered entities aligning with applicable law regarding patient access to health information. g. 2015 Edition ‘‘Data Export’’ Criterion in § 170.315(b)(6) We proposed to remove the ‘‘data export’’ criterion (defined in § 170.315(b)(6)) from the 2015 Edition Base EHR definition in § 170.102 and to replace ‘‘data export’’ with the proposed ‘‘EHI export’’ criterion (defined in § 170.315(b)(10)) by amending the third paragraph of the 2015 Edition Base EHR definition in § 170.102. We did not propose a transition period for the ‘‘data export’’ criterion. Rather, we proposed to remove the criterion from the 2015 Edition Base EHR definition upon the effective date of a final rule. We also proposed to modify the 2015 Edition Base EHR definition to include the new proposed export criterion (defined in § 170.315(b)(10)), with an implementation date 24 months from the effective date of the final rule. We welcomed comments on this approach. Comments. Some commenters were in favor of immediate removal of this criterion (§ 170.315(b)(6)) from the 2015 Edition Base EHR definition, stating it would reduce burden. However, the majority of commenters were against a potential gap in functionality due to the compliance timeline for the new export criterion (§ 170.315(b)(10)) and requested that we keep the ‘‘data export’’ criterion until the new criterion in § 170.315(b)(10) and other standardized data transmission methods were fully implemented. Some commenters supported an indefinite retention of the ‘‘data export’’ criterion, regardless of the proposed addition of § 170.315(b)(10). Several commenters also recommended to expand the current § 170.315(b)(6) criterion through USCDI as an alternative approach to the proposed ‘‘EHI export’’ criterion in § 170.315(b)(10). In addition, some commenters expressed concern that that the ‘‘data export’’ criterion is inconsistent with CMS Quality Payment Program (QPP) requirements such as View, Download, and Transmit (VDT) at 83 FR 59814 of the CY 2019 Physician Fee Schedule final rule. Response. In consideration of public comments in support of the retention of PO 00000 Frm 00059 Fmt 4701 Sfmt 4700 25699 the ‘‘data export’’ certification criterion, we have maintained the ‘‘data export’’ certification criterion in § 170.315(b)(6) as available for certification until 36 months after this final rule’s publication date. To implement this decision, we have finalized in § 170.550(m) that ONC–ACBs are permitted to issue certificates to ‘‘data export’’ in § 170.315(b)(6) until, but not after, 36 months after the publication date of this final rule. However, we note the ‘‘data export’’ certification criterion has been removed from the 2015 Edition Base EHR definition (in § 170.102) as of the general effective date of this final rule (60 days after its publication in the Federal Register). During the 36 months immediately following publication of this final rule, developers will be able to maintain the certification to § 170.315(b)(6) as a standardized means of exporting the discrete data specified in the CCDS, but the criterion will not be updated to the USCDI. Given that certification to the § 170.315(b)(6) criterion will no longer be available after 36 months, we do not believe an update to the USCDI is the best path. Rather, § 170.315(b)(6) will remain an unchanged criterion in the Program for the 36 months immediately following publication of this final rule in the Federal Register. After that timeframe, the EHI export criterion in § 170.315(b)(10), including that certification criterion’s scope of data export, will remain an available data export certification criterion for health IT developers that present for certification a Health IT Module that is part of a heath IT product which electronically stores EHI. This approach will support prior investments in § 170.315(b)(6) by developers and their customers, and also encourage movement toward the interoperability opportunities afforded by new criteria. Regarding commenter concerns that the ‘‘data export’’ criterion is inconsistent with CMS QPP requirements, such as View, Download and Transmit (VDT), we do not believe that this criterion would be inconsistent with QPP program requirements. In the CY 2019 Physician Fee Schedule final rule, CMS removed the VDT measure in § 170.315(e)(1) (83 FR 59814). However, the Promoting Interoperability performance category of QPP currently includes the measure entitled Provide Patients Electronic Access to their Health Information (83 FR 59812 through 59813), and CMS has identified technology certified to the ‘‘View, Download and Transmit to 3rd party’’ criterion at 45 CFR 170.315(e)(1) as required to meet this measure (83 FR E:\FR\FM\01MYR3.SGM 01MYR3 25700 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations 59817). The Data Export criterion in § 170.315(b)(6) is not required for the Provide Patients Electronic Access to their Health Information measure included in the Promoting Interoperability performance category, nor have we proposed to change the ‘‘View, Download and Transmit to 3rd party’’ criterion in § 170.315(e)(1) required for this measure, thus we do not believe this final policy will conflict with CMS requirements for QPP. 7. Standardized API for Patient and Population Services Criterion We proposed to adopt a new API criterion in § 170.315(g)(10) at 84 FR 7449. In response to comments, we are adopting a Standardized API for Patient and Population Services criterion for Certification in § 170.315(g)(10) with modifications. The new criterion, will replace the old ‘‘application access— data category request’’ certification criterion (§ 170.315(g)(8)). In doing so, we are also adding the Standardized API for Patient and Population Services criterion to the updated 2015 Edition Base EHR definition and removing the application access—data category request criterion (§ 170.315(g)(8)). This finalized Standardized API for patient and population services certification criterion requires the use of the FHIR Release 4 and several implementation specifications. The new criterion focuses on supporting two types of APIenabled services: (1) Services for which a single patient’s data is the focus and (2) services for which multiple patients’ data are the focus. Please refer to the ‘‘Application Programming Interfaces’’ section (VII.B.4) in this preamble for a more detailed discussion of the ‘‘API’’ certification criterion and related Conditions and Maintenance of Certification requirements. 8. Privacy and Security Transparency Attestations Criteria In 2015, the HIT Standards Committee (HITSC) recommended the adoption of two new ‘‘authentication’’ certification criteria for the Program (81 FR 10635). The National Coordinator endorsed the HITSC recommendations for consideration by the Secretary, and the Secretary determined that it was appropriate to propose adoption of the two new certification criteria through rulemaking. To implement the Secretary’s determination, we proposed two new criteria to which health IT would need to be certified (84 FR 7450). These would require the developer to attest to whether the Health IT Module for which they are seeking certification to the criteria encrypts authentication credentials (§ 170.315(d)(12)) and/or VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 supports multi-factor authentication (§ 170.315(d)(13)). We did not propose to require that health IT have these authentication and encryption-related functions, but instead proposed that a health IT developer must indicate whether or not their certified health IT has those capabilities by attesting ‘‘yes’’ or ‘‘no.’’ We did, however, propose to include the two criteria in the 2015 Edition privacy and security certification framework (§ 170.550(h)). For clarity, attesting ‘‘yes’’ to either of these criteria indicates that the Health IT Module can support either Approach 1 or Approach 2 of the 2015 Edition privacy and security certification framework for these criteria. We note that we received many comments on the proposed ‘‘encrypt authentication credentials’’ and ‘‘multifactor authentication’’ criteria, but the majority of comments conflated the two proposals and provided collective responses. Therefore, we have responded to them in kind to preserve the integrity of the comments. a. Encrypt Authentication Credentials We proposed in 84 FR 7450 to adopt an ‘‘encrypt authentication credentials’’ certification criterion in § 170.315(d)(12) and include it in the P&S certification framework (§ 170.550(h)). We proposed to make the ‘‘encrypt authentication credentials’’ certification criterion applicable to any Health IT Module currently certified to the 2015 Edition and any Health IT Module presented for certification that is required to meet the ‘‘authentication, access control, and authorization’’ certification criterion adopted in § 170.315(d)(1) as part of Program requirements. Encrypting authentication credentials could include password encryption or cryptographic hashing, which is storing encrypted or cryptographically hashed passwords, respectively. If a developer attests that its Health IT Module encrypts authentication credentials, we proposed in 84 FR 7450 that the attestation would mean that the Health IT Module is capable of protecting stored authentication credentials in accordance with standards adopted in § 170.210(a)(2), Annex A: Federal Information Processing Standards (FIPS) Publication 140–2, ‘‘Approved Security Functions for FIPS PUB 140–2, Security Requirements for Cryptographic Modules.’’ We posited that FIPS Publication 140–2 is the seminal, comprehensive, and most appropriate standard. Moreover, in the specified FIPS 140–2 standard, there is an allowance for various approved encryption methods, and health IT developers would have the flexibility to PO 00000 Frm 00060 Fmt 4701 Sfmt 4700 implement any of the approved encryption methods in order to attest ‘‘yes’’ to this criterion. We noted that health IT developers should keep apprised of these standards as they evolve and are updated to address vulnerabilities identified in the current standard. We did not propose that a Health IT Module would be required to be tested to the ‘‘encrypt authentication credentials’’ certification criterion. Rather, by attesting ‘‘yes,’’ the health IT developer is attesting that if authentication credentials are stored, then the authentication credentials are protected consistent with the encryption requirements above. We proposed in 84 FR 7450 that the attestations ‘‘yes’’ or ‘‘no’’ would be made publicly available on the Certified Health IT Product List (CHPL). We proposed in 84 FR 7450 that, for health IT certified prior to the final rule’s effective date, the health IT would need to be certified to the ‘‘encrypt authentication credentials’’ certification criterion within six months after the final rule’s effective date. For health IT certified for the first time after the final rule’s effective date, we proposed that the health IT must meet the proposed criterion at the time of certification. We also noted that some Health IT Modules presented for certification are not designed to store authentication credentials. Therefore, we specifically requested comment on whether we should include an explicit provision in this criterion to accommodate such health IT. We stated that this could be similar to the approach we utilized for the 2015 Edition ‘‘end-user device encryption’’ criterion (§ 170.315(d)(7)(ii)), where we permit the criterion to be met if the health IT developer indicates that their health IT is designed to prevent electronic health information from being locally stored on end-user devices. b. Multi-Factor Authentication We proposed in 84 FR 7450 to adopt a ‘‘multi-factor authentication’’ (MFA) criterion in § 170.315(d)(13) and include it in the P&S certification framework (§ 170.550(h)). We proposed to make the ‘‘multi-factor authentication’’ certification criterion applicable to any Health IT Module currently certified to the 2015 Edition and any Health IT Module presented for certification that is required to meet the ‘‘authentication, access control, and authorization’’ certification criterion adopted in § 170.315(d)(1) as part of Program requirements. To provide clarity as to what a ‘‘yes’’ attestation for ‘‘multifactor authentication’’ attestation would E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations mean, we provided the following explanation. MFA requires users to authenticate using multiple means to confirm they are who they claim to be in order to prove one’s identity, under the assumption that it is unlikely that an unauthorized individual or entity will be able to succeed when more than one token is required. MFA includes using two or more of the following: (i) Something people know, such as a password or a personal identification number (PIN); (ii) something people have, such as a phone, badge, card, RSA token or access key; and (iii) something people are, such as fingerprints, retina scan, heartbeat, and other biometric information. Thus, we proposed in 84 FR 7451 that in order to be issued a certification, a health IT developer must attest to whether or not its Health IT Module presented for certification supports MFA consistent with industryrecognized standards (e.g., NIST Special Publication 800–63B Digital Authentication Guidelines, ISO 27001).52 We proposed in 84 FR 7451 that, for health IT certified prior to the final rule’s effective date, the health IT would need to be certified to the ‘‘multi-factor authentication’’ certification criterion within six months after the final rule’s effective date. For health IT certified for the first time after the final rule’s effective date, we proposed that the health IT must meet this criterion at the time of certification. We solicited comment on the method of attestation and, if the health IT developer does attest to supporting MFA, whether we should require the health IT developer to explain how they support MFA. In particular, we asked whether a health IT developer should be required to identify the MFA technique(s) used/supported by submitting specific information on how it is implemented, including identifying the purpose(s)/use(s) to which MFA is applied within their Health IT Module, and, as applicable, whether the MFA solution complies with industry standards. Comments. The vast majority of commenters supported the adoption of the two proposed privacy and security transparency attestation certification criteria. A few commenters were opposed to the new criteria. Several supporters of the proposed criteria recommended that we make the criteria operative functional requirements (including testing), rather than yes/no attestations. Some of these commenters reasoned that MFA should be a requirement for all certified health IT, 52 NIST Special Publication 800–63B: https:// pages.nist.gov/800-63-3/sp800-63b/cover.html VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 given the risks involved with singlefactor authentication and how easy it is today to implement MFA. We also received a number of comments requesting that we clarify that the MFA proposal does not create a requirement for health care providers to implement MFA or encryption of authentication credentials. Similarly, we received several comments seeking clarification that a ‘‘yes’’ attestation would only require support of MFA, not that MFA would have to be implemented. Along these same lines, several commenters expressed concerns that the requirements could interfere with clinical care and urged that the requirements not contribute to provider burden. Response. We have adopted both proposed privacy and security transparency attestation criteria and included both criteria (§ 170.315(d)(12) and § 170.315(d)(13)) in the P&S certification framework (§ 170.550(h)), with minor modifications. While some commenters recommended that MFA should be a requirement for all certified health IT, we did not propose such a requirement nor could health IT developers have foreseen such an outcome in this final rule based on our proposals, particularly considering the clarity provided with our proposals (84 FR 7450) and the complexities of such a requirement. For example, as noted by commenters below, MFA may not be appropriate or applicable in all situations and there is wide variation in authentication needs and approaches throughout the industry. These criteria will, however, still provide increased transparency, and if a developer attests ‘‘yes’’ to these criteria regarding a certified Health IT Module, that Health IT Module will then be subject to ONC– ACB surveillance for any potential nonconformity with the requirements of these criteria. Given the strong support expressed in public comments for these criteria as proposed, we believe this is the appropriate approach at this time. While we believe that encrypting authentication credentials and MFA represent best practices for privacy and security in health care settings, we emphasize again that these criteria do not require certified health IT to have these capabilities or for health IT developers to implement these capabilities for a specific use case or any use case. Equally important, the criteria place no requirements on health IT users, such as health care providers, to implement these capabilities (if present in their Health IT Modules) in their health care settings. However, we note that information regarding the security capabilities of certified health IT PO 00000 Frm 00061 Fmt 4701 Sfmt 4700 25701 provided by such transparency can aid health IT users in making informed decisions on how best to protect health information and comply with applicable security regulations (e.g., the HIPAA Security Rule). Comments. Some commenters who supported the proposed criteria requested clarification on the scope and intent of the criteria, including what level of authentication and which types of users and user roles the criteria apply to, as well as on how to attest for multiple sign-on paths. A number of commenters noted the wide variation in authentication needs and approaches throughout the industry, and they recommended that we permit health IT developers to describe how they support authentication, rather than simply attest ‘‘yes’’ or ‘‘no.’’ The commenters stated that such information would provide helpful clarity regarding what the certified health IT supports. Additionally, several commenters stated that we should require that health IT developers explain how they support MFA. A number of commenters stressed that MFA may not be appropriate or applicable in all situations, and in particular, several commenters noted that automated transactions, including some that may occur in the public health reporting context, cannot support MFA. Response. In response to requests for modifications and clarifications, we have modified the ‘‘encrypt authentication credentials’’ criterion to permit a health IT developer that attests ‘‘no’’ for its Health IT Module(s) to indicate why the Health IT Module(s) does not support encrypting stored authentication credentials. A health IT developer that attests ‘‘no’’ to the ‘‘encrypt authentication credentials’’ criterion may explain, for example, that its Health IT Module is not designed to store authentication credentials, therefore there is no need for the Health IT Module to encrypt authentication credentials because it does not store, or have the capability to store, authentication credentials. For the ‘‘MFA’’ criterion, consistent with our solicitation of comments and the comments received recommending that health IT developers explain how they support MFA, we have modified the criterion to require health IT developers that attest ‘‘yes’’ to describe the use cases supported. For example, a health IT developer could attest ‘‘yes’’ to supporting MFA and state that the Health IT Module supports MFA for remote access by clinical users, thus providing clarity on the user roles to which MFA applies for that particular Health IT Module. To be clear, health IT E:\FR\FM\01MYR3.SGM 01MYR3 25702 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations developers are not expected to provide specific technical details about how they support MFA that could pose security risks. Again, the purpose is to enable health IT developers to give an indication of the types of uses for which their Health IT Module(s) support MFA. We note that health IT developers may wish to add new MFA use cases for their certified health IT over a period of time. In such instances, to provide the clarity sought in the Proposed Rule as to the MFA technique(s) used/supported and how MFA is implemented, including identifying the purpose(s)/ use(s) to which MFA is applied within their Health IT Modules, any new MFA use cases are required to comply with this criterion’s ‘‘yes’’ attestation provisions and be part of the quarterly CHPL reporting by health IT developers and ONC–ACBs under § 170.523(m). If a health IT developer attests ‘‘no,’’ then it would not be required to explain why its Health IT Module does not support authentication, through multiple elements, of the user’s identity with the use of industry-recognized standards. We did not propose to require an explanation for ‘‘no’’ attestation nor did we request comment on allowing health IT developers to provide an explanation for a ‘‘no’’ attestation like we did for ‘‘yes’’ attestations (84 FR 7450–7451). However, in an effort to provide transparency and consistency for these privacy and security attestation criteria, we will also permit developers to provide a reason for attesting ‘‘no’’ in order to provide more context. Such a reason may be due to MFA being inapplicable or inappropriate. In those cases, a developer could state, for example, that the Health IT Module does not support MFA because it is engaged in system-to-system public health reporting and MFA is not applicable. Comments. We received several comments requesting adjustment to the deadline for compliance to meet these criteria. We also received a number of comments recommending that we only apply both of the proposed criteria to new certifications and new Health IT Modules, and not to Health IT Modules already in widespread use. Response. Regarding the timeframe for compliance, and in response to comments recommending that we only apply the criteria to ‘‘new certifications,’’ we have determined that certification to these criteria as part of the updated 2015 Edition privacy and security certification framework (§ 170.550(h)) will only be necessary for Health IT Modules that are presented for certification. Thus, a new Health IT VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 Module seeking certification for the first time to the criteria specified in the 2015 Edition privacy and security certification framework (§ 170.550(h)), after the effective date of this final rule, will need to meet these privacy and security transparency attestation criteria at the time of certification. Similarly, a previously certified Health IT Module that has undergone revision, such as removal of certain capabilities, and is presenting for revised certification to the criteria specified in the 2015 Edition privacy and security certification framework (§ 170.550(h)) after the effective date of this final rule, will need to meet these privacy and security transparency attestation criteria at the time of certification. We believe that this approach will still provide the intended transparency as health IT will need to be issued new certifications as Health IT Modules are updated or certified to other new or revised criteria adopted in this final rule. At the same time, this approach should reduce burden for health IT developers and allow them more time to plan and prepare to meet these new transparency requirements. 9. Security Tags and Consent Management Criteria In the 2015 Edition final rule, we adopted two ‘‘data segmentation for privacy’’ (DS4P) certification criteria. One criterion, ‘‘DS4P-send’’ (§ 170.315(b)(7)), includes capabilities for applying security tags according to the DS4P standard in § 170.205(o) at the document-level of a summary care record formatted to the C–CDA 2.1 standard in § 170.205(a)(4). The other criterion, ‘‘DS4P-receive’’ (§ 170.315(b)(8)), includes capabilities for receiving a summary care record formatted to the C–CDA 2.1 standard in § 170.205(a)(4) with document-level security tags according to the DS4P standard in § 170.205(o). As noted in the 2015 Edition final rule (80 FR 62646), certification to these criteria is not required to meet the CEHRT definition for PI Programs. Security tagging enables computer systems to recognize the existence of sensitive elements in data and properly protect the privacy and security of the data by ensuring that only the appropriate individuals and entities can access it. Security tagging capabilities do not compromise the availability or comprehensiveness of health information available for treatment or research purposes; rather, they enable appropriate access controls in accordance with existing policies, governance, and applicable laws. The DS4P standard describes a method for PO 00000 Frm 00062 Fmt 4701 Sfmt 4700 applying security tags to HL7 CDA documents to ensure that privacy policies established at a record’s source can be understood and enforced by the recipient of the record. The utility of the DS4P standard is not limited to data subject to the Federal regulations governing the Confidentiality of Substance Use Disorder Patient Records, 42 CFR part 2 (80 FR 62647). DS4P may be implemented to support other data exchange use cases in which compliance with State or Federal legal frameworks require special protections for sensitive health information. Security tagging capabilities are an initial step towards enabling an interoperable health care system to use technical standards to permit appropriate access, use, or disclosure of sensitive health information in accordance with applicable policies and patient preferences. We understand and acknowledge additional challenges related the prevalence of unstructured data, sensitive images, and potential issues around use of sensitive health information by clinical decision support systems. The adoption of document level data tagging for structured documents would not solve these issues, but could help move technology in the direction where these issues could be addressed (80 FR 16841). Adoption of the 2015 Edition final rule DS4P criteria was consistent with earlier HIT Policy Committee (HITPC) recommendations for the use of security tagging to enable the electronic implementation and management of disclosure policies that originate from the patient, the law, or an organization, in an interoperable manner, so that electronic sensitive health information may be appropriately shared.53 The HITPC recommendations consisted of a glide path for the exchange of 42 CFR part 2-protected data starting with the inclusion of Level 1 (document level tagging) send and receive functionality. The HITPC also recommended advancing the exchange of 42 CFR part 2-protected data, by outlining additional capabilities in sharing, viewing and incorporating privacy restricted data at a more granular level, as well as 53 See HIT Policy Committee (HITPC) Recommendation Letter to ONC, July 2 014, https:// www.healthit.gov/facas/sites/faca/files/PSTT_ DS4P_Transmittal%20Letter_2014-07-03.pdf; see also HITPC’s Privacy and Security Tiger Team Public Meeting, Transcript, May 12, 2014, https:// www.healthit.gov/facas/sites/faca/files/PSTT_ Transcript_Final_2014-05-12.pdf.; Public Meeting, Transcript, May 27, 2014, https://www.healthit.gov/ facas/sites/faca/files/PSTT_Transcript_Final_201405-27.pdf. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations managing computable patient consent for the use of restricted data.54 Since the 2015 Edition final rule, the health care industry has engaged in additional field testing and implementation of the DS4P standard. As of the beginning of the fourth quarter of the 2019 calendar year, 34 Health IT Modules were certified to one or both of the current 2015 Edition DS4P certification criteria (Health IT Modules with multiple certified versions were counted once). Stakeholders have shared with ONC—through public forums, listening sessions, and correspondence—that document-level security tagging does not provide enough flexibility to address more complex privacy and security use cases. Stakeholders noted that certain provider types, such as pediatrics and behavioral health, often rely on burdensome manual workflows to appropriately segment and share sensitive health information according to State and local laws. Additionally, stakeholders expressed interest in ONC adopting health IT standards that work with DS4P to support electronic consent for the exchange of security tagged data over an API. Therefore, in consideration of stakeholder feedback and HITPC recommendations to adopt DS4P certification criteria on a glide path, we proposed (84 FR 7452) to remove the 2015 Edition DS4P-send (§ 170.315(b)(7)) and DS4P-receive (§ 170.315(b)(8)) certification criteria. We proposed that the effective date of removal of these criteria would be the effective date of the final rule. We proposed to replace the removed DS4P criteria with two new 2015 Edition DS4P certification criteria in § 170.315(b)(12) and § 170.315(b)(13) that would support security tagging according to the DS4P standard at the document, section, and entry levels of C–CDA 2.1 formatted documents. Our primary purpose for proposing to remove and replace the criteria, in lieu of proposing to revise them, was to provide clarity to stakeholders about the additional functionality enabled by health IT certified to the new criteria. We also proposed a new 2015 Edition certification criteria for sharing patient consent information over an API using the Substance Abuse and Mental Health Services Administration’s (SAMHSA) Consent2Share (C2S) IG a FHIR-based exchange standard, in § 170.315(g)(11). We noted resources released by ONC 54 For more details on the two glide paths for part 2-protected data, see https://www.healthit.gov/facas/ sites/faca/files/PSTT_DS4P_Transmittal%20Letter_ 2014-07-03.pdf. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 and OCR, such as the HHS Security Risk Assessment Tool 55 and the Guide to Privacy and Security of Electronic Health Information,56 as well as the Office for Civil Rights’ security risk analysis guidance 57 that entities may employ to make risk-based decisions regarding their implementation of the proposed DS4P criteria. We also noted the availability of the Electronic Consent Management Landscape Assessment, Challenges, and Technology report.58 The report includes suggestions for overcoming barriers associated with implementing electronic consent management, which may be considered for further research and discussion. We note that we received many comments on the proposed DS4P criteria and the proposed consent management for the API criterion but the majority of comments conflated the two proposals and provided a collective response. We tried to separate where possible, but in some instances, we kept them combined in order to preserve the integrity of the comments. a. Implementation With the Consolidated CDA Release 2.1 In place of the removed 2015 Edition DS4P criteria, we proposed (84 FR 7452) to adopt new DS4P-send (§ 170.315(b)(12)) and DS4P-receive (§ 170.315(b)(13)) criteria that would remain based on the CDA 2.1 and the HL7 DS4P standard. These criteria would include capabilities for applying security tags according to the DS4P standard at the document, section, and entry level. We believe this offers more valuable functionality to providers and patients, especially given the complexities of the landscape of privacy laws for multiple care and specialty settings. We stated in the Proposed Rule that we believe health IT certified to these criteria would support multiple practice settings and use cases. Comments. We received many comments both in support and against this proposal. In certain instances, commenters were supportive of our aims but felt there were too many 55 HHS Security Risk Assessment Tool: https:// www.healthit.gov/providers-professionals/securityrisk-assessment. 56 ONC Guide to Privacy and Security of Electronic Health Information: https:// www.healthit.gov/sites/default/files/ pdf/privacy/ privacy-and-security-guide.pdf. 57 HHS Office for Civil Rights: https:// www.hhs.gov/hipaa/for-professionals/security/ guidance/; and https://www.hhs.gov/ hipaa/for-professionals/security/guidance/ guidance-risk-analysis/?language=es. 58 https://www.healthit.gov/sites/default/files/ privacy-security/ecm_finalreport_ forrelease62415.pdf. PO 00000 Frm 00063 Fmt 4701 Sfmt 4700 25703 barriers and challenges near term, including but not limited to the perceived cost involved with successful segmentation in practice and indicated we should delay our finalization of the proposal. Others felt immediate adoption of our proposal in the final rule was critical for patient care and the secure exchange of sensitive health information. Many commenters in favor of our proposal provided examples of use cases which it could support, such as helping to combat the opioid crisis by facilitating the secure exchange of sensitive health information across health care settings and including substance use disorder (SUD) information covered by 42 CFR part 2. We also received support of our proposal for the protection of women’s health—the commenter explained that segmenting at the element level would protect individuals who have experienced intimate partner violence, sexual assault, and other sensitive experiences. Stakeholders shared with us that focusing certification on segmentation to only the document level does not permit providers the flexibility to address more granular segmentation needs. We received many comments on this proposal in the context of the following topics: provider and developer burden; readiness of the standard and C–CDA exchange; information blocking and EHI; future multidisciplinary activities (such as workgroups) and creating a vision for segmentation using health IT; safety; privacy policy conformity; suggested use cases; cost; and requests for specific clarifications. We describe these comments further below. Response. We thank commenters for their input. To address the comments concerned about the cost and timing, at the current time, these criteria are voluntary and not required under the definition of CEHRT or to participate in any HHS program. For more information on the costs for the adoption of these criteria, please see the Regulatory Impact Analysis in section XIII. For the reasons noted above, in this final rule, we have finalized our proposal to support a more granular approach to privacy tagging data consent management for health information exchange supported by the C–CDA exchange standard. We do this not by removing and replacing the 2015 Edition DS4P criteria with new § 170.315(b)(12) and § 170.315(b)(13), but by revising the 2015 Edition DS4P criteria, DS4P criteria DS4P-send (§ 170.315(b)(7)) and DS4P-receive (§ 170.315(b)(8)), to include the full scope of the HL7 DS4P standard for E:\FR\FM\01MYR3.SGM 01MYR3 25704 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations security tagging at the document, section and entry level with modifications as described below. Comments. We received many comments regarding the perceived burden of segmentation on providers and developers including comments focused on workflow challenges. One commenter indicated a lack of system and explained that tagging is burdensome for implementers because it does not describe how to determine what information is sensitive and should be tagged. Another indicated that DS4P creates a permanent added burden of extensive and costly manual data curation to redact each page to meet overlapping Federal and State regulations. Commenters indicated end users would be required to flag each individual data element, a process that is time consuming and error prone. They further explained that granular level privacy tagging has the risk of adding additional data entry burden to provider workflows if users must tag each item individually. Response. We appreciate the thoughtful comments submitted on the proposed criteria. Notably, with respect to the comments we received that expressed concern about the DS4P standard due to the burden, our analysis of the comments indicates that the concerns the commenters express are more closely related to the complexity of the privacy law landscape than to the specific functionality and standard in our proposal. As noted above, at the current time, these criteria are voluntary and not required under the definition of CEHRT or to participate in any HHS program. The DS4P standard is a tool and voluntary certification to these criteria is an initial step towards enabling an interoperable health care system to use technical standards to compute and persist security tags to permit access, use, or disclosure of sensitive health information. The criteria do not specify that a manual workflow is required to implement security tagging, and we understand from examples of DS4P use in practice that solutions may include the use of value sets to automate the tagging process. We reiterate that these criteria are intended to apply standards to the transmission of documents so that such security tags may be interoperable. Though the updated criteria would support a more granular approach to tagging the sensitive information, we recognize that this will not solve the whole problem of how to manage data segmentation for privacy and consent management. The recipient will still receive and can view the information that is tagged—the recipient will need to VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 determine what they are going to do with that information. Policies and procedures for what to do with the information once it is received are outside the scope of these criteria and this final rule. However, we emphasize that health care providers already have processes and workflows to address their existing compliance obligations for State and Federal privacy laws, which could be made more efficient and cost effective through the use of health IT, rather than relying on case-by-case manual redaction and subsequent workarounds to transmit redacted documents. We believe this tool may be one part of innovative solutions to support health IT enabled privacy segmentation in care coordination workflows to significantly reduce the burden of these manual processes currently in practice. Comments. Several commenters indicated that enhanced segmentation may unintentionally impact clinical care when providers are presented with an incomplete picture of patient data. Commenters stated there could be patient care risks involved with not sharing elements as users of downstream systems may not realize that a single element is filtered and act improperly, such as by prescribing a contraindicated medication due to missing information. Response. DS4P is a technical standard for C–CDA that helps health care providers comply with existing, applicable laws. As such, health care providers should already have processes and workflows in place to address their existing compliance obligations. The DS4P standard does not itself create incomplete records. Under existing law, patients already have the right to prevent re-disclosure of certain types of data by withholding consent to its disclosure or to place restrictions on its re-disclosure. DS4P allows providers to electronically tag (mark) data as sensitive and express re-disclosure restrictions and other obligations in an electronic form. DS4P does not determine whether a segmentation obligation exists legally or what that legal obligation means to the recipient. Instead, DS4P allows for tagging and exchange of health information that has already been determined to be sensitive and in need of special protections under existing law. Comments. We received comments in support of our proposal indicating that, without data segmentation, other mandatory criteria, such as the proposed ‘‘EHI export’’ criterion, would be difficult to implement without risking disclosure of sensitive data or information blocking. One commenter PO 00000 Frm 00064 Fmt 4701 Sfmt 4700 indicated that without this technical standard, it would be difficult for stakeholders to know whether appropriate consent has been obtained prior to releasing health information. Further, the commenter indicated concern that without such capabilities, hospitals and health systems could be accused of information blocking because they cannot verify that a patient has given consent for their EHI to be shared. They further commented that if ONC does not finalize this criterion, then we should provide an appropriate exception in the information blocking provisions so that an entity is not accused of information blocking because they do not know if another organization has obtained consent from patients. One commenter stated ONC should propose a new information blocking exception that specifically clarifies that a health IT developer’s choice to not certify to an optional standard cannot be a practice that implicates information blocking. Response. We thank commenters for their support of the DS4P standard. While we understand commenters’ concerns, we first reiterate the DS4P capability enables sensitive health information to be exchanged electronically with security tags in a standardized format. It does not enable the full segmentation of a patient’s record within an EHR, which may be necessary when responding to a request for EHI. Second, we have revised the Infeasibility Exception in the information blocking section of this final rule to provide that an actor is not required to fulfill a request for access, exchange, or use of EHI if the actor cannot unambiguously segment the requested EHI from other EHI: (1) Because of a patient’s preference or because the EHI cannot be made available by law; or (2) because the EHI is withheld in accordance with the Harm Exception in § 171.201 (§ 171.204(a)(2)). For instance, an actor will be covered under this condition if the actor could not fulfill a request to access, exchange, or use EHI because the requested EHI could not be unambiguously segmented from patient records created by federally assisted programs (i.e., Part 2 Programs) for the treatment of substance use disorder (and covered by 42 CFR part 2) or from records that the patient has expressed a preference not to disclose. We refer readers to the Infeasibility Exception discussion in section VIII.D.1.d of this final rule. Comments. Many commenters noted a low level of adoption for these standards and concerns related to readiness expressing that the standard E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations utility is limited by lack of widespread developer implementation. Several commenters encouraged ONC to defer adoption of the DS4P criteria with a few commenters recommending that the optional 2015 Edition criterion should be maintained with document level tagging only until practical implementations at scale have been demonstrated at this level. One commenter suggested that organic adoption by end-user providers will help spark innovation in this emerging standard while expressing concern that C–CDA level data tagging for privacy is largely untested in real world scenarios. Others encouraged ONC to provide additional guidance on the adoption of the DS4P standards and certification criteria and forgo the inclusion of this requirement until additional real world testing is available. They also indicated ONC should first conduct use test cases to demonstrate how this functionality will be effectively used across a variety of environments. Response. We appreciate the comments on the proposed criteria. In reference to the DS4P standard’s maturity, we note that it is considered a ‘‘normative’’ standard from the HL7 perspective—a status which indicates the content has been enhanced and refined through trial use. While we recognize that to date the standard has not been widely adopted, the SAMHSA C2S application uses the standard to segment Part 2 information. Likewise, the U.S. Department of Veterans Affairs (VA) and private companies across the country have used the DS4P standard to support behavioral health and pediatric care models. In addition, as of the fourth quarter of 2019, 34 individual Health IT Modules obtained certification to one of or both of the prior 2015 Edition certification criteria. Our intent for adopting the updates to these criteria is that in the absence of adoption of consensus driven standards there is increased risk that single-use-case, proprietary solutions will be developed, which may increase fragmentation, provider burden, and cost while limiting interoperability. Further, the purpose of adopting these criteria is to encourage the use of interoperable standards, in this case to use technical standards to compute and persist security tags upon exchange of a summary of care document in an interoperable manner. In addition, the certification criteria using the DS4P standard are voluntary and therefore our intent is, as commenters noted, to support organic adoption of technology certified to the criteria by providers seeking to implement health IT VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 solutions to replace burdensome manual privacy workflows. Comments. Several commenters called for the need to increase conformity among Federal and State privacy provisions to achieve successful implementation of granular tagging. They noted the significant policy component involved with the successful implementation of the DS4P standard in practice, and in certain instances specifically noted support for HIPAA Privacy Rule and 42 CFR part 2 harmonization. Several commenters identified specific areas for technical development of IT supporting data segmentation for privacy based on Federal and State privacy provisions. One commenter indicated that ONC could map which clinical codes are associated with certain health conditions that receive special privacy protections in addition to the HIPAA Rules. Other commenters noted that mapping of privacy policy to technical specifications is not a sufficient or adequate approach given policy complexities. One commenter indicated a future approach should focus on development of criteria that support a data provenance driven method of sensitive data management as applicable under privacy laws. Response. As we have stated, the DS4P standard enables sensitive health information to be exchanged electronically with security tags in a standardized format and we encourage health IT developers to include DS4P functionality and pursue certification of their health IT to these criteria in order to help support their users’ compliance with relevant State and Federal privacy laws that protect sensitive health information. We recognize that the current privacy law landscape is complex. In light of the complexities of the privacy law landscape, we believe that supporting a standard that allows for increased granularity in security tagging of sensitive health information would better allow for the interoperable exchange of this information to support a wide range of privacy related use cases. Comments. Many commenters offered an approach for next steps to advance the standard. To advance adoption and implementation of the standard, several commenters suggested that ONC work closely with clinicians, privacy subject matter experts and interoperability experts (notably the HL7 Privacy and Security workgroups) to develop a clear vision for implementing enhanced data segmentation. Many commenters specifically called for ONC to sponsor or lead a multidisciplinary workgroup of stakeholders to develop PO 00000 Frm 00065 Fmt 4701 Sfmt 4700 25705 recommendations for industry adoption and implementation. One commenter in support of our proposal suggested such workgroup focus on including whether additional standards are needed, as well as data visualization of non-disclosed data and its utilization in clinical decision support algorithms. Several commenters cited existing work to help support potential new multidisciplinary efforts indicating that one SDO has already undertaken early work toward evolving DS4P implementation guidance via the HL7 V2 to FHIR mapping project sponsored by the HL7 Orders Work Group. One commenter, called for an ONC led public-private collaborative effort to reduce data entry burden. One commenter recommended that ONC stand up a multi-stakeholder workgroup to identify and define policy needs and functional requirements to address patient privacy and provider needs. Response. We thank commenters for their recommendations. ONC believes that data segmentation is an integral capability for exchanging sensitive health data. ONC first studied policy considerations regarding data segmentation in electronic health information exchange in 2010 and informed ONC’s launch of the DS4P Standards and Interoperability Framework (S&I Framework) Initiative in 2011.59 The initiative focused on the development of a DS4P technical specification that would allow highly sensitive health information to flow more freely to authorized users while improving the ability of users of health IT to meet their obligations under State and Federal privacy rules. Recommendations from the initiative called for the use of metadata security tags to demonstrate privacy and security obligations associated with patient health information. It also advised that patients and providers be able to share portions, or segments, of records in order to maintain patient privacy. Pilot projects conducted under the DS4P S&I Framework Initiative demonstrated ways to enable the sharing of information that is protected by Federal and State laws, including the substance use disorder treatment confidentiality regulations, 42 CFR part 2. ONC’s prior Federal Advisory Committee, the HITPC, also focused on the health IT certification needed to enable exchange of behavioral health data.60 Additionally, ONC led a project on 59 https://archive.healthit.gov/providersprofessionals/ds4p-initiative. 60 https://www.healthit.gov/topic/Federaladvisory-committees/health-it-policy-committeerecommendations-national-coordinator. E:\FR\FM\01MYR3.SGM 01MYR3 25706 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations patient choice where the exchange of sensitive data was addressed.61 ONC also led a project on the Behavioral Health Data Exchange (BHDE) Consortium. The purpose of the project was to facilitate and address barriers to the intra and interstate exchange of behavioral health data.62 Currently, ONC’s Leading Edge Acceleration Projects (LEAP) in Health Information Technology (IT) program seeks to address well-documented and fast emerging challenges inhibiting the development, use, and/or advancement of well-designed, interoperable health IT. In 2019, one of the two LEAP awards issued by ONC focused on the standardization and implementation of the Fast Healthcare Interoperability Resources (FHIR®) Consent resource. Under this project, a FHIR® Consent Implementation Guide (IG) and package of open-source prototypes and content to assist partners in using the FHIR® Consent Resource will become available.63 Also, ONC actively participates in HL7 International (HL7®) Workgroups and standards-development activities related to data segmentation and consent management. It is critical for sensitive health information to be included in health information exchange and we are exploring opportunities for additional collaboration in the future. Comments. One commenter recommended a companion guide be developed to assist implementers with the standard. Another indicated ONC should provide guidance to facilitate adoption of the DS4P standards and certification criteria including dissemination of best practices to help ensure that providers can most effectively implement the standards and associated workflows. Another referred to a Query-Based Document Exchange IG which has further guidance on the ability to assert access policies and DS4P implementation considerations. Response. The HL7 Version 3 Implementation Guide: Data Segmentation for Privacy (DS4P), Release 1, Part 1: CDA R2 and Privacy Metadata Reusable Content Profile, May 16, 2014 standard 64 § 170.205(o)(1) (HL7 DS4P standard) describes the technical means to apply security tags to 61 https://www.healthit.gov/topic/patient-consentelectronic-health-information-exchange. 62 https://www.healthit.gov/topic/health-it-healthcare-settings/behavioral-health-data-exchangeprimary-care-and-behavioral. 63 https://www.healthit.gov/topic/leading-edgeacceleration-projects-leap-health-informationtechnology-health-it. 64 https://www.hl7.org/implement/standards/ product_brief.cfm?product_id=354. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 a health record and data may be tagged at the document-level, the section-level, or individual data element-level. The HL7 DS4P standard also provides a means to express obligations and disclosure restrictions that may exist for the data. We appreciate commenters input on additional guidance beyond these certification requirements that may prove useful for developers. However, we reiterate that in this rule we address only that guidance that is required for those developers to voluntarily submit a Health IT Module for certification to our criteria. Additional guidance on best practices would be outside the scope of this rulemaking. However, as noted above, we are committed to continuing to work with stakeholders, including health IT developers and those involved in implementing privacy policy in the health care industry, to work toward interoperable solutions for privacy and consent management. Comments. We received several comments seeking clarification on our proposal to remove the current 2015 Edition ‘‘DS4P-send’’ (§ 170.315(b)(7)) and ‘‘DS4P-receive’’ (§ 170.315(b)(8)) certification criteria and to replace these two criteria with three new 2015 Edition DS4P certification criteria (two for C– CDA and one for a FHIR-based API). As examples, one commenter sought clarification on whether our proposal was for DS4P send and receive to become mandatory for the revised 2015 Edition certification, or if they will remain voluntary criteria. One commenter sought clarification on whether the data protections apply to FHIR transmissions. Another indicated that they believe the DS4P implementation guide only focuses on data segmentation for C–CDA documents and not for HL7 FHIR and sought ONC clarification regarding whether or not we intend to apply data segmentation labeling to the HL7 FHIR resources in support of the USCDI as well. Another commenter recommended that we require FHIR Release 4 version but commented that a consistent approach of USCDI across HL7 CDA, C– CDA and HL7 FHIR is not attainable at this time. One commenter stated a similar need for clarification indicating that the standard for DS4P should be HL7 standards for CDA Version 2 and FHIR security tagging and not be the SAMHSA C2S stating that ONC should clarify this misunderstanding. Another commenter sought clarification by ONC to indicate that the IG is for CCDS and not FHIR, and also indicated confusion regarding STU4. One commenter noted that the DS4P criteria are only effective PO 00000 Frm 00066 Fmt 4701 Sfmt 4700 for C–CDA-based data exchange and recommended ONC add FHIR-based standard for tagging of sensitive data. Several commenters expressed concern over what they described as misalignment of this proposal with other ONC policies explaining that neither USCDI nor ARCH, nor HL7 FHIR US Core includes the FHIR Composition resource, which would be at the equivalent level of granularity as a C– CDA document. Response. We thank commenters for their input and we appreciate the need for clarity requested by commenters. In the Proposed Rule (84 FR 7452), we proposed both to adopt an update to the HL7 DS4P standard for the existing 2015 Edition certification criteria to support security tagging of a C–CDA upon send and receive by removing DS4P-send (§ 170.315(b)(7)) and DS4P-receive (§ 170.315(b)(8)) and replacing them with DS4P-send (§ 170.315(b)(12)) and DS4P-receive (§ 170.315(b)(13)) and to also adopt a new criterion to support API exchange via consent management solutions using the FHIR standard. In other words, these were two separate proposals, the first to support security tags in summary of care documents and another to support consent management for specific use cases that leverage a FHIR-based API. As of this final rule, these criteria remain voluntary and not required under the definition of CEHRT or to participate in any HHS program. We proposed these several criteria in a single section of the Proposed Rule because of the relationship between them as two potential health IT tools that could be part of overarching solutions to manage privacy and consent in health information exchange. However, as stated earlier, we note that neither of these tools addresses the entirety of the scope of data segmentation for privacy. To address the comment on the DS4P implementation guide, we confirm that the HL7 DS4P standard in § 170.205(o)(1) describes the technical means to apply security tags to a health record and data may be tagged at the document-level, the section-level, or individual data element-level in the C–CDA and not for FHIR. Currently, we do not intend to apply data segmentation labeling to the HL7 FHIR resources in support of the USCDI because all FHIR resources already include the capability to apply security tags to the resource as metadata. We appreciate the recommendation to require FHIR Release 4 for consent management but as discussed below, we have decided not to finalize the proposal for consent management for APIs in this final rule. For further E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations discussion of our FHIR-based consent management proposal, we direct readers to subsection b below. For the updates to the existing DS4P criteria, to support greater clarity requested by public comment, rather than removing the existing 2015 Edition criteria and replacing them with new criteria as proposed, we instead finalized a simple update to the existing criteria to note the use of the full HL7 DS4P standard for tagging or applying security tags at the document, section, and entry level. We further note that these updated criteria remain voluntary, and that we have finalized modifications in § 170.315(b)(7)(ii) and § 170.315(b)(8)(i)(B) to our proposed effective date for this change to allow for a longer glide path for health IT developers to update Health IT Modules to the full standard to better support clinical and administrative workflows. While certification to the updated standards will be available after the effective date of this final rule upon successful testing, we have finalized that document-level tagging remains applicable for up to 24 months after the publication date of this final rule. For certification and compliance of Health IT Modules certified after 24 months after the publication date of this final rule, only the full scope of the HL7 DS4P standard is applicable. We have finalized this 24 month period for the update for these criteria under the real world testing provisions in § 170.405(b)(6) as follows: • Security tags. A health IT developer with health IT certified to § 170.315 (b)(7) and/or § 170.315 (b)(8) prior to June 30, 2020, must: Æ Update their certified health IT to be compliant with the revised versions of the criteria adopted in § 170.315(b)(7) and/or the revised versions of the criteria adopted in § 170.315(b)(8); and Æ Provide its customers of the previously certified health IT with certified health IT that meets paragraph (b)(6)(i) of this section by May 2, 2022, In addition, we have finalized these updated criteria with modifications to the criteria names to better describe the function the criteria support in interoperable health IT systems. The modifications to the criteria are as follows: • Prior criterion: ‘‘DS4P-send’’ (§ 170.315(b)(7)) includes capabilities for creating a summary care record formatted to the C–CDA standard and document-level tagging as restricted (and subject to restrictions on redisclosure) according to the DS4P standard. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 • Revised criterion: ‘‘Security tags— Summary of Care (send)’’ (§ 170.315(b)(7)) includes capabilities for creating a summary of care record formatted to the C–CDA standard and that is tagged as restricted and subject to restrictions on re-disclosure according to the DS4P standard at the document, section, and entry (data element) level, or at the document-level for the period until May 2, 2022. • Prior criterion: ‘‘DS4P-receive’’ (§ 170.315(b)(8)) includes capabilities for receiving a summary care record formatted to the C–CDA standard and document-level tagged as restricted (and subject to restrictions on re-disclosure) according to the DS4P standard. • Revised criterion: ‘‘Security tags— Summary of Care (receive)’’ (§ 170.315(b)(8)) includes capabilities for receiving a summary of care record formatted to the C–CDA standard and that is tagged as restricted and subject to restrictions on re-disclosure according to the DS4P standard at the document, section, and entry (data element) level, or at the document-level for the period until May 2, 2022. We have finalized our proposal to include in the voluntary ‘‘Security tags— Summary of Care (receive)’’ (§ 170.315(b)(8)) criterion as a requirement that the Health IT Module has the capability to preserve privacy markings to ensure fidelity to the tagging based on consent and with respect to sharing and re-disclosure restrictions as proposed. b. Implementation With the Fast Healthcare Interoperability Resources (FHIR®) Standard In collaboration with ONC, SAMHSA developed the C2Sapplication to address the specific privacy protections for patients with substance use disorders whose treatment records are covered by the Federal confidentiality regulation, 42 CFR part 2. C2S is an open source application for data segmentation and consent management. It is designed to integrate with existing FHIR systems. SAMHSA created a FHIR implementation guide (the Consent2Share Consent Profile Design, hereafter referred to as ‘‘Consent Implementation Guide’’) that describes how the Consent2Share application and associated access control solution (C2S platform) uses the FHIR Consent resource to represent and persist patient consent for treatment, research, or disclosure.65 The implementation guide 65 The draft FHIR IG titled ‘‘Consent2Share FHIR Profile Design.docx’’ can be accessed through the Community- Based Care and Privacy (CBCP) HL7 workgroup, within the Package Name titled PO 00000 Frm 00067 Fmt 4701 Sfmt 4700 25707 provides instructions for using the FHIR Consent resource to capture a record of a health care consumer’s privacy preferences. In section VII.B.4 of this final rule, we discuss policies related to the implementation of a standardized API to support the exchange of health information between providers and patients and among members of a care team. In the Proposed Rule, we anticipated that the proposed 2015 Edition ‘‘standardized API for patient and population services’’ certification criterion (§ 170.315(g)(10)) would result in a proliferation of APIs that will enable a more flexible and less burdensome approach to exchanging EHI. We stated our belief that the health care industry could leverage this API infrastructure to share segmented data in a secure and scalable manner. Therefore, we proposed to adopt a 2015 Edition certification criterion ‘‘consent management for APIs’’ in § 170.315(g)(11) to support data segmentation and consent management through an API in accordance with the Consent Implementation Guide. Comments. Overall, the majority of commenters were supportive of the concept of consent management for APIs but many had concerns with the proposed criteria, specifically the adoption of the Consent Implementation Guide or the C2S platform as part of a certification criterion. Many commenters raised concerns that the Consent Implementation Guide has not been balloted as an HL7 standard and noted that C2S does not support a consenter’s signature or specification to protect information content data requirements. A couple of commenters stated that the Consent Implementation Guide is a new emerging standard in pilot with feedback requested. Commenters also raised concern that the IG has not gone through an SDO process. Another commenter raised concern that SAMHSA no longer supports the C2S platform and the Consent Implementation Guide and it now lacks a steward. A couple of commenters suggested ONC defer the consent management criteria at least until an API FHIR standard version is finalized and the Consent Implementation Guide is revised to conform that to that version. One commenter supported the adoption of FHIR v3-based Consent resource, but urged ONC to also consider pediatric and geriatric use cases in its adoption. Other commenters stated that their understanding was that tagging will be ‘‘BHITS_FHIR_Consent_IG,’’ at https:// gforge.hl7.org/gf/project/cbcc/frs/. E:\FR\FM\01MYR3.SGM 01MYR3 25708 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations a feature of FHIR Release 4, but were unclear how the proposal to move to FHIR Release 2 would work. One commenter questioned how if there are no standards-based approaches for identifying what in the record is sensitive, how one could feasibly implement privacy-tagging and consent management via FHIR at the Resource level and that tagging at a more granular level is too cumbersome and unrealistic. A number of commenters stated that the standards were premature and if adopted could have unintended negative effects. Commenters were not supportive of having two versions of FHIR but instead recommended the use of FHIR Release 4. Commenters recommended ONC focus on driving real-world implementation experience before adopting the standards. On the other hand, a few commenters supported our proposal, and stated that the C2S platform and the Consent Implementation Guide is mature and already supports granular level security tagging and data segmentation and supports several API standards listed in the Proposed Rule. One commenter expressed support broadly for the C2S platform indicating that, though it was originally designed to satisfy 42 CFR part 2 consent for the substance use disorder data, it supports the other sensitive categories such as HIV and mental health. Several commenters stated that the criteria should be required in the Base EHR definition. Many providers called for patient education and for ONC to work with SAMHSA, OCR, and CMS. It was also suggested that ONC coordinate with SAMHSA to establish a public-private project to advance the C2S platform and the Consent Implementation Guide using an analogous process to that of the Da Vinci Project with transparency and with no membership fees. Finally, several commenters raised issues that are out of scope for this rule including concerns specifically with the HIPAA Rules or 42 CFR part 2 which are under the authority of OCR and SAMHSA respectively. Response. We appreciate the comments received and the insights into real world implementing challenges of consent management. We agree that there is continued work to be done to ballot and field test the C2S platform and the Consent Implementation Guide and also agree with commenters that identified this resource as having significant potential to support consent management for specific use cases such as 42 CFR part 2, behavioral health, and pediatric care. We also note that we had included a series of questions in our Proposed Rule related to the alignment VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 of FHIR releases and we appreciate comments received related to these questions. We direct readers to section VII.B.4.c for further discussion of our adoption in this rule the FHIR Release 4 standard. We note that the Consent Implementation Guide is designed in FHIR Release 3 and that there is significant work to be done in standards development before the IG would be feasible with FHIR Release 4. At this time, FHIR Release 4 version of FHIR consent resource is not normative and can change from version to version and therefore further development, review, balloting, and testing would be required for a FHIR Release 4 based IG to be a viable consensus standard for adoption in the Program. In consideration of comments, and the scope of the additional work required for readiness of an IG that could be adopted in our regulations, we have not finalized the proposed ‘‘consent management for APIs’’ certification criterion in § 170.315(g)(11). We maintain, as stated above, that the C2S platform and the Consent Implementation Guide may still serve as a template for implementation of consent management workflows leveraging APIs and that it may be a part of health IT solutions to facilitate health information exchange of sensitive information. We will continue to monitor the development of the Consent Implementation Guide and other FHIR resources to support consent management and may consider including in a future rulemaking. 10. Auditable Events and TamperResistance, Audit Reports, and Auditing Actions on Health Information Since adopting the Auditable events and tamper-resistance (§ 170.315(d)(2)), Audit Reports (§ 170.315(d)(3)), and Auditing Actions on health information (§ 170.315(d)(10)) criteria in the 2015 Edition, there has been an update to ASTM E2147—1 standard and has been replaced by a newer version. Given the older version has been deprecated and based on comments received, we have updated these criteria with the most up to date standard, ASTM E1247—18 in § 170.210(h). We have also updated the requirements to align with the new numbering sequence of the updated standard. In order to meet the minimum requirements for capturing and auditing electronic health information, we have specified, in § 170.210(e)(1)(i), that the data elements in sections 7.1.1 through 7.1.3 and 7.1.6, through 7.1.9 in ASTM E1247—18 are required. We believe that the updated standard reinforces what we have previously required and maintained with previous certification PO 00000 Frm 00068 Fmt 4701 Sfmt 4700 requirements and note that there is no substantial change to the standard. We further note that health IT developers must update Health IT Modules to these updated standards referenced in these criteria within 24 months after the publication date of this final rule. We have added as a Maintenance of Certification requirement for the real world testing Condition of Certification requirement, that health IT developers are required to provide the updated certified health IT to all their customers with health IT previously certified to the identified criteria no later than 24 months after the publication date of the final rule. Developers would also need to factor these updates into their next real world testing plan as discussed in section VII.B.5 of this final rule and in § 170.405(b)(7). C. Unchanged 2015 Edition Criteria— Promoting Interoperability Programs Reference Alignment In the FY 2019 IPPS/LTCH PPS proposed rule (83 FR 20516), CMS proposed scoring and measurement policies to move beyond the three stages of meaningful use to a new phase of EHR measurement with an increased focus on interoperability and improving patient access to health information. To reflect this focus, CMS changed the name of the Medicare and Medicaid EHR Incentive Programs, to the Medicare and Medicaid Promoting Interoperability (PI) Programs. To align with the renaming of the EHR Incentive Programs, we proposed to remove references to the EHR Incentive Programs and replace them with ‘‘Promoting Interoperability Programs’’ in the updated 2015 Edition ‘‘automated numerator recording’’ criterion in § 170.315(g)(1) and the ‘‘automated measure calculation’’ criterion in § 170.315(g)(2). Comments. We did not receive any comments on this proposal to remove references to the EHR Incentive Programs and replace them with ‘‘Promoting Interoperability Programs’’ in the updated 2015 Edition ‘‘automated numerator recording’’ criterion in § 170.315(g)(1) and the ‘‘automated measure calculation’’ criterion in § 170.315(g)(2). Response. We have removed references to the EHR Incentive Programs and replaced them with ‘‘Promoting Interoperability Programs’’ in the 2015 Edition ‘‘automated numerator recording’’ criterion in § 170.315(g)(1) and the ‘‘automated measure calculation’’ criterion in § 170.315(g)(2). E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations V. Modifications to the ONC Health IT Certification Program A. Corrections 1. Auditable Events and Tamper Resistance We proposed to revise § 170.550(h)(3) to require the End-User Device Encryption criterion in § 170.315(d)(7) as appropriate, and exempt Health IT Modules from having to meet § 170.315(d)(7) when the certificate scope does not require § 170.315(d)(7) certification (see § 170.315(d)(2)(i)(C)) (84 FR 7454). As noted in the Proposed Rule (84 FR 7454), paragraph 170.315(d)(2)(i)(C) was not applicable to the privacy and security testing and certification of a Health IT Module required by § 170.550(h)(3)(iii), (v), (vii), and (viii), but we intended for it to also be exempted from the aforementioned paragraphs. We, therefore, proposed to revise § 170.550(h)(3)(iii), (v), (vii), and (viii) by removing references to paragraph 170.315(d)(2)(i)(C). Comments. One commenter expressed support of the proposals under section V (‘‘Modifications of the ONC Health IT Certification Program’’) of the Proposed Rule as a whole. However, we received no comments specific to this proposal. Response. We have finalized the revision as proposed. Certification can proceed for the audit log process without the Health IT Module demonstrating that it can record an encryption status in accordance with § 170.315(d)(2)(i)(C). Paragraph § 170.315(d)(2)(i)(C) is not applicable for the privacy and security testing and certification of a Health IT Module required by § 170.550(h)(3)(iii), (v), (vii), and (viii). We had previously identified this error in guidance,66 and have now codified the correction to § 170.550(h)(3)(iii), (v), (vii), and (viii) in regulation. 2. Amendments We proposed to revise § 170.550(h) to remove the ‘‘amendments’’ criterion’s application to certain non-applicable clinical criteria including: ‘‘Drug-drug, drug-allergy interaction checks for computerized provider order entry (CPOE)’’ in § 170.315(a)(4); ‘‘clinical decision support (CDS)’’ in § 170.315(a)(9); ‘‘drug-formulary and preferred drug list checks’’ in § 170.315(a)(10); and ‘‘patient-specific education resources’’ in § 170.315(a)(13) (84 FR 7454). The ‘‘amendments’’ certification criterion § 170.315(d)(4) is not necessarily indicated for health IT capabilities that may not have any 66 https://www.healthit.gov/test-method/ auditable-events-and-tamper-resistance. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 patient data for which a request for an amendment would be relevant. Comments. One commenter expressed support of the proposals under section V (‘‘Modifications of the ONC Health IT Certification Program’’) of the Proposed Rule as a whole. However, we received no comments specific to this proposal. Response. We have finalized the proposal with modifications. Health IT Modules presented for certification to these criteria do not have to demonstrate the capabilities required by the revised 2015 Edition ‘‘amendments’’ certification criterion (§ 170.315(d)(4)), unless the Health IT Module is presented for certification to another criterion that requires certification to the 2015 Edition ‘‘amendments’’ criterion under the privacy and security (P&S) certification framework. We note that, because we have not finalized our proposal to remove the ‘‘drug-formulary and preferred drug list checks’’ criterion in § 170.315(a)(10) and the ‘‘patientspecific education’’ criterion in § 170.315(a)(13), but to only permit ONC–ACBs to issue certificates for these criteria until January 1, 2022, we have not removed references to these criteria from the exemption in § 170.550(h) at this time. This clarification has already been incorporated into sub-regulatory guidance,67 and is now codified in regulation. 3. View, Download, and Transmit to 3rd Party We proposed to remove § 170.315(e)(1)(ii)(B), which includes a cross-reference to § 170.315(d)(2) indicating that a Health IT Module may demonstrate compliance with active history log requirements if it is also certified to § 170.315(d)(2) (84 FR 7454). Comments. One commenter expressed support of the proposals under section V (‘‘Modifications of the ONC Health IT Certification Program’’) of the Proposed Rule as a whole. However, we received no comments specific to this proposal. Response. We thank commenters for their support and have finalized the proposal to remove § 170.315(e)(1)(ii)(B), which includes a cross-reference to § 170.315(d)(2). As noted in the Proposed Rule (84 FR 7454), this cross-reference indicates that a Health IT Module may demonstrate compliance with activity history log requirements if it is also certified to the 2015 Edition ‘‘auditable events and 67 https://www.healthit.gov/test-method/drugdrug-drug-allergy-interaction-checks-cpoe; https:// www.healthit.gov/test-method/clinical-decisionsupport-cds; https://www.healthit.gov/test-method/ drug-formulary-and-preferred-drug-list-checks; and https://www.healthit.gov/test-method/patientspecific-education-resources. PO 00000 Frm 00069 Fmt 4701 Sfmt 4700 25709 tamper-resistance’’ certification criterion (§ 170.315(d)(2)). However, we no longer require testing of activity history log when certifying for § 170.315(d)(2). Therefore, this crossreference is no longer applicable to meet certification requirements for the updated 2015 Edition ‘‘view, download, and transmit to 3rd party’’ certification criterion (§ 170.315(e)(1)) activity history log requirements. Consequently, we have finalized our proposal to remove § 170.315(e)(1)(ii)(B). 4. Integrating Revised and New Certification Criteria Into the 2015 Edition Privacy and Security Certification Framework We proposed to require the new certification criteria (§ 170.315(d)(12) and (d)(13)) to apply to all § 170.315 certification criteria (84 FR 7454). Therefore, given these and the other modifications discussed above, we proposed to revise the P&S Certification Framework as shown in Table 1 of the Proposed Rule (84 FR 7455), noting that the P&S Certification Framework when finalized could differ depending on finalization of proposals in section III.B.4 of the Proposed Rule (84 FR 7436 and 7437) to remove certain 2015 Edition certification criteria. Comments. One commenter expressed support of the proposals under section V (‘‘Modifications of the ONC Health IT Certification Program’’) of the Proposed Rule as a whole. However, we received no comments specific to this proposal. Response. We thank the commenter for their input regarding our proposals under section V (‘‘Modifications of the ONC Health IT Certification Program’’) of the Proposed Rule. We have adopted the revisions as proposed with modifications. As noted in section IV.B.8.a, we have also adopted both proposed privacy and security transparency attestation criteria (§ 170.315(d)(12) and (d)(13)) with minor modifications. We have applied § 170.315(d)(12) and (d)(13) to all certification criteria across the P&S Certification Framework. Table 2 shows the final updated P&S Certification Framework, which includes all changes including the removal of certain 2015 Edition certification criteria as finalized in section III.B.4 of this final rule. We updated the P&S Certification Framework to reflect other changes made throughout this final rule. The privacy and security certification criteria applicable to a Health IT Module presented for certification is based on the other capabilities included in the Health IT Module and for which certification is sought (80 FR 62705). In this final rule, we have determined that E:\FR\FM\01MYR3.SGM 01MYR3 25710 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations § 170.315(b)(10) and, consistent with the rationale provided in the 2015 Edition final rule, (g)(1) through (6) are exempt from the P&S Certification Framework due to the capabilities included in these criteria, which do not implicate privacy and security concerns (80 FR 62707). We have revised § 170.550(h) of this final rule to reflect these clarifications. We also corrected Table 2 to accurately reflect the regulatory text at § 170.315(a)(3), (a)(14), and (a)(15). Sections 170.315(a)(3), (a)(14), and (a)(15), though included in the regulatory text, were erroneously deleted in the Proposed 2015 Edition Privacy and Security Certification Framework table and we corrected it in Table 2. TABLE 2—2015 EDITION PRIVACY AND SECURITY CERTIFICATION FRAMEWORK It will need to be certified to approach 1 or approach 2 for each of the P&S certification criteria listed in the ‘‘approach 1’’ column If the Health IT Module includes capabilities for certification listed under: Approach 1 Approach 2 § 170.315(a)(1) through (3), (5), (12), (14), and (15). § 170.315(d)(1) (authentication, access control, and authorization), (d)(2) (auditable events and tamper resistance), (d)(3) (audit reports), (d)(4) (amendments), (d)(5) (automatic log-off), (d)(6) (emergency access), (d)(7) (end-user device encryption) (d)(12) (encrypt authentication credentials) (d)(13) (multi-factor authentication). For each applicable P&S certification criterion not certified using Approach 1, the health IT developer submits system documentation that is sufficiently detailed to enable integration such that the Health IT Module has implemented service interfaces for each applicable P&S certification criterion that enable the Health IT Module to access external services necessary to meet the requirements of the P&S certification criterion. § 170.315(a)(4), (9), (10), and (13) ... § 170.315(d)(1) through (d)(3), (d)(5) through (d)(7), (d)(12), and (d)(13). § 170.315(d)(1) through (d)(3), (d)(5) through (d)(8) (integrity), (d)(12), and (d)(13). § 170.315(d)(1) through (d)(3) and (d)(5), (d)(12), and (d)(13) *. § 170.315(d)(1) through (d)(3), (d)(5), (d)(7), (d)(9) (trusted connection), (d)(12), and (d)(13). § 170.315(d)(1) through (d)(3), (d)(5), (d)(9), (d)(12), and (d)(13) *. § 170.315(d)(1) through (d)(3), (d)(7), (d)(12), and (d)(13). § 170.315(d)(1) and (d)(9); (d)(2) or (d)(10) (auditing actions on health information), (d)(12), and (d)(13). § 170.315(d)(1) through (d)(3), (d)(12), and (d)(13) *. § 170.315(b)(1) through (3) and (6) through (9). § 170.315(c) ....................................... § 170.315(e)(1) .................................. § 170.315(e)(2) and (3) ..................... § 170.315(f) ........................................ § 170.315(g)(7) through (g)(10) ......... § 170.315(h) ....................................... An ONC–ACB must ensure that a Health IT Module presented for certification to any of the certification criteria that fall into each regulatory text ‘‘first level paragraph’’ category of § 170.315 (e.g., § 170.315(a)) identified in Table 2 is certified to either Approach 1 (technically demonstrate) or Approach 2 (system documentation). In order to be issued a certification, a Health IT Module would only need to be tested once to each applicable privacy and security criterion identified as part of Approach 1 or Approach 2 so long as the health IT developer attests that such privacy and security capabilities apply to the full scope of capabilities included in the requested certification, except for the certification of a Health IT Module to § 170.315(e)(1) ‘‘view, download, and transmit to 3rd party.’’ For this criterion, a Health IT Module must be separately tested to § 170.315(d)(9) because of the specific capabilities for secure electronic transmission included in the criterion. * § 170.315(d)(2)(i)(C) is not required if the scope of the Health IT Module does not include end-user device encryption features. B. Principles of Proper Conduct for ONC–ACBs 1. Records Retention We proposed to revise the records retention requirement in § 170.523(g) to include the ‘‘life of the edition’’ as well as three years after the retirement of an edition related to the certification of Complete EHRs and Health IT Modules (84 FR 7456). We also proposed to clarify that HHS has the ability to access certification records for the ‘‘life of the edition,’’ which begins with the codification of an edition of certification criteria in the Code of Federal Regulations through a minimum of three years from the effective date of the final rule that removes the applicable edition from the Code of Federal Regulations (CFR), not solely during the three-year VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 period after removal from the CFR (84 FR 7456). Comments. Several commenters expressed support for ONC’s proposal to revise the records retention requirement. Another commenter requested that ONC provide a separate posting or notice that lists the dates specific to when the ‘‘life of the edition’’ starts and dates specific to when the ‘‘life of the edition’’ and the minimum period of three years from the effective date that removes the applicable edition end. Response. We thank commenters for their input and have finalized this revision as proposed. Because the ‘‘life of the edition’’ begins with the codification of an edition of certification criteria in the CFR and ends on the effective date of the final rule that removes the applicable edition from the PO 00000 Frm 00070 Fmt 4701 Sfmt 4700 CFR, the start and end dates for the ‘‘life of the edition’’ are published in the Federal Register in the rulemaking actions that finalize them. The period of three years beyond the ‘‘life of the edition’’ begins on the effective date of the final rule that removes the applicable edition from the CFR, thus the three-year period after removal from the CFR continues through three full calendar years following that date. For example, if the effective date of a hypothetical final rule removing an edition from the CFR were July 1, 2025, then the three year period following the end of the life of this hypothetical edition would be June 30, 2028. We anticipate continuing to work with ONC–ACBs to provide guidance and information resources as necessary or appropriate to promote successful adherence to all Principles of Proper E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations Conduct (PoPC) applicable to their participation in the Program. 2. Conformance Methods for Certification Criteria The PoPC in § 170.523(h) specified that ONC–ACBs may only certify health IT that has been tested by ONC–ATLs using tools and test procedures approved by the National Coordinator. We proposed to revise the PoPC in § 170.523(h) in three ways (84 FR 7456). First, we proposed to revise this PoPC to additionally permit ONC–ACBs to certify Health IT Modules that the ONC– ACB has evaluated for conformance with certification criteria without first passing through an ONC–ATL. However, we proposed that such methods to determine conformity must first be approved by the National Coordinator. Second, we proposed to revise the PoPC to clarify that certifications can only be issued to Health IT Modules and not Complete EHRs. We proposed to remove the 2014 Edition from the CFR (see section III.B.2 of this preamble) and Complete EHR certifications are no longer available for certification to the 2015 Edition (80 FR 62608; 79 FR 54443). We also proposed to remove the provision that permits the use of test results from National Voluntary Laboratory Accreditation Program (NVLAP)-accredited testing laboratories under the Program because the regulatory transition period from NVLAP-accredited testing laboratories to ONC–ATLs has expired (81 FR 72447). Third, we proposed to remove the provision that permits the certification of health IT previously certified to an edition if the certification criterion or criteria to which the Health IT Module(s) was previously certified have not been revised and no new certification criteria are applicable because the circumstances that this provision seeks to address are no longer feasible with certification to the 2015 Edition. Comments. One commenter sought clarification on whether the proposal to remove references to § 170.545, which includes the ability to maintain Complete EHR certification, would impact § 170.550(k), which requires ONC–ACBs to accept requests for a newer version of a previously certified Health IT Module(s) to inherit the certified status of the previously certified Health IT Module(s) without requiring the newer version to be recertified. The commenter strongly urged ONC to allow ONC–ACBs to grant inherited certification status to updated versions of certified technology. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 Another commenter expressed support for ONC’s proposal to revise the PoPC to clarify that certifications can only be issued to Health IT Modules and not Complete EHRs. The commenter also expressed support for ONC’s proposal to remove the provision that permits the certification of health IT previously certified to an edition if the certification criterion or criteria to which the Health IT Module(s) was previously certified have not been revised and no new certification criteria are applicable because the circumstances that this provision seeks to address are no longer feasible with certification to the 2015 Edition. Response. We have finalized the proposal to revise the PoPC in § 170.523(h). As noted in the Proposed Rule, the ability to maintain Complete EHR certification is only permitted with health IT certified to the 2014 Edition certification criteria (84 FR 7435). Because this concept was not continued in the 2015 Edition (84 FR 7456), we proposed revisions to clarify that Complete EHR certifications are no longer available. We note that ONC– ACBs have discretion, and processes in place, to evaluate updates made to certified health IT and assess the need for additional testing. These ONC–ACB processes allow for efficient certification of upgraded version releases of previously certified health IT while ensuring its continued conformity with certification criteria and standards to which the prior version release of the same Module(s) had been certified. We have finalized this proposal. Comments. Multiple commenters expressed support for the use of conformance methods approved by the National Coordinator. One commenter noted that the opportunity would enable alternative testing methods and less costly testing. Another commenter noted that this proposal would reduce burden for EHR developers and for ONC–ATLs by leveraging certification programs and alternative test methods and specifically requested that ONC consider a specific proprietary certification related to e-prescribing functionalities for potential approval. While expressing appreciation for the flexibility offered by the proposed revision, one commenter expressed concern about certifications based on other ONC-approved conformance methods that are not specifically designed to test against the ONC criteria and stressed the importance of assessing conformance to technical standards before being deployed to end users. Another commenter questioned whether the ONC–ACB would be permitted to do all evaluation directly, thus eliminating PO 00000 Frm 00071 Fmt 4701 Sfmt 4700 25711 the need for ONC–ATLs entirely. Two commenters sought clarity from ONC as to what metrics the National Coordinator will use to approve a conformance method. These commenters also sought clarification on ONC’s plan to reduce the risk of developers seeking certification through fraudulent means. The commenters cited the example of two developers who are currently operating under corporate integrity agreements with the HHS Office of the Inspector General due to court cases brought against them in relation to conduct including, but not limited to, the process of seeking certification. Response. We thank commenters for their feedback. We have finalized the proposal to revise the PoPC in § 170.523(h) to permit a certification decision to be based on an evaluation conducted by the ONC–ACB for Health IT Modules’ compliance with certification criteria by use of conformity methods approved by the National Coordinator. We note that all certification criteria will continue to have some method of holding developers responsible for demonstrating conformity whether through ONC–ATL testing, developer self-declaration, or some other method assessed and approved by the National Coordinator. As noted in the Proposed Rule (84 FR 7456), ONC acknowledges that there is a broad spectrum of types of evidence of conformance, from laboratory testing with an ONC–ATL to developer self-declaration. Some of these types of evidence may be more appropriate than others in specific circumstances. Historically, it has been proven that, in some circumstances, the requirement for ONC–ATL testing has presented more administrative burden on health IT developers than benefits for assessing conformity. For example, under § 170.315(a)(5) demographics certification criteria require only documentation or a visual inspection, and do not require testing by an ONC– ATL. We note that industry advancements have presented opportunities for improved efficiency for demonstrating conformity and this flexibility will allow the Program to advance as the state of the art for demonstrating conformance evolves. This flexibility addresses the current Program construct limitation of ONC– ACB certification only being permissible for health IT that has been tested by an ONC–ATL with ONC-approved test procedures. In some instances, such as developer self-declaration, there is no testing required and thus bypassing the ONC–ATL testing step reduces burden and enables a more streamlined and E:\FR\FM\01MYR3.SGM 01MYR3 25712 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations efficient process. By adopting this flexibility, we may approve conformance methods that rely solely on ONC–ACB evaluation, and not ONC– ATL testing, when appropriate. We will follow the same process used for alternative test methods (76 FR 1280) for the submission of non-governmental developed conformance methods to the National Coordinator for approval. A person or entity may submit a conformance method to the National Coordinator to be considered for approval for use under the Program. The submission should identify the developer of the conformance method; specify the certification criterion or criteria that is/are addressed by the conformance method; and explain how the conformance method would evaluate a Health IT Module’s or, if applicable, other type of health IT’s, compliance with the applicable certification criterion or criteria. The submission should also provide information describing the process used to develop the conformance method, including any opportunity for the public to comment on the conformance method and the degree to which public comments were considered. In determining whether to approve a conformance method for purposes of the Program, the National Coordinator will consider whether it is clearly traceable to a certification criterion or criteria adopted by the Secretary; whether it is sufficiently comprehensive (i.e., assesses all required capabilities) for the assessment of Health IT Modules’, or other type of health IT’s, conformance to the certification criterion or criteria adopted by the Secretary; whether an appropriate public comment process was used during the development of the conformance method; and any other relevant factors. When the National Coordinator has approved a conformance method for purposes of the Program, we will publish a notice of availability in the Federal Register and identify the approved conformance method on the ONC website. 3. ONC–ACBs To Accept Test Results From Any ONC–ATL in Good Standing We proposed to add the PoPC for ONC–ACBs in § 170.523(r) in order to address business relationships between ONC–ACBs and ONC–ATLs (84 FR 7456). To encourage market competition, we proposed to require ONC–ACBs to accept test results from any ONC–ATL that is in good standing under the Program and is compliant with its ISO/IEC 17025 accreditation requirements. However, if an ONC–ACB has concerns about accepting test results from a certain ONC–ATL, the ONC–ACB VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 would have an opportunity to explain the potential issues to ONC and NVLAP, and on a case-by-case basis, ONC could consider the facts and make the final determination. Comments. Multiple commenters expressed support for the proposed requirement that ONC–ACBs must accept test results from any ONC–ATL in good standing. One commenter expressed an opinion that this proposal has value in ensuring the credibility of the Program. Another commenter agreed that this proposal would encourage market competition and provide more options to developers. One commenter recommended that ONC–ATLs should also be required to provide their results to any ONC–ACB to which the developer has chosen to present its health IT for certification, stating that this consistency across ONC–ACBs and ONC–ATLs would ensure market competition. Response. We thank commenters for their input. We have finalized the PoPC for ONC–ACBs in § 170.523(r) as proposed. While an ONC–ATL attempting to inappropriately restrict developers’ choice of ONC–ACBs to those favored by the ONC–ATL would not support appropriate competition, we do not believe it would be practical to mandate direct transmission of ONC– ATL results to any ONC–ACB designated by the developer, in part because developers often do not initiate engagement with an ONC–ACB until after they have received and had a chance to review their ONC–ATL results. To date, we are not aware of substantial evidence that the standard practice of NVLAP-accredited testing laboratories providing test results to the client who engaged them to test their Health IT Modules is not serving as a sufficient safeguard against anticompetitive behavior on the part of ONC–ATLs in relation to their client developers’ selection of ONC–ACBs. 4. Mandatory Disclosures and Certifications We proposed to revise the PoPC in § 170.523(k) to remove § 170.523(k)(1)(ii)(B) because certifications can only be issued to Health IT Modules and not Complete EHRs (84 FR 7456). We also proposed to revise § 170.523(k)(1)(iii)(A) to broaden the section beyond the Promoting Interoperability (PI) Programs. We proposed to revise the section to include a detailed description of all known material information concerning additional types of costs or fees that a user may be required to pay to implement or use the Health IT Module’s capabilities, whether to meet PO 00000 Frm 00072 Fmt 4701 Sfmt 4700 provisions of HHS programs requiring the use of certified health IT or to achieve any other use within the scope of the health IT’s certification. We also proposed to remove the provision in § 170.523(k)(3) that requires a certification issued to a precoordinated, integrated bundle of Health IT Modules to be treated the same as a certification issued to a Complete EHR for the purposes of § 170.523(k)(1), except that the certification must also indicate each Health IT Module that is included in the bundle (84 FR 7457). We proposed to revise § 170.523(k)(4) to clarify that a certification issued to a Health IT Module based solely on the applicable certification criteria adopted by the ONC Health IT Certification Program must be separate and distinct from any other certification(s) based on other criteria or requirements (84 FR 7457). We also proposed changes related to transparency attestations and disclosures of limitations in section III.B.5 of the Proposed Rule preamble (84 FR 7437 and 7438). Additionally, we proposed other new PoPC for ONC– ACBs as discussed in sections VII.B.5 (84 FR 7501) and VII.D (84 FR 7506 and 7507) of the Proposed Rule preamble. Comments. Multiple commenters expressed support for ONC’s proposal to include a detailed description of all known material information concerning additional types of costs or fees that a user may be required to pay to implement or use the Health IT Module’s capabilities—whether to meet provisions of HHS programs requiring the use of certified health IT or to achieve any other use within the scope of the health IT’s certification. One commenter endorsed the transparency that this proposal would provide, noting that it would help providers budget for their health IT, but also expressed concern that requiring developers to disclose how much they charge for a particular functionality may be impractical due to variations across contracts and over time, or potentially have unintended consequences on market pricing. Multiple commenters expressed support for our proposal to remove subsection § 170.523(k)(1)(ii)(B). One commenter expressed support for ONC’s proposed revisions to § 170.523(k)(4). Another commenter was supportive of the proposal to remove the provision in § 170.523(k)(3). Response. We thank commenters for their support. We have finalized the proposals, in their entirety, as proposed. To clarify, the finalized revision in § 170.523(k) requires disclosure of a detailed description of all known material information concerning E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations additional types of costs or fees a user may be required to incur or pay to implement or use the Health IT Module’s capabilities to achieve any use within the scope of the health IT’s certification. We emphasize that (unless required elsewhere in CFR part 170) the requirement is for a description of the types of costs or fees, not predicted amounts of these costs or fees across the full array of probable implementation circumstances or over time. Among other considerations, we note that costs required to achieve some particular uses within the scope of some certifications may be for third-party services outside the control of the developer required to disclose the detailed description. C. Principles of Proper Conduct for ONC–ATLs—Records Retention We proposed to revise the records retention requirement in § 170.524(f) to include the ‘‘life of the edition’’ as well as 3 years after the retirement of an edition related to the testing of Health IT Module(s) to an edition of certification criteria (84 FR 7457). The circumstances are the same as in section V.B.1 of the Proposed Rule preamble, as summarized above. Therefore, we proposed the same revisions for ONC– ATLs as we did for ONC–ACBs. We did not receive any comments specific to this proposed revision to the PoPC for ONC–ATLs. In light of the absence of comments, we have finalized the revisions as proposed. VI. Health IT for the Care Continuum Health IT should help promote and support patient care when and where it is needed. This means health IT should help support patient populations, specialized care, transitions of care, and practice settings across the care continuum. In the Proposed Rule, we provided a history of the many actions we have taken since the inception of the ONC Health IT Certification Program through the Proposed Rule (84 FR 7457). As stated in the Proposed Rule, section 4001(b)(i) of the Cures Act instructs the National Coordinator to encourage, keep, or recognize, through existing authorities, the voluntary certification of health IT under the Program for use in medical specialties and sites of service for which no such technology is available or where more technological advancement or integration is needed. This provision of the Cures Act closely aligns with our ongoing collaborative efforts with both Federal partners and stakeholders within the health care and health IT community to encourage and support the advancement of health IT for a wide range of clinical settings. These initiatives have included projects VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 related to clinical priorities beyond those specifically included in the EHR Incentive Programs (now called the Promoting Interoperability Programs) including efforts in public health, behavioral health, and long-term and post-acute care. We noted in the Proposed Rule that these initiatives often include the development of nonregulatory informational resources to support the specific implementation goal and align with the technical specifications already available in the Program for certification. To advance these efforts, we also explained in the Proposed Rule that we generally consider a range of factors including: Stakeholder input and identification of clinical needs and clinical priorities, the evolution and adoption of health IT across the care continuum, the costs and benefits associated with any policy or implementation strategy related to care settings and sites of service, and potential regulatory burden and compliance timelines. Our goal was then and is now to support the advancement of interoperable health IT and to promote health IT functionality in care and practice settings across the care continuum (see 80 FR 62604). As stated in the Proposed Rule (84 FR 7458), generally, our approach can be summarized in three parts: • First, we analyze existing certification criteria to identify how such criteria may be applicable for medical specialties and sites of service. • Second, we focus on the real-time evaluation of existing and emerging standards to determine applicability to medical specialties and sites of service as well as to the broader care continuum, including the evaluation of such standards for inclusion in the ONC Interoperability Standards Advisory (ISA).68 • Third, we may work in collaboration with stakeholders to support the development of informational resources for medical specialties and sites of service for which we identify a need to advance the effective implementation of certified health IT. We continue to believe this approach is economical, flexible, and responsive for both health care providers and the health IT industry. It is also in alignment with the provisions of section 4001(a) in the Cures Act related to burden reduction and promoting interoperability. We are committed to continuing to work with stakeholders to promote the adoption of health IT to support medical specialties and sites of service and to help ensure that 68 https://www.healthit.gov/isa/. PO 00000 Frm 00073 Fmt 4701 Sfmt 4700 25713 providers have the tools they need (such as access to essential health information across care settings) to support patients at the point of care. A. Health IT for Pediatric Setting Section 4001(b)(iii) of the Cures Act— ‘‘Health information technology for pediatrics’’ requires: • First, that the Secretary, in consultation with relevant stakeholders, shall make recommendations for the voluntary certification of health IT for use by pediatric health providers to support the health care of children, and • Second, that the Secretary shall adopt certification criteria to support the voluntary certification of health IT for use by pediatric health providers to support the health care of children. In the Proposed Rule (84 FR 7458), we described our approach to stakeholder engagement, the analysis used to develop the recommendations, the specific 2015 Edition certification criteria that support each recommendation, and the voluntary certification of health IT for use by pediatric health providers to support the health care of children. Comments. We received several comments requesting further clarification on whether the pediatric health IT recommendations will be adopted as an independent certification program and/or certification criteria designated specifically for pediatric care. One commenter recommended that pediatric provisions should be formalized over time within what they refer to as the current pediatric program and not as a separate program, and that this future aligns with the 2015 Children’s EHR Format. One commenter also sought clarification as whether ONC intends for other government agencies/programs such as CHIP, to develop conditions of participation or financial incentives around the adoption of certification criteria identified in this rulemaking. We also received several comments stating that since current EHRs have pediatric capabilities, there is no need to specify requirements in regulation, and that there is no value in having EHRs certified as ‘‘pediatric-friendly,’’ only increased costs. We also received several comments stating that our approach reflects an attempt to retrofit the needs of pediatric patients by using adult requirements. Response. We thank commenters for their feedback. The comments we received suggests a need for greater clarity on our approach. We therefore reiterate that we did not propose to adopt care- or practice-specific certification tracks, or additional E:\FR\FM\01MYR3.SGM 01MYR3 25714 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations voluntary program(s), in parallel to the existing voluntary ONC Health IT Certification Program. In the Proposed Rule, we reiterated our statements from the 2015 Edition final rule, which explained that we did not intend to develop and issue separate regulatory certification ‘‘paths’’ or ‘‘tracks’’ for particular care or practice settings (e.g., a ‘‘long-term and post-acute care (LTPAC) certification’’) because it would be difficult to independently construct such ‘‘paths’’ or ‘‘tracks’’ in a manner that would align with other relevant programs and specific stakeholder needs. We further stated that stakeholders had indicated that separate certification pathways could have unintended consequences related to increasing burden on health care providers and health IT developers. We also stated that we would welcome the opportunity to work with HHS agencies, other agencies, and provider associations in identifying the appropriate functionality and certification criteria in the Program to support their stakeholders (80 FR 62704). In response to the comments regarding our approach to implement section 4001(b) of the Cures Act, we clarify that the 2015 Edition certification criteria identified for the voluntary certification of health IT for use by pediatric health providers are agnostic to the age of the patient (with the exception of the pediatric vital signs in the USCDI). Therefore, we believe our approach to fulfilling the Cures Act requirement for pediatric health care providers and settings, which involves identifying existing, new, or revised 2015 Edition criteria—as applicable to an identified clinical or interoperability priority—is appropriate across patient populations. We also note that our authority is limited to implementing the described requirements of the Cures Act related to pediatric settings. We cannot speak for the actions of other Federal agencies, but would note once again that we have taken a limited regulatory approach to implementing the pediatric provisions of the Cures Act. Comments. We received multiple comments requesting clarification on the intended use and functionality of the Certified Health IT Products List (CHPL) for pediatric certification, such as guidance on navigating the CHPL to identify relevant products based on pediatric care settings. Response. We thank stakeholders for their comments on the CHPL. We do not intend to have a separate tag functionality on the CHPL that identifies a product specifically for pediatric care. We did not propose, and do not intend, for there to be a separate VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 certification pathway or a new ONC certification designation called pediatric certification. However, we recognize that beyond certification and testing there are certain implementation needs that are important for pediatric care and services. We agree with the overwhelming prior feedback from stakeholders stating that they should not have to purchase separate products that contain universally applicable functionality, such as the ‘‘API functionality’’ certification criteria. We are exploring options for non-regulatory informational resources on effective implementation of health IT for use by pediatric health providers to expand the availability of health IT products supporting the care of children. Comments. We received comments regarding how the approach for voluntary certification of health IT for use by pediatric health providers might be applicable to other medical specialties and use cases. One commenter noted that the pediatric experience is scalable and should be extended to other disciplines. Another commenter sought clarification if this model could be used for broad applicability to multiple medical specialties such as pathologists. Response. We thank these commenters for identifying the applicability of our approach to pediatrics to other medical specialties. We confirm that our approach for advancing health IT can be used for other use cases and medical specialties, and welcome the opportunity to engage with stakeholders representing a wide range of medical specialties or sites of service to provide insight into this process and to inform stakeholder-led efforts to improve clinically-relevant health IT implementation across specialties and settings of care. 1. Background and Stakeholder Convening Over the past ten years, a number of initiatives have focused on the availability and use of effective health IT tools and resources for pediatric care. These have included a number of public-private partnerships including efforts between HHS, State agencies, and health systems for innovative projects that range from care coordination enterprise solutions to immunization information systems and to point of care solutions for specialty needs. In order to learn from and build upon these efforts, ONC has engaged with stakeholders in both the public and private sector including other Federal, State and local government partners, health care providers engaged in the care of children, standards developing PO 00000 Frm 00074 Fmt 4701 Sfmt 4700 organizations, charitable foundations engaged in children’s health care research, and health IT developers supporting pediatric care settings. For example, significant work has been done by the Agency for Healthcare Research and Quality (AHRQ), CMS, the Health Resources and Services Administration (HRSA), and organizations around the Children’s EHR Format (Children’s Format), which is critical to any discussion of the pediatric health IT landscape.69 The Children’s Format was authorized by the 2009 Children’s Health Insurance Program Reauthorization Act (CHIPRA) 70 and developed by AHRQ in close collaboration with CMS. It was developed to bridge the gap between the functionality present in most EHRs currently available and the functionality that could optimally support the care of children. Specifically, the Children’s Format provides information to EHR system developers and others about critical functionality and other requirements that are helpful to include in an EHR system to address health care needs specific to the care of children. The final version of the Children’s Format, released in 2015, consists of 47 high priority functional requirements in 19 topic areas that focus on improvements that would better support the safety and quality of care delivered to children. The Children’s Format was intended as a starting point for developers, users, and purchasers for informing an approach for pediatric voluntary certification. We refer to the Voluntary Edition proposed rule for a description of our prior discussion around the Children’s Format (79 FR 10930). In the summer of 2017, the American Academy of Pediatrics (AAP) reviewed the 2015 Children’s Format using a robust analytical process and engagement with their members. The result was a prioritized list of eight clinical priorities to support pediatric health care (‘‘Priority List’’). In October 2017, we held a technical discussion with stakeholders titled ‘‘Health IT for Pediatrics’’ with the specific purpose of obtaining input from an array of stakeholders in an effort to draw correlations between the pediatric providers’ clinical priorities identified in the Priority List with the detailed 69 Agency for Health Care Information and Technology. Health Information Technology. https:// healthit.ahrq.gov/health-it-tools-and-resources/ childrens-electronic-health-record-ehr-format. Accessed September, 2017. 70 Pub. L. 111–3, section 401 https:// healthit.ahrq.gov/sites/default/files/docs/citation/ children-ehr-format-enhancement-finalrecommendation-report-abridged.pdf. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations technical requirements outlined in the Children’s Format and the capabilities and standards that could be included in certified health IT. Through this collaborative approach, the meeting participants identified a set of priority needs for health IT to support pediatric care based upon those identified by the Priority List and the primary correlation to the Children’s Format. 2. Recommendations for the Voluntary Certification of Health IT for Use in Pediatric Care To support the first part of section 4001(b) of the Cures Act, we considered the historical efforts on the Children’s Format, the input from stakeholders, and our own technical analysis and review of health IT capabilities and standards to develop a set of recommendations for voluntary certification of health information technology for use by pediatric health providers to support the health care of children. These include eight recommendations related to the Priority List: • Recommendation 1: Use biometricspecific norms for growth curves and support growth charts for children • Recommendation 2: Compute weight-based drug dosage • Recommendation 3: Ability to document all guardians and caregivers • Recommendation 4: Segmented access to information • Recommendation 5: Synchronize immunization histories with registries • Recommendation 6: Age- and weight- specific single-dose range checking • Recommendation 7: Transferrable access authority • Recommendation 8: Associate maternal health information and demographics with newborn We also developed two additional recommendations beyond the Priority List, which relate to other items within the Children’s Format that are considered important to pediatric stakeholders. These additional recommendations, which may be supported by certified health IT, are as follows: • Recommendation 9: Track incomplete preventative care opportunities • Recommendation 10: Flag special health care needs In order to implement the second part of section 4001(b) of the Cures Act for the adoption of certification criteria to support the voluntary certification of health IT for use by pediatric health care providers, we identified both the 2015 Edition certification criteria and the new or revised certification criteria VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 proposed in the Proposed Rule that support the 10 recommendations for the voluntary certification of health IT for use by pediatric health providers to support the health care of children. In the Proposed Rule (84 FR 7459), we directed readers to the appendix of the Proposed Rule for a set of technical worksheets, which include a crosswalk of the various criteria specifically associated with each recommendation. These worksheets outlined the following information: • The alignment of each recommendation to the primary Children’s Format 71 item identified by stakeholders • The alignment of each recommendation to the 2015 Edition certification criteria and the new or revised criteria described in the Proposed Rule • Supplemental items from the Children’s Format for each recommendation and the related 2015 Edition certification criteria We also sought comment on the following: 1. Relevant gaps, barriers, safety concerns, and resources (including available best practices, activities, and tools) that may impact or support feasibility of the recommendation in practice. 2. Effective use of health IT itself in support of each recommendation as it relates to provider training, establishing workflows, and other related safety and usability considerations. 3. If any of the 10 recommendations should not be included in ONC’s final recommendations for voluntary certification of health IT for use by pediatric health providers to support the health care of children. 4. Any certification criteria from the Program that is identified for the 10 recommendations that should not be included to support the specific recommendation. Comments. We received many comments asking for detailed guidance and/or implementation specifications post final rulemaking, with one commenter noting that the majority of recommendations require additional capabilities beyond the scope of any aligned existing or proposed certification criteria. We also received many comments providing implementation recommendations specific to the 10 ONC recommendations for the voluntary certification of health IT for use by pediatric health providers such as 71 https://healthit.ahrq.gov/health-it-tools-andresources/childrens-electronic-health-record-ehrformat. PO 00000 Frm 00075 Fmt 4701 Sfmt 4700 25715 adding in developmental activity milestones, including what versions of growth charts should be supported, and including listings to clearly identify medical home providers. Several commenters also referenced concerns regarding the feasibility of implementing the content included as part of the pediatric health IT technical worksheet crosswalk analysis included in the Proposed Rule appendix for Recommendation 5 ‘‘Synchronize immunization histories with registries.’’ In this regard, several commenters noted that FHIR is not currently consistent with CDC/AIRA standards or practices for immunization data submission or query/response, and that public health is not currently funded to provide this capability from IIS. Response. We thank commenters for their useful input regarding the technical worksheets in the appendix we included for the Proposed Rule. As we stated in the Proposed Rule, these comments, and the detailed insights received through stakeholder outreach, will inform the future development of a non-binding informational guide or informational resource to provide useful information for health IT developers and pediatric care providers seeking to successfully implement these health IT solutions in a clinical setting. To facilitate adoption of the ten recommendations, we are developing a Pediatric Health IT Developer Informational Resource and a Pediatric Health IT Provider Informational Resource to be available for respective use in 2020. As such, we appreciate the comments we received specific to implementation recommendations and will take them into account in the support of the creation of non-regulatory informational resources for health IT developers and other stakeholders. We plan to continue working with stakeholders as we further develop and consider technical and implementation recommendations we have received through solicited public comments, the Health Information Technology Advisory Committee (HITAC), and other engagements. We also direct readers to our ‘‘pediatrics health IT’’ web page (www.healthIT.gov/pediatrics) for information on future work pertaining to health IT for pediatric care. Comments. We received several comments suggesting the use of pediatric-focused clinicians and settings to test EHR systems as part of these provisions, specifically recommending that we should require EHR developers to use pediatric-focused scenarios and mock pediatric patients when testing functionality, as well as requiring the E:\FR\FM\01MYR3.SGM 01MYR3 25716 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations inclusion of pediatric clinicians as part of end-user testing. Response. We thank commenters for their input. We agree that it would be beneficial for health IT developers to include pediatric-focused testing of their health IT especially with regards to ensuring patient safety. We note that we have established requirements for real world testing that requires health IT developers to real world test their health IT for the types of setting(s) in which it is intended for use (we refer readers to section VII.B.5 for more information on real world testing Condition and Maintenance of Certification requirements). a. 2015 Edition Certification Criteria In order to implement the second part of section 4001(b) of the Cures Act to adopt certification criteria to support the voluntary certification of health IT for use by pediatric health providers to support the health care of children, we identified the following already adopted 2015 Edition certification criteria in the Proposed Rule that support the recommendations. The already adopted 2015 Edition criteria are as follows: • ‘‘API functionality’’ criteria (§ 170.315(g)(7)–(g)(9)) which address many of the challenges currently faced by patients and by caregivers such as parents or guardians accessing child’s health information, including the ‘‘multiple portal’’ problem, by potentially allowing individuals to aggregate health information from multiple sources in a web or mobile application of their choice. • ‘‘Care plan’’ criterion (§ 170.315(b)(9)) which supports pediatric care by facilitating the documentation of electronic health information in a structured format to improve care coordination (80 FR 62648 and 62649). • ‘‘Clinical decision support’’ (CDS) criterion (§ 170.315(a)(9)) which supports pediatric care by enabling interventions based on the capture of biometric data. • ‘‘Common Clinical Data Set’’ (§ 170.315(b)(4) and § 170.315(b)(5)) which includes optional pediatric vital sign data elements including as optional the reference range/growth curve for three pediatric vital signs—BMI percent per LOINC identifiers for age per sex, weight per length/sex, and head occipital-frontal circumference for children less than three years of age. • ‘‘Data segmentation for privacy’’ send criterion and receive criterion (§ 170.315(b)(7) and § 170.315(b)(8)) which provides the ability to: Create a summary record that is tagged at the document level as restricted and subject VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 to re-disclosure; receive a summary record that is document-level tagged as restricted; separate the document-level tagged document from other documents received; and view the restricted document without having to incorporate any of the data from the document. • ‘‘Demographics’’ criterion (§ 170.315(a)(5)) which supports pediatric care through the capture of values and value sets relevant for the pediatric health care setting as well as allowing for improved patient matching which is a key challenge for pediatric care. • ‘‘Electronic Prescribing’’ criterion (§ 170.315(b)(3)) which includes an optional Structured and Codified Sig Format, which has the capability to exchange weight-based dosing calculations within the NCPDP SCRIPT 10.6 standard and limits the ability to prescribe all oral, liquid medications in only metric standard units of mL (i.e., not cc) important for enabling safe prescribing practices for children. • ‘‘Family health history’’ criterion (§ 170.315(a)(12)) which supports pediatric care because it leverages concepts or expressions for familial conditions, which are especially clinically relevant when caring for children. • ‘‘Patient health information capture’’ criterion (§ 170.315(e)(3)) which supports providers’ ability to accept health information from a patient or authorized representative. This criterion could support pediatric care through documentation of decisionmaking authority of a patient representative. • ‘‘Social, psychological, and behavioral data’’ criterion (§ 170.315(a)(15)) which supports integration of behavioral health data into a child’s record across the care continuum by enabling a user to record, change, and access a patient’s social, psychological, and behavioral data based using SNOMED CT® and LOINC® codes. • ‘‘Transitions of care’’ criterion (§ 170.315(b)(1)) which supports structured transition of care summaries and referral summaries that help ensure the coordination and continuity of health care as children transfer between different clinicians at different health care organizations or different levels of care within the same health care organization. • ‘‘Transmission to immunization registries’’ criterion (§ 170.315(f)(1)) which supports the safe and effective provision of child health care through immunizations and registry linkages. This criterion also provides the ability to request, access, and display the PO 00000 Frm 00076 Fmt 4701 Sfmt 4700 evaluated immunization history and forecast from an immunization registry for a patient. Immunization forecasting recommendations allow for providers to access the most complete and up-to-date information on a patient’s immunization history to inform discussions about what vaccines a patient may need based on nationally recommended immunization recommendations (80 FR 62662 through 62664). • ‘‘View, download, and transmit to 3rd party’’ (VDT) criterion (§ 170.315(e)(1)) which supports transferrable access authority for the pediatric health care setting and provides the ability for patients (and their authorized representatives) 72 to view, download, and transmit their health information to a 3rd party. We noted in the Proposed Rule (84 FR 7460) that some of these criteria may be updated based on proposals contained in the Proposed Rule (see further discussion below on new or revised certification criteria); and stated that we continue to believe that prior to any such updates, technology that is currently available and certified to these 2015 Edition criteria can make a significant impact in supporting providers engaged in the health care of children. We invited readers to use the technical worksheets in the appendix of the Proposed Rule to inform their public comment on the recommendations, the inclusion of specific items from the Children’s Format, and the identified 2015 Edition certification criteria as they relate specifically to use cases for pediatric care and sites of service. b. New or Revised Certification Criteria In order to implement the second part of section 4001(b)(iii) of the Cures Act to adopt certification criteria to support the voluntary certification of health information technology for use by pediatric health providers to support the health care of children, we also identified new or revised 2015 Edition certification criteria (and standards) in the Proposed Rule (84 FR 7460) that support the recommendations. These proposed criteria and standards include: • New API criterion (§ 170.315(g)(10)) which would serve to implement the Cures Act requirement to permit health information to be accessed, exchanged, 72 The VDT criterion includes a ‘‘patientauthorized representative’’ concept that aligns with the use of the term under the EHR Incentive Program. A ‘‘patient-authorized representative’’ is defined as any individual to whom the patient has granted access to their health information (see also 77 FR 13720). However, consent is not needed for minors, for whom existing local, state, or Federal law grants their parents or guardians access (see also 77 FR 13720). E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations and used from APIs without special effort. • New ‘‘DS4P’’ criteria (two for C– CDA ((§ 170.315(b)(12)) and (§ 170.315(b)(13)) and one for FHIR (§ 170.315(g)(11))) that would support a more granular approach to privacy tagging data for health information exchange supported by either the C– CDA or FHIR-based exchange standards. • New electronic prescribing certification criterion (§ 170.315(b)(11)), which would support improved patient safety and prescription accuracy, workflow efficiencies, and increased configurability of systems including functionality that could support pediatric medication management. • USCDI (§ 170.213) and USCDIbased criteria which enables the inclusion of pediatric vital sign data elements, including the reference range/ scale or growth curve for BMI percentile per age and sex, weight for age per length and sex, and head occipitalfrontal circumference. Each of the new or revised certification criteria and standards are further described in other sections of this final rule, including all final actions related to the criteria (some of which are described below in the response to comments). Comments. A majority of comments received supported our recommendations for the voluntary certification of health IT for use by pediatric health providers to support the health care of children along with the alignment with the Children’s Format and 2015 Edition certification criteria. Several commenters suggested that the 10 recommendations should only be the first step and encouraged future development of additional recommendations using the Children’s Format. Commenters were also pleased with the 10 recommendations selected by ONC from the Children’s Format stating that they represent a strong, positive step forward for improving EHRs used in the care of children. Many commenters stated that they support the continued alignment with the 2015 Edition recommendations. Response. We thank commenters for their support and feedback. As such, we have maintained the 10 recommendations for the voluntary certification of health IT for use by pediatric health providers to support the health care of children. We have finalized in this final rule the majority of the aligned proposed new 2015 Edition certification criteria that support the voluntary certification of health IT for use by pediatric health providers, with the exception of the proposed criterion for ‘‘consent management’’ in § 170.315(g)(11) since we did not VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 finalize our proposal for the criterion in this final rule. The functionality of the proposed new ‘‘DS4P’’ criteria have been incorporated into the already adopted 2015 Edition DS4P criteria DS4P-send (§ 170.315(b)(7)) and DS4Preceive (§ 170.315(b)(8)) now referred to as ‘‘Security tags—Summary of Caresend’’ and ‘‘Security tags—Summary of Care—receive,’’ respectively. The functionality of the proposed new e-Rx criterion was also incorporated in the already adopted e-Rx criterion (§ 170.315(b)(3)). Last, we have removed the ‘‘Common Clinical Data Set’’ (§ 170.315(b)(4) and § 170.315(b)(5)) from the 2015 Edition in this final rule. We note that we are aware that the NCPDP SCRIPT Standard Version 2017071 Implementation Guide contains a number of requirements intended to improve accurate dosing and pediatric patient safety. One such requirement is the inclusion of the most recent patient height and weight in the Observation Segment on all new and renewal prescriptions sent from the prescriber to the pharmacy, along with the date associated with these measures, for all patients 18 years old and younger. We are also aware of the challenges that such a requirement may pose on specific providers and under certain circumstances where height and/ or weight is not required or applicable for dosing of the product. We believe additional work must be done on refining this requirement, and will continue to monitor standards and industry advancements before proposing such a requirement. At this time, we recommend vital signs to be included in all electronic prescriptions for all patient populations when available and where applicable. The 10 recommendations and the aligned 2015 Edition certification criteria support the health IT needs of pediatric care providers. We believe further support can be provided through non-regulatory informational resources. These resources can help inform technical and implementation specifications for health IT developers and products for use by pediatric health providers to support the health care of children. We also agree with commenters that the 10 recommendations are a first step and welcome input and collaboration from the health IT industry and health care providers to continue efforts to develop and build a health IT infrastructure supporting pediatric care and other specialty care and sites of service across the continuum. PO 00000 Frm 00077 Fmt 4701 Sfmt 4700 25717 B. Health IT and Opioid Use Disorder Prevention and Treatment—Request for Information We identified a need to explore ways to advance health IT across the care continuum to support efforts to fight the opioid epidemic. For that purpose, in the Proposed Rule, we included a request for information (RFI) related to health IT and opioid use disorder prevention and treatment (84 FR 7461 through 7465). We received over 100 comments in responses to this RFI, which included recommendations from the HITAC. We appreciate the feedback and recommendations provided by commenters and the HITAC taskforce, respectively. We plan to share this feedback with appropriate Department partners. VII. Conditions and Maintenance of Certification Requirements for Health IT Developers Section 4002 of the Cures Act modifies section 3001(c)(5) of the Public Health Service Act (PHSA) to require the Secretary of HHS, through notice and comment rulemaking, to establish Conditions and Maintenance of Certification requirements for the Program. Specifically, health IT developers or entities must adhere to certain Conditions and Maintenance of Certification requirements concerning information blocking; appropriate exchange, access, and use of electronic health information; communications regarding health IT; application programming interfaces (APIs); real world testing; attestations regarding certain Conditions and Maintenance of Certification requirements; and submission of reporting criteria under the EHR Reporting Program under section 3009A(b) of the PHSA. A. Implementation To implement section 4002 of the Cures Act, we proposed an approach whereby the Conditions and Maintenance of Certification requirements express initial certification requirements for health IT developers and their certified Health IT Module(s) as well as ongoing maintenance requirements that must be met by both health IT developers and their certified Health IT Module(s) under the ONC Health IT Certification Program (Program). If these requirements are not met, the health IT developer may no longer be able to participate in the Program and/or its certified health IT may have its certification terminated. We proposed to implement each Condition of Certification requirement with further specificity as it applies to E:\FR\FM\01MYR3.SGM 01MYR3 25718 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations the Program. We also proposed to establish Maintenance of Certification requirements for certain Conditions of Certification requirements as standalone requirements. As we stated in the Proposed Rule, this approach would establish clear baseline technical and behavior Conditions of Certification requirements with evidence that the Conditions of Certification requirements are continually being met through the Maintenance of Certification requirements. Comments. We received comments expressing general support for the concept of requiring Conditions and Maintenance of Certification requirements. Commenters stated that these requirements are a step forward toward promoting transparency, improving usability, and achieving interoperability of health IT. We also received comments asserting that the Conditions and Maintenance of Certification requirements should only apply to developers of certified health IT. Response. We thank commenters for their support. We provide further details on each of the Conditions and Maintenance of Certification requirements within their respective subsections in this section of the final rule. However, to clarify our approach to the Conditions and Maintenance of Certification requirements in response to comments, the Conditions and Maintenance of Certification requirements, except for the ‘‘information blocking’’ and ‘‘assurances’’ Conditions and Maintenance of Certification requirements, apply only to actions and behaviors of health IT developers related to their certified health IT as well as to the certified health IT itself. For the ‘‘information blocking’’ and ‘‘assurances’’ Conditions and Maintenance of Certification requirements, consistent with the Cures Act provisions and our implementation of section 3022(a) (information blocking) of the PHSA, a health IT developer is also responsible to ensure that all of its health IT and related actions and behaviors do not constitute information blocking or inhibit the appropriate access, exchange, and use of electronic health information (EHI). We refer readers to section VIII of this preamble for further discussion of the information blocking regulations. B. Provisions 1. Information Blocking The Cures Act requires that a health IT developer, as a Condition and Maintenance of Certification VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 requirement under the Program, not take any action that constitutes ‘‘information blocking’’ as defined in section 3022(a) of the PHSA (see 3001(c)(5)(D)(i) of the PHSA). We proposed to establish this Information Blocking Condition of Certification in § 170.401. We proposed that the Condition of Certification would prohibit any health IT developer who has at least one health IT product certified under the Program from taking any action that constitutes information blocking as defined by section 3022(a) of the PHSA and proposed in § 171.103. We clarified in the Proposed Rule that this proposed ‘‘information blocking’’ Condition of Certification and its requirements would be substantive requirements of the Program and would rely on the definition of ‘‘information blocking’’ established by section 3022(a) of the PHSA and proposed in § 171.103 (84 FR 7465). We received no comments specifically about the Information Blocking Condition of Certification and have adopted the Condition of Certification as proposed. We received many comments regarding the information blocking provision, and have responded to those comments in the information blocking discussion in section VIII of this preamble. We also refer readers to section VII.D of this final rule for additional discussion of ONC’s enforcement of this and other Conditions and Maintenance of Certification requirements. 2. Assurances The Cures Act requires that a health IT developer, as a Condition and Maintenance of Certification requirement under the Program, provide assurances to the Secretary, unless for legitimate purposes specified by the Secretary, that it will not take any action that constitutes information blocking as defined in section 3022(a) of the PHSA, or any other action that may inhibit the appropriate exchange, access, and use of electronic health information (EHI). We proposed to implement this Condition of Certification and accompanying Maintenance of Certification requirements in § 170.402. As a Condition of Certification requirement, a health IT developer must comply with the Condition of Certification as recited here and in the Cures Act. We discussed in section VIII of the Proposed Rule the proposed reasonable and necessary activities specified by the Secretary, which constitute the exceptions to the information blocking definition. We also proposed to establish more specific Conditions and Maintenance of Certification requirements for a health IT developer to provide assurances that PO 00000 Frm 00078 Fmt 4701 Sfmt 4700 it does not take any action that may inhibit the appropriate exchange, access, and use of EHI. These proposed requirements serve to provide further clarity under the Program as to how health IT developers can provide such broad assurances with more specific actions. Comments. Most commenters agreed with the central premise of our proposal to adopt the ‘‘assurances’’ Condition and Maintenance of Certification requirement, requiring that a health IT developer provide certain assurances to the Secretary, including that, unless done for one of the ‘‘legitimate purposes’’ specified by the Secretary, it will not take any actions that constitutes information blocking as defined in section 3022(a) of the PHSA, or any other action that may inhibit the appropriate exchange, access, and use of electronic health information (EHI). Commenters stated that they support ONC’s efforts to eliminate barriers that result in information blocking. One commenter stated that it is not clear what constitutes ‘‘satisfactory to the Secretary’’ as interpretations may change from Secretary to Secretary, and suggested removing the term ‘‘Secretary.’’ Response. We thank commenters for their support. We have finalized our proposal to adopt the ‘‘assurances’’ Condition and Maintenance of Certification requirement subject to the clarifications and revisions discussed below. In response to the comment recommending we remove the term ‘‘Secretary’’ as Secretaries may change over time, it will not be removed as it is in the authorizing Cures Act statutory language. For clarification, future Secretaries may establish changes to the implementation of the Cures Act ‘‘assurances’’ Condition and Maintenance of Certification requirements through notice and comment rulemaking, as has been done with this rulemaking. a. Full Compliance and Unrestricted Implementation of Certification Criteria Capabilities We proposed, as a Condition of Certification requirement, that a health IT developer must ensure that its health IT certified under the Program conforms to the full scope of the certification criteria to which its health IT is certified. This has always been an expectation of ONC and users of certified health IT and, importantly, a requirement of the Program. As stated in the Proposed Rule, we believe that by incorporating this expectation as an explicit Condition of Certification requirement under the Program, there E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations would be assurances, and documentation via the ‘‘Attestations’’ Condition and Maintenance of Certification requirements proposed in § 170.406, that all health IT developers fully understand their responsibilities under the Program, including not to take any action with their certified health IT that may inhibit the appropriate exchange, access, and use of EHI. To this point, certification criteria are designed and issued so that certified health IT can support interoperability and the appropriate exchange, access, and use of EHI. We also proposed that, as a complementary Condition of Certification requirement, health IT developers of certified health IT must provide an assurance that they have made certified capabilities available in ways that enable them to be implemented and used in production environments for their intended purposes. More specifically, developers would be prohibited from taking any action that could interfere with a user’s ability to access or use certified capabilities for any purpose within the scope of the technology’s certification. Such actions may inhibit the appropriate access, exchange, or use of EHI and are therefore contrary to this proposed Condition of Certification requirement. While such actions are already prohibited under the Program (80 FR 62711), making these existing requirements that prohibit developers from taking any action that could interfere with a user’s ability to access or use certified capabilities for any purpose within the scope of the technology’s certification explicit in this Condition of Certification requirement will ensure that health IT developers are required to attest to them pursuant to the Attestations Condition of Certification requirement in § 170.406, which will in turn provide additional assurances to the Secretary that developers of certified health IT support and do not inhibit appropriate access, exchange, or use of EHI. As discussed at 84 FR 7466 in our Proposed Rule, actions that would violate this Condition of Certification requirement include failing to fully deploy or enable certified capabilities; imposing limitations (including restrictions) on the use of certified capabilities once deployed; or requiring subsequent developer assistance to enable the use of certified capabilities, contrary to the intended uses and outcomes of those capabilities). The Condition of Certification requirement would also be violated were a developer to refuse to provide documentation, support, or other assistance reasonably VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 necessary to enable the use of certified capabilities for their intended purposes. More generally, any action that would be likely to substantially impair the ability of one or more users (or prospective users) to implement or use certified capabilities for any purpose within the scope of applicable certification criteria would be prohibited by this Condition of Certification requirement. Such actions may include imposing limitations or additional types of costs, especially if these were not disclosed when a customer purchased or licensed the certified health IT. Comments. We received a comment recommending additional language to allow health IT developers to be able to provide an explanation of how their software conforms to the certification criteria requirements and how they enable the appropriate exchange, access, and use of EHI. Response. We thank the commenter for their input, but do not accept the recommendation. Health IT must comply with certification criteria as specified in regulation. We also refer readers to the ‘‘Attestations’’ Condition of Certification requirement in this section of the preamble for more information regarding how we proposed to provide flexibilities, including a method for health IT developers to indicate their compliance, noncompliance, or the inapplicability of each Condition and Maintenance of Certification requirement as it applies to all of their health IT certified under the Program, as well as the flexibility to specify noncompliance per certified Health IT Module, if necessary. As such, we have finalized the Full Compliance and Unrestricted Implementation of Certification Criteria Capabilities Condition of Certification requirement as proposed that a health IT developer must ensure that its health IT certified under the Program conforms to the full scope of the certification criteria to which its health IT is certified, and that health IT developers would be prohibited from taking any action that could interfere with a user’s ability to access or use certified capabilities for any purpose within the scope of the technology’s certification. We note that because compliance with the information blocking section of this final rule (Part 171) is not required until six months after the publication date of the final rule, § 170.402(a)(1) also has a six-month delayed compliance date. Comments. A couple of commenters requested clarification on whether requiring subsequent developer assistance to enable the use of certain certified capabilities would be PO 00000 Frm 00079 Fmt 4701 Sfmt 4700 25719 considered noncompliance with the Condition of Certification requirement, such as managed services, hosting, connecting with exchange networks, or outsourced arrangements under agreement. Response. We clarify that the purpose of this Condition of Certification requirement is to make certified capabilities available in ways that enable them to be implemented and used in production environments for their intended purposes. As stated above, the Condition of Certification requirement would be violated were a developer to refuse to provide documentation, support, or other assistance reasonably necessary to enable the use of certified capabilities for their intended purposes (see 84 FR 7466). We do not believe that actions by health IT developers to provide their customers with education, implementation, and connection assistance to integrate certified capabilities for their customers would typically constitute actions that interfere with a customer’s ability to use certified capabilities for their intended purposes, but in the absence of specific facts, we cannot say that whether there are scenarios that would result in the assistance interfering with a user’s ability to access or use certified capabilities for any purpose within the scope of the health IT’s certification. As such, education and other assistance may be offered, but care should be taken to do so in a manner that minds the Condition of Certification requirement standards. Comments. We received a comment asking that health IT developers be required to provide honest communication and expert advice as required by a user. Response. We appreciate the commenter’s suggestion regarding honest communication and expert advice. However, such a requirement would not be consistent with this Condition of Certification requirement, which focuses on assurances that Health IT developers did not take actions that may inhibit the appropriate exchange, access, and use of electronic health information (EHI). We also believe it would be difficult to enforce such a requirement in terms of determining what constitutes an ‘‘honest’’ communication and ‘‘expert advice.’’ b. Certification to the ‘‘Electronic Health Information Export’’ Criterion We proposed that a health IT developer that produces and electronically manages EHI must certify their health IT to the 2015 Edition ‘‘EHI export’’ criterion in § 170.315(b)(10). As E:\FR\FM\01MYR3.SGM 01MYR3 25720 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations a Maintenance of Certification requirement, we proposed that a health IT developer that produces and electronically manages EHI must provide all of its customers of certified health IT Modules with health IT certified to the functionality included in § 170.315(b)(10) within 24 months of a subsequent final rule’s effective date or within 12 months of certification for a health IT developer that never previously certified health IT to the 2015 Edition, whichever is longer. Consistent with these proposals, we also proposed to amend § 170.550 to require that ONC–ACBs certify health IT to the proposed 2015 Edition ‘‘EHI export’’ certification criterion when the health IT developer of the health IT Module presented for certification produces and electronically manages EHI. As discussed in section IV.C.1 of the Proposed Rule, the availability of the capabilities in the ‘‘EHI export’’ certification criterion promote access, exchange, and use of health information to facilitate electronic access to single patient and patient population health information in cases such as a patient requesting their information, or a health care provider switching health IT systems. As such, health IT developers with health IT products that have health IT Modules certified to the finalized ‘‘EHI export’’ certification requirement must make this functionality available to customers and provide assurances that the developer is not taking actions that constitute information blocking or any other action that may inhibit the appropriate exchange, access, and use of health information. We discussed the EHI export functionality in section IV.B.4 of the Proposed Rule. Comments. A couple of commenters expressed their support for the Condition of Certification requirement, noting that certifying health IT to § 170.315(b)(10) would provide greater EHI access to end users. Several commenters requested extending the implementation timeframe to 36 months stating that more time is needed for analysis, product development, and testing, with an additional 12 months for client adoption, testing, and training. A couple of commenters supported the 24-month timeframe, but stated that they did not support ONC dictating the adoption schedule for providers, and that the proposal does not consider the efforts required from providers to plan and execute effective implementation and adoption. One commenter stated that 24 months is not aggressive enough and that the rule should prioritize certain aspects of patient-directed exchange and make these available in 12 VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 months or less. Another commenter suggested that we narrow the type of health IT developer that must certify health IT to § 170.315(b)(10), noting that some Health IT Modules may manage data produced by other Health IT Modules, or received and incorporated from other sources. We did not receive any comments specific to our proposal to amend § 170.550 to require that ONC–ACBs certify health IT to the proposed 2015 Edition ‘‘EHI export’’ criterion when the health IT developer of the health IT Module presented for certification produces and electronically manages EHI. Response. We thank the commenters for their support. In response to comments regarding scope of data export under this criterion, we have modified the proposed ‘‘EHI export’’ certification criterion and scope of data export. In doing so, we have also revised our Condition of Certification requirement, which we have finalized in § 170.402(a)(4), that a health IT developer of a certified Health IT Module that is part of a health IT product which electronically stores EHI must certify to the certification criterion in § 170.315(b)(10). Additionally, we clarify that in attesting to § 170.406, a health IT developer must attest accurately in accordance with § 170.402(a)(4) and (b)(2) if the health IT developer certified a Health IT Module(s) that is part of a health IT product which can store EHI. The finalized criterion focuses on the Health IT Module’s ability to export EHI for the health IT product’s single and patient population, which encompasses the EHI that can be stored at the time of certification by the product, of which the Health IT Module is a part. To note, we do not require developers to disclose proprietary information about their products. Also, as clarified above and in § 170.315(b)(10)(iii), we do not require any specific standards for the export format(s) used to support the export functionality. In regards to when health IT developers must provide all of their users of certified health IT with health IT certified to the functionality included in § 170.315(b)(10), we have removed the proposed language ‘‘within 12 months of certification for a health IT developer that never previously certified health IT to the 2015 Edition, whichever is longer.’’ Our intention was to provide equity between existing and new health IT developers. However, we have concluded that new health IT developers will not be at a disadvantage to meet the same timeline considering all health IT developers will be aware of requirements necessary for certification PO 00000 Frm 00080 Fmt 4701 Sfmt 4700 when this final rule is published. We also acknowledge the concerns expressed regarding the 24-month timeframe and have extended the compliance timeline to within 36 months of the final rule’s publication date, as finalized in § 170.402(b)(2)(i). With the narrowed scope of data export for the criterion, we believe health IT developers should be able to provide all of their customers of Health IT Modules certified to § 170.315(b)(10) with the export functionality included in § 170.315(b)(10) within 36 months. We have also finalized in § 170.402(b)(2)(ii) that on and after 36 months from the publication of this final rule, health IT developers that must comply with the requirements of § 170.402(a)(4) must provide all of their customers of certified health IT with health IT certified to § 170.315(b)(10). From this milestone forward, a health IT developer’s participation in the Certification Program obligates them to provide the technical capabilities expressed in § 170.315(b)(10) when they provide such certified health IT to their customers. We will monitor ongoing compliance with this Condition and Maintenance of Certification through a variety of means including, but not limited to, developer attestations pursuant to § 170.406, health IT developers real world testing plans, response to user complaints, and ONC– ACB surveillance activities. Consistent with the above revisions and in alignment with our proposal to amend § 170.550, we have also amended § 170.550(g)(5) regarding Health IT Module dependent criteria for consistency with the requirements of § 170.402(a)(4) and (b)(2) when a Health IT Module presented for certification is part of a health IT product which can store electronic health information. In addition, we have amended § 170.550(m)(2) to only allow ONC– ACBs to issue certifications to § 170.315(b)(6) until 36 months after the publication date of this final rule. Thus, ONC–ACBs may issue certificates for either § 170.315(b)(6) or (b)(10) up until 36 months after the publication date of this final rule, but on and after 36 months they may only issue certificates for Health IT Modules in accordance with § 170.315(b)(10). We note that ONC–ACBs are required by their ISO/ IEC 17065 accreditation to have processes in place to meet the expectations and minimum requirements of the Program. Thus, ONC–ACBs are expected to have processes in place in order to effectively monitor these timeline requirements on and after 36 months after the E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations publication of this rule, and to additionally ensure that the health IT developer attests accurately to § 170.402(a)(4) and (b)(2). Should a developer fail to comply, the ONC–ACB will follow its processes to institute corrective action and report to ONC in accordance with Program reporting requirements in 45 CFR 170.523(f)(1)(xxii). In the event the developer does not follow through with the corrective action plan established and approved with the ONC–ACB, the ONC–ACB must alert ONC of the health IT developer’s failure to comply with the Conditions and Maintenance of Certification requirements. Comments. A commenter requested ONC add functionality to the CHPL (or in another format) that provides a list of the start and end dates of each previously certified Health IT Module. Response. We appreciate this suggestion and note that the CHPL already lists certification dates for certified Health IT Modules, including the dates the Health IT Module was last modified, decertified, or made inactive. c. Records and Information Retention We proposed that, as a Maintenance of Certification requirement in § 170.402(b)(1), a health IT developer must, for a period of 10 years beginning from the date of certification, retain all records and information necessary to demonstrate initial and ongoing compliance with the requirements of the Program. In other words, records and information should be retained starting from the date a developer first certifies health IT under the Program and applies separately to each unique Health IT Module (or Complete EHR, as applicable) certified under the Program. This retention of records is necessary to verify health IT developer compliance with Program requirements, including certification criteria and Conditions and Maintenance of Certification requirements. As stated in the Proposed Rule, 10 years is an appropriate period of time given that many users of certified health IT participate in various CMS programs, as well as other programs, that require similar periods of records retention. In an effort to reduce administrative burden, we also proposed, that in situations where applicable certification criteria are removed from the Code of Federal Regulations before the 10 years have expired, records must only be kept for 3 years from the date of removal for those certification criteria and related Program provisions unless that timeframe would exceed the overall 10year retention period. This ‘‘3-year from the date of removal’’ records retention VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 period also aligns with the records retention requirements for ONC–ACBs and ONC–ATLs under the Program. We encouraged comment on these proposals and whether the proposed requirements can provide adequate assurances that certified health IT developers are demonstrating initial and ongoing compliance with the requirements of the Program; and thereby ensuring that certified health IT can support interoperability, and appropriate exchange, access, and use of EHI. Comments. Some commenters requested clarification on what records and information are expected to be maintained and how this is different from the records ONC–ACBs and ONC– ATLs retain. A couple commenters requested clarification on when the records and information retention requirement would take effect. One commenter requested clarification regarding the role of health IT developers that no longer maintain a certified Health IT Module or have their certification suspended. One commenter recommended setting a retention period for record keeping in the event that a health IT developer removes a Health IT Module from market to ensure that potentially short lived Health IT Modules would inadvertently not have their documentation maintained. Response. We have adopted our proposal in § 170.402(b)(1) without revisions. We continue to believe that 10 years is an appropriate period of time given that many users of certified health IT participate in various CMS programs, as well as other programs, that require similar periods of records retention. We also finalized that in situations where applicable certification criteria are removed from the Code of Federal Regulations, records must only be kept for 3 years from the date of removal for those certification criteria and related Program provisions unless that timeframe would exceed the overall 10year retention period. We clarify that health IT developers are best situated to determine what records and information in their possession would demonstrate their compliance with all of the relevant Program requirements. We note that it is our understanding that health IT developers are already retaining the majority of their records and information for the purposes of ONC– ACB surveillance and ONC direct review under the Program. We also refer readers to section VII.D of this final rule preamble for additional discussion of records necessary for the enforcement of the Conditions and Maintenance of Certification requirements. In regard to the requested clarification for the role of PO 00000 Frm 00081 Fmt 4701 Sfmt 4700 25721 health IT developers that no longer maintain a certified Health IT Module or have their certification suspended, a health IT developer who does not have any certified Health IT Modules within the Program would no longer have any obligation to retain records and information for the purposes of the Program. However, we note that it may be in the health IT developer’s best interest to retain their records and information. For example, records may be useful for health IT developers in any potential investigation or enforcement action taken outside of the ONC Health IT Certification Program such as by the HHS Office of the Inspector General (e.g., information blocking) or the U.S. Department of Justice (e.g., False Claims Act). d. Trusted Exchange Framework and the Common Agreement—Request for Information In the Proposed Rule, we included a Request for Information (RFI) as to whether certain health IT developers should be required to participate in the Trusted Exchange Framework and Common Agreement (TEFCA) as a means of providing assurances to their customers and ONC that they are not taking actions that constitute information blocking or any other action that may inhibit the appropriate exchange, access, and use of EHI. We received 40 comments on this RFI. We appreciate the input provided by commenters and may consider them to inform a future rulemaking. 3. Communications The Cures Act requires that a health IT developer, as a Condition and Maintenance of Certification requirement under the Program, does not prohibit or restrict communication regarding the following subjects: • The usability of the health information technology; • The interoperability of the health information technology; • The security of the health information technology; • Relevant information regarding users’ experiences when using the health information technology; • The business practices of developers of health information technology related to exchanging electronic health information; and • The manner in which a user of the health information technology has used such technology. The Cures Act established the broad communications protections delineated above (referred to hereafter as ‘‘protected communications’’) and we proposed in 84 FR 7467 to implement E:\FR\FM\01MYR3.SGM 01MYR3 25722 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations this general prohibition against developers imposing prohibitions and restrictions on protected communications in § 170.403. We also recognized that there are circumstances where it is both legitimate and reasonable for developers to limit the sharing of information about their health IT. As such, we proposed to allow developers to impose prohibitions or restrictions on protected communications in certain narrowly defined circumstances. In order for a prohibition or restriction on a protected communication to be permitted, we proposed in 84 FR 7467 that it must pass a two-part test. First, the communication that is being prohibited or restricted must not fall within a class of communications (hereafter referred to as ‘‘communications with unqualified protection’’) that is considered to always be legitimate or reasonable—such as communications required by law, made to a government agency, or made to a defined category of safety organizations. Second, to be permitted, a developer’s prohibition or restriction on communications must also fall within a category of communications (hereafter referred to as ‘‘permitted prohibitions and restrictions’’) for which it is both legitimate and reasonable for a developer to limit the sharing of information about its health IT. This would be because of the nature of the relationship between the developer and the communicator or because of the nature of the information that is, or could be, the subject of the communication. We proposed that a developer’s restriction or prohibition that does not satisfy this two-part test would contravene the Communications Condition of Certification requirement. We note that this two-part test strikes a reasonable balance between the need to promote open communication about health IT and related business practices, and the need to protect the legitimate interests of health IT developers and other entities. Comments. The majority of public comments we received supported the proposed Communications Condition of Certification requirements, with many commenters expressing strong support. Commenters stated that the proposed requirements would enable better communication that would improve health IT and patient care. Some commenters who supported the proposed requirements sought clarification or had specific concerns, including regarding the proposed deadlines for contract modification. These matters are discussed in more detail below. Additionally, a handful of public comments strongly opposed the VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 proposed requirements, primarily based on concerns regarding intellectual property (IP). Response. We appreciate the overall strong support for the Communications Condition of Certification requirements as proposed and have finalized with modifications in § 170.403. We also recognize the need to provide clarification regarding some aspects of the requirements, including regarding the protections available for IP that are included in the Communications Condition and Maintenance of Certification requirements. We emphasize that, under section 3001(c)(5) of the PHSA, participation in the ONC Health IT Certification Program (Program) is voluntary. In other words, ONC cannot compel health IT developers to participate in the Program nor can ONC impose consequences (e.g., enforcement actions or penalties) on health IT developers who choose not to participate in the Program. The requirements of the Program are much like requirements for any other voluntary contract or agreement an entity would enter into with the Federal Government. Through the Conditions and Maintenance of Certification requirements, we have essentially offered developers terms for participation in the Program that we believe are appropriate based on: Our statutory instruction and interpretation of the Cures Act; the utility and necessity of using intellectual property, including screenshots, to communicate issues with usability, user experience, interoperability, security, or the way the technology is used (and relatedly, the real and substantial threat to public health and safety resulting from prohibitions and/or restrictions on the communication of screenshots); and the measured approach we have taken throughout the Communications Condition and Maintenance of Certification requirements (which is discussed in detail in this section). Because the Program is voluntary, developers have the option to agree to the terms we have offered or to choose not to participate in the Program. As such, we believe our policies concerning intellectual property, including the use of screenshots, are consistent with other laws and regulations that govern terms for voluntary contracts and agreements with the Federal Government. Further, we believe that the final provisions of this Condition of Certification include appropriate consideration of health IT developers’ intellectual property rights. We further discuss the various aspects of the Communications Condition of Certification requirements, as well as PO 00000 Frm 00082 Fmt 4701 Sfmt 4700 the changes we have made to our proposals, in more detail below. a. Background and Purpose The Communications Condition of Certification requirements address industry practices of certified health IT developers that can severely limit the ability and willingness of health IT customers, users, researchers, and other stakeholders to openly discuss and share their experiences and other relevant information about health IT performance, including about the ability of health IT to exchange health information electronically. These practices result in a lack of transparency that can contribute to and exacerbate patient safety risks, system security vulnerabilities, and health IT performance issues. We explained in the Proposed Rule that the challenges presented by health IT developer actions that prohibit or restrict communications have been examined for some time. The problem was identified in a 2012 report by the Institute of Medicine of the National Academies (IOM) entitled ‘‘Health IT and Patient Safety: Building Safer Systems for Better Care’’ 73 (IOM Report). The IOM Report stated that health care providers, researchers, consumer groups, and other health IT users lack information regarding the functionality of health IT.74 The IOM Report observed, relatedly, that many developers restrict the information that users can communicate about developers’ health IT through nondisclosure clauses, confidentiality clauses, IP protections, hold-harmless clauses, and other boilerplate contract language.75 The report stressed the need for health IT developers to enable the free exchange of information regarding the experience of using their health IT, including the sharing of screenshots relating to patient safety.76 Concerns have also been raised by researchers studying health IT,77 who emphasize that confidentiality and IP provisions in contracts often place broad and unclear limits on authorized uses of information related to health IT, 73 IOM (Institute of Medicine), Health IT and Patient Safety: Building Safer Systems for Better Care (2012). Available at https:// www.nationalacademies.org/hmd/Reports/2011/ Health-IT-and-Patient-Safety-Building-SaferSystems-for-Better-Care.aspx. 74 Id. at 37. 75 Id. at 36, 128. 76 Id. 77 See Hardeep Singh, David C. Classen, and Dean F. Sittig, Creating an Oversight Infrastructure for Electronic Health Record-Related Patient Safety Hazards, 7(4) Journal of Patient Safety 169 (2011). Available at https://www.ncbi.nlm.nih.gov/pmc/ articles/PMC3677059/. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations which in turn seriously impact the ability of researchers to conduct and publish their research.78 The issue of health IT developers prohibiting or restricting communications about health IT has been the subject of a series of hearings by the Senate Committee on Health, Education, Labor and Pensions (HELP Committee), starting in the spring of 2015. Senators on the HELP Committee expressed serious concern regarding the reported efforts of health IT developers to restrict, by contract and other means, communications regarding user experience, including information relevant to safety and interoperability.79 Developer actions that prohibit or restrict communications about health IT have also been the subject of investigative reporting.80 A September 2015 report examined eleven contracts between health systems and major health IT developers and found that, with one exception, all of the contracts protected large amounts of information from being disclosed, including information related to safety and performance issues.81 b. Condition of Certification Requirements i. Protected Communications and Communicators We proposed in 84 FR 7468 that the protection afforded to communicators under the requirements of the Communications Condition of Certification in § 170.403(a) would apply irrespective of the form or medium in which the communication is made. We proposed in 84 FR 7468 that developers must not prohibit or restrict communications whether written, oral, electronic, or by any other method if they are protected, unless such prohibition or restriction is otherwise permitted by the requirements of this Condition of Certification. Similarly, we proposed that these Condition of Certification requirements do not impose any limit on the identity of the communicators that are able to benefit from the protection afforded, except that employees and contractors of a health IT developer may be treated differently 78 Kathy Kenyon, Overcoming Contractual Barriers to EHR Research, Health Affairs Blog (October 14, 2015). Available at https://healthaffairs. org/blog/2015/10/14/overcoming-contractualbarriers-to-ehr-research/. 79 Senate HELP Committee Hearing at 13 and 27 (July 23, 2015), available at https:// www.help.senate.gov/hearings/achieving-thepromise-of-health-information-technologyinformation-blocking-and-potential-solutions. 80 D. Tahir, POLITICO Investigation: EHR gag clauses exist—and, critics say, threaten safety, Politico, August 27, 2015. 81 Id. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 when making communications that are not afforded unqualified protection under § 170.403(a)(2)(i). For example, we proposed that this Condition of Certification’s requirements are not limited to communications by health IT customers (e.g., providers) who have contracts with health IT developers. Comments. Many commenters addressed the scope of protected communications in their comments. Several commenters suggested that the proposed scope of protected communications was too broad. Other commenters stated that the scope should be clarified. One commenter suggested that the scope of private communications that can be shared should be limited and that ONC should require mutual consent for such communications to be made public. Response. We appreciate these comments. The Cures Act identifies a list of subject areas about which health IT developers cannot prohibit or restrict communications to meet the conditions for certification. The terms we proposed for the protected subject areas are taken from the language in section 4002 of the Cures Act and include: • The usability of the health information technology; • The interoperability of the health information technology; • The security of the health information technology; • Relevant information regarding users’ experiences when using the health information technology; • The business practices of developers of health information technology related to exchanging electronic health information; and • The manner in which a user of the health information technology has used such technology. We continue to interpret the above statutory terms broadly, but within the limiting framework we proposed, which includes a distinction between communications entitled to unqualified protections and those communications not entitled to such protection. We have, however, finalized some provisions with further limiting and clarifying language as well as provided examples to improve understanding of the provisions. We decline to create a consent requirement as part of the requirements of this Condition of Certification because such a requirement could unnecessarily encumber vital communications protected by the Cures Act. As highlighted above, the Communications Condition of Certification requirements are intended to enable unencumbered communication about usability, PO 00000 Frm 00083 Fmt 4701 Sfmt 4700 25723 interoperability, and other critical issues with health IT, and a consent requirement would chill the ability of users of health IT to engage in that communication as well as be contrary to section 4002 of the Cures Act. Comments. One commenter stated that the Communications Condition of Certification requirements should apply only to certified health IT, recommending that ONC clarify that the use of ‘‘the health IT’’ refers only to the developer’s health IT that is certified under the ONC Health IT Certification Program. The commenter stated that the use of ‘‘the health IT’’ in the Cures Act can only be reasonably interpreted as referring to the health IT for which a developer is seeking certification, not all of the developer’s health IT. Another commenter stated that other health IT, such as billing systems, should be out of scope of this requirement and noted that to do otherwise would create a regulatory imbalance between developers of such health IT who also offer certified health IT and those who do not. Response. We appreciate these comments regarding restricting the applicability of the Communications Condition of Certification requirements to certified health IT. We clarify that, as with all of the Conditions of Certification requirements, the Communications Condition of Certification requirements apply to developers of health IT certified under the Program and to the conduct of such developers with respect to health IT certified under the Program. By way of example, if a developer had health IT certified under the Program and also had health IT that was not certified under the Program, then only those communications about the certified health IT would be covered by the Communications Condition of Certification requirements. Comments. We received one comment requesting more specificity on the definition of communicators covered by the Communications Condition of Certification requirements. The commenter expressed concern that the broad scope could impact the ability to maintain confidentiality in traditional business-to-business relationships. Response. We appreciate this comment and understand the concern noted by the commenter. As stated in the Proposed Rule and finalized in § 170.403, the Communications Condition and Maintenance of Certification requirements generally do not impose any limit on the identity of communicators that are able to benefit from the protection afforded. We also note that there are limited exceptions E:\FR\FM\01MYR3.SGM 01MYR3 25724 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations where communications by certain communicators can be restricted. Specifically, as finalized in § 170.403(a)(2)(ii)(A), health IT developers can place limited restrictions on communications by employees and contractors. We believe this will enable traditional business-to-business relationships to continue without undue disruption, including allowing implementation of non-disclosure agreements or other contracts as necessary to maintain confidentiality. ii. Protected Subject Areas Comments. We received several comments requesting that we clarify how the Communications Condition of Certification requirements would apply to communications regarding public health reporting, including communications made by public health authorities. Response. We emphasize that the Cures Act identified a list of subject areas about which we were required to forbid developers from prohibiting or restricting communications. Though public health reporting was not specifically covered by the Cures Act or our proposed regulations, it may be that certain public health communications will fall within the categories established by the statute. We also note that one of the ‘‘communications with unqualified protection’’ discussed later in this section is for communicating information about adverse events, hazards, and other unsafe conditions to government agencies, health care accreditation organizations, and patient safety organizations. Depending on the specific communication in question, a communication about public health reporting or a communication made to public health authorities could be a communication that could not be restricted in any way. We also emphasize that, subject to limited circumstances already discussed above, we do not impose any limit on the identity of the communicators that are able to benefit from protections afforded under the Communications Condition of Certification requirements. Communicators are broadly defined and could include public health agencies and authorities. Comments. Several commenters had concerns regarding how a developer may address communications that contain false claims or libelous statements. Commenters discussed the need to enable health IT developers to— for example—refute false claims, deal with anonymous claims, and restrict certain communications (such as false statements or communications protected by attorney-client privilege). Some of VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 these comments emphasized that false communications such as libel should not be protected, nor should communications sent by someone who obtained them illegally, such as a hacker. Some of the commenters recommended adding a category of communications that would never be protected under the proposed framework, and such communications would not receive unqualified protection or necessitate permitted restrictions. This would allow a developer to—for example—prohibit or restrict communications that are false or deceptive, would violate a law or court order, or would result in a breach of contract. Response. We appreciate the concerns expressed by commenters regarding statements that may be false or misleading. However, developers already have legal means and remedies available to them to address such statements, and this rule does not change that. For example, each State has libel laws that address libelous or defamatory statements and provide remedies in situations where the specific facts in a damaging statement can be proven to be untrue. We believe that such statements are best addressed through those laws and that it is neither prudent nor practical for ONC to use the Program and the Communications Condition of Certification requirements to attempt to assess such statements and make determinations as to their veracity. Further, we note that the Communications Condition of Certification requirements only provide that such protected communications cannot be restricted or prohibited. It is up to the health IT developer whether and how they choose to respond to the protected communication once made. Therefore, we clarify that it is not a violation of the Communications Condition of Certification requirements for developers to respond to false or unlawful comments under applicable law, as they do now, and to pursue litigation or any other available legal remedy in response to any protected communications that are covered by the Communications Condition of Certification. For example, it would not be a violation of the Communications Condition of Certification for a health IT developer who restricts the communication of screenshots as permitted under § 170.403(a)(2)(ii)(D) to pursue litigation for Copyright infringement or violation of contract if a ‘‘protected communication’’ disclosed more screenshots than the developer’s restriction allowed. PO 00000 Frm 00084 Fmt 4701 Sfmt 4700 Comments. Several commenters requested that ‘‘safety’’ be added as a protected category or that ONC should include in the final rule a specific ban that prohibits any restrictions on communications about health IT-related patient safety. Additionally, several commenters noted that ONC should include specific reporting methods or standards in the final rule to improve safety reporting or add examples to help encourage reporting of safety and security issues. Several commenters also requested that ONC develop protocols for reporting safety issues, and one commenter recommended ONC develop a patient safety reporting system. Response. In implementing the Cures Act requirement that a health IT developer, as a Condition of Certification requirement under the Program, not restrict communications about health IT, we adhered to the list of protected subject areas identified by Congress in the Cures Act. Those subject areas include communications about ‘‘usability,’’ ‘‘relevant information regarding users’ experiences when using the health information technology,’’ and the ‘‘manner in which a user of the health information technology has used such technology.’’ We clarify that patient safety issues related to an interaction with the health IT could be covered in one or more of those categories. Additionally, we agree with commenters that safety-related communications should receive specific protections, and we emphasize that the communication of safety concerns is also addressed as a protected communication receiving ‘‘unqualified protection.’’ In the section of this final rule on ‘‘Communications with Unqualified Protection,’’ and in § 170.403(a)(2)(i)(B), we state that communicating information about adverse events, hazards, and other unsafe conditions to government agencies, health care accreditation organizations, and patient safety organizations is a communication about which a developer would be prohibited from imposing any prohibition or restriction. (A) Usability of Health Information Technology The term ‘‘usability’’ is not defined in the Cures Act, nor in any other relevant statutory provisions. We proposed in 84 FR 7469 that the ‘‘usability’’ of health IT be construed broadly to include both an overall judgment on the ‘‘usability’’ of a particular certified health IT product by the user, as well as any factor that contributes or may contribute to usability. We proposed that the factors of usability that could be the subject of E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations protected communications include, but are not limited to, the following: The user interface (e.g., what a user sees on the screen, such as layout, controls, graphics and navigational elements); ease of use (e.g., how many clicks); how the technology supports users’ workflows; the organization of information; cognitive burden; cognitive support; error tolerance; clinical decision support; alerts; error handling; customizability; use of templates; mandatory data elements; the use of text fields; and customer support. Comments. One commenter stated that ‘‘usability’’ is too broadly defined and should relate more specifically to judgments on the ease of use of the health IT, rather than factors related to usability. Response. We do not believe that ‘‘usability’’ is inaccurately defined nor too broadly defined. To define usability in the Proposed Rule, we referenced the NIST standard 82 as well as principles recognized by the Healthcare Information and Management Systems Society (HIMSS). We also emphasized that there are a multitude of factors that contribute to any judgment about ‘‘usability,’’ including factors contributing to the effectiveness, efficiency, and performance of the health IT. We have finalized the scope of the protected subject area ‘‘usability of its health IT’’ in § 170.403(a)(1)(i) as proposed, providing that the ‘‘usability’’ of health IT be construed broadly to include both an overall judgment on the ‘‘usability’’ of a particular certified health IT product, as well as any of the many factors that could contribute to usability as described in the Proposed Rule. We also note that communications about the usability of health IT may include communications about features that are part of the certified health IT as well as communications about what is not in the certified health IT (e.g., the absence of alerts or features that a user believes would aid in usability or are related to the other subject areas identified by the Cures Act). (B) Interoperability of Health Information Technology The Cures Act, as codified in section 3000(9) of the PHSA, provides a definition of ‘‘interoperability’’ that describes a type of health IT that demonstrates the necessary capabilities to be interoperable. For the purposes of the Communications Condition of Certification requirements, we proposed that protected communications regarding the ‘‘interoperability of health IT’’ would include communications about whether certified health IT and associated developer business practices meet the interoperability definition described in section 3000(9) of the PHSA, including communications about aspects of the technology or developer that fall short of the expectations found in that definition. We stated that this would include communications about the interoperability capabilities of health IT and the practices of a health IT developer that may inhibit the access, exchange, or use of EHI, including information blocking. As previously noted, Congress did not define the terms used in the Communications Conditions of Certification requirements in section 4002(a) of the Cures Act and codified in section 3001(c)(5)(D)(iii) of the PHSA. We believe that ‘‘interoperability’’ was appropriately defined in the Proposed Rule by using the interoperability definition that is located elsewhere in section 4003(a)(2) of the Cures Act and codified in section 3000(9) of the PHSA. We did not receive comments about this aspect of the Proposed Rule, and we have finalized the scope of the protected subject area ‘‘interoperability of its health IT’’ in § 170.403(a)(1)(ii) as proposed above. (C) Security of Health IT The security of health IT is addressed by the HIPAA Security Rule,83 which establishes national standards to protect individuals’ electronic protected health information (ePHI) that is created, received, maintained, or transmitted by a covered entity or business associate (as defined at 45 CFR 160.103). Covered entities and business associates must ensure the confidentiality, integrity, and availability of all ePHI; protect against any reasonably anticipated threats or hazards to the security or integrity of such information; and protect against any reasonably anticipated uses or disclosures of such information that are not permitted or required under the HIPAA Privacy Rule.84 The HIPAA Security Rule requires health IT developers, to the extent that they are business associates of covered entities, to implement appropriate administrative, physical, and technical safeguards to ensure the confidentiality, integrity, and availability of ePHI.85 We proposed in 84 FR 7469 that the matters that fall within the topic of health IT security should be broadly construed to include any safeguards, whether or not 83 45 84 45 82 See https://www.nist.gov/programs-projects/ health-it-usability. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 CFR part 160 and subparts A and C of part 164. CFR part 160 and subparts A and C of part 164. 85 Id. PO 00000 Frm 00085 Fmt 4701 Sfmt 4700 25725 required by the HIPAA Security Rule, that may be implemented (or not implemented) by a developer to ensure the confidentiality, integrity, and availability of EHI (information that includes ePHI), together with the certified health IT’s performance regarding security. Comments. One commenter noted that it is important that developers are able to remove posts on a website or forum that could compromise the security of health IT and recommended that ONC explicitly allow developers to do so in the final rule. Response. We recognize the importance of protecting the security of EHI and health IT. We also recognize that our engagement with stakeholders, as well as the language in section 4002 of the Cures Act, emphasize the strong public interest in allowing unencumbered communications regarding the protected subject areas and communications with unqualified protection, which are discussed in more detail below and in § 170.403(a)(2)(i). We emphasize that developers may respond to communications as allowed under applicable law and may pursue any appropriate legal remedy. Taking these factors into consideration, we decline at this time to explicitly allow developers to restrict communications regarding security as suggested by the commenter. Comments. One commenter requested that ONC consider narrowing the permitted communication of security elements in § 170.403(a)(1)(iii) that might be used to compromise a particular certified health IT’s security, for example restricting the sharing of authentication credentials issued to a customer or user to access a system containing sensitive information such as PHI. Response. We do not believe it is necessary in this final rule to narrow or restrict the information that can be communicated where security elements are included in the communication. As stated above, we believe there is a strong public interest in allowing unencumbered communications regarding the protected subject areas and communications with unqualified protection. Further, assurances that access credentials and PHI communicated under these circumstances will not be shared inappropriately are addressed in the HIPAA Security Rule and relevant State laws, and this rule does not change those protections. Comments. One comment recommended that the Communications Condition of Certification requirements should protect communication E:\FR\FM\01MYR3.SGM 01MYR3 25726 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations regarding the overall security posture that the health IT developer takes or makes the user take, including communications regarding a system with known and longstanding issues or bugs. Response. We appreciate this comment and clarify that communications related to the overall security posture taken by a health IT developer would be within the subject area of ‘‘security of its health IT,’’ and thus would be protected communications covered by the Communications Condition of Certification requirements. We have finalized the scope of the protected subject area ‘‘security of its health IT’’ in § 170.403(a)(1)(iii) as proposed. (D) User Experiences The phrases ‘‘relevant information regarding users’ experiences when using the health IT’’ and ‘‘user experience’’ are not defined in the Cures Act nor any other relevant statutory provisions. We proposed in 84 FR 7470 to afford the term ‘‘user experience’’ its ordinary meaning. To qualify as a ‘‘user experience,’’ we proposed that the experience would have to have been one that is had by a user of health IT. However, beyond this, we did not propose to qualify the types of experiences that would receive protection under the Communications Condition of Certification requirements based on the ‘‘user experience’’ subject area. To illustrate the breadth of potential user experiences that would be protected by the proposed Communications Condition of Certification requirements, we proposed that communications about ‘‘relevant information regarding users’ experiences when using the health IT’’ would encompass, for example, communications and information about a person or organization’s experience acquiring, implementing, using, or otherwise interacting with the health IT. We also proposed that this would include experiences associated with the use of the health IT in the delivery of health care, together with administrative functions performed using the health IT. We proposed that user experiences would also include the experiences associated with configuring and using the technology throughout implementation, training, and in practice. Further, we proposed that user experiences would include patients’ and consumers’ user experiences with consumer apps, patient portals, and other consumer-facing technologies of the health IT developer. We clarified that a ‘‘relevant user experience’’ would include any aspect of the health IT user VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 experience that could positively or negatively impact the effectiveness or performance of the health IT. Comments. One commenter stated that the most relevant aspect of a user’s experience of a health IT system is whether that experience resulted in patient safety events and requested that ONC specify patient safety events that arise from the use, misuse, or failure of health IT systems as ‘‘user experiences’’ that cannot be covered by gag orders. Response. As previously noted in our response to patient safety comments above, we reiterate that a user experience resulting in a patient safety event would be covered under the Communications Condition of Certification requirements and that a communication about such an experience would be protected, subject to other applicable laws. Further, communications about ‘‘adverse events, hazards, and other unsafe conditions to government agencies, health care accreditation organizations, and patient safety organizations’’ receive unqualified protection as described in § 170.403(a)(2)(i). We noted in the Proposed Rule that the Patient Safety and Quality Improvement Act of 2005 (PSQIA) provides for privilege and confidentiality protections for information that meets the definition of patient safety work product (PSWP). This means that PSWP may only be disclosed as permitted by the PSQIA and its implementing regulations. We clarified that to the extent activities are conducted in accordance with the PSQIA, its implementing regulation, and section 4005(c) of the Cures Act, no such activities shall be construed as constituting restrictions or prohibitions that contravene this Condition of Certification. We believe that ‘‘user experience’’ was appropriately defined in the Proposed Rule and have finalized the scope of the protected subject area ‘‘relevant information regarding users’ experiences when using its health IT’’ in § 170.403(a)(1)(iv) as proposed, with the clarification provided above regarding patient safety events and to clarify that any communications regarding consumer-facing technologies would need to be about certified consumerfacing technologies per our earlier clarification about the scope of this Condition of Certification being limited to certified health IT. (E) Manner in Which a User Has Used Health IT We proposed in 84 FR 7470 that protected communications regarding the ‘‘manner in which a user has used health IT’’ would encompass any PO 00000 Frm 00086 Fmt 4701 Sfmt 4700 information related to how the health IT has been used. We also proposed that the terms used to describe the protected subject areas should be construed broadly. We noted in the Proposed Rule that this subject area largely overlaps with the matters covered under the ‘‘user experience’’ subject area but may include additional perspectives or details beyond those experienced by a user of health IT. We proposed that the types of information that would fall within this subject area include but are not limited to: • Information about a work-around implemented to overcome an issue in the health IT; • customizations built on top of core health IT functionality; • the specific conditions under which a user used the health IT, such as information about constraints imposed on health IT functionality due to implementation decisions; and • information about the ways in which health IT could not be used or did not function as was represented by the developer. We did not receive comments on this specific aspect of the Proposed Rule, and we believe the Proposed Rule appropriately outlined what would fall within the subject matter of the manner in which a user has used health IT. We have finalized the scope of the protected subject area ‘‘manner in which a user of the health IT has used such technology’’ in § 170.403(a)(1)(vi) as proposed, with the clarification that ‘‘used’’ refers to any uses of the certified health IT by the user and is not limited to uses that involve direct patient care. (F) Business Practices Related to Exchange We proposed in 84 FR 7470 that the subject matter of ‘‘business practices of developers of health IT related to exchanging electronic health information’’ should be broadly construed to include developer policies and practices that facilitate the exchange of EHI and developer policies and practices that impact the ability of health IT to exchange health information. We further proposed that the exchange of EHI would encompass the appropriate and timely sharing of EHI. We proposed that protected communications would include, but would not be limited to: • The costs charged by a developer for products or services that support the exchange of EHI (e.g., interface costs, API licensing fees and royalties, maintenance and subscription fees, transaction or usage-based costs for exchanging information); E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations • the timeframes and terms on which developers would or would not enable connections and facilitate exchange with other technologies, individuals, or entities, including other health IT developers, exchanges, and networks; • the developer’s approach to participation in health information exchanges and/or networks; • the developer’s licensing practices and terms as it relates to making available APIs and other aspects of its technology that enable the development and deployment of interoperable products and services; and • the developer’s approach to creating interfaces with third-party products or services, including whether connections are treated as ‘‘one off’’ customizations, or whether similar types of connections can be implemented at a reduced cost. Importantly, we further proposed in 84 FR 7470 that information regarding ‘‘business practices of developers of health IT related to exchanging electronic health information’’ would include information about switching costs imposed by a developer, as we are aware that the cost of switching health IT is a significant factor impacting health care providers adopting the most exchange-friendly health IT available. Comments. One commenter stated that our proposed ‘‘business practices’’ is too broadly defined and should relate exclusively to interoperability elements of certified health IT, rather than to products and services that support exchange. Response. As discussed in the Proposed Rule, we believe the term ‘‘business practices of developers of health IT related to exchanging electronic health information’’ should be broadly construed consistent with our interpretation of the Cures Act language regarding the Communications Condition of Certification requirements, but limited to those business practices that relate to the certified health IT as clarified previously in this Condition and Maintenance of Certification section. A wide variety of business practices could impact the exchange of EHI, including developer business strategies, pricing, and even fraudulent behavior. As such, we have finalized in § 170.403(a)(1)(v) our proposal that such business practices include developer policies and practices that impact or facilitate the exchange of EHI. They could also include costs charged by a developer not only specifically for interoperability elements of the certified health IT, but also for any products or services that support the exchange of EHI through the certified health IT. We reiterate that business practices related to exchange could include timeframes VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 and terms on which developers facilitate exchange; the developer’s approach to participating in health information exchanges and/or networks; the developer’s licensing practices and terms as related to APIs and other interoperable services; and the developer’s approach to creating interfaces with third-party services. As proposed in 84 FR 7473, this Communications Condition of Certification requirement will also apply to any communication concerning a Program requirement (e.g., a Condition or Maintenance of Certification requirement) related to the exchange of EHI or the information blocking provision. Comments. Several commenters had concerns regarding communications about prices and costs, with some commenters asserting that such communications should be protected and some others asserting that developers should be able to restrict communications about prices and costs, including switching costs. Additionally, one commenter had concerns about protecting communications regarding timeframes and terms as well as workarounds and customizations. One commenter also recommended that ONC seek guidance from the Antitrust Division of the FTC regarding economic impacts of regulating health IT developer terms, prices, and timeframes. Response. We continue to interpret costs, information regarding timeframes and terms, and information about health IT workarounds and customizations as protected communications under the ‘‘Business Practices Related to Exchange’’ provision of this condition. We believe that this type of information is frequently relied upon and necessary in order to optimize health IT for the exchange of EHI. We emphasize that the costs charged by a developer for certified health IT or related services that support the exchange of EHI are significant factors that can impact the adoption of interoperable certified health IT and should be protected communications. For example, pricing could include prohibitive costs that prevent or discourage customers from using certified health IT to interact with competing technologies. Likewise, information regarding timeframes and terms is the type of information considered and relied upon in the adoption of interoperable certified health IT and is a protected communication. We have also finalized in § 170.403(a)(1)(vi) that information about certified health IT workarounds and customizations relates to important aspects of how a user has used certified health IT, including how the certified PO 00000 Frm 00087 Fmt 4701 Sfmt 4700 25727 health IT can be used to achieve greater interoperability, and is a protected communication. In response to the comments recommending that we seek guidance from the FTC, we note that we are not regulating health IT developer terms, prices, and timeframes under this Communications Condition of Certification requirements, and therefore do not need to seek further guidance. Rather, the Communications Condition of Certification requirements would protect communications about health IT developer costs, terms, and timeframes as described above and ensure that such information could be shared. We have finalized the scope of the protected subject area ‘‘business practices of developers of health IT related to exchanging electronic health information’’ in § 170.403(a)(1)(v) as proposed. iii. Meaning of ‘‘Prohibit or Restrict’’ The terms ‘‘prohibit’’ and ‘‘restrict’’ are not defined in the Cures Act, nor in any other relevant statutory provisions. We discussed in the Proposed Rule that communications can be prohibited or restricted through contractual terms or agreements (e.g., non-disclosure agreements or non-disparagement clauses) as well as through conduct, including punitive or retaliatory business practices that are designed to create powerful disincentives to engaging in communications about developers or their health IT. Therefore, we proposed in 84 FR 7470 that the Communications Condition of Certification requirements would not be limited to only formal prohibitions or restrictions (such as by means of contracts or agreements) and would encompass any conduct by a developer that would be likely to restrict a communication or class of communications protected by the Communications Condition of Certification requirements. We explained that the conduct in question must have some nexus to the making of a protected communication or an attempted or contemplated protected communication. (A) Prohibitions or Restrictions Arising by Way of Contract We explained in the Proposed Rule that the principal way that health IT developers can control the disclosure of information about their health IT is through contractual prohibitions or restrictions. We noted that there are different ways that contractual prohibitions or restrictions arise. In some instances, a contractual prohibition or restriction will be E:\FR\FM\01MYR3.SGM 01MYR3 25728 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations expressed, and the precise nature and scope of the prohibition or restriction will be explicit in the contract or agreement. However, we also noted that a contract may also impose prohibitions or restrictions in less precise terms. We stated that a contract does not need to expressly prohibit or restrict a protected communication in order to have the effect of prohibiting or restricting that protected communication. The use of broad or vague language that obfuscates the types of communications that can and cannot be made may be treated as a prohibition or restriction if it has the effect of restricting legitimate communications about health IT. We stated that restrictions and prohibitions found in contracts used by developers to sell or license their health IT can apply to customers directly and can require that the customer ‘‘flowdown’’ obligations to the customer’s employees, contractors, and other individuals or entities that use or work with the developer’s health IT. We proposed that such contract provisions would not comply with the Communications Condition of Certification requirements and would be treated as prohibiting or restricting protected communications. We noted that prohibitions or restrictions on communications can also be found in separate nondisclosure agreements (NDAs) that developers require their customers—and in some instances the users of the health IT or third-party contractors—to enter into in order to receive or access the health IT. We proposed that such agreements are covered by the Communications Condition of Certification requirements. We did not receive comments on this specific aspect of the Proposed Rule and have finalized our interpretation proposed in FR 7471 regarding prohibitions or restrictions arising by way of contract as stated above. (B) Prohibitions or Restrictions That Arise by Way of Conduct We proposed in 84 FR 7471 that conduct that has the effect of prohibiting or restricting a protected communication would be subject to the Communications Condition of Certification requirements. We emphasized that the conduct in question must have some nexus to the making of a protected communication or an attempted or contemplated protected communication. As such, developer conduct that was alleged to be intimidating, or health IT performance that was perceived to be substandard, would not, in and of itself, implicate the Communications Condition of Certification requirements unless there VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 was some nexus between the conduct or performance issue and the making of (or attempting or threatening to make) a protected communication. We did not receive comments on this specific aspect of the Proposed Rule and have finalized our interpretation proposed in 84 FR 7471 regarding prohibitions or restrictions arising by way of conduct as stated above. iv. Communications With Unqualified Protection We proposed in 84 FR 7472 a narrow class of communications—consisting of five specific types of communications— that would receive unqualified protection from developer prohibitions or restrictions. With respect to communications with unqualified protection, a developer would be prohibited from imposing any prohibition or restriction. We proposed that this narrow class of communications warrants unqualified protection because of the strength of the public policy interest being advanced by the class of the communication and/or the sensitivity with which the identified recipient treats, and implements safeguards to protect the confidentiality and security of, the information received. We stated that a developer that imposes a prohibition or restriction on a communication with unqualified protection would fail the first part of the two-part test for allowable prohibitions or restrictions, and as such would contravene the Communications Condition of Certification requirements. Comments. One commenter recommended adding language specifying the types of entities that can receive communications with unqualified protection, noting that such specificity would help ensure that these communications go to the appropriate entities so that they can be addressed quickly. The commenter recommended that provisions around reporting to government entities should be limited to United States government entities. Response. We do not believe it is necessary to further specify the types of entities that can receive communications with unqualified protection. We intend for this protection to cover a wide variety of organizations, and further specifying the types of entities that can receive such communications, such as limiting communication to only United States government entities, would unnecessarily limit the scope of this protection and could be counter to the public policy interest to advance the ability of these communications to occur unencumbered. We have finalized in § 170.403(a)(2)(i) our proposal to PO 00000 Frm 00088 Fmt 4701 Sfmt 4700 prohibit developers from imposing any prohibition or restriction on communications that fall into a narrow class of communications—consisting of the five specific types of communications described below—that would receive unqualified protection. (A) Disclosures Required by Law We proposed in 84 FR 7472 that where a communication relates to subject areas enumerated in proposed § 170.403(a)(1) and there are Federal, State, or local laws that would require the disclosure of information related to health IT, developers must not prohibit or restrict in any way protected communications made in compliance with those laws. We noted that we expect most health IT contracts would allow for, or not prohibit or restrict, any communication or disclosure that is required by law, such as responding to a court or Congressional subpoena, or a valid warrant presented by law enforcement. We further proposed that if required by law, a potential communicator should not have to delay any protected communication under the Communications Condition of Certification requirements. We did not receive comments on this aspect of the Proposed Rule and have finalized in § 170.403(a)(2)(i)(A) our approach regarding disclosures required by law as proposed. (B) Communicating Information About Adverse Events, Hazards, and Other Unsafe Conditions to Government Agencies, Health Care Accreditation Organizations, and Patient Safety Organizations We proposed in 84 FR 7472 that there is an overwhelming interest in ensuring that all communications about health IT that are necessary to identify patient safety risks, and to make health IT safer, not be encumbered by prohibitions or restrictions imposed by health IT developers that may affect the extent or timeliness of communications. In addition to the public policy interest in promoting uninhibited communications about health IT safety, we proposed that the recognized communication channels for adverse events, hazards, and unsafe conditions provide protections that help ensure that any disclosures made are appropriately handled and kept confidential and secure. We proposed that the class of recipients to which the information can be communicated under this specific category of communications given unqualified protection should provide health IT developers with comfort that there is little risk of such communications prejudicing the developer’s IP rights. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations We sought comment on whether the unqualified protection afforded to communications made to a patient safety organization about adverse events, hazards, and other unsafe conditions should be limited. Specifically, we sought comment on whether the unqualified protection should be limited by the nature of the patient safety organization to which a communication can be made, or the nature of the communication that can made. Comments. Several commenters stated that ONC should not place any limits on the unqualified protection afforded to communications made to patient safety organizations about adverse events, hazards, and other unsafe conditions. Response. We have finalized in § 170.403(a)(2)(i)(B) as proposed regarding the unqualified protection afforded to communications about adverse events, hazards, and other unsafe conditions that are made to government agencies, health care accreditation organizations, and patient safety organizations. Additionally, we placed no limits or qualifiers on such communications, including those communications made to patient safety organizations. (C) Communicating Information About Cybersecurity Threats and Incidents to Government Agencies We proposed in 84 FR 7472 that if health IT developers were to impose prohibitions or restrictions on the ability of any person or entity to communicate information about cybersecurity threats and incidents to government agencies, such conduct would not comply with the Communications Condition of Certification requirements. We sought comment on whether it would be reasonable to permit health IT developers to impose limited restrictions on communications about security issues to safeguard the confidentiality, integrity, and security of EHI. In the Proposed Rule, we asked if, for example, health IT developers should be permitted to require that health IT users notify the developer about the existence of a security vulnerability prior to, or simultaneously with, any communication about the issue to a government agency. Comments. Some commenters stated that users should never be required to notify the developer when reporting cybersecurity issues, as this would impose a burden on the user and a potential barrier to reporting. Other commenters recommended that developers should be allowed to require VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 users to notify them simultaneously or prior to reporting such incidents, with one comment noting that this would enable developers to better address and respond to security threats prior to the knowledge of a threat becoming widespread. Some commenters recommended that ONC make it a violation for developers to not share cybersecurity vulnerabilities with providers, and that ONC work with DHS to mitigate issues around sharing such vulnerabilities. One commenter recommended changing the wording regarding communicating cybersecurity and security risks to include known vulnerabilities and health IT defects. Response. We strongly encourage users of health IT to notify developers as soon as possible when reporting security incidents and issues. However, it would not be appropriate to require this practice, which would impose an obligation on users of health IT that is outside the scope of this rule. It would also be outside the scope of this condition to implement additional requirements for developers regarding the sharing of cybersecurity vulnerabilities with health care providers. To be clear, we expect developers with Health IT Modules certified under the Program to share information about cybersecurity vulnerabilities with health care providers and other affected users as soon as feasible, so that these affected users can take appropriate steps to mitigate the impact of these vulnerabilities on the security of EHI and other PII in the users’ systems. Thus, we have finalized the Communications Condition of Certification requirements in § 170.403(a)(2)(i)(C) as proposed. Developers must not place restrictions on communications receiving unqualified protections. We also clarify that known vulnerabilities and health IT defects would likely be considered types of ‘‘adverse events, hazards, and other unsafe conditions’’ that would receive ‘‘unqualified protection,’’ and thus a developer would not be able to restrict a health IT user from communicating about such issues in communications receiving unqualified protections under the Communications Condition of Certification requirements (see § 170.403(a)(2)(i) as finalized). However, we note that in communications not receiving unqualified protection under the Communications Condition of Certification requirements, a security vulnerability that is not already public knowledge would be considered a nonuser-facing aspect of health IT, about PO 00000 Frm 00089 Fmt 4701 Sfmt 4700 25729 which developers are permitted to restrict communications (see § 170.403(a)(2)(ii)(B) as finalized). Last, we note that we will continue to work with our Federal partners to mitigate and address cybersecurity threats and incidents. (D) Communicating Information About Information Blocking and Other Unlawful Practices to a Government Agency We proposed in 84 FR 7473 that the public benefit associated with the communication of information to government agencies on information blocking, or any other unlawful practice, outweighs any concerns developers might have about the disclosure of information about their health IT. We noted that reporting information blocking, as well as other unlawful practices, to a government agency would not cause an undue threat to a health IT developer’s IP. Comments. We received several comments regarding the lack of whistleblower protections in the Proposed Rule for individuals who report information blocking or other issues regarding certified health IT. These comments discussed the need to provide for whistleblower type protections for individuals who highlight information blocking practices, as well as to identify them to the appropriate authorities so that the individual is not subject to retaliatory action by the actor identified by the whistleblower. Response. We appreciate these comments and agree that it is extremely important for individuals to be able to report information blocking and violations of other Conditions of Certification without fear of retaliation. We note that the Communications Condition of Certification requirements provide protections against retaliation and intimidation by developers with respect to protected communications. We discussed in the Proposed Rule that the Communications Condition of Certification requirements cover communications that are prohibited or restricted through contractual terms or agreements (e.g., non-disclosure agreements, non-disparagement clauses) between the health IT developer, or offeror of health IT, and the communicator, as well as through conduct, including punitive or retaliatory business practices that are designed to create powerful disincentives to engaging in communications about developers or their health IT. We clarify, however, that merely filing a lawsuit against the communicator regarding the making of E:\FR\FM\01MYR3.SGM 01MYR3 25730 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations a communication would not be considered intimidating conduct in violation of this Condition. Any such determination would necessarily be fact-specific, and the health IT developer’s lawsuit would have to be designed to intimidate a communicator in order to prevent or discourage that communicator from making a protected communication, rather than be designed to pursue a legitimate legal interest. We believe that the proposed broad interpretation of ‘‘prohibit’’ and ‘‘restrict’’ is appropriate given the intention of the Cures Act, which placed no limitations on the protection of communications about the protected subject areas. We finalized this interpretation of ‘‘prohibit’’ and ‘‘restrict’’ proposed in 84 FR 7470 and believe that the interpretation would provide significant protections for whistleblowers from retaliatory actions. Thus, retaliatory actions by a developer against a whistleblower would be in violation of this provision. We also emphasize that conduct by a developer that may be perceived as intimidating or punitive would not implicate the Communications Condition of Certification requirements unless that conduct was specifically designed to influence the making of a protected communication. In other words, punitive actions must have a nexus to the making of a protected communication, such as retaliation for reporting of information blocking, in order to violate the Communications Condition of Certification requirements in § 170.403(a)(1). Last, we refer readers to the discussion of ‘‘complaints’’ under the information blocking section of this final rule, which details the confidentiality provided to information blocking complaints and complainants. We have finalized the Communications Condition of Certification requirements in § 170.403(a)(2)(i)(D) as proposed. (E) Communicating Information About a Health IT Developer’s Failure To Comply With a Condition of Certification or Other Program Requirement We proposed in 84 FR 7473 that the benefits to the public and to users of health IT of communicating information about a health IT developer’s failure to comply with a Condition of Certification requirement or other Program requirement (45 CFR part 170) justify prohibiting developers of health IT from placing any restrictions on such protected communications. We explained that information regarding the failure of certified health IT to meet any Condition of Certification requirement VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 or other Program requirement is vital to the effective performance and integrity of the Program. Moreover, the failure of a certified health IT to meet such requirements could impact the performance of the certified health IT with respect to usability, safety, and interoperability. We stated that it is important to enable unencumbered reporting of such information and that such reporting is essential to the transparency that section 4002 of the Cures Act seeks to ensure. While the current procedures for reporting issues with certified health IT encourage providers to contact developers in the first instance to address certification issues, we noted that users of health IT should not hesitate to contact ONCAuthorized Certification Bodies (ONC– ACBs), or ONC itself, if the developer does not provide an appropriate response, or the matter is of a nature that should be immediately reported to an ONC–ACB or to ONC. We did not receive any comments on this aspect of the Proposed Rule. In consideration of the above, we have finalized this provision in § 170.403(a)(2)(i)(E) as proposed. v. Permitted Prohibitions and Restrictions We proposed in 84 FR 7473 that, except for communications with unqualified protection (§ 170.403(a)(2)(i)), health IT developers would be permitted to impose certain narrow prohibitions and restrictions on communications. Specifically, we proposed that, with the exception of communications with unqualified protection, developers would be permitted to prohibit or restrict the following communications, subject to certain conditions: • Communications of their own employees; • Disclosure of non-user-facing aspects of the software; • Certain communications that would infringe the developer’s or another person’s IP rights; • Publication of screenshots in narrow circumstances; and • Communications of information that a person or entity knows only because of their participation in developer-led health IT development and testing. The proposed Communications Condition of Certification requirements delineated the circumstances under which these types of prohibitions and restrictions would be permitted, including certain associated conditions that developers would be required to meet. We emphasized that any prohibition or restriction not expressly PO 00000 Frm 00090 Fmt 4701 Sfmt 4700 permitted would violate the Communications Condition of Certification requirements. Additionally, we proposed that it would be the developer’s burden to demonstrate to the satisfaction of ONC that the developer met all associated requirements. Further, as an additional safeguard, we proposed that where a developer sought to avail itself of one of the permitted types of prohibitions or restrictions, the developer must ensure that potential communicators are clearly and explicitly notified about the information and material that can be communicated, and that which cannot. We proposed this would mean that the language of health IT contracts must be precise and specific. We stressed that contractual provisions or public statements that support a permitted prohibition or restriction on communication should be specific about the rights and obligations of the potential communicator. We explained that contract terms that are vague and cannot be readily understood by a reasonable health IT customer would not benefit from the qualifications to this Condition of Certification requirement as outlined in the Proposed Rule and below. (A) Developer Employees and Contractors We recognized in the Proposed Rule in 84 FR 7473 that health IT developer employees, together with the entities and individuals who are contracted by health IT developers to deliver products and/or services (such as consultants), may be exposed to highly sensitive, proprietary, and valuable information in the course of performing their duties. We also stated that we recognize that an employer should have the ability to determine how and when the organization communicates information to the public, and that employees owe confidentiality obligations to their employers. We noted that this would similarly apply to contractors of a developer. We proposed in 84 FR 7473 that on this basis, developers would be permitted to impose prohibitions or restrictions on the communications of employees and contractors to the extent that those communications fall outside of the class of communications with unqualified protection as discussed above. Comments. One commenter stated that this provision should be clarified and expanded to cover other third parties with whom the health IT developer shares its confidential information, including subcontractors, agents, auditors, suppliers, partners, cosellers, and re-sellers, as well as E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations potential relationships for which a contract has not yet been signed in case information is shared during a precontract evaluation stage. Response. We reiterate that ‘‘developer employees and contractors’’ include health IT developer employees, together with the entities and individuals who are contracted by health IT developers to deliver health IT and/or services who may be exposed to highly sensitive, proprietary, and valuable information in the course of performing their duties. This functional description of employees and contractors could include subcontractors, agents, auditors, suppliers, partners, co-sellers, and resellers, depending on the specific relationship and circumstances. We have finalized the proposed approach to describing employees and contractors in § 170.403(a)(2)(ii)(A). We note that we did not expand this description to include ‘‘potential relationships’’ because such an addition would make the description overly broad, and it is unlikely that individuals who are not yet under contract would be exposed to highly sensitive, proprietary, and valuable information. Comments. We received one comment that self-developers should not be permitted to place restrictions on the communications of their employees who are using their certified health IT. Response. We agree that selfdevelopers should not be allowed to restrict the communications of users of their certified health IT who are also employees or contractors. We have revised § 170.403(a)(2)(ii)(A) to clarify that the limited prohibitions developers may place on their employees or contractors under the Communications Condition of Certification requirements cannot be placed on users of a selfdeveloper’s certified health IT who are also employees or contractors of the self-developer. For example, a large health system with a self-developed EHR cannot restrict a health care provider, who is employed by that health system and using that EHR to provide services, from communicating about the EHR as a user based on the fact that the health care provider is also an employee of the health system. We note that the concept of ‘‘selfdeveloped’’ refers to a Complete EHR or Health IT Module designed, created, or modified by an entity that assumed the total costs for testing and certification and that will be the primary user of the health IT (76 FR 1300). VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 (B) Non-User-Facing Aspects of Health IT We proposed in 84 FR 7474 that the Communications Condition of Certification requirements would permit health IT developers to impose prohibitions and restrictions on communications to the extent necessary to ensure that communications do not disclose ‘‘non-user-facing aspects of health IT.’’ We noted that, like all permitted prohibitions, such prohibitions and restrictions could only be put in place by developers if there is not an unqualified protection that applies. We proposed in 84 FR 7474 that a ‘‘non-user-facing aspect of health IT,’’ for the purpose of this Condition of Certification, was an aspect of health IT that is not a ‘‘user-facing aspect of health IT.’’ We stated that ‘‘user-facing aspects of health IT’’ would include the design concepts and functionality that is readily ascertainable from the health IT’s user interface and screen display. We stated that they did not include those parts of the health IT that are not exposed to persons running, using, or observing the operation of the health IT and that are not readily ascertainable from the health IT’s user interface and screen display, all of which would be considered ‘‘non-user-facing’’ concepts. We proposed in 84 FR 7474 that ‘‘nonuser-facing aspects of health IT’’ would include source and object code, software documentation, design specifications, flowcharts, and file and data formats. We welcomed comments on whether these and other aspects of health IT should or should not be treated as userfacing. In the Proposed Rule, we noted that the terminology of ‘‘non-user-facing aspects of health IT’’ is not intended to afford only health IT users with specific protections against developer prohibitions or restrictions on communications and is agnostic as to the identity of the communicator. Comments. Some commenters expressed concern regarding the broad scope of ‘‘user-facing’’ and, by extension, the scope of ‘‘non-userfacing.’’ One commenter asked for clarification regarding the definition of ‘‘software documentation’’ with regards to non-user-facing aspects of health IT and suggested that it applies to documentation that is for back-end components, not documents for normalend use. Additionally, a couple of comments stated that administrative functions should not be considered user-facing, including one comment that the relevant users for the purpose of the Communications Condition of Certification requirements are ‘‘end’’ PO 00000 Frm 00091 Fmt 4701 Sfmt 4700 25731 users, thus the non-user-facing provision should apply only to ‘‘nonend-user-facing’’ aspects of health IT. Some commenters emphasized that administrative portions of health IT contain more insight into health IT systems and that administrative functions affect a limited number of users and are not the types of communications or subject matters contemplated by the Cures Act. One commenter stated that algorithms should be considered non-user-facing. Another commenter stated that ONC should clarify the status of diagrams and flowcharts. Response. We do not see a necessary or appreciable distinction between ‘‘users’’ and ‘‘end users,’’ as we have focused on the aspects of the health IT that are and are not subject to protected communications under this Condition of Certification. We also believe that there could be unintended consequences with the term ‘‘end user,’’ such as limiting certain users not specified under the ‘‘permitted prohibitions and restrictions’’ (e.g., developer employees and contractors) from making protected communications. Therefore, we believe ‘‘non-user-facing’’ best reflects the scope of the communications about health IT we seek to capture with these terms. We reiterate that ‘‘non-user-facing aspects of health IT’’ comprise those aspects of the health IT that are not readily apparent to someone interacting with the health IT as a user of the health IT, including source and object code, certain software documentation, design specifications, flowcharts, and file and data formats. We clarify that ‘‘non-userfacing aspects of health IT’’ would also include underlying software that is utilized by the health IT in the background and not directly by a user of the health IT. For example, the programming instructions for proprietary APIs would be considered non-user-facing because they are not readily apparent to the individual users of the health IT. In addition, underlying database software that connects to health IT and is used to store data would be considered a non-user-facing aspect of health IT because it serves data to the health IT, not directly to a user. We further clarify that algorithms would be considered ‘‘non-user-facing aspects of health IT’’ as they are not readily apparent to persons using health IT for the purpose for which it was purchased or obtained. Thus, communications regarding algorithms (e.g., mathematical methods and logic) could be restricted or prohibited, while communications regarding the output of the algorithm and how it is displayed in E:\FR\FM\01MYR3.SGM 01MYR3 25732 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations a health IT system could not be restricted as ‘‘non-user-facing aspects of health IT.’’ Similarly, we also clarify that certain ‘‘software documentation’’ that would be considered to be a nonuser-facing aspect of health IT would include documentation for back-end components, again because it is not readily apparent to persons using health IT. Whether or not a communication would be considered a ‘‘non-user-facing aspects of health IT’’ would be based on whether the communication involved aspects of health IT that would be evident to anyone running, using, or observing the operation of the health IT for the purpose for which it was purchased or obtained. With respect to administrative functions, where the communication at issue relates to aspects of the health IT that are not observable by users of the health IT, it would be considered ‘‘non-user-facing’’ for the purpose of this Condition of Certification requirement. For example, a communication regarding an input process delay experienced by an administrator of health IT that was caused by the underlying database software could be restricted if the communication discussed the underlying database software, which would be considered a non-user-facing aspect of the health IT. However, if the communication discussed the user screens and the delay experienced by the administrator, which would be considered user-facing aspects of health IT, it could not be restricted. Similarly, as long as diagrams or flowcharts do not include aspects of the health IT that are observable by users of the health IT, as described above, they would be considered communications about nonuser-facing aspects of health IT. We have finalized in § 170.403(a)(2)(ii)(B) our proposed approach to the scope of ‘‘non-userfacing aspects of health IT’’ with the clarification provided above regarding scope. (C) Intellectual Property We proposed in 84 FR 7474 that the Communications Condition of Certification requirements are not intended to operate as a de facto license for health IT users and others to act in a way that might infringe the legitimate IP rights of health IT developers or other persons. Indeed, we proposed in 84 FR 7474 that health IT developers are permitted to prohibit or restrict certain communications that would infringe their IP rights so long as the communication in question is not a communication with unqualified protection. We proposed in 84 FR 7474 VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 that any prohibition or restriction imposed by a developer must be no broader than legally permissible and reasonably necessary to protect the developer’s legitimate IP interests. We also proposed in 84 FR 7474 that health IT developers are not permitted to prohibit or restrict, or purport to prohibit or restrict, communications that would be a ‘‘fair use’’ of any copyright work comprised in the developer’s health IT.86 ‘‘Fair use’’ is a legal doctrine that allows for the unlicensed use of copyright material in certain circumstances, which could include circumstances involving criticism, commentary, news reporting, and research.87 Comments. One commenter stated that fair use should not override other IP protections and stressed that relying on fair use could lead to uncertainty because it is determined on a case-bycase basis. Another commenter stated that because the fair use doctrine can be difficult to implement and can lead to uncertain results, ONC should expand the list of communications that would be explicitly protected as fair use to include news reporting, criticism, parody, and communications for educational purposes. Response. We disagree with commenters and believe that relying on the ‘‘fair use’’ doctrine for determining when a screenshot or other communication cannot be restricted should be allowed under the Communications Condition of Certification requirements. This doctrine presents a framework of analysis that is well-developed in case law and thus can be interpreted and applied consistently, even when materials are not formally copyrighted. Accordingly, we are retaining the concept of ‘‘fair use’’ in the final provision in § 170.403(a)(2)(ii)(C). Developers and ONC will apply a fair use test to copyrighted materials and, by analogy, to materials that could be copyrighted, to determine whether developers may prohibit a communication that would infringe on IP rights. The Communication Condition of Certification requirements relate only to protected communications, thus developers can place restrictions on communications about subject matters outside of the protected communications categories without implicating the Communications 86 See 17 U.S.C. 107 (setting forth the four factors required to evaluate a question of fair use under the statutory framework). 87 See https://www.copyright.gov/fair-use/moreinfo.html for more information on fair use. PO 00000 Frm 00092 Fmt 4701 Sfmt 4700 Condition of Certification requirements. Also, as discussed earlier regarding developer employees and contractors in § 170.403(a)(2)(ii)(A), developers may restrict communications by their employees, contractors, and consultants without implicating the Communications Condition of Certification requirements, provided they do not restrict communications with unqualified protections. Further, as described earlier regarding non-userfacing aspects of certified health IT in § 170.403(a)(2)(ii)(B), developers may restrict communications that disclose non-user-facing aspects of the developer’s certified health IT, provided they do not restrict communications with unqualified protections. We clarified in that section that screenshots or videos depicting source code would be considered communications of nonuser-facing aspects of health IT and could be restricted under the Communications Condition of Certification requirements as long as they did not receive unqualified protection. We also clarify that this Condition does not prohibit health IT developers from enforcing their IP rights and that a lawsuit filed by a health IT developer in response to a protected communication regarding infringement of IP rights would not automatically be considered intimidation or retaliation in violation of this Condition. As discussed later in the pre-market testing and development section in § 170.403(a)(2)(ii)(E), developers can place restrictions on communications related to pre-market health IT development and testing activities, which could include IP protections, provided they do not restrict communications with unqualified protections. Combined, these avenues allow for protecting IP in ways that would not implicate the Communications Condition of Certification requirements, thereby allowing developers to take a number of actions to protect and safeguard IP in their certified health IT. Comments. Several commenters requested clarity regarding how the proposed protections for IP would work. One commenter stated that the rule must allow developers to protect legitimate IP interests and asked for clarity on how ONC would determine whether a developer’s restriction on the communication of a screenshot was an allowable protection of trade secrets or an impermissible restriction of protected communications. Several other commenters, who generally supported the Communications Condition of Certification requirements, requested clarification regarding how a E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations prohibition on communications that is designed to protect IP can be applied. Some commenters requested examples of the types of communications that can be restricted on the basis of IP and clarification of the standard ONC will use to determine what prohibitions are permissible. Response. We have finalized an approach in § 170.403(a)(2)(ii)(C) that allows developers to prohibit or restrict communications that involve the use or disclosure of intellectual property existing in the developer’s health IT (including third-party intellectual property), provided that any prohibition or restriction imposed by a developer must be no broader than necessary to protect the developer’s legitimate intellectual property interests and consistent with all other requirements under the ‘‘permitted prohibitions and restrictions’’ (§ 170.403(a)(2)(ii)) of this section. As discussed above, a restriction or prohibition would be deemed broader than necessary and inconsistent with the ‘‘permitted prohibitions and restrictions’’ (§ 170.403(a)(2)(ii)) if it would restrict or preclude a public display of a portion of a work subject to copyright protection (without regard to whether the copyright is registered) that would reasonably constitute a ‘‘fair use’’ of that work. Examples of the types of communications that could be restricted under the Communications Condition of Certification requirements might include a blog post describing a customization of a developer’s health IT that includes the source code of the developer’s health IT or a written review of an analytical feature of the developer’s health IT that reveals the algorithms used. However, as mentioned above, the restriction must be no broader than necessary to protect the developer’s legitimate IP interests, thus only the infringing portions of the communications could be restricted. Comments. One commenter recommended that a health IT developer must demonstrate that a communication was specifically designed to copy or steal a developer’s IP in order for the developer to be allowed to prohibit the communication as an infringement on their IP rights. Response. We appreciate this comment, but decline to require that a developer demonstrate that a communication was designed to copy or steal IP in order for the developer to restrict the communication as one that would infringe on IP rights. We believe that the revised approach discussed above provides appropriate balance between protecting IP rights and VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 enabling protected communications and do not believe that an ‘‘intent’’ element would be necessary. We have finalized the proposals regarding IP in § 170.403(a)(2)(ii)(C), as amended above. (D) Faithful Reproductions of Health IT Screenshots We proposed in 84 FR 7475 that health IT developers generally would not be permitted to prohibit or restrict communications that disclose screenshots of the developer’s health IT. We proposed that the reproduction of screenshots in connection with the making of a communication protected by this Condition of Certification would ordinarily represent a ‘‘fair use’’ of any copyright subsisting in the screen display, and developers should not impose prohibitions or restrictions that would limit that fair use. Notwithstanding this, we proposed that health IT developers would be allowed to place certain restrictions of the disclosure of screenshots as specified in proposed § 170.403(a)(2)(ii)(D). With respect to the limited allowable restrictions on screenshots, we proposed in 84 FR 7475 that developers would be permitted to prevent communicators from altering screenshots, other than to annotate the screenshot or to resize it for the purpose of publication. We also proposed that health IT developers could impose restrictions on the disclosure of a screenshot on the basis that it would infringe third-party IP rights (on their behalf or as required by license). However, to take advantage of this exception, we proposed in 84 FR 7475 that the developer would need to first put all potential communicators on sufficient written notice of those parts of the screen display that contain IP and cannot be communicated, and would still need to allow communicators to communicate redacted versions of screenshots that do not reproduce those parts. Finally, we proposed in 84 FR 7475 that it would be reasonable for developers to impose restrictions on the communication of screenshots that contain PHI, provided that developers permit the communication of screenshots that have been redacted to conceal PHI, or where the relevant individual’s consent or authorization had been obtained. We welcomed comments on whether an appropriate balance had been struck between protecting legitimate IP rights of developers and ensuring that health IT customers, users, researchers, and other stakeholders who use and work with health IT can openly discuss and share their experiences and other relevant information about the performance of health IT. PO 00000 Frm 00093 Fmt 4701 Sfmt 4700 25733 Comments. A large number of commenters, particularly health care providers, supported our proposals regarding the communication of screenshots, with several stressing how helpful screenshots are when communicating usability and safety issues with health IT. One commenter noted that communication of screenshots can help different health care systems understand whether a proposed implementation of an EHR has introduced safety-related challenges at other locations, or help identify solutions to common problems, such as usability challenges. One other commenter stated that there is nothing novel displayed in health IT screenshots that would need to be protected. Response. We appreciate the many positive comments on our proposals regarding screenshots. Comments. Commenters stated that the scope of protected communications as proposed should exclude disclosure of the health IT itself, such as through screenshots. The commenter stressed that the Cures Act required that health IT developers not restrict communications about the certified health IT with respect to specific topic areas, while the Proposed Rule expands that restriction to include communication of the health IT itself. One commenter noted that the Cures Act does not mention screenshots and they should not be included in the Communications Condition of Certification requirements. Response. The Cures Act amended title XXX of the PHSA to establish this condition of certification, which applies to ‘‘health information technology.’’ Title XXX of the PHSA was previously added by the HITECH Act, which included the definition of ‘‘health information technology.’’ Section 3000(5) of the PHSA defines health information technology to mean hardware, software, integrated technologies or related licenses, IP, upgrades, or packaged solutions sold as services that are designed for or support the use by health care entities or patients for the electronic creation, maintenance, access, or exchange of health information. We emphasize both that this definition includes IP associated with the health information technology and that it applies to this condition of certification as this condition references communications regarding health information technology. We have also adopted this definition in § 170.102. We disagree with the commenters’ interpretation of the statutory provision. The statutory provision focuses on ‘‘communications’’ regarding E:\FR\FM\01MYR3.SGM 01MYR3 25734 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations enumerated aspects of the health IT. Communications are not defined nor limited in the Cures Act, and we proposed to broadly define them. Verbal, written, and visual, as well other types of communications, are all covered under the Cures Act. A screenshot is a copy/picture of the user interface of the health IT, or a ‘‘visual communication’’ that is protected under this condition of certification. We have specifically defined ‘‘communication’’ for this section in § 170.403(c) to mean any communication, irrespective of the form or medium. The term includes visual communications, such as screenshots and video. As we emphasized in the Proposed Rule in 84 FR 7475, the sharing of screenshots (with accompanying annotation and/or explanatory prose) is often a critical form of communication of issues with health IT related to—for example—usability, user experience, interoperability, security, or the way the technology is used. We believe screenshots are uniquely helpful as a form of visual communication that can non-verbally illustrate the ‘‘user’s experiences when using the health information technology’’ and the ‘‘manner in which a user of the health information technology has used such technology’’ as they relate intrinsically to both subject areas and capture those user experiences immediately and directly. Further, enabling screenshot sharing can allow for clearer, more immediate, and more precise communication on these pertinent issues, potentially helping a health system avoid costly, or even deadly, complications when implementing health IT. It is also our understanding that screenshots are often the only recourse a user in a network enterprise system has for capturing, documenting, and explaining their concerns. We clarify, however, that the sharing of a screenshot alone would not be considered a protected communication as it would need to be accompanied by an explanation of the issues or aspects of the health IT that the screenshot is meant to communicate or illustrate. Considering the value of communicating significant issues regarding health IT through screenshots, we have finalized our proposal to include screenshots as a protected communications under the Cures Act. However, as discussed in responses to other comments below, we have revised our final policy in multiple ways. Comments. One commenter recommended that screenshots should be defined broadly to include video and other media that can be helpful in demonstrating challenges with EHRs. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 Response. We agree with the recommendation that protections afforded to screenshots should extend to video. We clarify that, like screenshots, video is considered a form of visual communication. A video of a computer screen while a software program is in operation would capture the user experience of interacting with that program and essentially would show a number of screenshots from that program in rapid succession. We emphasize that video, similarly to individual screenshots, is a critical form of communication of issues with the health IT, including issues related to usability, user experience, interoperability, security, or the way the technology is used. As with screenshots, video is particularly useful in communicating a user’s experience with health IT and the manner in which the user has used health IT. This is especially the case when issues of a temporal nature are involved. For example, video would be essential for illustrating a latency issue experienced during drug ordering that could not be communicated through screenshots or other forms of communication. Video also could be critical to demonstrating an issue with a clinical decision support alert that is designed to appropriately and timely notify the provider of a patient matter but fails to do so. Comments. Several commenters expressed concern regarding how a developer’s IP may be impacted by the proposed Communications Condition of Certification requirements. Several commenters stated that the Proposed Rule goes beyond protecting communications for the purposes of patient safety and system improvement and would enable or require inappropriate sharing and disclosure of IP, potentially creating security risks, increased IP theft, and harming innovation and the marketplace for health IT. Several commenters stated that trade secrets, patent protections, and protections for confidential and proprietary information were not addressed or considered appropriately in the Proposed Rule, and that as a result it would be possible for bad actors to create pirated health IT based on the disclosure of screenshots and similar communications. Commenters stated that developers of health IT have successfully used licensing and nondisclosure agreements that apply to user-facing aspects of the technology to maintain the trade secret status of their health IT and that the Proposed Rule would impact their ability to do so and remain competitive in the market. PO 00000 Frm 00094 Fmt 4701 Sfmt 4700 Response. We appreciate the comments regarding how a developer’s IP may be impacted by the Communications Condition of Certification requirements. As discussed earlier in this section, participation in the Program is voluntary; and developers have the option to agree to the terms we have offered or to choose not to participate in the Program. However, we recognize the need to properly balance the protection of a developer’s IP with the need to advance visual communications (e.g., screenshot and video communications) under the Communications Condition and Maintenance of Certification requirements, which we believe is critical to addressing—among other things—the usability, interoperability, and security of health IT. As discussed throughout this section and in section (C) above, we believe that we have properly considered and addressed health IT developers’ IP rights in this final rule in § 170.403(a)(2)(ii)(C) by amending the proposed regulation as described above. We emphasize that the communication of screenshots is essential to protect public health and safety and that our final policies take a measured approach to responding to and addressing a real and substantial threat to public health and safety. The communication of screenshots enables providers, researchers, and others to identify safety concerns, share their experiences with the health IT, learn from the problems, and then repair dangers that could otherwise cause serious harm to patients. Our position is informed both by years of experience regulating health IT and overwhelming research and academia, which is discussed below. For instance, a study published in 2018 was performed to better characterize accessibility to EHRs among informatics professionals in various roles, settings, and organizations across the United States and internationally.88 To quantify the limitations on EHR access and publication rights, the researchers conducted a survey of informatics professionals from a broad spectrum of roles including practicing clinicians, researchers, administrators, and members of industry. The results were analyzed and levels of EHR access were stratified by role, organizational affiliation, geographic region, EHR type, and restrictions with regard to 88 Khairat, S, et al. 2018 Assessing the Status Quo of EHR Accessibility, Usability, and Knowledge Dissemination. eGEMs (Generating Evidence & Methods to improve patient outcomes), pp. 1–11, https://doi.org/10.5334/egems.228. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations publishing results of usability testing, including screenshots. Among faculty members and researchers, 72 percent could access the EHR for usability and/ or research purposes, but, of those, fewer than 1 in 3 could freely publish screenshots with results of usability testing and half could not publish such data at all. Across users from all roles, only 21 percent reported the ability to publish screenshots freely without restrictions.89 The study explained that the patient safety implications of EHR publication censorship and restricted EHR access are multiple. First, limiting institutions from sharing usability research findings can prevent the correction of known problems. Second, without public dissemination, poor design practices will propagate to future iterations of existing vendor systems. Finally, research efforts are directed away from real-world usability problems at a time when EHR systems have become widely deployed and when an urgency exists to accelerate usability testing. The study referenced the 2011 Institute of Medicine report (as discussed in the Proposed Rule and in additional detail below), which identified contractual restrictions as a barrier to knowledge regarding patient safety risks related to health IT.90 The study emphasized that the result of this level of censorship is that a vast majority of scientists researching EHR usability are either prevented from publishing screenshots altogether or must first obtain vendor permission, thus impeding the free dialogue necessary in communities of investigation.91 The study argued that: (1) Lack of EHR access makes many critical EHR usability research activities impossible to conduct, and (2) publication censorship, especially regarding screenshots, means that even those usability studies which can be conducted may not have the impact they otherwise would. As a consequence, innovation can be stifled. As such, one of the recommendations made by the researchers was that there should be a mandate that screenshots and images from EHR systems be freely publishable without restrictions from copyright or trade secret constraints.92 In the report by the Institute of Medicine that was noted above, entitled Health IT and Patient Safety: Building Safer Systems for Better Care,93 the 89 Id. at 1. at 2. 91 Id. at 7. 92 Id. at 8. 93 Institute of Medicine 2012. Health IT and Patient Safety: Building Safer Systems for Better 90 Id. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 Committee on Patient Safety and Health Information Technology (Committee) explained that a significant impediment to gathering safety data is contractual barriers (e.g., nondisclosure, confidentiality clauses) that can prevent users from sharing information about health IT–related adverse events. They further explained that such barriers limit users’ abilities to share knowledge of risk-prone user interfaces, for instance through screenshots and descriptions of potentially unsafe processes. In addition, some vendors include language in their sales contracts and escape responsibility for errors or defects in their software (i.e., ‘‘holdharmless clauses’’). The Committee concluded that these types of contractual restrictions limit transparency, which significantly contributes to the gaps in knowledge of health IT–related patient safety risks. Further, these barriers to generating evidence pose unacceptable risks to safety.94 Based on these findings, the committee recommended that the Secretary of HHS should ensure insofar as possible that health IT vendors support the free exchange of information about health IT experiences and issues and not prohibit sharing of such information, including details (e.g., screenshots) relating to patient safety.95 Recently, the U.S. Food and Drug Administration (FDA) funded Brigham and Women’s Hospital Center for Patient Safety Research and Practice to conduct an exploration of computerized prescriber order entry (CPOE)-related potential for errors in prescribing, particularly as these relate to drug name displays, and ordering and workflow design issues. The project investigated ways to better identify, understand, and prevent electronic ordering errors in the future.96 However, the researchers noted that one large vendor would not grant permissions to share requested screenshots necessary for the study. This refusal ran counter to both the FDA’s task order initial precondition as well as multiple high-level panels’ health IT safety recommendations. The FDA emphasized that it is hard to justify from a safety viewpoint why such permission was withheld, despite the vendors’ proprietary concerns. FDA explained that identifying, preventing, and learning from errors and improving Care. Washington, DC: The National Academies Press, https://doi.org/10.17226/13269. 94 Id. at 3. 95 Id. at 7. 96 U.S. Food & Drug Admin., UCM477419, Computerized Prescriber Order Entry Medication Safety: Uncovering and Learning from Issues and Errors, https://www.fda.gov/downloads/Drugs/ DrugSafety/MedicationErrors/UCM477419.pdf. PO 00000 Frm 00095 Fmt 4701 Sfmt 4700 25735 prescribing safety should be a priority and should take precedence over commercial considerations (and to the extent correctable problems can be identified, likely would result in an improved commercial CPOE product). In cases where the FDA sought to illustrate problems in the system, they drew generic screenshots to illustrate the issue in question.97 Among their recommendations, the FDA recommended that vendors be required to share screenshots and error reports. The FDA emphasized that vendors should be required to permit the sharing of screenshots and information with the FDA and other institutions regarding other CPOE system issues of concern or that pose risk for errors. They stressed that the practice of prohibiting such sharing via copyright must be eliminated. Further, the FDA recommended that vendors should be required to disclose errors reported to them or errors identified in their products, analogous to the requirement that drug manufacturers report significant adverse drug effects.98 One of the co-authors of the FDA study recently wrote a law review article that discussed the significance of screenshots.99 The author noted that the results of the FDA study were remarkable and remarkably distressing, as they identified and took screenshots of over fifty different dangers in the health IT. He expressed frustration that it took up to two years of additional discussions with the vendors to get permission to share the screenshots publicly, and that even after these extended discussions, one vendor— ‘‘with more than a lion’s share of the market’’—prevented the study from displaying the screenshots, some of which were clearly dangerous or deadly. He explained that they had worked around that limitation by substituting the one vendor’s screens with parallel screens taken from Harvard’s homegrown, but by then superannuated, EHR. The author emphasized that those images and screenshots illustrated over fifty EHR risks caused by dangerous and confusing EHR interfaces. The author also emphasized that the study could have been even more helpful in identifying these risks if the FDA had been able to present the findings when first available, rather than haggle for a year or two, and if the study was able 97 Id. at 44. at 52. 99 Ross Koppel, Uses of the Legal System That Attenuate Patient Safety, 68 DePaul L. Rev. (2019) Available at: https://via.library.depaul.edu/lawreview/vol68/iss2/6. 98 Id. E:\FR\FM\01MYR3.SGM 01MYR3 25736 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations to include all of the full images from each system they studied.100 Comments. A commenter recommended that ONC draw a distinction around purpose of use in relation to the fair use of screenshots and require that the discloser of a screenshot be responsible for ensuring the appropriateness of that purpose. Response. As discussed under section (C) above we have retained the concept of ‘‘fair use’’ as it applies to all health IT developer intellectual property covered under ‘‘permitted prohibitions and restrictions’’ (§ 170.403(a)(2)(ii)). As discussed throughout this section, we have placed certain restrictions on the sharing of screenshots responsive to the commenter. Comments. One commenter urged ONC to revise the proposed approach to screenshots by adopting a process that would allow developers to review and approve screenshots for publication for specific purposes, such as communications about safety and usability. Response. A pre-approval process could create potential or perceived barriers to communications and thus could discourage or delay the making of protected communications that are vital to patient safety or other important issues regarding certified health IT. For example, a user might be less willing to go through the process, the time the process takes could undermine the conveyance of the communications, and the objections raised during the process may not be valid or amenable to all parties. Comments. Several commenters had concerns regarding the volume of screenshots that could be shared under our proposal and potential harms that could occur. One commenter emphasized that sharing of screenshots could disclose information about how health IT works, including algorithms and workflows, and enable creation of duplicate software and theft of valuable IP. One commenter suggested that if a user of health IT published hundreds of screenshots of the health IT, a bad actor could theoretically deduce trade secrets based on the screenshots. Several additional commenters were also concerned that the Proposed Rule could allow communication of an unlimited number of screenshots of certified health IT, and one commenter suggested revising the proposed approach to include limiting sharing of screenshots to a reasonable number, such as seven. Response. We appreciate those comments expressing concerns regarding the volume of screenshots that 100 Id. at 280–81. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 could be shared and the potential negative consequences of allowing screenshots to be shared. In the Proposed Rule in 84 FR 7475, we proposed to allow developers to place limited restrictions on the sharing of screenshots. We stressed in the Proposed Rule that our goal with our proposals concerning screenshots was to enable communications that will address matters such as patient safety, system security vulnerabilities, health IT performance, and usability. Our intent was not to prevent developers from restricting the communication of screenshots for purposes outside the scope of the protected communications detailed in the Cures Act. Additionally, we believe that modern software design best practices uncouple screen design from underlying algorithms, and that limited use of screenshots for safety would not allow reverse engineering of large parts of the underlying code. However, we further emphasize that it was never our intention that screenshots (or other visual communications such as video) depicting source or object codes would be protected communications (see the non-user-facing aspects provision of this Condition of Certification), so long as such communications are not communications with unqualified protection. We reviewed comments that suggested establishing a set numerical limit for the sharing of screenshots. However, we have not finalized a requirement in § 170.403(a)(2)(ii)(D) with a fixed numerical limit because there is no non-arbitrary way to determine what the ‘‘right’’ or ‘‘appropriate’’ number is in a one-sizefits-all way. That is because the number of screenshots or amount of video that would be needed to communicate about the health IT could vary, from one situation to the next, based on the specific issue and circumstances. For instance, an issue with health IT functionality regarding a particular process that involves the user viewing and making selections on several different screens may necessitate images of all of the screens involved in order to communicate the issue. However, an issue regarding how one value is being displayed in a particular context (e.g., a medication name being truncated) may only necessitate one screenshot in order to communicate the issue. Thus, we believe the best approach is to adopt a qualitative standard that is designed to be sufficiently flexible for the wide range of health IT issues that may arise and the varying visual communications PO 00000 Frm 00096 Fmt 4701 Sfmt 4700 that need to be communicated to demonstrate or display the issue. We have finalized provisions in § 170.403(a)(2)(ii)(D)(2) and (3) that allow health IT developers to require persons who communicate screenshots to limit the sharing of screenshots to only the relevant number of screenshots and amount of video that are needed to communicate about the health IT regarding one or more of the six subject areas identified in the Cures Act and detailed in § 170.403(a)(1). Allowing developers to limit the sharing of screenshots to only the relevant number needed to communicate about the health IT—regarding one or more of those six subject areas—places a limitation on the number of screenshots allowed to be shared under the Communications Condition of Certification requirements and requires that the screenshots are related to, and thus necessary in illustrating, the protected communication being made. In practice, this would mean that if a particular safety issue in the health IT could be communicated using three screenshots, the communicator should not share additional screenshots that are irrelevant or only potentially relevant to communicate the safety issue with the health IT. If the communication included additional screenshots that were not necessary to visually communicate about the particular safety issue with the health IT that falls within the usability category, the health IT developer would have grounds to seek redress. As with screenshots, we wish to be sensitive to concerns regarding protecting IP in health IT and allow developers to appropriately limit video communication in order to protect against harms that could occur due to unlimited sharing. Similar to screenshots, the amount of video that may be necessary to make a protected communication about health IT could vary, depending on the nature of the issue or aspect of the health IT being addressed. For example, a video meant to communicate a delay in order entry would need to be long enough to communicate the significance of the delay, but would not need to include video of the log-in process or other unrelated functionality of the health IT. We have finalized a provision in § 170.403(a)(2)(ii)(D)(3) that allows health IT developers to place certain limitations on the communication of video. Under this provision, a health IT developer may require persons who communicate video to limit the sharing of video to: (1) The relevant amount of video needed to communicate about the health IT regarding one or more of the E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations subject areas identified in the Cures Act and detailed in § 170.403(a)(1); and (2) only videos that address temporal matters that the user reasonably believes cannot be communicated through screenshots or other forms of communications. In sum, any disclosure must be limited to the relevant number of screenshots or amount of video that is necessary to convey the matter that falls within one of the six subject areas, with video only being used to convey temporal matters that cannot be communicated through screenshots or other forms of communication. We believe these additional limitations on the communication of screenshots and video will further bolster protections for developer IP, while still allowing necessary and effective communication about health IT issues within the six subject areas. Comments. Several commenters stated that there should be a way to protect against doctored screenshots. Response. As proposed, communicators of screenshots must not alter the screenshots (or video), except to annotate the screenshots or resize the screenshots (§ 170.403(a)(2)(ii)(D)(1)). These restrictions similarly apply to video as well (§ 170.403(a)(2)(ii)(D)(1)). We further note that, despite a lack of comments, on further reflection, we have elected to not finalize proposed limitations to allow developers to impose restrictions on the communication of screenshots that contain PHI. We have made this determination because we believe that most of the individuals or entities communicating the screenshots would be bound by other laws, including the HIPAA Rules and State privacy laws, which would be applicable to the PHI at issue. Therefore, we do not believe it is necessary to provide for developers policing the release of such data in the form of screenshots in this Condition of Certification. Comments. A number of commenters discussed the infeasibility of the proposed requirements regarding restricting communication of screenshots, and in particular, the requirement that health IT developers put all potential communicators on sufficient written notice of each aspect of its screen display that contains thirdparty content that cannot be communicated because it would infringe IP rights. Some commenters stated that the proposed language should be amended to require a list of third-party content that might appear in a screen or that the developer sublicenses, or to require a notice on the developer’s website. Other commenters VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 stated that the proposal should be removed. One commenter recommended ONC consider not making developers accountable for actions by health IT users regarding the disclosure of screenshots with thirdparty information. One commenter requested additional guidance from ONC for dealing with third-party, nonhealth IT content in health IT. Response. Where a health IT developer is prohibited by this rule from restricting the communication of a screenshot and allows a screenshot containing third-party content to be communicated, the health IT developer is acting as required by this final rule and enabling important communication regarding critical health IT issues to occur. Thus, we believe developers acting in accordance with this final rule should not be responsible for third-party content in screenshots that are communicated as required by the Communications Condition of Certification requirements. As such, in § 170.403(a)(2)(ii)(D) we have removed from the requirements related to thirdparty IP rights proposed in 84 FR 7475. (E) Testing and Development We discussed in the Proposed Rule in 84 FR 7475 that some health IT developers expose aspects of their health IT to health care providers and others for the purpose of testing and development prior to a product’s ‘‘general availability’’ release. We stated that such disclosures may relate to beta releases that are shared with certain customers for testing prior to the software being made generally available to the market, or may be made as part of a joint-venture or cooperative development process. In these circumstances, we proposed in 84 FR 7475 that a health IT developer would be justified in keeping information about its health IT confidential. We explained that this permitted prohibition or restriction would allow developers to seek appropriate IP protection and discuss novel, ‘‘unreleased’’ product features with their customer base, which has significant public policy benefits for research and innovation in the health IT industry. We proposed in 84 FR 7475 that this permitted restriction would be limited and would not apply to communications that are subject to unqualified protection as specified in proposed § 170.403(a)(2)(i). We proposed that this permitted restriction would also not apply to communications about the released version of the health IT once the health IT has been released. PO 00000 Frm 00097 Fmt 4701 Sfmt 4700 25737 We requested comment on whether we should limit the time this protection would apply for testing purposes. We also requested comment on whether we should set specific parameters for covered testing. Comments. A couple of commenters stated that there should be no limit on how long testing and development could last for the purpose of the restrictions that developers would be allowed to place on communications regarding products in development. These commenters stressed that any limit would be arbitrary and that until certified health IT is in live commercial use, health IT developers should be permitted to restrict communications about it. Response. We agree with the commenters and did not propose to add a time limit on testing and development phases for the purpose of this Condition of Certification requirement. Comments. A couple of commenters requested clarification that providers testing products in real-world environments would not be considered ‘‘contractors’’ of developers for the purpose of the Communications Condition of Certification requirements because such treatment could result in developers being allowed to place additional communication restrictions on employees and contractors under the Communication Condition of Certification requirements. One comment also stated that restrictions on communications by employees and contractors should not extend to their communications regarding product features and functionality that the employees and contractors were not involved in developing or testing. Response. The applicability of this allowable restriction to providers testing products would be determined by the particular facts at issue and whether or not the provider was an actual contractor, employee, or consultant for the developer. We also clarify that this final rule does not limit the restrictions a developer may place on an employee, contractor, or consultant with regard to protected communications, except to the extent that the communication is one with unqualified protection, in which case no such restrictions would be allowed. Comments. One commenter recommended that a health IT user must have used health IT in a real-world context before a communication by the user about the health IT can be protected. Response. We have finalized our proposal in § 170.403(a)(2)(ii)(E) that a health IT developer would be justified in keeping information about its health E:\FR\FM\01MYR3.SGM 01MYR3 25738 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations IT confidential prior to a product’s ‘‘general availability’’ release. We note that a health IT developer would also be justified in keeping information about a product update confidential because the update is not yet generally available. We do not place any limits on who the communicator has to be in order to be covered by the Communications Condition of Certification requirements, particularly since the protections in the Communications Condition of Certification requirements extend beyond users of certified health IT to cover researchers and other stakeholders who may experience certified health IT in a variety of settings and scenarios. As such, we have decided not to limit the communication protection to only those communications that are made by users of certified health IT in the real-world context. c. Maintenance of Certification Requirements We proposed in 84 FR 7476 that to maintain compliance with the Communications Condition of Certification requirements, a health IT developer must not establish or enforce any contract or agreement provision that contravenes the Communications Condition of Certification requirements. We also proposed in 84 FR 7476 that a health IT developer must notify all entities or individuals with which it has a contract/agreement related to certified health IT that any communication or contract/agreement provision that contravenes the Communications Condition of Certification requirements will not be enforced by the health IT developer. We proposed in 84 FR 7476 that such notification must occur within six months of the effective date of the final rule. Further, we proposed in 84 FR 7476 that this notice would need to be provided annually up to and until the health IT developer amends the contract or agreement to remove or make void any contractual provision that contravenes the Communications Condition of Certification requirements. We further proposed as a Maintenance of Certification requirement in proposed § 170.403(b)(2) that health IT developers must amend their contracts/agreements to remove or make void any provisions that contravene the Communications Condition of Certification requirements within a reasonable period of time, but not later than two years from the effective date of a final rule. In the event that a health IT developer cannot, despite all reasonable efforts, locate an entity or individual that previously entered into an agreement with the developer that prohibits or restricts communications protected by VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 the Communications Condition of Certification requirements, we proposed in 84 FR 7476 that the developer would not be in contravention of the Communications Condition of Certification requirements so long as it takes no step to enforce the prohibition or restriction. We did not propose that health IT developers be required to furnish to ONC or their ONC–ACB copies of notices made to customers, or copies of contracts or agreements revised, in satisfaction of this Maintenance of Certification requirement, although we noted that those communications could be requested by ONC or an ONC–ACB in the usual course of business or to demonstrate compliance. Comments. A number of commenters expressed concerns regarding the proposed deadlines for complying with the requirements. Several commenters stated that the requirement to notify customers and others with whom the developer has contracts or agreements within six months was too long and recommended that the deadline be shortened. Regarding the deadline for amending contracts/agreements that contravene the Communications Condition of Certification requirements, most commenters stated that the deadline was too short, with several requesting that it be extended to five years. Some other commenters recommended that modification of any contracts/agreements to comply with the Communications Condition of Certification requirements should occur whenever such contracts/agreements are renewed, or at the earliest available time, without the need for a specific deadline. A couple of commenters recommended that a health IT developer not be held responsible for amending contracts within two years of the effective date of the final rule if it has made reasonable efforts to do so. Several comments recommended that ONC should allow alternative means of completing this requirement, such as posting relevant language on the developer’s website. One commenter stated that it would be helpful to have a ‘‘standard exception clause’’ that developers could use in their contracts and agreements. Response. We appreciate the comments we received on this provision. We clarify in § 170.403(b)(2)(i) that a developer may not include provisions that contravene the Communications Condition of Certification requirements in any new contract as of the effective date of the final rule. In consideration of comments, we have decided to modify the timeframe requirement proposed in PO 00000 Frm 00098 Fmt 4701 Sfmt 4700 84 FR 7476 for amending contracts/ agreements to be in compliance with this condition. While we considered extending the deadline to five years to allow developers to have additional time for compliance, we determined that a more flexible solution is appropriate. As such, we have modified the requirement in § 170.405(b)(2)(ii) to state that any contracts/agreements in place as of the effective date of the final rule and containing language in contravention of the Communications Condition of Certification requirements must be revised to remove or void the contractual provision that contravenes the Communications Condition of Certification requirements whenever the contract is next modified for any reason. We clarify that where a contract automatically renews, the developer would still be prohibited under the Program from enforcing any agreement or contract provisions that contravene the Communications Condition of Certification requirements in § 170.403(a) and the developer would also be responsible for sending an annual notice as described above until such provisions have been modified. To note, we decline to absolve a developer of the requirement to modify the contract solely because the developer has made a reasonable effort to do so. We finalized the notification requirements proposed in 84 FR 7476. A health IT developer must notify all entities and individuals with which it has a contract/agreement related to certified health IT that any communication or contract/agreement provision that contravenes the Communications Condition of Certification requirements will not be enforced by the health IT developer. However, we no longer require that such notification must occur within six months of the effective date of the final rule and annually thereafter until contravening provisions are amended. Instead, notification must only occur annually, beginning in calendar year 2020, and continue until all contravening provisions are amended. Given the timing of the publication of the final rule, health IT developers could have potentially been required to provide both initial notification and an annual notification in the same calendar year. We believe the removal of the six months notification deadline and retention of an annual requirement only, beginning with notification in calendar year 2020, will simplify compliance for health IT developers while still providing adequate notice and ensuring that initial notification is provided in a reasonable amount of time. Therefore E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations we have finalized the deadline for the notice requirement in § 170.403(b)(1) to be annually, beginning in calendar year 2020. Comments. Several commenters requested clarification that once the final rule goes into effect, contravening provisions in developer contracts prohibiting communications cannot be enforced. One of these commenters stated that developers would often include language in their contracts prohibiting communication on the part of end users and entities, thus preventing communication about issues with EHRs. Several commenters requested that ONC explicitly state that any permitted communication made following the effective date of the final rule be inadmissible as a violation of a contract/agreement regardless of whether the customer has been notified. One commenter requested that ONC clarify that, with respect to protecting communications regarding developer business practices, where the disclosure of certain information is prohibited by contract, the developer would not be liable for its inability to communicate such information. Response. We emphasize that as of the effective date of the final rule, contravening provisions in contracts or agreements cannot be enforced without the risk of losing certification for the developer’s health IT or a certification ban for the developer under the Program, regardless of whether the customer was notified as required by the Communications Condition of Certification requirements. We clarify that provisions of contracts requiring that the health IT customer ‘‘flowdown’’ obligations onto the customer’s employees, contractors, and other users of the health IT that would restrict protected communications would be in contravention of this Condition of Certification. Such provisions could not be enforced after the effective date of the final rule without risking loss of certification as noted above for the developer under the Program. We appreciate commenters’ concern regarding disclosing information that may be otherwise prohibited by contract. However, we clarify that the purpose of the Communications Condition of Certification requirements is to prevent developers from improperly restricting protected communications, including communications about a developer’s practices and policies related to facilitating the exchange of health information. As discussed earlier in this section, costs, timeframes, licensing practices and terms, as well as the developer’s approach to working with VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 third-party services, could all be considered protected communications to the extent they relate to facilitating the exchange of health information. Thus, we reiterate that where a contract entered into by the developer would restrict a communication protected by the Communications Condition of Certification requirements, the developer may not enforce such a contract and may not restrict a protected communication in violation of the Communications Condition of Certification requirements after the effective date of the final rule without risking loss of certification. It is also important to note that not all contractual provisions related to communications would create a risk of de-certification. As noted above, the Communications Condition of Certification requirements in § 170.403(a)(2)(ii) do allow for developers to place restrictions on certain communications as discussed above. Therefore, contractual provisions that appropriately address those allowances would not create a risk of de-certification under the Program. Comments. One commenter suggested that ‘‘renew’’ should be added to the maintenance requirement to not establish or enforce any contract or agreement that contravenes the Communications Condition of Certification requirements in § 170.403(a). Response. We appreciate this comment and amended the proposed regulatory text in § 170.403(b)(2)(i) to include ‘‘renew.’’ We clarify that where a contract auto-renews, the developer would still be prohibited under the Program from enforcing any agreement or contract provisions that contravene the Communications Condition of Certification requirements without risking loss of certification and would also be responsible for sending an annual notice as described above until such provisions have been modified. Comments. A couple of commenters expressed concern about developer efforts to re-negotiate other terms of a contract that are unrelated to protected communications as part of the contract modification process. Response. We stress that the contract modifications required as part of the Communications Condition of Certification requirements are strictly limited to removing any provisions of the relevant contract/agreement that would restrict protected communications in contravention of the Communications Condition of Certification requirements and are not required to be done until the contract/ PO 00000 Frm 00099 Fmt 4701 Sfmt 4700 25739 agreement is modified for other purposes. 4. Application Programming Interfaces The API Condition of Certification requirement in Section 4002 of the Cures Act requires health IT developers to publish APIs that allow ‘‘health information from such technology to be accessed, exchanged, and used without special effort through the use of APIs or successor technology or standards, as provided for under applicable law.’’ The requirement also states that a developer must, through an API, ‘‘provide access to all data elements of a patient’s electronic health record to the extent permissible under applicable privacy laws.’’ Additionally, the API Condition of Certification requirement of the Cures Act includes several key phrases and requirements for health IT developers that go beyond the technical functionality of the Health IT Modules they present for certification. In this section of the preamble, we outline the proposals we have adopted to implement the API Condition of Certification requirement of the Cures Act to provide compliance clarity for health IT developers. We have adopted new standards, new implementation specifications, a new certification criterion, Condition and Maintenance of Certification requirements, and modified the Base EHR definition. Health IT developers should consider these final requirements in the context of information blocking provisions described in section VIII of this preamble. a. Statutory Interpretation and API Policy Principles Section 4002 of the Cures Act requires health IT developers certified to the Program to publish APIs that allow ‘‘health information from such technology to be accessed, exchanged, and used without special effort through the use of APIs or successor technology or standards, as provided for under applicable law.’’ To implement the Cures Act API requirements, we proposed a new 2015 Edition Cures Update ‘‘API’’ certification criterion at 84 FR 7476 that included requirements for an API to have ‘‘read’’ capabilities that support two types of services: (1) Services for which a single patient’s data is the focus; and (2) services for which multiple patients’ data are the focus. We conveyed in the Proposed Rule our belief that ‘‘without special effort’’ requires APIs and the health care ecosystem in which they are deployed to be standardized, transparent, and pro- E:\FR\FM\01MYR3.SGM 01MYR3 25740 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations § 170.215(a)(1) and finalized its use in § 170.315(g)(10). competitive. Therefore, we noted that any Health IT Module certified to the new 2015 Edition Cures Update API criterion and a health IT developer’s business practices would have to have these attributes. b. API Standards and Implementation Specifications i. Base Standard We proposed in § 170.215(a)(1) at 84 FR 7477 to adopt HL7® FHIR® Draft Standard for Trial Use (DSTU) 2 for reference in the criterion proposed in § 170.315(g)(10). Additionally, we requested comment in 84 FR 7478 and 7479 on four options to determine the best version of HL7 FHIR to reference for use in § 170.315(g)(10): Option 1: FHIR DSTU 2, Option 2: FHIR DSTU 2 and FHIR Release 3, Option 3: FHIR DSTU 2 and FHIR Release 4, and Option 4: FHIR Release 4 only. We requested commenters review the proposed certification criterion in § 170.315(g)(10) and the accompanying Condition of Certification requirements attributed to the API certification criteria. Notably, we stated in the Proposed Rule at 84 FR 7479 that if we adopted another FHIR Release in a final rule as an alternative to FHIR Release 2 for the proposed API criterion in § 170.315(g)(10), then we would also adopt the applicable implementation specifications associated with the FHIR Release. Comments. We received overwhelming support for Option 4: Adopt solely FHIR Release 4 in the final rule for reference in § 170.315(g)(10). We received support for the adoption of FHIR Release 4 across a broad array of stakeholders, including health IT developers, medical trade associations, software application developers, and payers. Commenters noted that FHIR Release 4 is the first FHIR release with normative FHIR resources and support for enhanced capabilities. Most commenters emphasized that Option 4 will allow the industry to unify and focus on a single baseline standard, rather than accommodating multiple releases proposed in Options 2 and 3. A minority of commenters suggested alternative or multiple versions, noting this would allow for flexibility, but the vast majority of commenters supported the adoption of FHIR Release 4 only. Response. We appreciate the feedback and agree with commenters that adoption of a single standard is the best option to align industry and enable widespread interoperability. We have adopted the latest version of the standard at the time of this final rule publication (FHIR Release 4.0.1) in VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 ii. United States Core Data for Interoperability We proposed in § 170.215(a)(2) at 84 FR 7479 to adopt the API Resource Collection in Health (ARCH) Version 1 implementation specification, which listed a set of base HL7® FHIR® resources that Health IT Modules certified to the proposed criterion in § 170.315(g)(10) would need to support. Comments. Most commenters were opposed to the adoption of the ARCH in the final rule. Commenters argued for the use of American National Standards Institute accredited standards, and suggested ONC work with standards developing organizations for standards development and maintenance. Several commenters noted that the ARCH has not gone through a formal balloting process, did not support ONC’s proposal to rely upon the National Technology Transfer and Advancement Act’s exception to adopt the ARCH in the final rule, and encouraged the use of technical standards developed or adopted by voluntary consensus standards bodies. Several commenters noted that requiring the ARCH in addition to the other adopted standards could create confusion. Commenters further emphasized the importance of maintaining ongoing consistency between the ARCH and the other adopted standards, and noted this would be challenging to achieve. Additional comments against the ARCH expressed concern with the proposed updates through the Standards Version Advancement Process, and with ONC over-regulating API functionality. Commenters also noted that ONC could encourage API access to specific data elements without creating a new implementation specification. Some commenters in favor of the ARCH implementation specification asked for data element revisions. Commenters also asked for clarity that EHRs will not need to provide the full set of data to modular applications, and asked for specificity on how much of this data would need to be mapped by the API Technology Supplier. Additionally, commenters asked for guidance on lab results, including application creation implementation guides that would ensure accuracy and compliance when incorporating lab data. Response. In response to commenters, we did not adopt the ARCH as an implementation specification in the final rule. Upon consideration of public comments and in an effort to PO 00000 Frm 00100 Fmt 4701 Sfmt 4700 consistently approach how we reference the United States Core Data for Interoperability (USCDI) with various content standards (e.g., C–CDA), we determined that having an implementation specification to map USCDI to HL7 FHIR could create more restrictions than we intended. We appreciate the concerns raised by stakeholders, and as we evaluated the ARCH in context of our other proposals, we determined that we could achieve our desired policy outcome to link the USCDI Data Elements to FHIR Resources without the ARCH. We refer commenters to the sections that follow for further clarity regarding the implementation of Data Elements included in the USCDI implementation specification (IV.B.1). iii. US Core IG and Bulk IG We proposed in 84 FR 7480 in § 170.215(a)(3) to adopt the Argonaut Data Query Implementation Guide version 1 (Argonaut IG) implementation specification, which specifies constraints for 13 of the HL7® FHIR® resources proposed in § 170.215(a)(2). Additionally, we proposed in § 170.215(a)(4) to adopt the Argonaut Data Query Implementation Guide Server implementation specification. Comments. Several commenters advocated for the adoption of the FHIR US Core Implementation Guide STU 3 Release 3.0.0 implementation specification instead of the Argonaut Implementation Guides. Commenters noted that the US Core Implementation Guide was built from the Argonaut Implementation Guides and has been balloted by the standards community. Response. We thank commenters for their feedback. We note that in the Proposed Rule at 84 FR 7479 we stated that if we were to adopt another FHIR Release in the final rule as an alternative to FHIR Release 2, then we would also adopt the applicable implementation specifications and FHIR profiles associated with the FHIR Release. Considering this and commenters’ recommendations, we have adopted the HL7 FHIR US Core Implementation Guide STU 3.1.0 (US Core IG) implementation specification in § 170.215(a)(2). We note that we adopted the latest version of the US Core IG at the time of the final rule publication. The US Core IG defines the minimum conformance requirements for accessing patient data using FHIR Release 4 (adopted in § 170.215(a)(1)), including profiled resources, operations, and search parameters for the Data Elements required in the USCDI implementation specification (adopted in § 170.213). E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations We note that in the Proposed Rule at 84 FR 7479 we proposed to require that the ‘‘Patient.address’’ and ‘‘Patient.telecom’’ elements of the ‘‘Patient’’ resource must be supported. We note these requirements have since been subsumed by the US Core IG, given that ‘‘Patient.address’’ and ‘‘Patient.telecom’’ elements are both flagged ‘‘must support’’ for the ‘‘Patient’’ profile in the US Core IG. We also proposed to require that the ‘‘Device.udi’’ element follow the human readable representation of the unique device identifier found in the recommendation, guidance, and conformance requirements section of the ‘‘HL7 Version 3 Cross Paradigm Implementation Guide: Medical Devices and Unique Device Identification Pattern, Release 1.’’ These requirements have also been subsumed by the US Core IG. Additional information can be found in the ‘‘Device’’ profile of the US Core IG adopted in § 170.215(a)(2). We note that in the Proposed Rule we proposed in 84 FR 7480 that the clinical note text included in the ‘‘DocumentReference’’ resource would need to be represented in its ‘‘raw’’ text form, and further proposed in 84 FR 7480 that it would be unacceptable for the note text to be converted to another file or format (e.g., .docx, PDF) when it is provided as part of an API response. We clarify that the clinical note text included in any of the notes described in the ‘‘Clinical Notes Guidance’’ section of the US Core IG adopted in § 170.215(a)(2) must be represented in a ‘‘plain text’’ form, and would be unacceptable for the note text to be converted to another file or format (e.g., .docx, PDF) when it is provided as part of an API response. We note that in the Proposed Rule we proposed in 84 FR 7480 to require that the ‘‘Provenance.recorded’’ and ‘‘Provenance.agent.actor’’ elements of the ‘‘Provenance’’ resource must be supported. We note these requirements have been subsumed by the US Core IG, given that ‘‘Provenance.recorded’’ and ‘‘Provenance.agent.who’’ elements are both flagged ‘‘must support’’ for the ‘‘Provenance’’ profile in the US Core IG. As addressed under the header ‘‘Standardized API for Patient and Population Services’’ in the section V.B.4.c, we have finalized the adoption of the HL7 FHIR Bulk Data Access (Flat FHIR) (v1.0.0: STU 1) implementation specification (Bulk IG), including mandatory support for the ‘‘groupexport’’ ‘‘OperationDefinition’’ in § 170.215(a)(4). VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 iv. HL7 SMART IG and Backend Services Authorization We proposed in 84 FR 7481 in § 170.215(a)(5) to adopt the HL7® SMART Application Launch Framework Implementation Guide Release 1.0.0 implementation specification, a profile of the OAuth 2.0 specification. Comments. Most commenters expressed support for the HL7 SMART Application Launch Framework Implementation Guide Release 1.0.0 (SMART IG) implementation specification. Multiple commenters suggested that in addition to requiring support for ‘‘refresh tokens,’’ ‘‘Standalone Launch,’’ and ‘‘EHR Launch’’ capabilities from the SMART IG, ONC also require support for ‘‘ssoopenid-connect,’’ ‘‘launch-standalone,’’ ‘‘launch-ehr,’’ ‘‘client-public,’’ ‘‘clientconfidentialsymmetric,’’ ‘‘context-ehrpatient,’’ ‘‘context-standalone-patient,’’ ‘‘permission-patient,’’ ‘‘permissionuser,’’ and ‘‘permission-offline’’ capabilities. Response. We thank stakeholders for their comments. The ten optional capabilities commenters suggested are included in the ‘‘SMART on FHIR Core Capabilities’’ section of the SMART IG. The ‘‘SMART on FHIR Core Capabilities’’ suggested by commenters include ‘‘sso-openid-connect,’’ which allows for support of the OpenID Connect profile in the SMART IG; ‘‘client-public’’ and ‘‘client-confidentialsymmetric,’’ which allow for client authentication; ‘‘context-ehr-patient’’ and ‘‘context-standalone-patient,’’ which provide context to apps at launch time; and ‘‘permission-patient,’’ ‘‘permission-user,’’ and ‘‘permissionoffline,’’ which allow support for patient-level scopes, user-level scopes, and refresh tokens, respectively. Other ‘‘SMART on FHIR Core Capabilities’’ that were not suggested by commenters include ‘‘context-banner’’ and ‘‘contextstyle,’’ which provide basic context to apps at launch time, and ’’context-ehrencounter’’ and ‘‘context-standaloneencounter,’’ which provide encounterlevel granularity to apps at launch time. Given the importance of these ‘‘SMART on FHIR Core Capabilities,’’ and in consideration of public comments and our own research, we have adopted the SMART IG, including mandatory support for the ‘‘SMART on FHIR Core Capabilities’’ in § 170.215(a)(3). We explicitly require mandatory support of the ‘‘SMART on FHIR Core Capabilities’’ in § 170.215(a)(3) because these capabilities are indicated as optional in the implementation specification. We further clarify these ‘‘SMART on FHIR Core Capabilities’’ are PO 00000 Frm 00101 Fmt 4701 Sfmt 4700 25741 in scope for Program testing and certification. Additionally, we clarify that by requiring the ‘‘permissionpatient’’ ‘‘SMART on FHIR Core Capability’’ in § 170.215(a)(3), Health IT Modules presented for testing and certification must include the ability for patients to authorize an application to receive their EHI based on FHIR resource-level scopes. Specifically, this means patients would need to have the ability to authorize access to their EHI at the individual FHIR resource level, from one specific FHIR resource (e.g., ‘‘Immunization’’) up to all FHIR resources necessary to implement the standard adopted in § 170.213 and implementation specification adopted in § 170.215(a)(2). This capability will give patients increased control over how much EHI they authorize applications of their choice to receive. For example, if a patient downloaded a medication management application, they would be able to use these authorization scopes to limit the EHI accessible by the application to only information contained in FHIR ‘‘MedicationRequest’’ and ‘‘Medication’’ profile. Comments. Some commenters noted concerns for privacy and security of APIs. Specifically, one commenter explained the threat of cross-site request forgery (CSRF), and suggested we take action to mitigate that risk, including by requiring the use of both OAuth 2.0 and OpenID Connect Core 1.0. Response. We appreciate the concerns expressed by commenters regarding the privacy and security of APIs. The OAuth 2.0 standard defined at Request For Comment (RFC) 6749 101 describes that ‘‘[The OAuth 2.0 authorization] framework was designed with the clear expectation that future work will define prescriptive profiles and extensions necessary to achieve full web-scale interoperability.’’ The SMART IG serves as a ‘‘prescriptive profile’’ as described in RFC 6749. Thus, consistent with commenters’ recommendations, we have adopted a profile of the OAuth 2.0 standard (SMART IG) in § 170.215(a)(3). Additionally, we have adopted OpenID Connect Core 1.0 incorporating errata set 1 in § 170.215(b), and require conformance with the relevant parts of this standard as part of testing and certification. CSRF is a welldocumented security threat in OAuth 2.0, which can be prevented with adequate security practices. We encourage implementers to adhere to industry best practices to mitigate CSRF and other known security threats. Relatedly, we note that the HL7 community has developed an 101 https://tools.ietf.org/html/rfc6749. E:\FR\FM\01MYR3.SGM 01MYR3 25742 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations ‘‘Implementer’s Safety Check List,’’ 102 a guide of security best practices for implementing FHIR-based APIs. We encourage stakeholders to consult this guide during development and implementation of § 170.315(g)(10)certified Health IT Modules to minimize security risks. For backend services authorization, as addressed under the header ‘‘Standardized API for Patient and Population Services’’ in the section V.B.4.c, we have finalized the adoption of the HL7 FHIR Bulk Data Access (Flat FHIR) (v1.0.0: STU 1) implementation specification (Bulk IG), which includes the ‘‘Backend Services Authorization Guide’’ in § 170.215(a)(4). v. OpenID Connect We proposed in 84 FR 7480 through 7481 in § 170.215(b) to adopt OpenID Connect Core 1.0 including errata set 1. Comments. We received few comments regarding the adoption of OpenID Connect Core 1.0 including errata set 1, however, commenters generally supported the adoption of this standard. Response. We thank commenters for their feedback. Given their support, we have finalized the adoption of OpenID Connect Core 1.0 including errata set 1 as proposed in § 170.215(b). We clarify that only the relevant parts of the OpenID Connect Core 1.0 including errata set 1 adopted in § 170.215(b) that are also included in the implementation specification adopted in § 170.215(a)(3) will be in-scope for testing and certification. c. Standardized API for Patient and Population Services We proposed in 84 FR 7481 to adopt a new certification criterion, § 170.315(g)(10), to replace § 170.315(g)(8), and we proposed in 84 FR 7495 to update the 2015 Edition Base EHR definition, as referenced in § 170.102. The proposed certification criterion would require Health IT Modules to support API-enabled ‘‘read’’ services for single and multiple patients. ‘‘Read’’ services include those that allow authenticated and authorized third-party applications to view EHI through a secure API. These services specifically exclude ‘‘write’’ capabilities, where authenticated and authorized third-party applications would be able to create or modify EHI through a secure API. Comments. Commenters supported the proposed adoption of a new certification criterion, § 170.315(g)(10), to replace § 170.315(g)(8). 102 https://www.hl7.org/FHIR/safety.html. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 Response. We appreciate the support from commenters. As a result, we have adopted a new certification criterion in § 170.315(g)(10), to replace § 170.315(g)(8) and made several revisions to address public comment as discussed further below. Although the certification criteria finalized at § 170.315(g)(10) will replace § 170.315(g)(8), we note that § 170.315(g)(8) is not removed from regulation. We maintain § 170.315(g)(8) and have finalized in § 170.550(m) that ONC–ACBs can issue certificates for § 170.315(g)(8) during the transition period to § 170.315(g)(10) for 24 months after the publication date of the final rule. Comments. Commenters suggested dividing the § 170.315(g)(10) criterion into two separate criteria for single and multiple patients. Response. We appreciate the feedback. We decline to split the certification criterion into two criteria. In consideration of comments and for clarity, we have improved the organization of the final certification requirements for API-enabled ‘‘read’’ services for single and multiple patients by separating the criterion into distinct sections in the regulation text. Comments. Several commenters supported referencing a standard for API-enabled ‘‘read’’ services for multiple patients, including the HL7® FHIR® Bulk Data Access Implementation Guide Release 1.0.0. Commenters felt that omitting a standard in the criterion would undermine interoperability for APIenabled ‘‘read’’ services for multiple patients. Response. We thank commenters for their feedback. To enable consistent health IT implementation of APIenabled ‘‘read’’ services for multiple patients, we have finalized the adoption of the Bulk IG, including mandatory support for the ‘‘group-export’’ ‘‘OperationDefinition’’ in § 170.215(a)(4). As part of the Program, we require Health IT Modules presented for testing and certification to conform to the Bulk IG implementation specification finalized in § 170.215(a)(4). The adoption of an implementation specification for APIenabled ‘‘read’’ services for multiple patients in § 170.215(a)(4) is responsive to stakeholder concerns and further supports our intent to prevent ‘‘special effort’’ for the use of APIs as mandated in section 4002 of the Cures Act. Furthermore, based on our analysis, we believe the ‘‘group-export’’ ‘‘OperationDefinition,’’ as defined in the Bulk IG implementation specification is essential to fulfill the use cases PO 00000 Frm 00102 Fmt 4701 Sfmt 4700 envisioned for API-enabled ‘‘read’’ services for multiple patients. The ‘‘group-export’’ ‘‘OperationDefinition’’ will allow application developers interacting with § 170.315(g)(10)certified Health IT Modules to export the complete set of FHIR resources as constrained by the US Core IG adopted in § 170.215(a)(2) and USCDI adopted in § 170.213 for a pre-defined cohort of patients. We appreciate commenters’ recommendations, and agree that coalescing around a common implementation specification will advance interoperability of API-enabled ‘‘read’’ services for multiple patients. We provide further discussion of the supported search operations, data response, and authentication and authorization requirements for APIenabled ‘‘read’’ services for multiple patients in the sections below. Comments. Commenters requested clarification that API-enabled ‘‘read’’ services for multiple patients are not intended for patient end users and that health IT developers and health care providers are therefore not expected to supply a patient-facing mechanism for these requests. Response. We appreciate the feedback from commenters. API-enabled ‘‘read’’ services for multiple patients are not intended for patient end users because API-enabled ‘‘read’’ services for multiple patients allow for the disclosure of multiple patients’ records, and individual patients only have the right to access their own records or records of patients to whom they are the personal representative (45 CFR 164.502(f)(1)). Health IT Modules are not required to support patient-facing API-enabled ‘‘read’’ services for multiple patients for the purposes of this certification criterion. Comments. One commenter suggested we modify the language that defines the purpose of this section to provide more clarity, specifically the term ‘‘services.’’ The commenter also requested we include the scope of cohorts we intended to address in ‘‘population services.’’ Response. We appreciate the feedback from commenters. The term ‘‘services’’ includes all § 170.315(g)(10)-related technical capabilities included in a Health IT Module presented for testing and certification. The API-enabled ‘‘read’’ services for single patients is intended to support EHI requests and responses for individual patient records and the API-enabled ‘‘read’’ services for multiple patients is intended to support EHI requests and responses for multiple patients’ records. The scope of patient cohorts for ‘‘population services’’ can include various groups defined at the E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations discretion of the user of the API-enabled ‘‘read’’ services for multiple patients, including, for example, a group of patients that meet certain disease criteria or fall under a certain insurance plan. We have adopted the Bulk IG in § 170.215(a)(4) to support this function as discussed further below. The technical capabilities expected of APIrelated Health IT Modules presented for testing and certification are included in § 170.315(g)(10). Comments. Commenters requested clarification for information blocking policies and health care provider obligations for API-enabled ‘‘read’’ services for multiple patients. Response. We appreciate the request for clarification from commenters. We clarify that the criteria finalized in § 170.315(g)(10) includes the technical capabilities that must be met by APIrelated Health IT Modules presented for testing and certification. The information blocking policies in this rule do not compel health care providers to implement Health IT Modules certified to requirements in 170.315(g)(10). We note that other programs, like CMS value-based programs, may require the use of this technology. We refer commenters to the information blocking section (VIII) for additional clarification. Comments. Commenters asked us to clarify the relationship between the APIenabled ‘‘read’’ services for single and multiple patients in § 170.315(g)(10) and the ‘‘EHI export’’ criterion in § 170.315(b)(10). Response. We thank commenters for this request. The API criterion in § 170.315(g)(10) is separate from the ‘‘EHI export’’ criterion in § 170.315(b)(10). While both criteria aim to advance health IT in alignment with the Cures Act’s goal of ‘‘complete access, exchange, and use of all electronically accessible health information’’ for both single and multiple patients, the criteria specifications and Condition and Maintenance of Certification requirements are distinct. The ‘‘EHI export’’ criterion focuses on a Health IT Module’s ability to electronically export EHI, as defined in § 171.102, that can be stored at the time of certification by the product, of which the Health IT Module is a part. In contrast, the finalized API criterion in § 170.315(g)(10) focuses on ‘‘read’’ services for single and multiple patients for the USCDI (adopted in § 170.213) Data Elements and US Core IG (adopted in § 170.215(a)(2)) FHIR profiles. Additionally, the ‘‘EHI export’’ criterion finalized in § 170.315(b)(10) does not mandate conformance to standards or VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 implementation specifications, whereas the criterion finalized in § 170.315(g)(10) requires conformance to several standards and implementation specifications, as described further below. We refer to the finalized ‘‘EHI export’’ criterion in § 170.315(b)(10) for additional information. Comments. Several commenters supported requiring Health IT Modules to support API-enabled ‘‘write’’ services for single patients, either in this rule or in a future rulemaking. One commenter suggested including a subset of data classes for ‘‘write’’ services for single patients, including ‘‘patient goals,’’ ‘‘patient-generated health data’’ (including patient-reported outcomes, patient generated device data, and questionnaires), and ‘‘care plans.’’ Another commenter suggested adding a list of required operations (‘‘read’’ and ‘‘write’’) to USCDI elements, limited to ‘‘read’’ for this rulemaking. Response. We appreciate the feedback from commenters. While we support the interest in API-enabled ‘‘write’’ services, we have not adopted such requirements. We do not believe API-enabled ‘‘write’’ services have reached a level of a maturity to warrant the addition of regulatory conformance requirements within the Program. We encourage industry to consider all the implications and implementation requirements for API-enabled ‘‘write’’ services, and perform additional API-enabled ‘‘write’’ pilot implementations to demonstrate the readiness for API-enabled ‘‘write’’ services in the testing and certification of Health IT Modules. Additionally, we encourage industry to expand existing profiles like the US Core IG to support ‘‘write’’ services. Comments. Commenters recommended including a requirement for event logging for ‘‘read’’ services for single and multiple patients. Response. We appreciate the recommendation from commenters. The 2015 Edition Privacy and Security Certification Framework requires that if a Health IT Module includes capabilities for certification under § 170.315(g)(10) it needs to be certified to several privacy and security certification criteria including auditable events in § 170.315(d)(2) or auditing actions on health information in § 170.315(d)(10). Comments. Commenters noted that references to APIs focus exclusively on RESTful query and ignore ‘‘push’’ elements of the FHIR API, such as ‘‘POST,’’ ‘‘PUT,’’ and FHIR messaging. Response. We appreciate the feedback from commenters. While we support the interest in the ‘‘push’’ operations of the FHIR standard, including ‘‘POST,’’ PO 00000 Frm 00103 Fmt 4701 Sfmt 4700 25743 ‘‘PUT,’’ and FHIR messaging, we have not adopted such requirements for the Program. We encourage industry stakeholders to further consider all the requirements and implications for the ‘‘push’’ operations of the FHIR standard, develop use cases, perform additional API-enabled ‘‘push’’ pilot implementations, create or expand implementation profiles to support ‘‘push’’ services, and demonstrate the utility of the ‘‘push’’ operations of the FHIR standard for future potential inclusion in the Program. i. Data Response We proposed in 84 FR 7482 in § 170.315(g)(10)(i) that Health IT Modules presented for testing and certification must be capable of responding to requests for data on single and multiple patients in accordance with proposed standards and implementation specifications adopted in § 170.215(a)(1) (HL7® FHIR® DSTU 2 (v1.0.2–7202)), specified in the proposed § 170.215(a)(2) (API Resource Collection in Health (ARCH) Version 1), and consistent with the proposed specifications in § 170.215(a)(3) (Argonaut Data Query Implementation Guide Version 1.0.0). We clarified that all data elements indicated as ‘‘mandatory’’ and ‘‘must support’’ by the proposed standards and implementation specifications must be supported and would be in scope for testing. Comments. Commenters expressed concern with fully enforcing ‘‘mandatory’’ and ‘‘must’’ support requirements of the referenced specifications and implementation guides, explaining that developers may be required to support requirements that are not applicable to the stated intended use of the Health IT Module(s). Response. We appreciate the concerns expressed by commenters. We clarify that the standards and implementation specifications adopted and required for this certification criterion were created by standards developing organizations to support a wide range of health care use cases. We have finalized in § 170.315(g)(10)(i)(A) that Health IT Modules presented for testing and certification must be capable of responding to requests for a single patient’s data according to the standard adopted in § 170.215(a)(1) and implementation specification adopted in § 170.215(a)(2), including the mandatory capabilities described in ‘‘US Core Server CapabilityStatement,’’ for each of the Data Elements included in the standard adopted in § 170.213. This requirement will enable Health IT Modules to support US Core IG E:\FR\FM\01MYR3.SGM 01MYR3 25744 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations operations for each of the Data Elements included in the USCDI. Additionally, we have finalized in § 170.315(g)(10)(i)(B) that Health IT Modules presented for testing and certification must be capable of responding to requests for data on multiple patients as a group according to the standard adopted in § 170.215(a)(1) and implementation specifications adopted in § 170.215(a)(2) and § 170.215(a)(4), for each of the Data Elements included in the standard adopted in § 170.213. Finally, we clarify that the use of the ‘‘SMART Backend Services: Authorization Guide’’ section of the implementation specification adopted in § 170.215(a)(4) is required for API ‘‘read’’ services for multiple patients as finalized in § 170.315(g)(10)(i)(B) and described above. For requests for data on multiple patients, we note that the implementation specification adopted in § 170.215(a)(4) has optional parameters which can be used to filter results to a period of time, or one or several specified FHIR resources. While these parameters are not required for testing and certification, we encourage health IT developers to adopt these parameters and other ‘‘OperationDefinitions’’ to enhance the utility of requests for data on multiple patients. ii. Search Support We proposed in 84 FR 7482 in § 170.315(g)(10)(ii) that Health IT Modules presented for testing and certification must be capable of responding to all of the ‘‘supported searches’’ specified in the proposed implementation specification in § 170.215(a)(4) (Argonaut Data Query Implementation Guide Server). We reiterated that Health IT Modules presented for testing and certification and as implemented must support all search capabilities for single and multiple patients in accordance with the proposed implementation specification in § 170.215(a)(4). We also requested comments on the minimum ‘‘search’’ parameters that would need to be supported for the ’’DocumentReference’’ and ‘‘Provenance’’ HL7® FHIR® resources. Comments. Most commenters supported this proposal. One commenter recommended only requiring the ‘‘target’’ query parameter for the ‘‘Provenance’’ FHIR resource, and ‘‘patient’’ and ‘‘date’’ query parameters for the ‘‘DocumentReference’’ FHIR resource. One commenter suggested deferring this VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 certification requirement until a standard is published by HL7. Response. We appreciate the feedback from commenters. Since we have not finalized the adoption of the ARCH as proposed in § 170.215(a)(2), and instead rely on the search parameters specified in the US Core IG finalized in § 170.215(a)(2) and Bulk IG finalized in § 170.215(a)(4), the comments related to the specific ‘‘Provenance’’ and ‘‘DocumentReference’’ FHIR resources are no longer applicable. We have finalized in § 170.315(g)(10)(ii)(A) that Health IT Modules presented for testing and certification must support all search capabilities for single patients according to the implementation specification adopted in § 170.215(a)(2), including support for all mandatory capabilities included in the ‘‘US Core Server CapabilityStatement.’’ Additionally, we have finalized in § 170.315(g)(10)(ii)(B) that Health IT Modules presented for testing and certification must respond to search requests for multiple patients’ data consistent with the search criteria included in the implementation specification adopted in § 170.215(a)(4). We clarify that the scope of data available in the data responses defined in § 170.315(g)(10)(i) must be supported for single and multiple patient searches via the supported search operations finalized in § 170.315(g)(10)(ii). Additionally, we clarify for the requirements finalized in § 170.315(g)(10)(i) and (ii) that all data elements indicated as ‘‘mandatory,’’ ‘‘must support,’’ by the standards and implementation specifications must be supported and are in scope for testing. iii. Application Registration We proposed in 84 FR 7483 in § 170.315(g)(10)(iii) that Health IT Modules presented for testing and certification must be capable of enabling apps to register with an ‘‘authorization server.’’ As proposed, this would have required an API Technology Supplier to demonstrate its registration process, but would not have required conformance to a standard. We requested comment at 84 FR 7483 on whether to require the OAuth 2.0 Dynamic Client Registration Protocol (RFC 7591) 103 standard as the sole method to support registration for the proposed certification criterion in § 170.315(g)(10), and requested comment on whether we should require its support as part of the final rule’s certification criterion. Additionally, we requested comment at 84 FR 7483 on whether to include application registration in the testing and certification of apps executed within an 103 https://tools.ietf.org/html/rfc7591. PO 00000 Frm 00104 Fmt 4701 Sfmt 4700 API Data Provider’s clinical environment. Comments. Commenters generally supported that Health IT Modules presented for testing and certification must enable apps to register with an authorization server. Some commenters supported excluding application registration from the testing and certification of apps executed within an API Data Provider’s clinical environment. Response. We appreciate the feedback from commenters. Given the overwhelming support, we have finalized in § 170.315(g)(10)(iii) that Health IT Modules presented for testing and certification must enable apps to register with an authorization server. We clarify that Health IT Modules presented for testing and certification must support application registration regardless of the scope of patient search utilized by the application (e.g., single or multiple). This certification criterion requires a health IT developer, as finalized in the Condition of Certification requirements section below, to demonstrate its registration process, but does not require conformance to a standard. Additionally, we expect that apps executed within an implementer’s clinical environment will be registered with an authorization server, but we do not require a health IT developer to demonstrate its registration process for these ‘‘provider-facing’’ apps. We reiterate that we believe implementers of § 170.315(g)(10)-certified Health IT Modules should have the discretion to innovate and execute various methods for application registration within a clinical environment. Comments. Commenters provided a mix of support and opposition for requiring the OAuth 2.0 Dynamic Client Registration Protocol (RFC 7591) standard as the sole method of application registration. Some commenters felt that the Program should require dynamic client registration in the context of patientaccess scenarios only, and others felt the standard is not ready for mandated adoption in the Program. Commenters opposed to requiring the OAuth 2.0 Dynamic Client Registration Protocol (RFC 7591) felt that not specifying a standard would allow flexibility for different innovative registration approaches to be used and developed. Other commenters suggested there should be an option for data holders to support dynamic client application registration if the data holder prefers that approach, including support for dynamic application registration via trusted networks. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations Response. We appreciate the feedback from commenters. We have not adopted a requirement for Health IT Modules presented for testing and certification to support the OAuth 2.0 Dynamic Client Registration Protocol (RFC 7591) standard. We agree with commenters and believe that requiring registration without a mandated standard will allow registration models to develop further. We encourage health IT developers to coalesce around the development and implementation of a common standard for application registration with an API’s authorization server. Comments. Commenters suggested permitting implementers of § 170.315(g)(10)-certified Health IT Modules to undertake a review of thirdparty applications prior to permitting them to connect to the implementers’ deployed APIs. Response. We appreciate the suggestion from commenters. The requirement that health IT developers must enable an application to register with the § 170.315(g)(10)-certified Health IT Module’s authorization server only applies for the purposes of demonstrating technical conformance to the finalized certification criterion and Condition and Maintenance of Certification requirements. The practices by all parties (including implementers of Health IT Modules) other than developers of certified Health IT Modules are not in scope for this certification criterion nor the associated Condition and Maintenance of Certification requirements. All other practices associated with third-party application review or ‘‘vetting’’ by implementers must not violate the information blocking provision described in section VIII of this preamble and applicable laws and regulations. In general, an implementer of § 170.315(g)(10)-certified Health IT Modules (e.g., health care providers) would be allowed to review third-party applications the implementer intends to use for its own business use (e.g., a third-party decision-support application used by the health care provider in the course of furnishing care) prior to permitting the third-party applications to connect to the implementer’s deployed APIs within its enterprise and clinical users’ workflow. However, implementers of § 170.315(g)(10)certified Health IT Modules (e.g., health care providers) are not permitted to review or ‘‘vet’’ third-party applications intended for patient access and use (see section VII.C.6 of this preamble). We clarify that the third-party application registration process that a health IT developer must meet under this VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 criterion is not a form of review or ‘‘vetting’’ for purposes of this criterion. Comments. Commenters requested clarity on whether the ‘‘EHR Launch’’ scenario was out of scope for testing during registration with an authorization server. Response. Commenters referred to the ‘‘EHR Launch’’ scenario, which is the ‘‘launch-ehr’’ ‘‘SMART on FHIR Core Capability’’ included in the implementation specification adopted in § 170.215(a)(3). Health IT Modules presented for testing and certification must enable all apps that utilize the SMART IG ‘‘launch-standalone’’ ‘‘SMART on FHIR Core Capability’’ to register with an authorization server. We reiterate that the application registration requirement finalized in § 170.315(g)(10)(iii) does not require conformance to a standard or implementation specification. We envision that apps using only the SMART IG ‘‘launch-ehr’’ ‘‘SMART on FHIR Core Capability’’ will be tightly integrated with § 170.315(g)(10)certified Health IT Modules deployed by implementers, and will be able to accommodate registration processes that best suit the needs of those implementers. Additionally, while we do not require conformance to a standard or implementation specification for application registration, we clarify that Health IT Modules presented for testing and certification are required to support application registration functions to enable authentication and authorization as finalized in § 170.315(g)(10)(v). iv. Secure Connection We proposed in 84 FR 7483 in § 170.315(g)(10)(iv) that Health IT Modules presented for testing and certification must be capable of establishing a secure and trusted connection with an application requesting patient data in accordance with the proposed § 170.215(a)(5) (HL7 SMART Application Launch Framework Implementation Guide Release 1.0.0), including mandatory support for ‘‘Standalone Launch’’ and ‘‘EHR Launch’’ modes. Comments. Commenters asked for clarification around where ‘‘Standalone Launch’’ and ‘‘EHR Launch’’ capabilities are required, suggesting that ‘‘Standalone Launch’’ support be used exclusively for patient access and ‘‘EHR Launch’’ support be used exclusively for provider/clinician access. They also noted that testing and certification of ‘‘Standalone Launch’’ would not be a valid use case and should be excluded from the certification criterion. PO 00000 Frm 00105 Fmt 4701 Sfmt 4700 25745 Response. We appreciate the feedback from commenters. The SMART IG ‘‘Standalone Launch’’ and ‘‘EHR Launch’’ modes can be used by both provider- and patient-facing applications. We refer to the adopted implementation specification in § 170.215(a)(3) for clarification of certification requirements for the SMART IG. We have finalized in § 170.315(g)(10)(iv)(A) that Health IT Modules presented for testing and certification must demonstrate the ability to establish a secure and trusted connection with an application requesting data for a single patient in accordance with the implementation specifications adopted in § 170.215(a)(2) and (a)(3). We amended this text from the Proposed Rule by adding the US Core IG implementation specification adopted in § 170.215(a)(2) because the US Core IG specifically requires Transport Layer Security 1.2 (RFC 5246) 104 or higher for all transmissions not taking place over a secure network connection. Pursuant to this adopted implementation specification, we will test Health IT Modules for support for all ‘‘SMART on FHIR Core Capabilities’’ including both ‘‘launch-ehr’’ and ‘‘launch-standalone.’’ Additionally, we have finalized in § 170.315(g)(10)(iv)(B) that Health IT Modules presented for testing and certification must demonstrate the ability to establish a secure and trusted connection with an application requesting data for multiple patients in accordance with the implementation specification adopted in § 170.215(a)(4). The implementation specification adopted in § 170.215(a)(4) has several sections, but for testing and certification to this criterion, we specifically require conformance to, but not limited to, the ‘‘SMART Backend Services: Authorization Guide.’’ v. Authentication and Authorization We proposed in 84 FR 7483 in § 170.315(g)(10)(v) that Health IT Modules presented for testing and certification must demonstrate the ability to perform user authentication, user authorization, and issue a refresh token valid for a period of at least 3 months during its initial connection with an application to access data for a single patient in accordance with the proposed standard in § 170.215(b) (OpenID Connect Core 1.0 incorporating errata set 1) and the proposed implementation specification in § 170.215(a)(5) (HL7® SMART Application Launch Framework Implementation Guide Release 1.0.0). 104 https://tools.ietf.org/html/rfc5246. E:\FR\FM\01MYR3.SGM 01MYR3 25746 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations Additionally, we proposed in § 170.315(g)(10)(vi) that Health IT Modules presented for testing and certification must demonstrate the ability of an application to access data for a single patient and multiple patients during subsequent connections of applications capable of storing a client secret, in accordance with the proposed implementation specification in § 170.215(a)(5) (HL7 SMART Application Launch Framework Implementation Guide Release 1.0.0), without requiring the user to reauthorize and re-authenticate when a valid refresh token is supplied. Additionally, we proposed in 84 FR 7483 that Health IT Modules presented for testing and certification must demonstrate it can issue a new refresh token to an application, valid for a period of at least 3 months. Comments. A majority of commenters supported that Health IT Modules presented for testing and certification must demonstrate the ability to perform user authentication, user authorization, and issue a refresh token valid for a period of at least 3 months. Some commenters noted that the OAuth 2.0 implementation guide does not recommend servers provide refresh tokens to public/non-confidential applications. Response. We thank commenters for their feedback. Given the general support and in response to these comments, we have consolidated the proposed requirements in § 170.315(g)(10)(v) and § 170.315(g)(10)(vi) as a revised set of requirements finalized in § 170.315(g)(10)(v). Specifically, we have finalized requirements for authentication and authorization for patient and user scopes in § 170.315(g)(10)(v)(A) and requirements for authentication and authorization for system scopes in § 170.315(g)(10)(v)(B). We have focused the revised requirements around authentication and authorization scopes to remove any confusion associated with requirements for single and multiple patients. We have finalized authentication and authorization requirements for first time connections for patient and user scopes in § 170.315(g)(10)(v)(A)(1). This include the requirement finalized in § 170.315(g)(10)(v)(A)(1)(i) that Health IT Modules presented for testing and certification must demonstrate that authentication and authorization occurs during the process of granting access to patient data in accordance with the implementation specification adopted in § 170.215(a)(3) and standard adopted in § 170.215(b). It also includes the requirement finalized in VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 § 170.315(g)(10)(v)(A)(1)(ii) that an application capable of storing a client secret must be issued a refresh token valid for a period of no less than three months. Additionally, we have finalized authentication and authorization requirements for subsequent connections for patient and user scopes in § 170.315(g)(10)(v)(A)(2). This includes the requirements finalized in § 170.315(g)(10)(v)(A)(2)(i) that Health IT Modules presented for testing and certification must demonstrate that access is granted to patient data in accordance with the implementation specification adopted in § 170.215(a)(3) without requiring re-authorization and re-authentication when a valid refresh token is supplied by the application. It also includes the requirements finalized in § 170.315(g)(10)(v)(A)(2)(ii) that an application capable of storing a client secret must be issued a new refresh token valid for a new period of no less than three months. Additionally, we have finalized requirements for authentication and authorization for system scopes in § 170.315(g)(10)(v)(B), which require that Health IT Modules presented for testing and certification must demonstrate that authentication and authorization occurs during the process of granting an application access to patient data in accordance with the ‘‘SMART Backend Services: Authorization Guide’’ section of the implementation specification adopted in § 170.215(a)(4) and the application must be issued a valid access token. We note that for system scopes, applications will likely be authorized via a prior authorization negotiation and agreement between applications and Health IT Modules. For clarity, we use the term ‘‘an application capable of storing a client secret’’ to refer to ‘‘confidential clients.’’ In the definition at RFC 6749, ‘‘confidential’’ clients are ‘‘clients capable of maintaining the confidentiality of their credentials (e.g., client implemented on a secure server with restricted access to the client credentials), or capable of secure client authentication using other means.’’ RFC 6749 also defines ‘‘public’’ clients as ‘‘clients incapable of maintaining the confidentiality of their credentials (e.g., clients executing on the device used by the resource owner, such as an installed native application or a web browserbased application), and incapable of secure client authentication via any other means.’’ We clarify that the term ‘‘an application capable of storing a client secret’’ specifically excludes ‘‘public’’ clients. PO 00000 Frm 00106 Fmt 4701 Sfmt 4700 Additionally, we clarify that Health IT Modules will be explicitly tested for US Core IG operations using authentication and authorization tokens acquired via the process described in the implementation specification adopted in § 170.215(a)(3), and Health IT Modules will be explicitly tested for Bulk IG operations using authentication and authorization tokens acquired via the process described in the implementation specification adopted in § 170.215(a)(4). Comments. One commenter recommended that ONC introduce a Condition of Certification requirement to ensure that implementers of § 170.315(g)(10)-certified Health IT Modules can obtain automated systemlevel access to all API calls from the API servers offered by the Certified Health IT Developers (e.g., via the SMART Backend Services authorization guide), with ‘‘system/*.*’’ scopes. Response. We decline to accept the recommendation to require ‘‘system/ *.*’’ scopes as a certification requirement in § 170.315(g)(10). Insofar as the commenter requested that Health IT Modules make available automated system-level scopes for the purposes of an ‘‘all information export,’’ we have finalized a similar requirement in § 170.315(b)(10), and refer the commenter to that section for additional detail. Additionally, we have finalized in § 170.315(g)(10)(v)(B) that Health IT Modules must perform authentication and authorization during the process of granting an application access to patient data using system scopes in accordance with the ‘‘SMART Backend Services: Authorization Guide’’ section of the implementation specification adopted in § 170.215(a)(4). We recognize that the capabilities supported by ‘‘SMART Backend Services: Authorization Guide’’ could be used for many other use cases that are currently not required by the criterion. We clarify that implementers of Health IT Modules are not prohibited from configuring Health IT Modules to support the backend ‘‘system’’ scope described in the ‘‘SMART Backend Services: Authorization Guide’’ section of the Bulk IG adopted in § 170.215(a)(4) for API-enabled ‘‘read’’ services defined in the US Core IG. Indeed, we strongly encourage health IT developers to support these use cases as they develop in order to make full use of the certified functions of Health IT Modules and advance the state of the industry. Comments. Commenters suggested specifying that refresh tokens apply exclusively to patient access scenarios, noting that there are too many security risks to allow persistent tokens for provider-facing applications. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations Additionally, commenters suggested permitting Health IT Modules to support the revocation of refresh tokens in appropriate scenarios to address legitimate security concerns. Response. We appreciate the feedback from commenters. We do not agree that there are too many security risks to allow refresh tokens to be used for provider-facing applications. Refresh tokens are commonly used in health care and other industries to provide seamless integration of systems with other applications while reducing the need for the burdensome process of reauthentication and re-authorization. We expect implementers of § 170.315(g)(10)certified Health IT Modules to have the capability of revoking refresh tokens where appropriate. Additionally, we clarify that implementers of § 170.315(g)(10)-certified Health IT Modules are not prohibited from changing the length of refresh tokens for users of the API including patients and providers to align with their institutional policies. However, implementers of § 170.315(g)(10)certified Health IT Modules should be mindful of information blocking provisions applicable to them and that requiring patients to re-authenticate and re-authorize at a high frequency could inhibit patient access and implicate information blocking. Comments. Commenters suggested amending the time from three months to 12 months. One commenter agreed that the patient token should be valid for three months, but suggested the provider token be limited to 24 hours. One commenter suggested requiring reauthentication every time information is sought via APIs. Response. We appreciate the feedback from commenters. We believe a refresh token valid for a period of three months is sufficient to balance persistent access and security concerns. Moreover, for subsequent connections of applications capable of storing a client secret, Health IT Modules are required to issue a new refresh token valid for a new period of no shorter than three months per the API certification criterion requirement finalized in § 170.315(g)(10)(v)(A)(2)(ii). Given this requirement, we anticipate that the user’s application will renew its refresh token (valid for a new period of three months) every time the user actively engages with the application. We believe this justifies a refresh token length for a moderate period of no shorter than three months rather than a long period of 12 months suggested by commenters. Additionally, as stated above, implementers of § 170.315(g)(10)certified Health IT Modules are not prohibited from changing the length of VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 refresh tokens for users of the API, including patients and providers, to align with their institutional policies. Further, implementers of § 170.315(g)(10)-certified Health IT Modules are not prohibited from implementing their § 170.315(g)(10)certified Health IT Modules in accordance with their organizational security policies and posture, including by instituting policies for reauthentication and re-authorization (e.g., providers and/or patients could always be required to re-authenticate and re-authorize after a set number of refresh tokens have been issued). We also note that we have finalized a requirement in § 170.315(g)(10)(vi) that a Health IT Module’s authorization server must be able to revoke an authorized application’s access at a patient’s direction. This required capability will enable patients to definitively revoke an application’s authorization to receive their EHI until reauthorized, if ever, by the patient. Comments. Commenters suggested creating a more robust assessment process for identity management, including adding additional criteria for identity proofing, authentication, and authorization, and ensuring software developers do not act in a way that could inhibit patient control of their data. Response. We appreciate the feedback and suggestions. Although we agree that identity proofing is an important practice, we did not include requirements for identity proofing in the Proposed Rule, and have not finalized requirements for identity proofing in response to this comment. We note that the certification criterion finalized in § 170.315(g)(10) only applies to health IT developers. Given the scope of the Program, we believe that mandating identity proofing, which are generally business practices performed by organizations and other entities, is not something appropriate to require of health IT developers. We note that per the requirements of the 2015 Edition Privacy and Security Certification Framework, health IT developers with Health IT Modules certified to § 170.315(g)(7) through (g)(10) are required to certify to § 170.315(d)(1), which includes requirements for authentication, access control, and authorization. Additionally, authentication and authorization for use of § 170.315(g)(10)-certified Health IT Modules are included in the requirements finalized in § 170.315(g)(10)(v). We appreciate the sentiment expressed by commenters, and have created thorough and rigorous requirements to ensure adequate privacy PO 00000 Frm 00107 Fmt 4701 Sfmt 4700 25747 and security capabilities are present in § 170.315(g)(10)-certified Health IT Modules. Regarding the request for certification requirements to ensure that software developers do not act in a way that could inhibit patient control of their data, we refer to the requirement finalized in § 170.315(g)(10)(A), which requires that patients have the ability to grant applications authorization to access their EHI using granular FHIR Resources of their choice to comply with the adopted implementation specification in § 170.215(a)(3), and requirement in § 170.315(g)(10)(vi), which requires that a Health IT Module’s authorization server must be able to revoke an authorized application’s access at a patient’s direction. Comments. Several commenters suggested that patients be able to specify refresh token length, if desired, and revoke a third-party application’s access at any time. Commenters suggested that clear information be provided to patients whether authorized access is one-time or ongoing. Response. We appreciate the feedback from commenters. Refresh tokens are an OAuth 2.0 concept, and are largely opaque to the end user. However, we clarify that patients are not prohibited from changing the length of refresh tokens to the degree this option is available to them. Additionally, pursuant to these comments, and to ensure patients have the ability to revoke an application’s access to their EHI at any time, we have finalized an additional certification requirement in § 170.315(g)(10)(vi) which requires that a Health IT Module’s authorization server must be able to revoke an authorized application’s access at a patient’s direction. We have finalized this as a functional requirement to allow health IT developers the ability to implement it in a way that best suits their existing infrastructure and allows for innovative models for authorization revocation to develop. Additionally, per the requirement finalized in § 170.315(g)(10)(v)(A), Health IT Modules must perform authorization conformant with the implementation specification adopted in § 170.215(a)(3), including all ‘‘SMART on FHIR Core Capabilities.’’ The ‘‘permission-offline’’ ‘‘SMART on FHIR Core Capability’’ includes support for the ‘‘offline_ access’’ scope. Importantly, the implementation specification adopted in § 170.215(a)(3) requires that patients have the ability to explicitly enable the ‘‘offline_access’’ scope during authorization. If the ‘‘offline_access’’ scope is not enabled by patients, patients will be required to re- E:\FR\FM\01MYR3.SGM 01MYR3 25748 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations authenticate and re-authorize an application’s access to their EHI after the application’s access token expires. Comments. Commenters suggested providing the ability for implementers of § 170.315(g)(10)-certified Health IT Modules to perform token introspection using services enabled by health IT developers to ensure that additional resource servers can work with the same access tokens and authorization policies as the resource servers provided by API Technology Suppliers. Response. We appreciate the feedback from commenters. Based on feedback, we have finalized in § 170.315(g)(10)(vii) that Health IT Modules presented for testing and certification must demonstrate the ability to receive and validate a token issued by its authorization server, but we did not specify a standard for this requirement. Token introspection will allow implementers of § 170.315(g)(10)certified Health IT Modules to use API authorization servers and authorization tokens with various resource servers. This functionality has the potential to reduce complexity for implementers of § 170.315(g)(10)-certified Health IT Modules authorizing access to several resource servers and reduces the overall effort and subsequent use of § 170.315(g)(10)-certified Health IT Modules consistent with the goals of section 4002 of the Cures Act to enable the use of APIs without ‘‘special effort.’’ Although we do not specify a standard for token introspection, we encourage industry to coalesce around using a common standard, like OAuth 2.0 Token Introspection (RFC 7662).105 Comments. One commenter expressed concerns with the privacy and security of APIs, and nefarious actors posing as legitimate health facilities. Response. Regarding the privacy and security of APIs, the Standardized API for Patient and Population Services certification criterion finalized in § 170.315(g)(10) requires Health IT Modules presented for testing and certification to implement the implementation specification adopted in § 170.215(a)(3), which is based on the OAuth 2.0 security standard that is widely used in industry. The implementation of OpenID Connect paired with OAuth 2.0 allows health care providers to securely deploy and manage APIs consistent with their organizational practices. Health care providers retain control over how their workforce and patients authenticate when interacting with the API. For example, a patient may be required to use the same credentials (e.g., username 105 https://tools.ietf.org/html/rfc7662. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 and password) they created and use to access their EHI through a patient portal as they do when authorizing an application to access their data. Since patients complete the authentication process directly with their health care provider, no application will have access to their credentials. There is little protection software can provide to protect against nefarious actors posing as legitimate health facilities, however, we believe that implementing the security controls and safeguards described above, along with the privacy and security requirements required under the 2015 Edition Privacy and Security Certification Framework, will help to protect Health IT Modules against nefarious actors. Additionally, the protections required for ePHI in Health IT Modules offered by health IT developers acting as business associates of health care providers remain unchanged. vi. Technical Documentation We proposed in 84 FR 7484 in § 170.315(g)(10)(vii) that an API Technology Supplier needed to provide complete documentation via a publicly accessible hyperlink, without additional access requirements, for all aspects of its § 170.315(g)(10)-certified API, especially for any unique technical requirements and configurations, including API syntax, function names, required and optional parameters supported and their data types, return variables and their types/structures, exceptions and exception handling methods and their returns, the software components and configurations necessary for an application to successfully interact with the API and process its response(s), and all applicable technical requirements and attributes necessary for an application to be registered with an authorization server. Additionally, we proposed in 84 FR 7484 to remove the ‘‘terms of use’’ documentation provisions in the API certification criteria adopted in § 170.315(g)(7) through (g)(9) in order to reflect the Condition of Certification requirements and not be duplicative of the terms and conditions transparency Condition of Certification requirements proposed in 84 FR 7485. Comments. Commenters generally supported the requirements for this criterion as proposed. Some commenters suggested technical documentation should be limited to descriptions of how the API differs from the utilized standards and implementation specifications, like HL7® FHIR® and the SMART IG. Response. We appreciate the feedback from commenters. We did not make PO 00000 Frm 00108 Fmt 4701 Sfmt 4700 substantive changes to the requirements proposed in § 170.315(g)(10)(vii). We have finalized these requirements § 170.315(g)(10)(viii). We recognize that our formal adoption of the HL7 FHIR standard and the associated implementation specifications referenced in § 170.315(g)(10) would be consistent across all Health IT Modules presented for certification. As a result, there may be minimal additional documentation needed for these capabilities beyond what is already documented in adopted standards and implementation specifications. We expect health IT developers to disclose any additional data their § 170.315(g)(10)-certified Health IT Module supports in the context of the adopted standards and implementation specifications. The content of technical documentation required to meet this certification criteria are described in requirements finalized in § 170.315(g)(10)(viii)(A). We expect these and any additional documentation relevant to the use of a health IT developer’s § 170.315(g)(10)-certified Health IT Module to be made available via a publicly accessible hyperlink without preconditions or additional steps to meet the requirement as finalized in § 170.315(g)(10)(viii)(B). d. API Condition of Certification Requirements i. Key Terms We proposed in 84 FR 7477 to adopt new definitions for ‘‘API Technology Supplier,’’ ‘‘API Data Provider,’’ and ‘‘API User’’ in § 170.102 to describe the stakeholders relevant to our proposals. Comments. The majority of commenters recommended updating definitions and providing examples for the key terms, including API User. Most commenters recommended dividing ‘‘API User’’ into two categories: ‘‘FirstOrder Users,’’ to include patients, health care providers, and payers that use apps/services that connect to API technology, and ‘‘Third-Party Users,’’ to include third-party software developers, and developers of software applications used by API Data Providers. Response. We thank commenters for their feedback. We note that in this section we use the terms proposed in § 170.102 that we finalized in § 170.404(c) with added quotation marks for emphasis and clarity. We considered separating the term ‘‘API User’’ into distinct terms for developers of software applications and other users, such as patients and health care providers. However, we determined that this distinction was unnecessary from a regulatory perspective. Narrowing our E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations definitions to distinct subgroups could exclude unforeseen stakeholders that emerge in a future API ecosystem. The term ‘‘API User’’ was intended to describe stakeholders that interact with the certified API technology either directly (e.g., to develop third-party apps/services) or indirectly (e.g., as a user of a third-party app/service). Based on suggestions to revise the proposed key terms, we have renamed the term ‘‘API Data Provider’’ to ‘‘API Information Source’’ finalized in § 170.404(c) to make clear which party is the source and responsible for the EHI (as in ‘‘the source of the information is the health care provider’’), and ‘‘API Technology Supplier’’ to ‘‘Certified API Developer’’ finalized in § 170.404(c) to more clearly refer to health IT developers with Health IT Modules certified to any of the API criteria under the Program. Rather than keeping ‘‘API technology’’ an undefined term, we renamed it to ‘‘certified API technology’’ and finalized a definition in § 170.404(c). Additionally, we amended the definition of ‘‘API User’’ for clarity in § 170.404(c) to ‘‘API User means a person or entity that creates or uses software applications that interact with the ‘certified API technology’ developed by a ‘Certified API Developer’ and deployed by an ‘API Information Source.’’’ Additionally, we did not include the non-exhaustive list of examples of ‘‘API User’’ in the definition finalized in § 170.404(c). Instead, we rely on preamble to provide guidance for examples of ‘‘API Users’’ rather than appearing to limit the regulatory definition to these examples. We interpret that ‘‘API Users’’ can include, but are not limited to, software developers, patients, health care providers, and payers. We simplified the definition of ‘‘API Information Source’’ in § 170.404(c) to ‘‘API Information Source means an organization that deploys ‘certified API technology’ created by a ‘Certified API Developer.’’’ We revised the definition of ‘‘Certified API Developer’’ in § 170.404(c) to ‘‘Certified API Developer means a health IT developer that creates the ‘certified API technology’ that is certified to any of the certification criteria adopted in § 170.315(g)(7) through (10).’’ We added the definition of ‘‘certified API technology’’ in § 170.404(c) as ‘‘certified API technology means the capabilities of Health IT Modules that are certified to any of the API-focused certification criteria adopted in § 170.315(g)(7) through (10).’’ For ease of reference and to clarify that these terms only apply to the Condition and Maintenance of VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 Certification requirements, we have finalized these revised definitions in § 170.404(c). In this and other sections of the rule, we use the original proposed terms in the proposal and comment summaries, and the finalized terms in our responses. Comments. Some commenters suggested ONC allow flexibility for instances where stakeholders may meet the definition of more than one key term, and others recommended restricting stakeholders from meeting the definition of more than one key term. Commenters expressed concern with the complexity of key terms in the Proposed Rule, and confusion with the interaction of these terms with other criteria within the rule. Response. We thank commenters for expressing their concern about stakeholders being able to serve more than one role under the definitions proposed in § 170.102 that we have finalized in § 170.404(c). We do not believe it is practical to restrict persons or entities to just one definition. We anticipate situations where a person or entity can serve more than one role. For example, a large health care system could purchase and deploy ‘‘certified API technology’’ as an ‘‘API Information Source’’ and have ‘‘API Users’’ on staff that create or use software applications that interact with the ‘‘certified API technology.’’ Additionally, a health IT developer could serve as a ‘‘Certified API Developer’’ that creates ‘‘certified API technology’’ for testing and certification and as an ‘‘API User’’ when it creates software applications that connect to ‘‘certified API technology.’’ We clarify that a stakeholder will meet a role defined in § 170.404(c) based on the context in which they are acting. For example, only health IT developers (when acting in the context of a ‘‘Certified API Developer’’) are required to comply with these API Condition and Maintenance of Certification requirements. Comments. Commenters expressed concern that ONC exceeded its regulatory authority by implicating physicians in the definition of ‘‘API Data Providers.’’ Response. We remind commenters that these definitions were created to describe relationships between key API stakeholders and to help describe the Condition and Maintenance of Certification requirements. We clarify that health care providers are not covered by the Condition and Maintenance of Certification requirements to which the definitions apply in § 170.404(c) unless they are serving the role of a ‘‘Certified API Developer. PO 00000 Frm 00109 Fmt 4701 Sfmt 4700 25749 ii. Scope and Compliance We proposed in 84 FR 7485 that the Condition and Maintenance of Certification requirements proposed in § 170.404 apply to API Technology Suppliers with Health IT Modules certified to any API-focused certification criteria adopted in the proposed § 170.315(g)(7) through (11). Comments. Commenters agreed that the proposed applicability for the Condition of Certification requirements proposed in § 170.404 should be limited to health IT developers certified to any API-focused criteria adopted in the proposed § 170.315(g)(7) through (11). One commenter requested clarification whether non-certified internally developed laboratory systems would be subject to this requirement. Response. We thank stakeholders for their comments. We have generally finalized the scope and compliance for the Condition and Maintenance of Certification requirements as proposed in § 170.404 with one modification. Given that we have not adopted the certification criterion proposed for adoption in § 170.315(g)(11), the scope of the Condition and Maintenance of Certification requirements apply only to health IT developers with Health IT Modules certified to any of the APIfocused criteria finalized in § 170.315(g)(7) through (10). The Condition and Maintenance of Certification requirements finalized in § 170.404 do not apply to health IT developers not seeking certification, nor do they apply to health IT developers certified to solely non-API-focused criteria. Additionally, we clarify that the Condition and Maintenance of Certification requirements only apply to practices of Certified API Developers with respect to the capabilities included in § 170.315(g)(7) through (10). In other words, the Condition and Maintenance of Certification requirements would not apply to practices of Certified API Developers with respect to non-certified capabilities or practices associated with, for example, the immunization reporting certification criterion in § 170.315(f)(1), because that criterion is not one of the API-focused criteria finalized in § 170.315(g)(7) through (10). However, health IT developers should understand that other requirements in this final rule, especially those related to information blocking, could still apply to its business practices associated with non-API-focused certification criteria. iii. General We proposed in 84 FR 7485 in § 170.404(a)(1) to adopt the Cures Act’s E:\FR\FM\01MYR3.SGM 01MYR3 25750 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations API Condition of Certification requirement stating that an API Technology Supplier must, through an API, ‘‘provide access to all data elements of a patient’s electronic health record to the extent permissible under applicable privacy laws.’’ We then subsequently proposed in 84 FR 7485 to interpret ‘‘all data of a patient’s electronic health record’’ for the purposes of the scope of this API Condition of Certification requirement to include the proposed ARCH standard, its associated implementation specifications, and the policy expressed around the data elements that must be supported by § 170.315(g)(10)-certified APIs. Comments. Commenters supported our adoption of the Cures Act’s API Condition of Certification requirement. For the purposes of the scope of data covered under this API Condition of Certification requirement, most commenters recommended defining ‘‘all data elements’’ as the Data Elements referenced by the USCDI and the FHIR resources in the FHIR US Core Implementation Guide STU 3 (US Core IG) for FHIR Release 4. We received comments recommending additional data elements to be included that we discuss in our comment summary for the ARCH in the ‘‘API Standards, Implementation Specifications, and Certification Criterion’’ section of this final rule. Response. We appreciate stakeholder feedback. The § 170.315(g)(10) certification criterion requirement and associated standards and implementation specifications will enable secure, standards-based API access to a specific set of information. We have finalized that a Certified API Developer must publish APIs, and must allow EHI from such technology to be accessed, exchanged, and used without special effort through the use of APIs or successor technology or standards, as provided for under applicable law, including providing access to all data elements of a patient’s electronic health record to the extent permissible under applicable privacy laws, in § 170.404(a)(1). Additionally, for the purposes of meeting this portion of the Cures Act’s API Condition of Certification requirement, we clarify the data required and that must be supported to demonstrate conformance to the final § 170.315(g)(10) certification criterion (including all of its associated standards and implementation specifications) constitutes ‘‘all data elements of a patient’s electronic health record to the extent permissible under applicable privacy laws.’’ Regarding the recommendation by commenters that VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 the scope of ‘‘all data elements’’ include the Data Elements of the standard adopted in § 170.213 and FHIR resources referenced by the implementation specification adopted in § 170.215(a)(2), we note that both the standard and implementation specification are included in the interpretation of ‘‘all data elements of a patient’s electronic health record to the extent permissible under applicable privacy laws’’ above. We note that this specific interpretation does not extend beyond the API Condition and Maintenance of Certification requirements finalized in § 170.404 and cannot be inferred to reduce the scope or applicability of other Cures Act Conditions of Certification or the information blocking policies, which include a larger scope of data. iv. Transparency Conditions We proposed in 85 FR 7485 and 7486 in § 170.404(a)(2)(i) to require API Technology Suppliers make available complete business and technical documentation via a publicly accessible hyperlink, including all terms and conditions for use of its API technology. Additionally, we proposed that API Technology Suppliers must make clear to the public the timing information applicable to their disclosures in order to prevent discrepancies between an API Technology Supplier’s public documentation and its direct communication to customers. Additionally, we requested comment at 84 FR 7486 on whether the expectation for API Technology Suppliers to make necessary changes to transparency documentation should be finalized in regulation text, or whether this would be standard practice as part of making this documentation available. Comments. We received overall support from commenters for the need to make complete business and technical documentation available via a publicly accessible hyperlink. We did not receive public comment on whether we should formally include public disclosure requirements for regular updates to business and technical documentation in regulatory text. Response. We thank commenters for their support to make complete business and technical documentation available via a publicly accessible hyperlink. We have finalized in § 170.404(a)(2)(i) that a Certified API Developer must publish complete business and technical documentation, including the documentation described in § 170.404(a)(2)(ii), via a publicly accessible hyperlink that allows any person to directly access the information without any preconditions PO 00000 Frm 00110 Fmt 4701 Sfmt 4700 or additional steps. We made small adjustments to § 170.404(a)(2)(i) to reflect the changes in API definitions finalized in § 170.404(c). Given that we did not receive public comment on whether we should formally include public disclosure requirements for regular updates to business and technical documentation in regulatory text, so we have finalized in 170.404(a)(4)(iii)(B) that a Certified API Developer must provide notice and a reasonable opportunity for API Information Sources and API Users to update their applications to preserve compatibility with certified API technology and to comply with applicable terms and conditions. We note that notice could include a public notice made available on a website, but also encourage Certified API Developers to contact API Information Source customers and registered API Users (application developers) directly prior to updating business and technical documentation. (A) Terms and Conditions We proposed in 84 FR 7485 in § 170.404(a)(2)(ii)(A) that API Technology Suppliers must publish all terms and conditions for its API technology, including any restrictions, limitations, obligations, registration process requirements, or other similar requirements that would be needed to: Develop software applications to interact with the API technology; distribute, deploy, and enable the use of software applications in production environments that use the API technology; use software applications, including to access, exchange, and use EHI by means of the API technology; use any EHI obtained by means of the API technology; and register software applications. Additionally, we proposed in § 170.404(a)(2)(ii)(B) that any and all fees charged by an API Technology Supplier for the use of its API technology must be described in detailed, plain language, including the persons or classes of persons to whom the fee applies; the circumstances in which the fee applies; and the amount of the fee, which for variable fees must include the specific variable(s) and methodology(ies) that will be used to calculate the fee. Comments. We received support from stakeholders regarding the transparency of ‘‘all terms and conditions’’ associated with the use of API technology. Response. We thank commenters for their support. We believe this terms and conditions transparency requirement would ensure that API Information Sources and API Users do not experience ‘‘special effort’’ in the form E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations of unnecessary costs or delays in obtaining the terms and conditions for certified API technology. Furthermore, we believe full transparency is necessary to ensure that API Users have a thorough understanding in advance of any terms or conditions that might apply to them once they have committed to developing software that interacts with certified API technology. We have finalized in § 170.404(a)(2)(ii)(A) that Certified API Developers must publish all terms and conditions for its certified API technology, including any fees, restrictions, limitations, obligations, registration process requirements or other similar requirements as enumerated in § 170.404(a)(2)(ii)(A)(1) through (6). We made small adjustments to § 170.404(a)(2)(ii)(A) to reflect the changes in API definitions finalized in § 170.404(c). Additionally, we moved ‘‘App developer verification’’ from its proposed location in § 170.404(a)(2)(ii)(C) and finalized it in § 170.404(b)(1) to improve organization. We added the phrase ‘‘Used to verify the authenticity of API Users’’ to the regulation text finalized in § 170.404(a)(2)(ii)(A)(5) for consistency with our proposed policy. We also moved the phrase ‘‘Register software applications’’ from its proposed location in § 170.404(a)(2)(ii)(A)(5) to the finalized location in § 170.404(a)(2)(ii)(A)(6) and revised the phrase for consistency. Additionally, we made small changes to the regulation text finalized in § 170.404(a)(2)(ii)(A)(1) through § 170.404(a)(2)(ii)(A)(6) for clarity. Comments. We received both support and disagreement for the requirement to publish transparency documentation on API fees. Some commenters felt transparency documentation of API fees should be limited to value-added services, because those are the only permitted fees applicable to API Users, and the other permitted fees applicable to API Data Providers (usage-based fees and fees to recover costs for development, deployment, and upgrades) would be included in contractual documentation with their customers. Response. We recognize that some commenters had concern with making documentation on permitted fees publicly available. We believe that transparent documentation of all permitted fees is necessary to maintain a competitive marketplace and ensure that fees are reasonably related to the development, deployment, upgrade, and use of certified API technology. Fee transparency will also enable API Information Sources and API Users to VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 shop for certified API technology and related services that meet their needs. We have finalized in § 170.404(a)(2)(ii)(B) that any and all fees charged by a Certified API Developer for the use of its certified API technology must be described in detailed, plain language, including all material information described in § 170.404(a)(2)(ii)(B)(1) through (3). Additionally, we made small adjustments to § 170.404(a)(2)(ii)(B) to reflect the changes in API definitions finalized in § 170.404(c). Comments. Multiple stakeholders expressed the need to include consumer protections in the terms and conditions documentation with an explanation about how EHI will be used. Response. This provision of the Condition of Certification requirements does not prohibit additional content or limit the type of content a Certified API Developer may include in its terms and conditions. A Certified API Developer would be permitted to include consumer protections in their terms and conditions documentation. Additionally, we clarify these API Conditions of Certification requirements only apply to Certified API Developers. As such, API Information Sources and API Users are not required by the API Condition of Certification requirements to publish any terms and conditions, including those that apply to consumer protections. v. Fees Conditions (A) General Fees Prohibition We proposed in § 170.404(a)(3)(i)(A) that API Technology Suppliers would be prohibited from imposing fees associated with API technology as a Condition of Certification requirement. In establishing this general prohibition, ONC was mindful of the need for API Technology Suppliers to recover their costs and to earn a reasonable return on their investments in providing API technology that has been certified under the Program. Accordingly, we identified categories of ‘‘permitted fees’’ in 84 FR 7487 that API Technology Suppliers would be permitted to charge and still be compliant with the Condition of Certification and Program requirements. These include the proposed § 170.404(a)(3)(ii) (permitted fee for developing, deploying, and upgrading API technology), proposed § 170.404(a)(3)(iii) (permitted fee to recover costs of supporting API usage for purposes other than patient access), and proposed § 170.404(a)(3)(iv) (permitted fee for value-added services). We also proposed in 84 FR 7487 that API Technology Suppliers would not be PO 00000 Frm 00111 Fmt 4701 Sfmt 4700 25751 permitted to impose fees on any person in connection with an API Technology Supplier’s work to support the use of API technology to facilitate a patient’s ability to access, exchange, or use their EHI. We also clarified that while the proposed permitted fees set the boundaries for the fees API Technology Suppliers would be permitted to charge and to whom those permitted fees could be charged, the proposed regulations did not specify who could pay the API Technology Supplier’s permitted fee. Rather, we proposed general conditions that an API Technology Supplier’s permitted fees must satisfy in § 170.404(a)(3)(i)(B)(1) through (4), and requested comment in 84 FR 7488 on these conditions and whether they sufficiently restrict fees from being used to prevent access, exchange, and use of EHI through APIs without special effort. We include detailed discussions of permitted fees and related conditions below. Comments. Some commenters supported the clear prohibition on API fees outside those fees permitted in § 170.404(a)(3)(ii) through (iv), expressing that the language in the rule would prevent confusion regarding allowable and restricted fees. Some commenters noted that prohibiting fees would enable patients to exercise their HIPAA right of access without experiencing cost barriers, and remove cost barriers to hospitals and health care facilities using APIs for interoperability. Commenters noted that the proposals addressed many of the access and pricing practices that API Technology Suppliers engaged in to limit data exchange and gain a competitive advantage. Commenters noted that API Technology Supplier pricing practices often create barriers to entry and competition for apps that health care providers seek to use. Some commenters supported the proposal that prohibits API Technology Suppliers from charging fees to API Users. Response. We thank stakeholders for their support of and feedback on our proposal. We have finalized in § 170.404(a)(3)(i)(A) that all fees related to certified API technology not otherwise permitted by § 170.404(a)(3) are prohibited from being imposed by a Certified API Developer. Additionally, we have modified and reorganized these Condition of Certification requirements for clarity. We have renamed the title for the section from the Proposed Rule to ‘‘Fees conditions’’ because the requirements include both permitted and prohibited fees. We have updated the terminology used in this section to reflect changes made to the terminology used throughout the API Condition of E:\FR\FM\01MYR3.SGM 01MYR3 25752 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations Certification requirements and finalized in § 170.404(c). We finalized a requirement in § 170.404(a)(3)(i)(A) that permitted fees in paragraphs § 170.404(a)(3)(ii) and § 170.404(a)(3)(iv) may include fees that result in a reasonable profit margin in accordance with the information blocking Costs Exception provision finalized in § 170.302. We clarify that any fee that is not covered by those exceptions would be suspect under the information blocking provision, and would equally not be permitted by this API Condition of Certification requirement. This general prohibition on fees as finalized in § 170.404(a)(3)(i)(A) is meant to ensure that Certified API Developers do not engage in pricing practices that create barriers to entry and competition for apps and API-based services that health care providers seek to use. Such activities are inconsistent with the goal of enabling API-based access, exchange, and use of EHI by patients and other stakeholders without special effort. As finalized, this general prohibition allows for three categories of permitted fees (§ 170.404(a)(3)(ii) through (iv)) to allow Certified API Developers to recover their costs and to earn a reasonable return on their investments in providing certified API technology while being compliant with the Condition of Certification and Program requirements. Comments. Some commenters were critical of our proposals, expressing concerns that the proposed policies may stifle relationships between API Technology Suppliers and application developers. Others expressed concern that the proposed fee structure would place undue burden on API Data Providers, and that ONC should instead consider regulations that allow fee sharing across stakeholders. Some commenters stated that ONC should remove all prohibitions, and allow for market pricing and revenue sharing. Several commenters, many of whom were providers and provider organizations, requested additional clarity and guidance regarding the API fees that can be charged under the Condition of Certification requirements. Some commenters requested clarification regarding whether an API Data Provider can transfer costs to API Users. Other commenters requested clarification regarding when it is (and is not) appropriate for an API User to be charged a fee in connection with use of API technology. A few commenters requested that ONC provide a chart that lists all actors, all types of costs, and who can charge whom. Response. We appreciate this feedback from commenters. These VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 ‘‘general conditions,’’ as finalized in § 170.404(a)(3)(i) and discussed above, will facilitate API-based access, exchange, and use of EHI by patients and other stakeholders without special effort. We disagree with commenters that the permitted fee policies will stifle relationships between Certified API Developers and API Users. Cumulatively, these final policies create guardrails to protect against anticompetitive practices and reinforce the independence that we believe API Information Sources should have to establish relationships with API Users. Furthermore, we believe these fee policies are necessary in light of the potential for Certified API Developers to use their market position and control over certified API technology to engage in discriminatory practices that create special effort and barriers to the use of certified API technology. We continue to receive evidence that some Certified API Developers are engaging in practices that create special effort for the use of certified API technology. These practices include fees that create barriers to entry or competition as well as rent-seeking and other opportunistic behaviors. For example, we have received feedback that some Certified API Developers are conditioning access to technical documentation on revenue sharing or royalty agreements that bear no plausible relation to the costs incurred by the Certified API Developer to provide or enable the use of certified API technology. We are also aware of discriminatory pricing policies that have the purpose or effect of excluding competitors from the use of APIs and other interoperability elements despite the fact that the API Information Source would like to partner with and use these competitive, best-of-breed services. These practices from Certified API Developers close off the market to innovative applications and services that could empower patients and enable providers to deliver greater value and choice to health care consumers and other service providers. We note that Certified API Developers and API Users have the ability to collaborate and form relationships, so long as these relationships do not conflict with any of the provisions of this final rule or other applicable Federal and State laws and regulations. Further, we clarify that while the permitted fees set the boundaries for the fees Certified API Developers are permitted to charge and to whom those permitted fees can be charged, they do not prohibit who may pay the Certified API Developer’s permitted fee. In other words, these conditions limit the party PO 00000 Frm 00112 Fmt 4701 Sfmt 4700 from which a Certified API Developer may require payment, but they do not speak to who may pay the fee. For example, a permitted practice under these conditions could include a relationship or agreement where an API User or other party offered to pay the fee owed by the API Information Source to a Certified API Developer. This is an acceptable practice because the fee is first agreed upon between the Certified API Developer and API Information Source and subsequently paid by the API Information Source directly or by a third party on behalf of the API Information Source. We note that fees charged for ‘‘value-added services’’ can arise between an API Information Source and Certified API Developer or API User. As a general matter, we note that stakeholders should be mindful of other Federal and State laws and regulations that could prohibit or limit certain types of relationships involving remuneration. We provide additional clarity and guidance regarding the API fees that can be charged under the Condition of Certification requirements in the sections that follow. Additionally, we appreciate commenters’ requests for clarification, including a chart of actors and costs. We will take this comment into consideration as we develop educational materials to help explain the permitted fees conditions finalized in § 170.404(a)(3). Comments. Commenters suggested that one way to clarify the limits on API fees would be to require API Technology Suppliers provide fee information to ONC and for ONC to make this information publicly available, including information on individual pricing transactions. Response. We appreciate the recommendation from commenters to require Certified API Developers to provide fee information to ONC. We view fee transparency as a responsibility that a Certified API Developer can fulfill without having to send a listing of its API fees to ONC. We have finalized the provision in § 170.404(a)(2)(ii) that a Certified API Developer must publish all terms and conditions for its certified API technology, including any fees. Specifically, we have finalized in § 170.404(a)(2)(ii)(B) that any and all fees charged by a Certified API Developer for the use of its certified API technology must be described in detailed plain language, including the persons or classes of persons to whom the fee applies; the circumstances in which the fee applies; and the amount of the fee, which for variable fees must include the specific variable(s) and E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations methodology(ies) that will be used to calculate the fee. (B) Certified API Developer Permitted Fees Conditions We proposed general conditions in § 170.404(a)(3)(i)(B)(1) through (4) that an API Technology Supplier’s permitted fees must satisfy in order for such fees to be expressly permitted. Comments. We received support for the general conditions for permitted fees from commenters. Some commenters expressed appreciation for the guardrails and transparency of the permitted fees. Under the first condition, commenters sought clarity on the nature and extent of some of the permissible fees an API Technology Supplier can charge and how to model such fees, specifically regarding the ‘‘objective and verifiable’’ criteria. Another commenter supported the second condition that fees must be reasonably related to API Technology Supplier’s costs of supplying and, if applicable, supporting the API technology to the API Data Provider, especially in situations where physicians may also develop APIs or support apps. However, some commenters expressed concern with the third condition to reasonably allocate fees across all customers of the API. Commenters explained that fees could not be reasonably allocated across all customers of the API, because the number of customers will change over time. We received no comments on the fourth condition that API Technology Suppliers must ensure that fees are not based on whether the requestor or other person is a competitor who will be using the API technology in a way that facilitates competition. In addition to the general permitted fees proposed, some commenters recommended clear fee exemption for any health information provided or reported by a practice for the purpose of meeting reporting requirements. Response. We appreciate feedback from commenters. We have finalized these general conditions for permitted fees in § 170.404(a)(3)(i)(B) with some modifications as described further below. We have finalized that for all permitted fees, a Certified API Developer must: (1) Ensure that such fees are based on objective and verifiable criteria that are uniformly applied to all similarly situated API Information Sources and API Users; (2) Ensure that such fees imposed on API Information Sources are reasonably related to the Certified API Developer’s costs of supplying certified API technology to, and if applicable, support VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 certified API technology for, API Information Sources; (3) Ensure that such fees for supplying, and if applicable, supporting certified API technology are reasonably allocated among all similarly situated API Information Sources; and (4) Ensure that such fees are not based on whether API Information Sources or API Users are competitors, potential competitors, or will be using the certified API technology in a way that facilitates competition with the Certified API Developer. We have revised the term ‘‘substantially similar’’ to ‘‘similarly situated’’ in § 170.404(a)(3)(i)(B)(1) for clarity and to align with changes made in § 171.302. Additionally, in response to comments and to align with changes made in § 171.302 and § 170.404(a)(3)(i)(B)(1), we have revised the term ‘‘substantially similar’’ to ‘‘similarly situated’’ in § 170.404(a)(3)(i)(B)(3). We emphasize that this provision is meant to prevent one customer or a specific group of customers to whom the certified API technology is supplied or for whom it is supported from bearing an unreasonably high cost compared to other customers, which could lead to ‘‘special effort’’ for accessing and using APIs. We believe the final policy achieves the same goal as proposed and provides clearer guidelines for the regulated community to follow. Additionally, we have revised the phrase ‘‘classes of persons and requests’’ to ‘‘API Information Sources and API Users’’ in § 170.404(a)(3)(i)(B)(1) to clearly express the actors being charged fees by Certified API Developers. Additionally, we have revised the sentence structure and grammar in § 170.404(a)(3)(i)(B)(2) through (4) for simplification. In response to comments requesting clarity on the nature and extent of permissible fees a Certified API Developer can charge and how a Certified API Developer should model such fees, specifically regarding the ‘‘objective and verifiable’’ requirement finalized in § 170.404(a)(3)(i)(B)(1), we emphasize that there will be significant variability in the fee models and specific fees charged by each Certified API Developer. Our goal with the requirement that fees be ‘‘objective and verifiable’’ is to require Certified API Developers to apply fee criteria that, among other things, will lead the Certified API Developer to come to the same conclusion with respect to the permitted fee’s amount each time it administers a fee to an API Information Source or API User. Accordingly, the fee cannot be based on the Certified API PO 00000 Frm 00113 Fmt 4701 Sfmt 4700 25753 Developer’s subjective judgment or discretion. Comments. A few commenters suggested that ONC allow API Data Providers the ability to recoup the costs for upgrading technology. Response. This comment appears to misunderstand the scope and applicability of ONC’s authority with respect to these Condition of Certification requirements. We clarify that these Condition of Certification requirements apply only to Certified API Developers. We note that similar to any IT investment, API Information Sources (as ‘‘health care providers’’) would generally be expected to recover these costs through fees administered while delivering health care services. Additionally, if an API Information Source were to recoup such costs they would need to do so consistent with the information blocking exceptions and other applicable laws and regulations. Comments. Some commenters requested that ONC conduct evaluations after the implementation of the rule and use the results to drive future policy. Some commenters recommended a study to evaluate the real-world cost of APIs used by health systems in areas such as clinical decision support, payments, machine learning, and precision medicine. Commenters also suggested ONC conduct a study on whether these regulations improve patient access to their EHI. Response. We appreciate the evaluation recommendations. We will consider these suggestions as we implement and administer the Program. (C) Certified API Developer Prohibited Fees We proposed in 84 FR 7595 in § 170.404(a)(3)(iii)(B) that permitted fees would not include costs associated with intangible assets (including depreciation or loss of value), except the actual development or acquisition costs of such assets. Additionally, we proposed in § 170.404(a)(3)(iii)(C) that permitted fees would not include opportunity costs, except for the reasonable forward-looking cost of capital. Comments. We did not receive any comments specific to the proposal for costs associated with intangible assets other than actual development or acquisition costs of such assets. Response. We moved the proposed § 170.404(a)(3)(iii)(B) and (C) to the general conditions for permitted fees finalized in § 170.404(a)(3)(i)(C)(1) and (2), respectively, because they are general conditions on permitted fees rather than conditions for ‘‘Recovering API usage costs.’’ We did not make E:\FR\FM\01MYR3.SGM 01MYR3 25754 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations other changes to the proposed regulation text in these two sections other than updating terms to the finalized definitions in § 170.404(c). Additionally, in the discussion of the Fees Exception in this final rule (VIII.D.2.b), we discussed that one commenter expressed concern that the overlap between the Fees Exception and the Licensing Exception creates the potential for actors to recover the same costs twice. The commenter explained that licensing of IP is intended to recoup the costs of development of that IP, so where the IP is an interoperability element, the costs reasonably incurred for its development should be incorporated into the royalty rate. The commenter recommended that we be clearer that, in these circumstances, only a single recovery is permitted. In order to address this comment and align the API permitted fees with related provisions finalized in the Fees Exception (§ 170.302(a)(2)(vi)) and Licensing Exception (§ 170.303(b)(2)(iv)), we have added and finalized § 170.404(a)(3)(i)(C)(3), which states that the permitted fees in this section cannot include any costs that that led to the creation of IP if the actor charged a royalty for that IP pursuant to § 170.303 and that royalty included the development costs for the creation of the IP. We refer readers to the ‘‘Basis for Fees Condition’’ sub-section within section VIII.D.2.b for a more detailed discussion of the rationale for this addition. (i) General Examples of Prohibited Fees As discussed in the Proposed Rule in 84 FR 7481 and finalized in § 170.404(a)(3)(i)(A), any API-related fee imposed by a Certified API Developer that is not expressly permitted is prohibited. In the Proposed Rule, we provided the following non-exhaustive examples of fees for services that Certified API Developers would be prohibited from charging, and reiterate them here in the final rule for clarity: (1) Any fee for access to the documentation that a Certified API Developer is required to publish or make available under this Condition of Certification requirement. (2) Any fee for access to other types of documentation or information that a software developer may reasonably require to make effective use of certified API technology for any legally permissible purpose. (3) Any fee in connection with any services that would be essential to a developer or other person’s ability to develop and commercially distribute production-ready applications that use certified API technology. These services VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 could include, for example, access to ‘‘test environments’’ and other resources that an application developer would need to efficiently design and develop apps. The services could also include access to distribution channels if they are necessary to deploy productionready software and to production resources, such as the information needed to connect to certified API technology (e.g., service base URLs) or the ability to dynamically register with an authorization server. Comments. At least one commenter expressed concern about the openended nature of the examples of prohibited fees we provided in the Proposed Rule. In particular, that any fee in connection with any services that would be essential to a developer or other person’s ability to develop and commercially distribute productionready applications that use API technology would be prohibited. They stated that if the example were not more clearly defined and scoped, it could be used by API Users to create requirements for API Technology Suppliers beyond what would normally be considered necessary to successfully deploy apps in production. They requested ONC more clearly define ‘‘essential services’’ in final rulemaking or withdraw the reference. Response. We appreciate the feedback from commenters. We disagree with commenters that the examples are too broad. We believe that in some cases they need to be general because of the diverse and varied practices that could be used by Certified API Developers to create special effort to use certified API technology. While we understand that the generality of the example regarding ‘‘essential services’’ may at first appear difficult for Certified API Developers to follow and, per the commenter, could be creatively used by an API User to request more support than necessary, we offer the following as additional guidance: A Certified API Developer is best positioned to know what an API User, for example, needs to have access to and do programmatically in order for the API User’s application to be developed and commercially distributed as production-ready for use with certified API technology. From a Certified API Developer’s perspective, if that requires any number of mandatory steps (e.g., passing tests in sandbox/test environment, conducting a demo, submitting documentation or paperwork) in order for the application to be production-ready for use with certified API technology, then fees associated with those mandatory steps are prohibited. Conversely, fees for requirements beyond what a Certified PO 00000 Frm 00114 Fmt 4701 Sfmt 4700 API Developer considers necessary to successfully deploy applications in production are considered supplemental to the development, testing, and deployment of software applications that interact with certified API technology, and are permitted fees for value added services as finalized in § 170.404(a)(3)(iv). (D) Record-Keeping Requirements We proposed in § 170.404(a)(3)(v) that API Technology Suppliers must keep for inspection detailed records of all API technology fees charged, all costs incurred to provide API technology to API Data Providers, methodologies used to calculate such fees, and the specific costs to which such fees are attributed. We requested comment in 84 FR 7492 on whether these requirements provide adequate traceability and accountability for costs permitted under this API Condition of Certification and whether to require more detailed accounting records or prescribe specific accounting standards. Comments. A majority of commenters expressed concerns with the level of granularity proposed for record keeping in § 170.404(a)(3)(v). These commenters stated that the required recordkeeping would exceed documentation performed for any other purpose. Some commenters stated that the requirement for health IT developers to track who pays fees and how fees enter the system will cause significant administrative burden, especially on smaller vendors or vendors with business models that require less operational overhead. Additionally, they stated that the requirement for clients to maintain and potentially publicly disclose records of fees for inspection would place a burden on IT providers, and could potentially allow bigger companies to engage in practices such as predatory pricing. Commenters suggested ONC have a more scaled-back method, and simply allow patients the ability to access their EHI without charge. These commenters recommended focusing on a good conduct approach rather than prescriptive requirements. Response. We thank commenters for their feedback and perspective. We moved § 170.404(a)(3)(v) to 170.404(a)(3)(i)(D) for better organization because this provision applies to the permitted fee Condition of Certification requirements finalized in § 170.404(a)(3)(ii) through (iii). We have finalized in § 170.404(a)(3)(i)(D) that Certified API Developers must keep detailed records for inspection of all fees charged, all costs incurred to provide certified API technology to API Information Sources, methodologies E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations used to calculate such fees, and the specific costs to which fees are attributed. Considering the feedback on perceived burden, we believe transparency and documentation of API fees is necessary to mitigate unfair pricing practices that may stifle innovation or otherwise create barriers to the goals of enabling API-based access, exchange, and use of EHI without special effort. Further, we believe that the accounting practices already used by health IT developers will largely support the health IT developer to meet this requirement. Examples of these practices by health IT developers include the methods used to track their own investments, determine how to bill and issue invoices to their customers, document receipt of payment, and to maintain overall accurate financial records of business transactions. We find it difficult to believe, as some commenters appeared to indicate, that health IT developers are not already keeping such financial records and that this requirement would create substantial new documentation burden for Certified API Developers. The record-keeping requirements finalized in 170.404(a)(3)(i)(D) foster transparency and promote accountability in the Program. In response to the comments received, we have not added additional requirements for accounting records or standards. (E) Permitted Fee for Development, Deployment, and Upgrades We proposed in § 170.404(a)(3)(ii) to permit an API Technology Supplier to charge API Data Providers reasonable fees for developing, deploying, and upgrading Health IT Modules certified to § 170.315(g)(7) through (g)(11). Comments. Many commenters applauded the permitted fee related to development, deployment, and upgrading API technology. The majority supported the proposal that fees would not be permitted if they interfere with an API User’s ability to efficiently and effectively develop and deploy production-ready software. A few commenters expressed concern that our proposals regarding development, deployment, and upgrade fees were not restrictive enough. Commenters noted that API Technology Suppliers will use the allowable fees, such as for program upgrades, as a barrier to providing interoperability between systems or other applications and a means to eliminate competitive threats. Some of these commenters recommended that ONC explicitly prohibit API Technology Suppliers from charging any fees for implementing APIs and for facilitating the interoperable exchange of EHI and VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 that this blanket prohibition apply to all new and updated API technology. A few commenters noted that it is possible that API Technology Suppliers will bundle or upcharge service fees to recoup API technology development costs and API Technology Suppliers should not be allowed to charge costs for development or impose surcharges for product feature development. They noted that product feature development should be considered a cost of doing business and can be amortized as a one-time capital expense across the vendor’s entire customer base without the need for recovering costs from API Users. They emphasized that API access and use prices need to be transparent as the intent of Congress was to have APIs be made easily available and at no or low cost, not to be a source of revenue for profit. Other commenters noted that the development of the APIs themselves should be regarded as part of the license fee and the API Technology Suppliers should not be permitted to charge an additional license fee to either the API Data Provider or API User for what is an inherent part of the software. Another commenter requested that consideration be applied toward potential additional hidden integration fees. Response. We appreciate the support, concerns, and recommendations from commenters. We finalized this proposal in § 170.404(a)(3)(ii) as proposed with updated terms based on the revised finalized definitions in § 170.404(c). We refer to the discussions below and 84 FR 7488 for additional details on what Certified API Developer fees for ‘‘developing,’’ ‘‘deploying,’’ and ‘‘upgrading’’ certified API technology comprise. We also note that the nature of the costs charged under this category of permitted fees depends on the scope of the work to be undertaken by a Certified API Developer (i.e., how much or how little labor an API Information Source requires of the Certified API Developer to deploy and upgrade the certified API technology). We sincerely thank commenters for the various recommendations to prohibit or restrict fees regarding certified API technology. In order to reconcile the recommendations specific to § 170.404(a)(3)(ii) and other conditions in this final rule, we have aligned related conditions to address concerns and mitigate potential fee practices that could limit API-based access, exchange, and use of EHI by patients and other stakeholders without special effort. As finalized, we believe the fees permitted in § 170.404(a)(3)(ii) and § 170.404(a)(3)(i)(B), transparency requirements in § 170.404(a)(2), and openness and pro-competitive PO 00000 Frm 00115 Fmt 4701 Sfmt 4700 25755 conditions in § 170.404(a)(4) will ensure that fees permitted for upgrade costs will not be used as a barrier to providing interoperability between systems or other applications, or as a means to eliminate competitive threats. Additionally, the transparency requirements regarding the publication of fees finalized in § 170.404(a)(2)(ii)(B) will help prevent hidden integration fees cited by commenters. We thank commenters for recommending and noting that development of the APIs themselves should be regarded as part of a license fee and that Certified API Developers should not be permitted to charge an additional license fee for what is an inherent part of the software. In response to this recommendation, we have added a provision in § 170.404(a)(3)(i)(C)(3) that states that permitted fees in § 170.404(a)(3)(ii) through (iv) may not include any costs that led to the creation of IP, if the actor charged a royalty for that IP pursuant to the information blocking Licensing Exception (§ 171.303). This provision aligns with similar provisions included in the information blocking section and will ensure that Certified API Developers cannot earn a double recovery in instances described by the commenter. We will continue to work with stakeholders to advance policies that promote interoperability and deter practices that may stifle innovation or present barriers to the access, exchange, and use of EHI through APIs. Subject to the general conditions in § 170.404(a)(3)(i), our final policies support the ability of Certified API Developers to recover the full range of reasonable costs associated with developing, deploying, and upgrading API technology over time. It is important that Certified API Developers be able to recover these costs and earn a reasonable return on their investments so that they have adequate incentives to make continued investments in these technologies. In particular, we anticipate Certified API Developers will need to continually expand the data elements and upgrade the capabilities associated with certified APIs as the USCDI and HL7® FHIR® standard and associated implementation specifications mature. We refer readers to the information blocking section of this preamble (VIII) for additional information on activities that may constitute information blocking and for discussion about how the fees provisions in this Condition of Certification and within the information blocking section support innovation. E:\FR\FM\01MYR3.SGM 01MYR3 25756 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations Comments. Some developers expressed concern regarding balancing and distributing costs with regard to the permitted fee for developing, deploying, and upgrading technology. The commenters noted ONC proposed that the cost for development be distributed among those who will use it, which they felt was problematic in many ways, but most fundamentally because it suggests a serious misconception about how software development is funded, priced, and sold. The commenters emphasized that requiring development costs to be divided among clients purchasing the API necessitates new and complex business processes and creates unsolvable scenarios that could easily create business conflicts between API Technology Suppliers and their clients. At least one commenter suggested that ONC should consider balancing the costs associated with API development and deployment across both API Data Providers and certain API Users to ensure that third-party software application developers also bear some of the financial burden, since they stand to generate revenue from the use of their apps. Commenters asked ONC clarify why it believes it is inappropriate to pass development, deployment, and upgrade costs on to API Users. Other commenters noted that the costs for updating information systems and Health IT Modules to the new standards and requirements should not be passed on to physicians and patients. Response. We appreciate the feedback from commenters. We proposed and finalized this permitted fee for development, deployment, and upgrade costs because we believe that these costs should be negotiated solely between the Certified API Developer that supplies the capabilities and the API Information Source that implements them in their production environment. In our view, it is inappropriate for Certified API Developers to go around the API Information Source to directly impose financial cost burdens on API Users for the benefit of working with or connecting to the API Information Source. Based on our experience, the practice of a Certified API Developer going around its customer (the API Information Source) to also charge API Users erodes an API Information Source’s choice and the independence of their relationship with API Users. As such, that kind of business practice would be something that we would consider creating special effort on the part of the API Users if they had to continue to face additional fees just for permission to work with or connect to VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 an API Information Source’s certified API technology. While the development, deployment, and upgrade permitted fee is limited between the Certified API Developer and API Information Source as a way to recoup a Certified API Developer’s costs to supply certified API technology to a particular API Information Source, we again reiterate that the value added services permitted fee providers Certified API Developers a wide range of options to make additional revenue related to their certified API technology. Should API Users stand to generate revenue from the use of their apps, any fee an API Information Source may impose would not be in scope for this Condition of Certification but would be likely be covered by information blocking. Accordingly, we emphasize that such stakeholders should take care to ensure they are compliant with other Federal and State laws and regulations that may prohibit or limit certain types of relationships involving remuneration. In response to comments suggesting that costs for updating information systems and Health IT Modules to the new standards and requirements would be passed on to physicians and patients, we disagree. We emphasize that most of the information contained in a patient’s electronic record has been documented during the practice of medicine or has otherwise been captured in the course of providing health care services to patients. In our view, patients have effectively paid for this information, either directly or through their employers, health plans, and other entities that negotiate and purchase health care items and services on their behalf, and should be able to access the information via certified API technology without fees. Comments. Some developers suggested that API Technology Suppliers should be able to charge fees for access to a test environment and requested clarification as to whether an API Technology Supplier can charge for the use of sandboxes by API Users. Response. We appreciate the feedback from commenters. As detailed in the ‘‘General Examples of Prohibited Fees’’ section of the preamble text and included in the general prohibition finalized in § 170.404(a)(3)(i)(A), Certified API Developers are prohibited from charging fees in connection with any services essential to a developer or other person’s ability to develop and commercially distribute productionready applications for use with certified API technology. In general, if a test environment or sandbox is required to be used by a Certified API Developer and is essential for an application to be PO 00000 Frm 00116 Fmt 4701 Sfmt 4700 developed in order to be considered production-ready by the Certified API Developer for use with its certified API technology, then fees associated with that kind of test environment would be prohibited as they would impose special effort. However, we note that this prohibition is not globally applicable. If instead, the purpose of the testing environment was to provide specific testing above-and-beyond productionreadiness for use with certified API technology, then fees could be charged for such testing as part of the valueadded services permitted fee. Comments. A few commenters requested guidance on how ONC expects API Technology Suppliers to account for the costs incurred to develop, deploy, and upgrade the API technology, which is part of, and not necessarily separable from, the broader EHR product. Several commenters opposed the prohibition against charging for work to upgrade the broader EHR product, expressing that this is essential work needed to modernize their solutions as broader technologies evolve. One commenter noted that the Proposed Rule does not set specific guidelines on what constitutes an upgrade or how much the fee could be, and it is the commenter’s experience that EHR systems often charge fees for such services as integrating with a clinical data registry or using outside or non-preferred software. Response. We thank stakeholders for their comments. While we understand that there is overlap between features of the certified API technology and the ‘‘broader EHR product,’’ we refer specifically to development, deployment, and upgrades made to ‘‘certified API technology’’ as defined in § 170.404(c). Namely, development, deployment, and upgrades made to the capabilities of certified Health IT Modules that fulfill the API-focused certification criteria adopted at § 170.315(g)(7) through (10). In response to commenters concerned that EHR developers often charge fees for services such as integrating with a clinical data registry or using outside or nonpreferred software, we note that, as described in § 170.404(a)(3)(i)(A), Certified API Developers are prohibited from imposing fees associated with certified API technology unless included as a permitted fee in § 170.404(a)(3)(ii) through (iv). We do not include specific price information for permitted fees to develop, deploy, or upgrade API technology, because these costs are subject to change over time with new technology and varying development, deployment, and upgrade E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations efforts. Instead, we allow Certified API Developers to recover their costs (including costs that result in a reasonable profit margin for permitted fees in § 170.404(a)(3)(ii) and § 170.404(a)(3)(iv)) in providing certified API technology while being compliant with the Condition and Maintenance of Certification and Program requirements. We include descriptions of fees for developing, deploying, and upgrading API technology in the sections that follow, in which we offer additional clarity, as discussed in the Proposed Rule at 84 FR 7488, on the fees for developing, deploying, and updating API technology. (i) Fees for Developing Certified API Technology Fees for ‘‘developing’’ certified API technology comprise the Certified API Developer’s costs of designing, developing, and testing certified API technology. In keeping with our discussion at 84 FR 7488, fees for developing certified API technology must not include the Certified API Developer’s costs of updating the nonAPI related capabilities of the Certified API Developer’s existing Health IT Modules, including its databases, as part of its development of the certified API technology. As we further discussed in 84 FR 7488 in our Proposed Rule, these costs are connected to past business decisions made by the Certified API Developer and typically arise due to Health IT Modules being designed or implemented in nonstandard ways that unnecessarily increase the complexity, difficulty or burden of accessing, exchanging, or using EHI. The recovery of costs associated with updating a Certified API Developer’s non-API related Health IT Modules capabilities would be inconsistent with the Cures Act requirement that API technology be deployed ‘‘without special effort.’’ (ii) Fees for Deploying Certified API Technology Certified API Developer’s fees for ‘‘deploying’’ certified API technology comprise the Certified API Developer’s costs of operationalizing certified API technology in a production environment. Such fees include, but are not limited to, standing up hosting infrastructure, software installation and configuration, and the creation and maintenance of API Information Source administrative functions. We discussed in our Proposed Rule that a Certified API Developer’s fees for ‘‘deploying’’ certified API technology does not include the costs associated with managing the traffic of API calls that are VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 used to access the certified API technology, which a Certified API Developer can only recover under the permitted fee for usage support costs (§ 170.404(a)(3)(iii)). We emphasize that for the purpose of this Condition of Certification, we consider that certified API technology is ‘‘deployed’’ by the customer—the API Information Source—that purchased or licensed it. (iii) Fees for Upgrading Certified API Technology The Certified API Developer’s fees for ‘‘upgrading’’ certified API technology comprise the Certified API Developer’s costs of supplying an API Information Source with an updated version of certified API technology. Such costs would include the costs required to bring certified API technology into conformity with new requirements of the Program, upgrades to implement general software updates (not otherwise covered by development fees or under warranty), or developing and releasing newer versions of the certified API technology at the request of an API Information Source. The nature of the costs that can be charged under this category of permitted fees depends on the scope of the work undertaken by a Certified API Developer (i.e., how much or how little labor an API Information Source requires of the Certified API Developer to upgrade the certified API technology being supplied from one version or set of functions to the next). (F) Permitted Fee to Recover Costs of Supporting API Usage We proposed in 84 FR 7489 in § 170.404(a)(3)(iii) to permit an API Technology Supplier to charge API usage-based fees to API Data Providers to recover the API Technology Supplier’s reasonable incremental costs for purposes other than facilitating the access, exchange, or use of EHI by patients or their applications, technologies, or services. We considered ‘‘usage-based’’ fees to be the fees imposed by an API Technology Supplier to recover the costs that would typically be incurred supporting API interactions at increasing volumes and scale within established service levels. Additionally, in 84 FR 7489 under § 170.404(a)(3)(iii), we proposed that any usage-based fees associated with API technology be limited to the recovery of the API Technology Supplier’s ‘‘incremental costs.’’ Additionally, we proposed in § 170.404(a)(3)(iii)(A) that the permitted fee would not include any costs incurred by the API Technology Supplier to support uses of the API technology that facilitate a patient’s ability to access, exchange, or use their PO 00000 Frm 00117 Fmt 4701 Sfmt 4700 25757 EHI. Finally, we proposed in § 170.404(a)(3)(iii)(B)–(C) restrictions for permitted fees that were moved to the general permitted fees section finalized in § 170.404(a)(3)(i)(C). Comments. Commenters generally supported our proposal to permit an API Technology Suppliers to charge usagebased fees to API Data Providers to the extent that the API technology is used for purposes other than facilitating the access, exchange, or use of EHI by patients or their applications, technologies, or services. Response. We appreciate support from commenters and have finalized this proposal in § 170.404(a)(3)(iii) with some modification. We amended the title of the regulation text for clarity in § 170.404(a)(3)(iii) to ‘‘Permitted fee— Recovering API usage costs.’’ Additionally, we amended the regulation text to focus on usage-based fees and Certified API Developer’s reasonable incremental costs. We did not finalize the specific prohibition on permitted fees proposed in § 170.404(a)(3)(iii)(A) that the ‘‘permitted fee does not include costs incurred by the API Technology Supplier to support uses of the API technology that facilitate a patient’s ability to access, exchange, or use electronic health information.’’ We did not finalize this aspect of the provision because upon further consideration of this cost and the fee prohibition included in information blocking related to patient access, we determined that these fees remain necessary in order to allow Certified API Developers to recover incremental costs reasonably incurred during the process of hosting certified API technology on behalf of the API Information Source. We reiterate that a Certified API Developer’s ‘‘incremental costs’’ comprise the Certified API Developer’s costs that are directly attributable to supporting API interactions at increasing volumes and scale within established service levels. A Certified API Developer should ‘‘price’’ its costs of supporting access to the certified API technology by reference to the additional costs that the Certified API Developer would incur in supporting certain volumes of API use. For comments and responses related to the proposed provisions in § 170.404(a)(3)(iii)(B) and (C), we refer readers to the header ‘‘Certified API Developer Prohibited Fees.’’ Comments. We received a few comments focused on volume thresholds and incremental costs. A few commenters supported a reasonable cap for API call fees. Several recommended changing the parameters around API usage-based fees to focus on volume E:\FR\FM\01MYR3.SGM 01MYR3 25758 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations thresholds being included in any contractual language related to these fees, to ensure that any incremental costs attributable to supporting API interactions at increasing volumes and scale are addressed appropriately. Commenters noted that if an API Technology Supplier is receiving fees to develop, deploy, and upgrade API technology, it is unlikely that they would also need to charge for usage of the APIs, as long as their usage remains under a pre-determined volume threshold. A few commenters noted that the volume of requests that will be pinging APIs may compromise the performance of data retrieval and effective user experience. In order to protect against denial of service attacks whether intentional or inadvertent, they stated ONC should consider an additional throttling or rate-limiting layer or capability onto the API in order for the API to accept and digest the data being entered or extracted. A few commenters noted that our proposal could create loopholes that would enable certain organizations to charge highly burdensome, excessive fees to clinical registries to access their data. A few commenters expressed concern that this proposal is not restrictive enough. Some commenters requested that ONC provide more definitive guidance, including a range of prices based on examples from the current marketplace, to ensure providers are not charged unreasonable fees by API Technology Suppliers and can reasonably charge API Users for the cost of accessing their API technology. Response. We appreciate the feedback from commenters. This Condition of Certification requirement offers the flexibility necessary to accommodate reasonable pricing methodologies and will allow Certified API Developers to explore innovative approaches to recovering the costs associated with supporting the use of certified API technology with a permitted fee. As described in the Proposed Rule (84 FR 7489), ‘‘usage-based’’ fees are fees imposed by a Certified API Developer to recover costs typically incurred for supporting API interactions at increasing volumes and scale within established service levels. That is, ‘‘usage-based’’ fees recover costs incurred by a Certified API Developer due to the actual use of the certified API technology once it has been deployed (e.g., costs to support a higher volume of traffic, data, or number of apps via the certified API technology). Certified API Developers can adopt a range of pricing methodologies when charging for the support of API usage. We appreciate commenters’ request to VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 establish a reasonable cap for API usagebased fees, but the focus of our policy is to identify usage fees as a type of permitted fee and not to dictate a singular fee model, which we believe could limit Certified API Developers ability to create innovative fee models that serve to benefit themselves and API Information Sources. We decline to include a price cap for API usage-based fees or a range of prices for API fees based on examples from the current marketplace because we anticipate the cost of technology will change over time and so too will the way in which usage costs are calculated. Additionally, while we understand and expect that Certified API Developers and API Information Sources will deploy particular security methods to mitigate the risk of denial of service attacks and other impacts on API availability, these types of technology layers are separate from the focus of our policy on permitted API usage fees. Comments. Several commenters requested that ONC further clarify that API Technology Suppliers should not attempt to charge different fees for different API transactions as they frequently do today. Response. We appreciate this information and feedback from commenters. We clarify that Certified API Developers are permitted to charge ‘‘usage-based’’ fees to recover the costs that would typically be incurred supporting API transactions at increasing volumes and scale within established service levels. To clarify, usage-based fees recover costs incurred by a Certified API Developer related to the actual use of certified API technology once it has been deployed (e.g., costs to support a higher volume of traffic, data, or number of apps via the API Technology). We acknowledge that Certified API Developers could adopt a range of pricing methodologies when charging for the support of API usage, including potentially charging higher prices for some API transactions that incur relatively higher costs than others. However, in combination with this flexibility, Certified API Developers will still need to be mindful of not violating any overarching information blocking policies. We refer readers to a discussion in the Proposed Rule in 84 FR 7489 for additional discussions on usage-based fees. Comments. Some commenters emphasized that it is unreasonable to presume that API User-driven data overages should be the responsibility of the API Data Provider. While other commenters expressed concern that our proposal will leave providers, who are mandated to use certified EHRs that include API technology and provide PO 00000 Frm 00118 Fmt 4701 Sfmt 4700 patients with access to data via those APIs, responsible for a variety of unwarranted costs with little recourse to recover those costs. Response. While we understand the perspective from which these concerns arise, especially regarding unpredictable overuse of certified API technology, an API Information Source has financial responsibility for its overall technology infrastructure. This accountability is no different for certified API technology than it is for non-certified APIs and other interfaces that may also create costs for the API Information Source (i.e., health care provider). Given that API Users can also include an API Information Source’s own employees/ internal tools and 3rd party partners’ tools, an API Information Source is best positioned and generally accountable for its financial commitments. Again, as noted above, we do not limit who may pay for the charges an API Information Source incurs. An API Information Source should have full knowledge and ability to assess what employees, internal applications, and 3rd party services it has granted access to use and interact with its certified API technology. With respect to potential overages as a result of patient access, as we have stated before, we believe patients have effectively paid for this information, either directly or through their employers, health plans, and other entities that negotiate and purchase health care items and services on their behalf, and believe they should not be charged. Additionally, as stated in the Proposed Rule (84 FR 7489) and finalized here, usage fees for certified API technology will only apply when the Certified API Developer acts on behalf of the API Information Source to deploy its certified API technology. In scenarios where the API Information Source, such as a large hospital system, assumes full responsibility for the technical infrastructure necessary to deploy and host the certified API technology it has acquired, the volume and scale of its usage would be the API Information Source’s sole responsibility, and a Certified API Developer would not be permitted to charge usage-based fees. Instead, the Certified API Developer would be limited to charge fees under the ‘‘development, deployment, upgrade’’ permitted fee in § 170.404(a)(3)(ii). Additionally, the costs recovered under ‘‘usage-based’’ fees can only reflect ‘‘post-deployment’’ costs. As such, ‘‘usage-based’’ fees cannot include any costs necessary to prepare and ‘‘get the certified API technology up, running, and ready for use,’’ which are costs that must be E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations recovered as part of the deployment services delivered by the Certified API Developer if permitted under § 170.404(a)(3)(ii). Comments. Several commenters supported ONC’s efforts to bolster patient access, noting that the capacity to offer a patient’s access to all elements of their electronic medical record, through an API, without cost, is wellsupported in the Proposed Rule. One commenter noted that the proposed provisions regarding fees supports uses of the API technology that facilitate a patient’s ability to access, exchange, or use their EHI. The commenters noted that the clear language in the Proposed Rule will prevent any potential confusion or friction in the future. A few commenters expressed concern that application developers will attempt to leverage the patient access fee limitations by claiming to be patient facing. One commenter suggested that the proposed fee limitations regarding patient access applied only with respect to fees API Technology Providers impose on API Data Providers, should also apply to fees charged to consumerfacing application developers who in the past have been charged high fees by CEHRT developers. One commenter recommended making it clear that provider organizations and health IT developers cannot charge patients, or the apps that they use, for using patientfacing APIs. At least one commenter requested that ONC clarify that permitted usage-based fees do not apply to patients or patient designees. Response. We thank commenters for their support for restricting API-related fees. As noted above, we have reconfigured the permitted fee for usage costs in response to public comments and our assessment of the intersection of API permitted fees policies and information blocking policies. We have finalized an approach that permits Certified API Developers to recover incremental usage costs reasonably incurred during the process of hosting certified API technology on behalf of an API Information Source, which could include fees to the API Information Source for providing and supporting patient access. However, the Certified API Developers and API Information Sources cannot recover these costs from patients or the developers of applications that facilitate access to and receipt of patients’ EHI. Patients have already effectively paid for their EHI, either directly or through their employers, health plans, and other entities that negotiate and purchase health care items and services on their behalf. We refer readers to the Fees Exception in the information blocking VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 section of this final rule in VII.D.2.b, which applies to health IT developers and a broader set of actors than these Condition and Maintenance of Certification requirements, for a discussion of the restrictions on charging patients for access to their EHI. Comments. Several commenters requested that ONC provide further guidance on the types of costs that a developer could charge to permit API Data Suppliers to offer population-level queries to API Users. They requested ONC clarify that such usages fees must relate to the costs associated with actual hardware (e.g., server space) needed to support the increased volume of queries for non-patients and not the cost of implementing the population-level query functionality itself. Response. We clarify that API usage fees related to API ‘‘read’’ services for multiple patients would be calculated using a similar methodology to calculate API usage fees related to API ‘‘read’’ services for single patients. These ‘‘usage-based’’ fees are fees imposed by a Certified API Developer to recover the costs typically incurred to support API interactions for API ‘‘read’’ services for multiple patients once these services have been deployed. This could include, but not be limited to, costs to support a higher volume of traffic, data, or number of apps via the certified API technology (which could include higher costs for hardware, including server space). We appreciate the recommendation from commenters; however, we have not prescribed the centralization of all of this content. Comments. Some commenters suggested that API Technology Suppliers publish their fees on the same website as their API documentation so there is full transparency and an API Data Supplier and API User can easily understand costs before embarking upon development. Response. We appreciate the recommendation and support from commenters. As finalized under § 170.404(a)(2)(ii)(B), a Certified API Developer must publish all terms and conditions for its certified API technology, including any fees. Any and all fees charged by a Certified API Developer for the use of its certified API technology must be described in detailed, plain language, including the persons or classes of persons to whom the fee applies; the circumstances in which the fee applies; and the amount of the fee, which for variable fees must include the specific variable(s) and methodology(ies) that will be used to calculate the fee. Comments. Some commenters stated that usage-based fees may not be PO 00000 Frm 00119 Fmt 4701 Sfmt 4700 25759 appropriate. They stated that, in the case of TEFCA, HIEs and providers must be responsive to inbound requests to broadcast data and should not be charged a fee for responding to such requests. They explained that such an arrangement could be used maliciously between market participants seeking to increase the operational expenses of their competitors. Response. We appreciate this comment, but we continue to believe that that usage-based fees should be permitted subject to the conditions described in § 170.404(a)(3)(iii). We have addressed commenter’s concern regarding potential anticompetitive behavior through the final provisions in § 170.404(a)(3)(i)(B). Specifically, in § 170.404(a)(3)(i)(B)(1), a Certified API Developer must ensure that fees are based on objective and verifiable criteria that are uniformly applied for all similarly situated classes of persons and requests. In addition, under § 170.404(a)(3)(i)(B)(4), a Certified API Developer must ensure that fees are not based in any part on whether the requestor or other person is a competitor, potential competitor, or will be using the certified API technology in a way that facilitates competition with the Certified API Developer. Comments. Several commenters expressed concern about incremental costs that can be recovered by actors supporting the use of APIs for purposes other than patient access. They requested ONC clarify that recovery of incremental costs for these other purposes should not be allowed, because they believed the incremental costs do not add any efficiency to the health care system, do not benefit patients, and do not serve any other procompetitive purpose. Response. We appreciate these comments, but continue to believe that ‘‘incremental costs’’ should be allowed. A Certified API Developer’s ‘‘incremental costs’’ comprise the Certified API Developer’s costs that are directly attributable to supporting API interactions at increasing volumes and scale within established service levels. We believe a Certified API Developer should ‘‘price’’ its costs of supporting access to the certified API technology by reference to the additional costs that the Certified API Developer would incur in supporting certain volumes of API use. In practice, we expect that this means that a Certified API Developer will offer a certain number of ‘‘free’’ API calls based on the fact that, up to a certain threshold, the Certified API Developer will not incur any material costs in supporting certified API technology in addition to the costs recovered for E:\FR\FM\01MYR3.SGM 01MYR3 25760 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations deployment services. However, after this threshold is exceeded, we expect that the Certified API Developer will impose usage-based costs commensurate to the additional costs that the Certified API Developer must incur to support certified API technology use at increasing volumes and scale. We expect that Certified API Developers will charge fees that are correlated to the incremental rising of costs required to meet increased demand. For example, if, at a certain volume of API calls, the Certified API Developer needed to deploy additional server capacity, the associated incremental cost of bringing an additional server online could be passed on to the API Information Source because the certified API technology deployed on behalf of the API Information Source was the subject of the higher usage. In this example, up until the point that the threshold is reached, the additional server capacity is not required, so the Certified API Developer would not be permitted to recover the costs associated with it. Moreover, the additional server capacity would support ongoing demand up to a certain additional volume, so the Certified API Developer would not be permitted to recover the costs of further additional server capacity until the existing capacity was exhausted. (G) Permitted Fee for Value-Added Services We proposed in 84 FR 7490 and 7491 in § 170.404(a)(3)(iv) to permit an API Technology Supplier to charge fees to API Users for value-added services supplied in connection with software that can interact with the API technology. We also clarified in 84 FR 7491 that a fee will only be permitted if it relates to a service that an API User, such as a software developer, can elect to purchase, but is not required to purchase in order to develop and deploy production-ready apps for API technology. Comments. Several commenters supported our proposal to permit an API Technology Supplier to charge fees to API Users for value-added services supplied in connection with software that can interact with certified API technology. Some commenters requested certain clarifications regarding our proposal. One commenter requested that we clarify within the discussion of value-added services, that references to ‘‘app stores’’ and ‘‘listing processes’’ for software applications that register to connect with the API technology are solely intended as examples to illustrate when a fee would or would not qualify as a ‘‘value-added VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 service,’’ and are not meant to convey a requirement or expectation that API Technology Suppliers provide an app store with application listing free of charge. A few commenters requested that ONC clarify that EHR developers can charge value-add fees without triggering the information blocking provision. A couple other commenters requested additional examples of what constitutes a ‘‘value-added’’ service for which an API Technology Supplier can charge fees to an API User. Response. We thank commenters for the feedback. We have finalized § 170.404(a)(3)(iv) as proposed, with the exception of updating terms based on the definitions finalized in § 170.404(c). Our final policy permits Certified API Developers to charge fees, including a reasonable profit margin, to API Users for value-added services related to certified API technology, so long as such services are not necessary to efficiently and effectively develop and deploy production-ready software that interacts with certified API technology. We clarify that the value-added services need to be provided in connection with and supplemental to the development, testing, and deployment of productionready software applications that interact with certified API technology. A fee is permitted if it relates to a service that a software developer can elect to purchase from a Certified API Developer, but is not required to purchase in order to develop and deploy production-ready apps for certified API technology. In response to comments for clarity, we note that examples used to illustrate when a fee would or would not qualify as a ‘‘value-added service,’’ such as app store listing, are demonstrative, but not required unless otherwise noted in the regulation text. Under this condition, we permit fees for services associated with the listing and promotion of apps beyond basic application placement so long as the Certified API Developer ensures that basic access and listing in the app store is provided free of charge (if an application developer depended on such listing to efficiently and effectively develop and deploy production-ready apps for use with certified API technology). Fees charged for additional/specialized technical support or promotion of the API User’s application beyond basic access and listing services would be examples of permitted value-added services. We caution health IT developers not to over-interpret the scope of this Condition of Certification, which is focused on certified API technology. To the degree that a health IT developer administers an ‘‘app store’’ and offers value-added services associated with PO 00000 Frm 00120 Fmt 4701 Sfmt 4700 certified API technology, the Condition of Certification covers its practices related to certified API technology only. Conversely, this Condition of Certification would not apply to any practices that do not involve certified API technology. However, health IT developers would need to be mindful of any applicable information blocking rules that may apply to their app store practices given applicable facts and circumstances. Regarding the request for specific value-added fees that would not constitute information blocking, we refer readers to the information blocking section (VIII) of this preamble. (H) Request for Comment on § 170.404(a)(3) We requested comment at 84 FR 7491 on any additional specific ‘‘permitted fees’’ not addressed in our Proposed Rule (84 FR 7491) that commenters felt API Technology Suppliers should be able to recover in order to assure a reasonable return on investment. Furthermore, we requested comment on whether it would be prudent to adopt specific, or more granular, cost methodologies for the calculation of the permitted fees. We encouraged commenters to consider, in particular, whether the approach we described would be administrable and appropriately balance the need to ensure that stakeholders do not encounter unnecessary costs and other special effort with the need to provide adequate assurance to API Technology Suppliers, investors, and innovators that they will earn a reasonable return on their investments in API technology. We welcomed comments on whether the approach adequately balances these concerns and achieves our stated policy goals. We also welcomed comments on potential revisions or alternative approaches. We encouraged detailed comments that included, where possible, economic justifications for suggested revisions or alternative approaches. Comments. Commenters suggested we alter our approach to APIs so that it is tiered fee structure. They suggested that ONC could establish categories where the technology requirements designate the fees: (1) A ‘‘no fee’’ category would limit API Technology Suppliers from charging API Data Providers or API Users any fees for exchanging data in compliance with Federal requirements; (2) an ‘‘at cost’’ category would allow API Technology Suppliers to charge API Data Providers or API Users the cost of interfacing APIs with a non-API Technology Supplier’s commercial technology; and (3) a ‘‘cost plus reasonable profit’’ category would allow E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations API Technology Suppliers to charge API Data Providers or API Users a reasonable profit when conducting legitimate custom API development or creating custom apps. Response. We appreciate the recommendation from commenters, but we have not adopted a tiered fee structure in the final rule because it would require unnecessary specificity and prescribe a particular method that could have unintended effects of limiting the market’s evolution over time. We believe the current structure for prohibited and permitted fees allows for the adequate cost recovery and reasonable profit by Certified API Developers while also establishing the guardrails around which API access can be enabled without special effort. Comments. Many commenters expressed concerns related to the effect our proposals regarding API fees would have on innovation and business. Several commenters noted that the structure of permitted fees could have unintended consequences that will ultimately work to impede innovation, increase administrative burden, and focus on cost recovery rather than creation of novel ways to improve data access. Several developers stated that the proposed fee structure specifically works to sever business relationships between API Technology Providers and API Users for anything other than ‘‘value added services’’ and effectively eliminates the ability for API Users to work directly with API Technology Suppliers to innovate and accelerate API development, and to achieve truly integrated and supported products throughout the product lifecycle. They suggested that a better model would be one that gives API Data Providers rights to leverage APIs ‘‘without special effort,’’ while supporting the ability for API Technology Suppliers and API Users to voluntarily engage in direct business relationships under mutually agreeable terms that are fair and equitable. Some developers stated that the market should determine permitted fees. They stated that in order to maintain a vigorously competitive market, API Technology Suppliers must be adequately compensated for their work to create and deploy non-standard APIs and support expanding standards. They explained that without this compensation, there will be far fewer entrants into the certified health IT space and current participants will depart. A couple of developers recommended that ONC allow revenue-sharing models for certain components of certified APIs. The commenters suggested that ONC VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 should view revenue sharing arrangements as a type of market-based compensation that will ultimately benefit innovation and competition. Conversely, one commenter stated that it is essential that API Technology Suppliers be expressly prohibited from conditioning access to API technology on charging revenue-sharing or royalty agreements to API Data Providers or API Users outside of actual usage costs incurred. The commenter noted this rent-seeking behavior is anticompetitive in nature and can have a significant impact on squelching any new market entrants and allow existing health IT actors to prevent all the positive outcomes that could arise from the ONC’s proposed rules. Some developers stated that the prohibition against health IT developers charging for work to update their code structure is unreasonable, emphasizing that this is important work that is necessary for companies to be able to modernize their solutions as broader technologies evolve. Response. We appreciate these comments, but disagree with commenters regarding the potential negative effect of the final permitted fee structure on innovation. We also note that the value-added services permitted fee does permit a direct relationship between Certified API Developers and API Users. What is generally prohibited and what we noted presented ‘‘special effort’’ in the Proposed Rule were Certified API Developer practices that required an API Information Source to seek permission to use its own certified API technology from the Certified API Developer. We reiterate that complying with the requirements of this permitted fee and the information blocking exception will generally not prevent an actor from making a reasonable profit in connection with the access, exchange, or use of EHI. To be responsive to comments, we have added a provision in § 171.404(a)(3)(i)(A) to clarify this point. This final provision states that certain permitted API fees (§ 170.404(a)(3)(ii) and § 170.404(a)(3)(iv)) may include fees that result in a reasonable profit margin in accordance with the Costs Exception (§ 171.302). We believe that the allowance of reasonable profits is necessary to incentivize innovation and allow innovators to earn returns on the investments they have made to develop, maintain, and update innovations that ultimately improve health care delivery and benefit patients. Our finalized approach to API fees strikes the appropriate balance of addressing the rent-seeking and exclusionary pricing PO 00000 Frm 00121 Fmt 4701 Sfmt 4700 25761 practices noted by the commenters while enabling and supporting innovation. We also emphasize that a majority of the EHI has been generated and recorded in the course of furnishing health care services paid with public dollars through Federal programs, including Medicare and Medicaid, or directly subsidized through the tax preferences for employer-based insurance. Yet, this EHI is not readily available where and when it is needed. We believe the overwhelming benefits of publishing certified APIs that allow EHI from such technology to be accessed, exchanged, and used without special effort far outweigh the potential burden on Certified API Developers and API Information Sources. Comments. A few commenters requested that ONC clarify whether API Data Suppliers would be allowed to recoup costs from API Users in light of the information blocking provisions. A few commenters expressed confusion that fees are addressed under the API Condition and Maintenance of Certification and information blocking. The commenters suggested that ONC address fees in one consolidated section. Response. We appreciate this comment and refer readers to the information blocking section of this rule. We do not believe that a discussion of fees should be consolidated in one section for a couple of reasons. First, the information blocking provision has a much broader reach than the Condition and Maintenance of Certification requirements and regulates conduct of health IT developers of certified Health IT Modules, health care providers, health information networks, and health information exchanges. The Condition and Maintenance of Certification requirements only relate to conduct by health IT developers of certified Health IT Modules. Second, the API Condition of Certification covers a much narrower scope of potential fees, as the fees in this section are specific to certified API technology only while fees in the information blocking section generally relate to the access, exchange, or use of EHI regardless of the particular technology used. We emphasize that we have finalized a provision in § 171.302(c) that if the actor is a health IT developer subject to the Condition of Certification requirements in § 170.402(a)(4) (Assurances), § 170.404 (API), or both, the actor must comply with all requirements of such conditions for all practices and at all relevant times. Under this provision, health IT developers of certified Health IT E:\FR\FM\01MYR3.SGM 01MYR3 25762 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations Modules subject to the API Condition of Certification requirements may not charge certain types of fees and are subject to more specific cost accountability provisions than apply generally under the Costs Exception. We explain in the Costs Exception that a failure of developers to comply with these additional requirements would impose impediments to consumer and other stakeholder access to EHI without special effort and would be suspect under the information blocking provision. vi. Openness and Pro-Competitive Conditions We proposed in 84 FR 7595 in § 170.404(a)(4) that an API Technology Supplier must grant API Data Providers the sole authority and autonomy to permit API Users to interact with the API technology deployed by the API Data Provider in a non-discriminatory manner; provide all reasonably necessary support and other services to enable the effective development, deployment, and use of API technology by API Data Providers and its API Users to access, exchange, and use EHI in production environments; not impose collateral terms or agreements that could interfere with the use of API technology; and provide reasonable notice prior to making changes to its API technology or terms and conditions. Comments. The majority of commenters supported the proposed openness and pro-competitive conditions. Several commenters requested clarification about API Data Providers’ rights and responsibilities when providing access to an application of a patient’s choice. Specifically, they sought clarification on whether they can vet, deny, or limit access by applications that are using the API technology inappropriately. Another commenter proposed that app developers be required to obtain a business associate agreement (BAA) with providers prior to the application developer gaining access to a patient’s EHI on behalf of a patient. Response. We appreciate the feedback from commenters. Based on the support from commenters, we have finalized that a Certified API Developer must grant API Information Sources the independent ability to permit API Users to interact with the certified API technology deployed by the API Information Source in § 170.404(a)(4). Under the HIPAA Privacy Rule, a business associate relationship exists if an entity creates, receives, maintains, or transmits ePHI on behalf of a covered entity (directly or through another business associate) to carry out the VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 covered functions of the covered entity. HIPAA does not require a covered entity (e.g., API Information Source) or its business associate (e.g., API Technology Supplier) to enter into a business associate agreement with an app developer that does not create, receive, maintain, or transmit ePHI on behalf of or for the benefit of the covered entity (whether directly or through another business associate). However, if the app was developed to create, receive, maintain, or transmit ePHI on behalf of the covered entity (API Information Source), or was provided by or on behalf of the covered entity (directly or through its API Technology Supplier, acting as the covered entity’s business associate), then a business associate agreement would be required.106 In such cases, API Information Sources have the ability to conduct whatever ‘‘vetting’’ they deem necessary of entities (e.g., app developers) that would be their business associates under the HIPAA Rules before granting access and use of EHI to the entities. In this regard, covered entities must conduct necessary vetting in order to comply with the HIPAA Security Rule. For third-party applications chosen by individuals to facilitate their access to their EHI held by actors, there would not be a need for a BAA as discussed above. There would also generally not be a need for ‘‘vetting’’ on security grounds and such vetting actions otherwise would be an interference. Please see our discussion of ‘‘vetting’’ in the ‘‘Interference Versus Education When an Individual Chooses Technology to Facilitate Access’’ discussion in the Information Blocking section of the preamble (Section VIII). We also refer readers to our discussion of ‘‘vetting’’ versus verifying an app developer’s authenticity under the API Condition of Certification later in this section of the preamble. Comments. Several commenters requested clarification about the types of business relationships permitted between API Technology Suppliers and API Users and requested examples of permitted activities and responsibilities under each role. These comments expressed concern about prohibiting API Technology Suppliers from being able to form direct relationships with API Users for the purpose of joint development and commercialization of their products. Other commenters requested clarifications about relationships that existed prior to the involvement of an API Data Provider. 106 https://www.hhs.gov/hipaa/for-professionals/ privacy/guidance/access-right-health-apps-apis/ index.html. PO 00000 Frm 00122 Fmt 4701 Sfmt 4700 Response. We appreciate the feedback from commenters. Based on the general support, we have finalized in § 170.404(a)(4)(i)(A) that a Certified API Developer must provide certified API technology to API Information Sources on terms that are no less favorable than it provides to itself and its own customers, suppliers, partners, and other persons with whom it has a business relationship. Additionally, we have finalized in § 170.404(a)(4)(i)(B) that the terms on which a Certified API Developer provides certified API technology must be based on objective and verifiable criteria that are uniformly applied to all substantially similar or similarly situated classes of persons and requests. Furthermore, we have finalized in § 170.404(a)(4)(i)(C) that a Certified API Developer must not offer different terms or services on the basis of: Competition or potential for competition and revenue or other value the other party receiving the services may receive from using the certified API technology. We note that we slightly modified the finalized requirements in § 170.404(a)(4)(i) based on the revised definitions finalized in § 170.404(c). We clarify that this rule does not prohibit Certified API Developers from forming business relationships with API Users. To the degree that a Certified API Developer seeks to charge an API User for particular services associated with its certified API technology, it would need to do so pursuant to the ‘‘valueadded services’’ permitted fee. Comments. Commenters requested clarification about how ‘‘the sole authority and autonomy to unilaterally permit connections to their health IT through certified API technology’’ applies to application registration. Specifically, they asked whether API Users are required to register once with the API Technology Supplier, or several times with each instance of API technology deployed by API Data Providers. Response. We appreciate the feedback from commenters. We refer commenters to § 170.315(g)(10)(iii) for the application registration requirements for Health IT Modules presented for certification. In general, we do not prescribe the registration paradigm that Certified API Developers create for themselves and their customers. Thus, in different scenarios, an API User may only be required to register once with an Certified API Developer, or several times with each instance of a § 170.315(g)(10)-certified Health IT Module deployed by an API Information Source. When it comes to apps that focus on the ‘‘launch-ehr’’ ‘‘SMART on FHIR Core Capability’’ from the E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations implementation specification adopted in 170.215(a)(3), such an approach will be tightly integrated with the Health IT Modules deployed by API Information Sources. Because of the tight integration between API Information Sources and Health IT Modules, registration for these apps could more often fall to the API Information Source. When it comes to apps that enable patient access, registration could be handled centrally by Certified API Developers or in a distributed manner with each API Information Source, especially in cases where API Information Sources take full responsibility for administering their § 170.315(g)(10)-certified Health IT Modules. Regarding ‘‘the sole authority and autonomy to unilaterally permit connections to their health IT through certified API technology,’’ we have finalized in 170.404(a)(4)(ii)(A) that Certified API Developer must have and, upon request, must grant to API Information Sources and API Users all rights that may be reasonably necessary to (1) access and use certified API technology in a production environment; (2) develop products and services that are designed to interact with the Certified API Developer’s API technology; and (3) market, offer, and distribute products and services associated with the Certified API Developer’s certified API technology. Additionally, we have finalized in § 170.404(a)(4)(ii)(B) that a Certified API Developer must not condition any of the rights described in § 170.404(a)(4)(ii)(A) on: (1) Receiving a fee, including but not limited to a license fee, royalty, or revenue-sharing arrangement; (2) agreeing to not compete; (3) agreeing to deal exclusively with the Certified API Developer; (4) Obtaining additional services that are not related to the certified API technology; (5) sharing intellectual property with the Certified API Developer; (6) meeting any Certified API Developer-specific testing or certification requirements; and (7) providing the Certified API Developer or technology with reciprocal access to application data. We slightly modified the conditions from the Proposed Rule for what we finalized in § 170.404(a)(4)(ii)(B) for clarity, and amended terms to the revised definitions finalized in § 170.404(c). Additionally, we clarify that while Certified API Developers are not permitted to condition the rights described in § 170.404(a)(4)(ii)(A) on receiving a fee, Certified API Developers are permitted to charge fees compliant with the permitted fees described in § 170.404(a)(3). We also clarify that ‘‘meeting any Certified API Developer- VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 specific testing or certification requirements’’ would include preconditions like registering and testing in a testing environment prior to moving to production, and meeting Certified API Developer-created certification requirements. Comments. Commenters expressed concern about software applications maintaining compatibility when upgrading API technology, and highlighted the importance of adopting backwards-compatible standards. Response. We appreciate the feedback from commenters. We share the concern expressed by commenters. We specifically consider features of standards like backwards compatibility when proposing and finalizing testing and certification requirements for the Program. As mentioned above, we have finalized the standard adopted in § 170.215(a)(1) as the base standard for the certification criterion adopted in § 170.315(g)(10) Standardized API for Patient and Population Services. We note that the standard adopted in § 170.215(a)(1) includes many FHIR resources that need to retain their compatibility over time, which will help as upgrades to newer standards occur. Additionally, we have finalized in § 170.404(a)(4)(iii) the service and support obligations required by a Certified API Developer, including the requirements that a Certified API Developer must provide all support and other services reasonably necessary to enable the effective development, deployment, and use of certified API technology by API Information Sources and API Users in production environments. These include requirements for changes and updates to API technology finalized in § 170.404(a)(4)(iii)(A), where Certified API Developers must make reasonable efforts to maintain the compatibility of its certified API technology and to otherwise avoid disrupting the use of certified API technology in production environments, and requirements for changes to terms and conditions finalized in § 170.404(a)(4)(iii)(B), where Certified API Developers must provide notice and reasonable opportunity for its API Information Source customers and registered API Users to update their applications to preserve compatibility with API technology and to comply with applicable terms and conditions. e. API Maintenance of Certification Requirements i. Authenticity Verification We proposed in 84 FR 7486 in § 170.404(a)(2)(ii)(C) to permit API Technology Suppliers to verify the PO 00000 Frm 00123 Fmt 4701 Sfmt 4700 25763 authenticity of application developers, limited to a duration of no greater than five business days of receipt of a request to register an application developer’s software with the API technology. We noted the authenticity verification process would need to be objective, apply to the application developer and not their software, and be the same for all application developers. We sought comment in 84 FR 7486 on factors that would enable registration with minimal barriers, including options and associated trade-offs. Additionally, we sought comment at 84 FR 7486 on other timing considerations for application developer authenticity verification. Comments. Commenters asked for a longer timeframe to complete the authenticity verification process of application developers. Some commenters asked to extend the authenticity verification timeframe to ten business days. Commenters suggested adding ‘‘and any receipt of any additional requested information needed in order to verify the developer’s authenticity’’ to ‘‘within five business days of receipt of an application developer’s request to register their software application with the API technology provider’s authorization server.’’ Commenters suggested various methods for verifying the authenticity of application developers and applications, including by proposing required registration information, or required attestation to model privacy guidelines or industry best practices. Other commenters suggested various approaches for verifying application developers and applications, including by working with industry to establish a verification body, privacy and security trust or certification framework, and other more detailed recommendations. Several commenters suggested requiring application developers to attest to providing a model privacy notice to patients. Commenters suggested mandating terms and conditions and consent requirements as part of the registration process. Response. We appreciate feedback from commenters. To improve the organization of these Condition and Maintenance of Certification requirements, we moved the requirements proposed in § 170.404(a)(2)(ii)(C) to the finalized § 170.404(b)(1)(i) under the combined § 170.404(b)(1), ‘‘Authenticity verification and registration for production use.’’ We accept commenters’ requests to establish a longer time period for this permitted, but not required, process to verify the authenticity of application developers E:\FR\FM\01MYR3.SGM 01MYR3 25764 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations who seek to register their software application for use with the Certified API Developer’s certified API technology. We have adopted ten business days as the timeframe by which this process would need to be completed and as a result find it unnecessary to add the text contemplating a back and forth between the Certified API Developer and API User. We recommend that Certified API Developers who elect to institute a verification process implement a process that is as automated as possible to ensure they remain in compliance with our final policy. Given that we combined authenticity verification and registration for production use in one requirement finalized in § 170.404(b)(1), we reduced the scope of these requirements to Certified API Developers with a Health IT Module certified to the certification criterion adopted in § 170.315(g)(10) to remain consistent with the scope of applicability of registration for production use from the Proposed Rule. We also note that authenticity verifications would likely occur more frequently for patient-facing applications that are not sponsored by API Information Sources. We anticipate that an API Information Source (e.g., a health care organization) that is a HIPAA covered entity would vet and enter into a HIPAA business associate agreement with a provider-facing application developer prior to using the application within their internal technical enterprise. In comparison, a patient-facing application is likely to connect to an API Information Source’s resource server using a public service base URL of a § 170.315(g)(10)-certified Health IT Module in service to the patient’s HIPAA Privacy Rule right of access (45 CFR 164.524) or based on a patient’s HIPAA authorization (45 CFR 164.508) without first establishing a relationship with the API Information Source. For patient-facing applications, and to the comments suggesting we require various modes of attestation to privacy guidelines in such contexts, we refer commenters to the information blocking provisions in section VIII for a discussion of permitted behaviors regarding privacy attestations. Comments. Commenters suggested including a warning by the API Data Provider that the application developer selected by the patient or patientdesignee is untrusted. Response. We thank commenters for their feedback. An API Information Source would not be prohibited from showing a warning to patients as part of the patient authorization for an application to receive their EHI from an VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 API Information Source. This could include a warning that an application attempting to access data on behalf of a patient is untrusted. We refer commenters to the information blocking provisions in section VIII for additional information about providing warnings to patients. ii. Registration for Production Use We proposed in 84 FR 7494 in § 170.404(b)(1) to require API Technology Suppliers to register and enable all applications for production use within one business day of completing its verification of an application developer’s authenticity. Comments. Commenters generally supported the proposed registration requirements. Most commenters suggested extending the registration timeframe to five business days. Response. We appreciate the feedback from commenters. We have reorganized this section of the regulation text for readability by combining ‘‘Authenticity verification’’ with ‘‘Registration for production use’’ under the heading ‘‘Authenticity verification and registration for production use’’ in § 170.404(b)(1). We accepted the recommendation from commenters to extend the registration timeline and have finalized in § 170.404(b)(2)(ii) a requirement for Certified API Developers with Health IT Modules certified to the certification criterion finalized in § 170.315(g)(10) to register and enable all applications for production use within five business days of completing its verification of an application developer’s authenticity pursuant to requirements finalized in § 170.404(b)(1)(i). iii. Service Base URL Publication We proposed in 84 FR 7595 in § 170.404(b)(2) to require an API Technology Supplier to support the publication of service base URLs for all of its customers, and make such information publicly available, in a computable format, at no charge. Comments. A majority of commenters supported the proposal requiring API Technology Suppliers to publish service base URLs for all of its customers. Several commenters recommended the creation of a single, publicly available repository to maintain all client endpoints. Some stakeholders recommended ONC require additional facility information be published with the service base URL. Commenters who disagreed with this proposal stated that health IT developers cannot publish client information without their consent, and that API Data Providers PO 00000 Frm 00124 Fmt 4701 Sfmt 4700 should have the sole authority to publish their endpoints. Response. We thank commenters on their feedback on our proposal requiring a Certified API Developer to publish service base URLs for all of its customers. The public availability and easy accessibility of this information is a central necessity to assuring the use of certified API technology without special effort, particularly for patient-facing applications. We agree with the points made by commenters on the need for a single or multiple publicly available repositories that maintain provider service base URLs. We encourage industry to coalesce around the development of a public resource from which all stakeholders could benefit. We believe this would help scale and enhance the ease with which service base URLs could be obtained and used. While we support the concept of repositories for service base URLs, we do not believe that creating a requirement under the Program is the appropriate mechanism to foster industry support around this concept at this time. We acknowledge that stakeholders expressed concern about Certified API Developers publishing client service base URLs and revised our approach to focus on service base URLs necessary to support patient access. We anticipate that many services related to certified API technology will be developed and made available and do not believe it is appropriate to burden Certified API Developers with publishing all service base URLs for these services for all of their customers. We considered several options, including requiring Certified API Developers to publish service base URLs for only those API Information Source customers for whom they manage/host an authorization server centrally. However, we determined that alternative options would not meet our policy interests and would lead to unnecessarily complex and burdensome approaches and would not achieve the Cures Act’s goals of enabling EHI to be accessed, exchanged, and used without special effort. Additionally, we considered requiring that all Certified API Developers with certified API technology, that is, health IT developers with a Health IT Module certified to § 170.315(g)(7) through (10), meet this requirement. However, we determined that it would be more beneficial to allow health IT developers to focus energy and resources on upgrading their technology to the certification criterion finalized in § 170.315(g)(10). Therefore, we have finalized in § 170.404(b)(2) that a Certified API Developer must publish service base URLs for all Health IT E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations Modules certified to § 170.315(g)(10) that can be used by patients to access their EHI. We further require that a Certified API Developer must publicly publish service base URLs for all customers in a machine-readable format at no charge regardless of whether the Health IT Modules certified to § 170.315(g)(10) are centrally managed by the Certified API Developer or locally deployed by an API Information Source. We note our focus for this criterion on ‘‘service base URLs for Health IT Modules certified to § 170.315(g)(10) that can be used by patients to access their EHI.’’ We believe that Certified API Developers will have adequate relationships with API Information Sources in the process of providing Health IT Modules certified to § 170.315(g)(10) and will be able to collect and publish all service base URLs that support patient access on behalf of their customers. Furthermore, we note that API Information Sources would be obligated to share such service base URLs with Certified API Developers to avoid violating the Technical Interference Information Blocking provisions as discussed further in section VIII. Certified API Developers must make available appropriately scoped service base URLs that can be used by patients to access their EHI for Health IT Modules certified to § 170.315(g)(10). iv. Providing (g)(10)-Certified APIs to API Data Providers We proposed in 84 FR 7494 in § 170.404(b)(3) that an API Technology Supplier with Health IT Modules previously certified to § 170.315(g)(8) must provide all API Data Providers Health IT Modules certified to § 170.315(g)(10) within 24 months of this final rule’s effective date. Comments. The majority of comments received urged ONC to extend the timeline beyond the 24 months proposed. Many commenters requested separate timelines for developers and providers. Several commenters recommended 36 months. Some commenters offered alternatives ideas for timelines, including a stepwise approach, or ONC only determining technical timelines, and allowing CMS to cover provider timelines. Only a few commenters encouraged faster adoption. Response. We appreciate commenters’ feedback on our proposal. Given the reduced scope of the overall updates required by this final rule, our belief that the industry is well-prepared to meet this certification criterion’s requirements once the final rule is published, and the Cure’s Act expectation that secure, standards-based VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 APIs would be made available in a timely manner, we have retained a 24 month compliance timeline, which will start from the publication date of the final rule. At that point, it will be approximately five years since the Cures Act’s passage and we believe its implementation should not be delayed any further. We also remind stakeholders that this is within 24 months of this rule’s publication compliance date for supplying all API Information Sources with Health IT Modules certified to § 170.315(g)(10) enables Certified API Developers (based on their client base and IT architecture) to determine the most appropriate timeline for development, testing, certification, and product release cycles. Thus, we have finalized in § 170.404(b)(3) that a Certified API Developer with certified API technology previously certified to the certification criterion at § 170.315(g)(8) must provide all API Information Sources with such certified API technology deployed with certified API technology certified to the certification criterion in § 170.315(g)(10) within 24 months of the publication date of the final rule. v. Compliance for Existing Certified API Technology We proposed in 84 FR 7486 that API Technology Suppliers with Health IT Modules certified to § 170.315(g)(7), (8), or (9) must revise their existing API documentation within six months from the final rule’s effective date. Comments. Some commenters supported the requirement to revise existing API documentation within six months of the final rule’s effective date. Others requested more time to allow documentation and all other websites to come into alignment before enforcement of this Condition of Certification requirement. One commenter requested clarification on which documentation requires revision within the six-month timeframe. Response. In order to align the API Condition of Certification requirements policies, we have broadened the scope of the provision finalized in § 170.404(b)(4) to apply to all API Condition of Certification requirements finalized in § 170.404(a), including § 170.404(a)(1) through (4). Given the change of scope, we renamed this section to ‘‘Compliance for existing certified API technology.’’ We considered commenters’ request for more time, but given the already delayed effective date of Part 170 we believed the proposed time of six months sufficient to enable Certified API Developers to become compliant with the Condition of Certification PO 00000 Frm 00125 Fmt 4701 Sfmt 4700 25765 requirements finalized in § 170.404(a). This additional time provides Certified API Developers with Health IT Modules already certified to § 170.315(g)(7), (8), or (9) a total of eight months from the final rule’s publication to update their policies and documentation to comply with the requirements finalized in § 170.404(a). We did not allow a longer time period than six months in § 170.404(b)(4) due to the fact that we have finalized our proposal in § 170.404(b)(3) to require Certified API Developers with Health IT Modules previously certified to the certification criterion in 170.315(g)(8) to provide § 170.315(g)(10)-certified APIs to API Information Sources within 24 months of final rule’s publication date. These policies finalized in § 170.404(b)(4) provide API Information Sources with Health IT Modules certified to § 170.315(g)(8) with 18 months of updated documentation before the new requirements finalized in § 170.404(b)(3) become effective. Setting a more delayed compliance date than the one finalized in § 170.404(b)(4) would have unreasonably delayed and ultimately diminished the benefits of the Program requirements we have finalized in this rule. In summary, we finalized in § 170.404(b)(4) that Certified API Developers with Health IT Modules certified to § 170.315(g)(7), (8), or (9) must comply with § 170.404(a) no later than six months after this final rule is published in the Federal Register, including by revising their existing business and technical API documentation and making such documentation available via a publicly accessible hyperlink that allows any person to directly access the information without any preconditions or additional steps. 5. Real World Testing The Cures Act requires, as Condition and Maintenance of Certification requirements under the Program, that health IT developers successfully test the real world use of the technology for interoperability 107 in the type of setting in which such technology would be marketed. As discussed in the Proposed Rule (84 FR 7495), the objective of real world testing is to verify the extent to which certified health IT deployed in production contexts continues to demonstrate conformance to the full scope of applicable certification criteria and functions with the intended use cases as part of the overall maintenance 107 Defined in statute in section 3000 of the Public Health Service Act (as modified by section 4003 of the Cures Act) and defined in regulation at 45 CFR 170.102. E:\FR\FM\01MYR3.SGM 01MYR3 25766 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations of a health IT’s certification. Real world testing should assess that the certified health IT is meeting the intended use case(s) of the certification criteria to which it is certified within the workflows, system architectures, and type(s) of care setting(s) for which it is marketed (advertised, promoted, or sold). For the purpose of this Condition of Certification requirement, in § 170.405(a), we proposed (84 FR 7495) that successful real world testing means: • The certified health IT continues to be compliant to the full scope of the certification criteria to which it is certified, including the required technical standards and vocabulary codes sets; • The certified health IT is exchanging electronic health information in the care and practice settings for which it is intended for use; and • Electronic health information is received by and used in the certified health IT. To fully implement the real world testing Condition of Certification requirement, we proposed Maintenance of Certification requirements that would require health IT developers to submit publicly available prospective annual real world testing plans and retrospective annual real world testing results for the certification criteria focused on interoperability to which each of its Health IT Modules is certified (84 FR 7496). Comments. Comments on the whole support the establishment of a robust process of real world testing. Several commenters expressed concerns regarding the quality and usability of health IT. Specifically, commenters indicated that issues related to health IT usability may be contributing to clinician burn-out or impacting patient safety, noting that they therefore strongly support the inclusion of robust real world testing requirements. Response. We appreciate all comments, and have finalized real world testing Condition and Maintenance of Certification requirements in § 170.405(a) and (b) as proposed, with minor adjustments to due dates and clarifications of several points in response to specific comments as discussed below. Comments. Commenters indicated that additional clarification of the real world testing requirements would make these Condition and Maintenance of Certification requirements less burdensome to implement. These commenters specifically sought additional guidance around the expectations for an appropriate testing VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 plan and method of execution. One commenter recommended that ONC provide more guidance around what care settings must be covered by test plans, and establish a minimum number of settings and test sites that are applicable for certified Health IT Modules. Response. In response to comments requesting additional guidance around expectations and acceptable methods for real world testing, we provide below additional discussion, explanation, and illustrative examples. At this time, we have decided not to establish a minimum number of settings or minimum percentage or fraction of production instances of the developer’s applicable certified Health IT Modules that must be included in the developer’s annual real world testing activities. While health IT developers are not required to test their certified health IT in each and every setting in which it is intended for use, we would expect a developer’s real world testing plan to address each type of clinical setting for which their health IT is marketed. Developers must address in their real world testing plans their choice of care and/or practice settings to test and provide a justification for their chosen approach. We also remind developers that although we are not requiring testing in every setting for which the certified health IT is marketed, we encourage real world testing in as many specific settings as feasible within each type of setting for which the certified health IT is marketed. Comments. Some commenters expressed a view that there has been too much focus on the export capabilities of systems and not enough attention paid to providers being able to ingest data received in standardized formats—such as the Continuity of Care Document (CCD) standard—from other providers, including other providers who use the same developer’s Health IT Modules certified to produce exports in conformance with the standards. Response. The interoperability focused criteria listed in § 170.405(a) include required capabilities for receiving and incorporating data in accordance with referenced standards and implementation specifications adopted by the Secretary in part 170 subpart B. We believe this appropriately aligns requirements for real world testing of Health IT Modules’ ability to ingest data with the capabilities their certifications address. Comments. A commenter recommended that, for real world testing of Health IT Modules certified to the API criterion, the final rule require health IT developers to provide a testing PO 00000 Frm 00126 Fmt 4701 Sfmt 4700 environment (or ‘‘developer sandbox’’) and require the use of a testing platform and test scripts that validate the ability of the API to meet the underlying requirements for the version of FHIR® to which Health IT Module(s) are certified, any applicable FHIR® profiles, and implementation guides. Response. As discussed in the Proposed Rule (84 FR 7496), we believe health IT developers are in the best position to design and facilitate implementation of real world testing approaches that balance the burdens of this statutory requirement with its intended assurances that certified health IT as deployed in the types of clinical settings for which it is marketed (advertised, promoted, or sold) continues to meet the Program requirements, including but not limited to interoperability performance, applicable under the certification it holds. While we recognize that testing environments can be useful for a variety of purposes, and would not generally discourage developers from offering test platforms specific to their products or participating in the development and use of open-source testing platforms, the purpose of real world testing is to demonstrate that Health IT Modules continue to perform in conformance to their certification when and as they are deployed in production environments supporting the types of clinical settings for which the Health IT Modules are marketed. Thus, real patient data and real production environments will in most cases best meet that need and should be first considered when developing real world testing plans. Mandating creation or use of testing environments for real world testing would compete for developers’ time and effort with the focus on innovative ways to best serve the purpose of the real world testing Conditions and Maintenance of Certification requirements at the least burden on their customers and end users. We have therefore not required health IT developers to provide a testing environment (or ‘‘developer sandbox’’) nor have we required the use of a testing platform or test scripts in order to satisfy real world testing Condition and Maintenance of Certification requirements. Comments. Several commenters requested that ONC be mindful of the burdens this testing could place on health care providers in terms of time and cost and take all necessary steps to minimize such burdens. Commenters specifically stated real world testing would require significant work by providers for whom, in the commenters’ stated view, there is no incentive to E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations participate in real world testing. Some commenters specifically recommended that HHS incentivize providers to participate, stating that without providers’ participation, this proposal would become an untenable requirement. One commenter requested HHS clarify whether a developer would be permitted to compensate its customers for the time the customer spends supporting the developer’s real world testing activities. Response. We thank commenters for their feedback noting the potential for health IT developers’ real world testing activities to impose burden on providers. We do appreciate the importance of recognizing that providers engage directly and actively in various types of activities supporting advancement of health IT. The fact that many of these activities could be included in robust real world testing regimes suggests that we should provide developers with extensive flexibility to develop innovative real world testing plans. We have therefore built into our real world testing policy flexibility that offers the developer a substantial opportunity to design real world testing approaches that minimize burden and fully optimize value of the real world testing activities and results to current and prospective customers. We do not believe that HHS incentives to providers participating in real world testing would be the most effective means of alleviating burdens on health care providers specifically attributable to developers’ real world testing activities. Rather, the flexibility of our policy allows for, and encourages, developers to approach real world testing in an innovative mode so that they can maximize efficiency and minimize burden of real world testing for both the developer and its customers. A wide range of practical strategies are available for developers to potentially consider in creating such optimized solutions for real world testing of their specific health IT with their particular customer base. Examples of this range of practical strategies include, but are not necessarily limited to: Avoiding some activities that satisfy only the real world testing Maintenance of Certification requirements by including in its overall real world testing plans the testing typically associated with confirming functionality of new installations and upgrades of their software; and innovating methods of measuring products’ performance in real time use through system metadata and/or feedback from health information networks and other exchange partners of their customers. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 In response to the recommendation that developers be allowed to compensate their customers for participating in the developer’s real world testing activities, we note that nothing in our proposed or finalized policy under part 170 would prohibit that. In the event a developer concludes that its real world testing approach imposes on its customers directly participating in real world testing activities a burden that the developer would like to offset for those customers, we would not discourage the developer from considering whether there may be opportunities within the bounds of other applicable laws or regulations for developers of certified health IT to offer customers some types of burdenoffsetting compensation or other incentive for real world testing participation. Analysis, interpretation, or changes to such other law or regulation is outside the scope of this particular rulemaking action. Moreover, outside the rulemaking process, developers should be aware that ONC is not in a position to provide general guidance on Federal laws specific to compensation arrangements or advice specific to any particular circumstances or contemplated conduct related to developers compensating providers for participating in developers’ real world testing activities. However, if developers or providers may be contemplating a potential compensation arrangement related to offsetting providers’ cost or burden of engagement in developers’ real world testing, we offer as a point of information that one publicly stated purpose of the HHS Office of the Inspector General advisory opinion process is to provide meaningful advice about of the applicability of the antikickback statute or other OIG sanction statutes in specific factual situations.108 Comments. One commenter expressed concern that developers with small customer bases will have smaller pools of participants willing to undergo a lengthy process which will require significant resources and suggested developers submit results from a more limited scope of testing only every three years. Response. We reiterate that the policy we have finalized includes substantial flexibility for developers to assess how to meet the real world testing Condition and Maintenance of Certification requirements in a way that appropriately minimizes burden on the current users of their certified health IT. 108 For more information about HHS Office of the Inspector General advisory opinions and advisory opinion process, please visit: https://oig.hhs.gov/ compliance/advisory-opinions/index.asp. PO 00000 Frm 00127 Fmt 4701 Sfmt 4700 25767 Comments. A commenter expressed concern that health care providers might be unwilling to use health IT that had not yet been certified, and that this could make real world testing of Health IT Modules prior to certification impractical. Response. In our Proposed Rule (84 FR 7429), we proposed in § 170.405(a) to limit the applicability of this Condition of Certification to health IT developers with Health IT Modules that are certified to one or more 2015 Edition certification criteria focused on interoperability and data exchange. We also proposed that the real world testing Condition of Certification would be met through meeting the real world testing Maintenance of Certification requirements in § 170.405(b). We have finalized this proposal as proposed. Thus, the real world testing Condition and Maintenance of Certification requirements do not mandate testing real world use of a Health IT Module in actual production environments before it is certified. a. Unit of Analysis at Which Testing Requirements Apply Comments. One commenter requested confirmation if real world testing is required per CHPL listing, per product, or per company. Response. The real world testing Condition and Maintenance of Certification requirements apply to each developer that has at least one Health IT Module certified to at least one of the interoperability and exchange focused criteria listed in § 170.405(a), because Condition and Maintenance of Certification requirements apply to the developer of certified health IT. However, each developer of certified health IT to which the real world testing Condition and Maintenance of Certification requirements apply must conduct real world testing for each criterion within the scope of real world testing (§ 170.405(a)) to which each developer presents for certification a Health IT Module that is part of a health IT product to be listed on the CHPL are certified. A health IT developer with multiple products that are listed on the CHPL and that include one or more Health IT Module(s) certified to one or more of the criteria listed in § 170.405(a) need only submit one real world testing plan, and one real world testing results report, for any given annual cycle of real world testing, but the real world testing plan and results report must address each of the developer’s products that is listed on the CHPL. Health IT developers with multiple health IT products that may include the same Health IT Module(s) certified to one or E:\FR\FM\01MYR3.SGM 01MYR3 25768 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations more of the criteria listed in 170.405(a) have discretion to design their real world testing plans in a way that efficiently tests a combination of products that include Health IT Modules certified criteria listed in § 170.405(a) so long as testing plans and results are traceable to specific certified Health IT Modules and each criterion to which the Health IT Module(s) are certified, and address the types of settings for which the products are marketed. Because the purpose of real world testing is to test health IT products as they are deployed in production, developers of health IT products deployed through the cloud who offer their products for multiple types of clinical settings will be required to test the same capability for those different types of settings even if it uses a single instance of the deployed capability to serve all of those types of settings. b. Applicability of Real World Testing Condition and Maintenance of Certification Requirements We proposed (84 FR 7495) to limit the applicability of the real world testing Condition of Certification requirement to health IT developers with Health IT Modules certified to one or more of the certification criteria focused on interoperability and data exchange or availability listed in (then-proposed) § 170.405(a): • The care coordination criteria in § 170.315(b); • The clinical quality measures (CQMs) criteria in § 170.315(c)(1) through (c)(3); • The ‘‘view, download, and transmit to 3rd party’’ criterion in § 170.315(e)(1); • The public health criteria in § 170.315(f); • The application programming interface criteria in § 170.315(g)(7) through (g)(10); and • The transport methods and other protocols criteria in § 170.315(h). We solicited comment on whether to also include the ‘‘patient health information capture’’ certification criteria in § 170.315(e)(3), including the value of real world testing these functionalities compared to the benefit for interoperability and exchange (84 FR 7496). We also solicited comment on whether any other 2015 Edition certification criteria should be included or removed from the applicability list (to be codified at 170.405(a)) for this Condition of Certification requirement. Comments. The vast majority of commenters addressing this proposal were in support of the specific criteria proposed to be within the scope of real world testing and expressed agreement VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 that required testing should be limited to Health IT Modules certified to one or more of the certification criteria listed in § 170.405(a) as proposed. Response. We appreciate all feedback received. The list of criteria to which real world testing Condition and Maintenance of Certification requirements apply is finalized in § 170.405(a) as proposed. Comments. We received one comment supporting and two comments opposing the addition of patient health information capture criterion in § 170.315(e)(3) to the scope of real world testing. One commenter specifically recommended against including the patient health information capture criterion in § 170.315(e)(3) in real world testing because of the significant variability in how health IT certified to this criterion is implemented. They stated that this variability in the real world could make cross-implementation comparisons difficult, and stated that testing for this criterion could present a particular challenge based on difficulty they anticipated would be encountered in securing needed engagement from patients as well as the exchange partners who would presumably receive the data as a result of the patient using the ‘‘transmit’’ functionality. Commenters opposed to addition of this criterion to the real world testing Condition and Maintenance of Certification requirements also stated this addition would add cost to the developer which would then flow down to end users and be burdensome to clinician practices. Response. On balance, the comments received do not support expansion of the scope of real world testing requirements to include the patient health information capture criterion in § 170.315(e)(3) at this time. In developing the proposed list of criteria to which real world testing Condition and Maintenance of Certification requirements would apply, we concluded an initial focus on those particular criteria would strike an appropriate balance between the magnitude of the challenge represented by the new real world testing requirements and the potential benefits of their broader application. The concerns raised by the commenters recommending against adding the patient health information capture criterion in § 170.315(e)(3) to the scope of real world testing requirements at this time, combined with other comments more generally recommending against a broader scope at this time, tend to support the conclusion that the scope we proposed strikes an appropriately practical balance until we and the PO 00000 Frm 00128 Fmt 4701 Sfmt 4700 industry have benefit of experience and innovation in real world testing. Thus, the finalized list of criteria to which real world testing requirements apply (§ 170.405(a)) does not include the patient health information capture criterion in § 170.315(e)(3). Comments. A few commenters suggested expanding the scope of real world testing requirements to include the proposed ‘‘EHI export’’ criterion in § 170.315(b)(10). Response. We appreciate the confirmation that commenters supported inclusion of the ‘‘EHI export’’ criterion in § 170.315(b)(10) alongside the rest of the care coordination criteria in § 170.315(b). We have finalized the criteria listed in § 170.405(a) including, as proposed, all criteria within § 170.315(b). Comments. One commenter expressed an opinion that the initial scope of criteria is more expansive than the commenter would suggest for an introductory set, and asked that fewer criteria be required for the initial rollout of real world testing, delaying application of the requirement to more interoperability focused criteria until experience has been amassed with real world testing for a narrower selection of criteria than we had proposed. Response. Noting that the majority of comments received were supportive of the scope as proposed, we also balance suggestions such as that offered by this commenter against the Program’s needs and the purpose of the real world testing Condition and Maintenance of Certification requirements. We do not believe it would be in the best interest of the Program or the health care providers and patients who rely on certified health IT to meet their needs for interoperable health IT to narrow the applicability of the real world testing Condition and Maintenance of Certification requirements further than we proposed. We have, therefore, finalized the criteria listed in § 170.405(a) as proposed. Comments. Some commenters advocated expanding the scope of the real world testing requirement to include select functionally-based ‘‘clinical’’ criteria within § 170.315(a) that are included in the base EHR definition. Response. As explained in the Proposed Rule (84 FR 7495), we did not propose to include in the scope of real world testing functionally-based criteria, administrative criteria, or other criteria that do not focus on interoperability and exchange or availability of data. The ‘‘clinical’’ certification criteria in § 170.315(a) were noted in the Proposed Rule as an E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations example of criteria not proposed because they require only that the health IT enable the provider to record, change, and access specific types of data within the Health IT Module being certified (or within a product that includes the Health IT Module being certified to the particular criteria). However, real world testing of health IT’s ability to exchange the types of data these clinical criteria reference is addressed through the inclusion of the USCDI in the interoperability-focused criteria listed in § 170.405(a) as proposed, which is finalized as proposed. In order to successfully exchange interoperable EHI, the health IT must be able to access it, and in order to incorporate a type of data, the health IT must be able to record it. Comments. The majority of comments received specifically referencing the proposed inclusion of public health criteria in the real world testing requirement in § 170.405(a) support the importance and inclusion of the public health criteria in the scope of real world testing requirements. One commenter questioned the inclusion of the public health criteria in § 170.315(f), stating the commenter’s perception that extensive variation between registries would make this a challenging functionality to demonstrate. Response. Variations in system configurations across different public health agencies’ infrastructures may suggest different real world testing strategies may be most appropriate, or most relevant to customers, compared to what might be the case for some other criteria within the scope of real world testing. However, as noted below about testing tools, we are aware of a wide variety of resources and opportunities to test real world interoperability performance of Health IT Modules certified to the public health criteria in § 170.315(f). Because interoperability performance in actual production environments is an important feature of health IT certified to the public health criteria in § 170.315(f), and noting the support for its inclusion expressed by most commenters, and we have determined that the most appropriate course is to finalize the inclusion of the public health criteria in§ 170.315(f) in the scope of real world testing in § 170.405(a). Comments. One commenter expressed concern that some of the criteria proposed for inclusion in § 170.405(a) be re-examined because they do not include all three of the characteristics our Proposed Rule described as being demonstrated through real world testing. Examples offered included that some criteria proposed for inclusion in VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 § 170.405(a) require exporting but do not require receipt and use of electronic health information by the certified health IT. Response. We appreciate commenters’ bringing to our attention that additional discussion about the requirements would be helpful to the community. For the criteria proposed and finalized in the real world testing scope in § 170.405(a), such real world testing needs to address the interoperability characteristics and all other functionalities and capabilities applicable based on the specific criteria to which the Health IT Module is certified. For example, even if a Health IT Module is not certified to any criterion that specifically requires it to demonstrate, in order to be certified, that the Health IT Module has the capability to incorporate and use data received directly from sources outside the production environment in which it is deployed, that Health IT Module will still need to demonstrate conformance to the full scope of each criterion to which it is certified. This includes, though it is not limited to, the technical standards and vocabulary codes sets included in each criterion to which it certified. c. Testing Plans, Methods, and Results Reporting We proposed (84 FR 7496) that a health IT developers must submit an annual real world testing plan to its ONC–ACB via a publicly accessible hyperlink no later than December 15, of each calendar year for each of its certified Health IT Modules that include certification criteria specified for this Condition of Certification. We proposed (84 FR 7497) that a health IT developer must submit an annual real world testing plan to its ONC–ACB via a publicly accessible hyperlink no later than January 31, of each calendar year for the preceding calendar year’s real world testing. We proposed that the real world testing plan, which will be required to be available to ONC and the public via the CHPL no later than December 15 of each year once this final rule is effective, will need to address the health IT developer’s real world testing that will be conducted the upcoming calendar year and must include, for each of the certification criteria in scope for real world testing in § 170.405(a) and each Health IT Module certified to one or more of these criteria (84 FR 7496): • The testing method(s)/ methodology(ies) that will be used to demonstrate real world interoperability, including a mandatory focus on scenario- and use case-focused testing; PO 00000 Frm 00129 Fmt 4701 Sfmt 4700 25769 • The care and practice setting(s) that will be tested for real world interoperability, including conformance to the full scope of the certification criteria requirements, and an explanation for the health IT developer’s choice of care setting(s) to test; 109 • The timeline and plans for voluntary updates to standards and implementation specifications that ONC has approved (further discussed below); • A schedule of key real world testing milestones; • A description of the expected outcomes of real world testing; • At least one measurement/metric associated with the real world testing for each certification in scope; and • A justification for the health IT developer’s real world testing approach. We sought comment (84 FR 7497) on whether we should specify a minimum ‘‘core’’ set of metrics/measurements and examples of suggested metrics/ measurements as well as on the timing of required real world testing results reporting. We also invited comment on the annual frequency and timing of required real world testing results reporting. Comments. Most comments received supported the proposed requirement for Health IT Modules to undergo real world testing. In addition, commenters indicated that real world testing should occur on a regular basis to ensure various types of changes in the Health IT Modules or production environments have not affected functionality required by the certification. Several commenters recommended development of more specific minimum requirements for test plans and measurement of results. They further recommended that ONC provide additional guidance about what will constitute a minimally acceptable testing plan with explicit content depicting the minimum requirements for each component of the testing plan. Response. We thank commenters for their feedback. As discussed in the Proposed Rule and above, we believe health IT developers are in the best position to design and facilitate implementation of real world testing approaches that balance the burdens of this statutory requirement with its intended assurances that certified health 109 We do not specifically define or limit the care settings and leave it to the health IT developer to determine. As an example, health IT developers can consider categories, including but not limited to, those used in the EHR Incentive Programs (https:// www.cms.gov/Regulations-and-Guidance/ Legislation/EHRIncentivePrograms/Downloads/ UserGuide_QNetHospitalObjectivesCQMs.pdf); long-term and post-acute care; pediatrics; behavioral health; and small, rural, and underserved settings. E:\FR\FM\01MYR3.SGM 01MYR3 25770 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations IT meets Program requirements, including interoperability performance, applicable under the certification it holds. We have therefore finalized requirements in § 170.405(b)(1) designed to avoid the risk of a ‘‘one size fits all’’ set of testing tools (discussed at 84 FR 7496) that might not fully address the concerns raised or provide the assurances of interoperability performance sought across the various types of care settings. By establishing in § 170.405(b)(1)(iii) the topics and considerations every developer must address in its required real world testing plan but not specifying how they must address these required aspects we have provided health IT developers with a requirement that at the same time provides them with the flexibility to develop and implement successful real world testing plans that will best balance burden and value for the customers of each of their products. The ONC–ACBs will be responsible for assessing real world testing plans and results reports for completeness in comparison to what § 171.405(b)(1) requires the plan and results reports to include or address, but will otherwise not be formally evaluating the testing approach for quality as a testing approach. We note for clarity that while ONC–ACB’s will not be judging a developer’s real world testing approaches as planned or as executed, the contents of a developer’s publicly available real world testing results could be used by an ONC–ACB as part of its ongoing surveillance of certified health IT. Additionally, we have finalized our proposed requirement in § 170.405(a) and (b) that requires developers subject to the real world testing Condition and Maintenance of Certification requirements (see § 170.405(b)(2)(i)) who discover in the course of their real world testing any non-conformities with the standards, functionalities, or other requirements of any certification criterion under the Program, to address these non-conformities in order for their Health IT Modules to remain certified. This requirement will apply in the same manner to Health IT Modules certified under the SVAP flexibility in § 170.405(b)(8) or (9) as to Health IT Modules not certified under the SVAP flexibility. Thus, developers who discover non-conformity to any Program requirement(s) will be required to report those non-conformities to their ONC– ACB(s). In order to provide a clear threshold for determining whether a developer has acted on this requirement in a timely manner, we have finalized the requirement to report nonconformities within 30 days of VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 discovering them (see § 170.405(b)(2)(i)). We believe 30 days is an appropriate timeframe to allow developers the opportunity to gather all facts and report to their ONC–ACBs the details and nature of the non-conformity. Furthermore, we believe more than the 30 days would extend beyond the timeframe by which a non-conformity should be investigated by an ONC–ACB and corrective action implemented, if necessary. We are aware that by choosing not to specify particular methods, tools, or checklists of activities that must be included in real world testing, and providing instead extensive flexibility for developers to select tools and design overall methodologies based on their knowledge of their products and customers, we are asking developers to apply innovation and problem solving skills to their real world testing. We believe that the alternative of developing a catalog of detailed specifications and checklists, as some commenters suggested, would be undesirably complex, less supportive of ongoing innovation in the market, and not ultimately less burdensome for developers or their customers. As we have noted in the context of prior Program rulemaking actions, we often make additional information resources and non-binding guidance regarding real world testing available through familiar communications channels, such as the HealthIT.gov website. Comments. Several commenters expressed concerns about the burden of real world testing in specific reference to ONC–ACB processes for in-the-field surveillance of certified products’ continued conformance to applicable certification criteria. Some comments raised concerns about the burden that could be placed on developers’ customers should developers choose to rely heavily on the procedures used by ONC–ACBs for randomized or reactive in-the-field surveillance. Some comments indicated concern that ONC would expect, encourage, or view more favorably real world testing approaches that rely heavily or exclusively on use of ONC–ACB in-the-field surveillance protocols. Response. In the Proposed Rule, we stated that ‘‘developers may consider working with an ONC–ACB and have the ONC–ACB oversee the execution of the health IT developer’s real world testing plans, which could include inthe-field surveillance per § 170.556, as an acceptable approach to meet the requirements of the real world testing Condition of Certification’’ requirement (84 FR 7497). Having considered all comments received, we have decided PO 00000 Frm 00130 Fmt 4701 Sfmt 4700 not to finalize the flexibility for developers to use ONC–ACBs’ in-thefield surveillance as part of the developer’s real world testing plan. We do not believe that use or replication of methods or protocols used by ONC– ACBs for in-the-field surveillance of certified Health IT Modules would be the most effective or the least burdensome approach available to health IT developers and are concerned accepting real world testing approaches that rely on ONC–ACB in-the-field surveillance could slow rather than accelerate development of more innovative approaches to real world testing. We are also concerned that inclusion of ONC–ACB execution of inthe-field surveillance within a developer’s real world testing approach could lead to confusion as to whether the organization that is an ONC–ACB was applying in-the-field surveillance protocols in its capacity as an ONC– ACB as part of its oversight responsibilities on behalf of ONC or in its private capacity on behalf of the health IT developer. We believe it is important, to protect HIPAA covered health care providers and other HIPAA covered entities and their business associates from inadvertently violating requirements related to disclosure of health information, to maintain a clear distinction of when an organization that is an ONC–ACB is acting in the ONC– ACB capacity and when it is acting in its private capacity. We note and emphasize this because, in the event a developer may choose to engage services in support of developing or implementing the developer’s real world testing plans from an organization or entity that also happens to be an ONC–ACB, all activities undertaken by the organization or entity to develop, execute, or support the development or execution of the developer’s real world testing plan would be activities outside the ONC–ACB role. In such circumstances, the organization that is an ONC–ACB would be acting in a separate, private capacity. Note that an organization providing such private services that involve ePHI would likely be characterized under the HIPAA Rules as a business associate to the health care provider and subject to the HIPAA Rules. The oversight authorities attached to its ONC–ACB role would not apply to the organization’s requests to gain access to health care provider facilities or to EHI for purposes of providing these separate support services to health IT developers for conduct of the developers’ real world testing. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations Comments. Several commenters sought confirmation that a test server could be used for real world testing instead of a production environment, given the permissible use of synthetic data. Response. After considering the totality of comments received, we have decided to finalize that a test server could be used for real world testing and provide the flexibility included in the Proposed Rule that allows for real world testing to occur in a production setting using real patient data in accordance with applicable laws as well as in an environment that mirrors a specific production environment used in a type of clinical setting for which the health IT is marketed. We have also decided to finalize the flexibility for the developer to use synthetic patient data in lieu of or in addition to real patient data in real or simulated/test scenarios executed in environments that mirror production environments where the health IT is deployed. However, we emphasize that the purpose of real world testing is to demonstrate that the Health IT Module(s) work as expected in real-life clinical settings. We note, as a point of potential interest for such consideration, that real world testing plans that meet the Program requirement might include observation or measurement of the health IT’s interoperability performance while actual scenarios and use cases are executed by end users on real patient data in actual operational contexts. If a developer chooses to use synthetic data, non-production (mirrored) environments, or a combination of real and synthetic data or production and mirrored environments, to complete any portion of their annual real world testing requirements, the developer must include in their real world testing plan and results submissions a specific explanation justifying how the synthetic data, mirrored environment, or both are appropriate and adequate to meet the real world testing requirement(s) for which they will be or were used. Comments. Several commenters sought confirmation that a product serving multiple care settings could complete a single test relevant to all settings and ask ONC to provide a list of eligible care settings for reference. Response. The finalized real world testing Condition and Maintenance of Certification requirements include testing each criterion listed in § 170.405(a) to which any Health IT Module(s) within the product are certified, and testing in each type of setting to which it is marketed. To satisfy these Condition and Maintenance of Certification requirements as finalized, a single VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 testing plan, protocol, or approach must address all the types of settings to which the product, with all its included Health IT Module(s), is marketed and do so with traceability to each Health IT Module of its real world performance in each type of setting for which it is marketed. We believe it is possible to construct a real world use scenario or use case that tests more than one type of setting applicable to the Health IT Module, and confirm that a developer is not required to develop unnecessarily or artificially separate scenarios or use cases across multiple types of settings to which a given developer markets its applicable Health IT Module(s). With respect to the types of settings required to be addressed by a given developer’s plan, we do not believe that additional specification is necessary because we believe each developer is well situated to know for what types of settings the developer (or its authorized resellers) has marketed, is marketing, or intends to market its Health IT Modules. For purposes of this Condition and Maintenance of Certification requirement as finalized, there is no exclusion for settings or health care provider types based on their inclusion or lack of inclusion in, or eligibility or ineligibility for, and particular Federal health care program or initiative. Therefore, the types of settings eligible to be addressed in a developer’s real world testing plan for a given year include all those to which product(s) including one or more Health IT Modules certified to one or more of the criteria listed at § 170.405(a) as of August 31 of the year in which that specific annual real world testing plan is due have been or are marketed when the real world testing plan is submitted, and/or the types of settings for which the developer anticipates marketing such product(s) in time to include them in a specific year’s real world testing activities. Comments. Several commenters requested ONC ensure that real world testing requirements do not create infrastructure for testing of public health transactions without public health involvement. Several commenters noted that public health organizations and many public health agencies already offer resources and processes used in onboarding processes for public health reporting connections and suggested these resources and processes could be used more broadly to test health IT’s real world performance on public health interoperability criteria rather than requiring creation of new or different tools. Response. We would tend to agree that relying for specific use cases on PO 00000 Frm 00131 Fmt 4701 Sfmt 4700 25771 testing infrastructures developed without appropriate involvement of key participants in the use case would not be an optimal approach. Also, we reiterate that we encourage developers to consider a variety of options and approaches before finalizing their annual real world testing plans. We would encourage developers to consider the real world testing potential of resources, tooling, and infrastructure already offered by public health organizations and agencies before embarking on efforts to develop additional tooling. We also note that, for the interoperability-focused public health criteria, alternatives that would avoid both overuse of simulation environments and asking public health agencies to engage in work unique to developers’ real world testing plans might include structured observation and measurement of interoperability performance in actual public health data reporting/exchange as well as the testing ordinarily conducted for onboarding/ confirming connectivity of newly deployed/upgraded implementations to public health data exchange infrastructures. Comments. A number of commenters expressed support of requiring the use of metrics/measurements for real world testing. One commenter stated that ONC should not allow just one measurement to suffice for real world testing of interoperability of a Health IT Module. Several commenters recommended ONC include a description of ‘‘measurement,’’ provide clarity on the role of measurement, and provide a ‘‘sample’’ or suggested set of metrics/ measurements to help foster alignment of reporting around meaningful common metrics/measurements across developers. Some commenters recommended ONC identify a core set of metrics/measures that developers would be required to include, or from which developers would be required to select specific metrics/measures to include, in their real world testing plans. Other commenters advocated against developers being required to submit testing results for a minimum ‘‘core’’ set of general metrics, providing the rationale that not all metrics will be available to all systems uniformly and suggesting that many metrics are retained in the provider’s locally integrated production systems and unavailable to the developer of any given Module(s) without considerable effort to retrieve the data. One commenter recommended requiring that each developer’s real world test plan include measures addressing all of the domains of the NQF report: E:\FR\FM\01MYR3.SGM 01MYR3 25772 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations Measurement Framework to Assess Nationwide Progress Related to Interoperable Health Information Exchange to Support the National Quality Strategy.110 Response. The comments on real world testing did not show clear, widespread support for any specific subset of available metrics as a ‘‘core’’ set or catalog that a significant portion of the affected communities (health IT developers, health care providers, and public health agencies) would generally agree should be consistently used across all developers’ real world testing plans. Thus, we have finalized the real world testing plan requirements (see § 170.405(b)(1)(iii) and real world testing results reporting requirements (see § 170.405(b)(2)(ii)) without identifying a minimum set of measures that must be used or a catalog of suggested measures from which a developer would be expected to choose in constructing its real world testing plans. We reiterate that each developer must choose a measurement approach, including at least one measurement/ metric per applicable criterion, for use in each year’s real world testing and explain the selection and relevance of its selected measures/metrics within its justification for its real world testing approach in that year’s plan and results report. Comments. Comments were received on the frequency and timing of real world testing. One commenter stated the policy should not require annual testing if the capability certified for a given criterion remains unchanged year to year, offering the example that if a Health IT Module is certified for both § 170.315(b)(1) and (b)(2) and the developer is planning to release material updates to the capabilities specific to § 170.315(b)(1), but not make any material changes specific to the Module’s certification to § 170.315(b)(2), this commenter would prefer that the Health IT Module would need to submit a testing plan and subsequent results addressing only the § 170.315(b)(1) criterion for the year the change is made. Another commenter expressed skepticism regarding the value of annual real world testing requirements, expressing a preference for an approach that developers would, after an initial cycle of post-certification real world testing of a Health IT Module, be required to re-test only when updating to National Coordinator-approved newer versions of adopted standards included in applicable criteria or when making 110 https://www.qualityforum.org/Projects/i-m/ Interoperability_2016–2017/Key_Informant_ Summary_Report.aspx (last accessed 12/17/2019). VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 major functional updates to the certified Health IT Module. One commenter who was overall not supportive of the real world testing requirement stated that developers would need a two-year cycle instead of a one-year cycle in order to adequately demonstrate compliance with full functionality testing. One commenter specifically expressed support for the annual frequency and timing of required real world testing results reporting. Response. We thank the commenters for their feedback regarding the frequency and timing of real world testing. We have finalized the requirement for annual testing in § 170.405(b)(1). Ongoing annual testing is needed to ensure that Health IT Module(s) continue to perform as intended in the types of settings where patients and health care providers continue to rely on it to meet their interoperability needs. Comments. Several commenters expressed support of the proposed real world testing plan requirements and requested we strengthen this provision to require that developers test their products within each clinical specialty to which the technology would be marketed. One commenter requested that we define with more particularity what is expected of developers during the testing to account for the differing conditions under which Health IT Modules are deployed, and how for example, the system works particular conditions like server degradation. Several other commenters suggested we provide a standardized template for use in developing test plans. Commenters described a template would include all required testing elements and promote greater consistency in the way the test plans are written by the various developers. Response. For reasons stated in the Proposed Rule (84 FR 7496) and above, we do not believe a centrally developed or standardized approach for real world testing plans is the most appropriate solution at this time. By centrally mandating or endorsing a single template in the interest of consistently formatted documentation, we are concerned that we might inadvertently discourage innovation in both testing approaches and their communication to the customer community. What the plan must include or address for each applicable criterion to which the developer’s Health IT Module(s) are certified is outlined in § 170.405(b)(1)(iii), as finalized by this rule. We believe the plan requirements finalized in the plan requirements in § 170.405(b) are specific enough to ensure the plans can be completed by PO 00000 Frm 00132 Fmt 4701 Sfmt 4700 developers and effectively reviewed for completeness by ONC–ACBs, and that both the substance and clarity or efficacy of presentation can both be examined and considered by any interested parties—from health care providers to informatics and interoperability researchers. Because individual circumstances and needs may vary even within the same type of setting or clinician specialty, it would be not be possible at this time to define a real world testing regime that eliminated all of the variability developers may have in implementing their real world testing plans. Comments. One commenter sought clarification on the total minimum number of metrics required for a developer’s real world testing plan to be considered complete and in compliance with the requirement. Response. A developer’s real world testing plan must include at least one metric for each applicable certification criteria. To ensure that we are providing clear guidance, we offer the following illustrative example: A developer with one Health IT Module that is certified to five criteria would need to include in its real world testing plan at least one specific measurement/metric associated with the real world testing for each of those five criteria. Depending on the specific criteria and the developer’s real world testing approach, this could call for up to five different measurements/ metrics, or could be addressed with fewer different measurements/metrics but a specific measurement/metric would need to be identified/attributed within the plan to each of the applicable certification criteria. Comments. A few commenters stated concerns regarding our mandatory focus on scenario- and use case-focused testing. One commenter expressed a view that this would be expensive and time consuming, stating that this expense limits scenario- and use casefocused testing in the number of settings that can realistically be tested in any given year. One commenter noted that as more settings are tested, fewer scenarios can be run per setting. Two commenters sought more information on the mandatory scenario- and use case-focused testing that will be required, recommending that Health Information Service Providers (HISPs) be able to attest to the relevant use cases and provide the proper evidence of testing associated to those scenarios. Response. In light of comments received, we can see how our use of terms that are also used in the context of ONC–ATL laboratory or ONC–ACB surveillance testing, and our reference in one instance to in-the-field E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations surveillance, could have led to an inference that our use of these terms implied we would expect to see the same or similar testing protocols used in real world testing. However, we did not propose that real world testing would require developers to set up and execute artificial scenarios or activities solely for purposes of testing. In fact, we do not encourage use of the laboratory testing or ONC–ACB in-the-field surveillance protocols to conduct real world testing, as those particular test methods, tools, and surveillance protocols were not designed and should not be relied upon for real world testing. The testing methods/methodologies need to address realistic scenarios, use cases, and workflows associated with interoperability, and we do expect developers to consider such factors as the size of the organization that production systems support, the type of organization and setting, the number of patient records and users, system components and integrations, and the volume and types of data exchange in planning for real world testing. Comments. One commenter expressed agreement that the developer is best situated to determine the most effective real world testing plan for their products. One commenter requested developers be allowed to work together with their customers to define what real world tests are. Response. The requirements we proposed and finalized provide developers the opportunity to identify, potentially in partnership with their customers, the real-life scenarios, use cases, and work flows applicable to the customer’s day-to-day use of the Health IT Module(s) to meet their interoperability needs in their production environments. d. Submission Dates We proposed that a health IT developer must submit an annual real world testing plan to its ONC–ACB via a publicly accessible hyperlink for availability to ONC and the public no later than December 15, of each calendar year, and that the plan must address all of its Health IT Modules certified to the 2015 Edition certification criteria listed in proposed in § 170.405(a) and (84 FR 7496). We proposed requiring that prior to submission to the ONC–ACB, the plan will need to be approved by a health IT developer authorized representative capable of binding the health IT developer for execution of the plan and include the representative’s contact information. We proposed that the plan due in any given year will need to include all health IT certified to the 2015 Edition through August 31 of that VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 year (in other words, the August 31 that immediately preceded the December 15 due date). We further proposed that a health IT developer would submit annual real world testing results to their ONC–ACBs via a publicly accessible hyperlink no later than January 31 of each calendar year for the real world testing conducted in the preceding calendar year (84 FR 7497). We proposed that real world testing results for each certification criterion listed in § 170.405(a) would be required to address the elements required in the previous year’s testing plan, describe the outcomes of real world testing with any challenges encountered, and provide at least one measurement or metric associated with the real world testing. Comments. Some commenters expressed concerns that the annual real world testing plan due date falls in December, noting that in addition to multiple holidays widely celebrated in the U.S., December can be a busy time for many health IT developers due to various year-end requirements and necessary preparations to support customers’ quality measurement data submissions for CMS programs. Response. We understand the commenters’ concern that the proposed real world testing plan publication due date falls in the preparatory run-up to year-end deadlines, including for many developers completing preparations to support their customers’ successful clinical quality measurement data submission during CMS program windows that typically open on the first Federal business day in January. In consideration of comments received, we have made edits to the phrasing of the CFR text in § 170.405(b) to convey with more precise clarity that under the policy we have finalized, the developer is required to submit its real world testing plans so that the ONC–ACB can conduct its completeness review and publish the plan hyperlink on CHPL no later than December 15 of each year. This allows for the ONC–ACB and developer to identify and agree on the date by which the developer will actually submit its plan to the ONC– ACB, which could be well in advance of December. One practical implication of the single-deadline feature of the policy as proposed is that in order for the plans to be submitted to ONC and made publicly available by the single deadline, the ONC–ACB’s requirement to review plans for completeness per Program requirements will in many cases mean that the ONC–ACB will need the developer to submit the plan to the ONC–ACB in advance of the single deadline. We have finalized the PO 00000 Frm 00133 Fmt 4701 Sfmt 4700 25773 December 15 due date for real world testing plan publication on CHPL as proposed. We have also made clarifying edits to the finalized regulation text (see § 170.405(b)(1)) in comparison to the proposed text to more explicitly recognize the practical implication that the developers’ and ONC–ACBs’ responsibility for a single publication date for the plans means that the plan must be submitted by the developer to the ONC–ACB on a date agreed between them that allows for publication by the deadline. We encourage developers and ONC–ACBs to consider allowing at least one calendar month so that the December 15 due date for ONC–ACBs’ publication of real world testing plans will be consistently met. We also note that nothing in § 170.405 as finalized precludes a developer and ONC–ACB from agreeing on the developer submitting its annual real world testing plan to the ONC–ACB more than one month prior to December 15. We have finalized the single plan publication deadline as proposed. We did not receive comments specific to August 31 as the annual date when a Health IT Module must be certified by in order to be required to be included in the real world testing plan due that year. We have finalized this aspect of our policy as proposed in § 170.405(b)(1)(ii). Thus, developers can submit their real world testing plans as early as September 1 and on a rolling basis thereafter for products in scope for the following year, which also addresses commenter concerns. We did not receive comments specific to this point, but have removed from § 170.405(b) as finalized the language that would have specifically required the initial submission of the plan to the ONC–ACB by the developer must be by a publicly accessible hyperlink. While this remains an option, and could be the most efficient one for developers and ONC–ACBs in many instances, we believe this is an unnecessarily limiting specification of the manner of interaction between developers and ONC–ACBs in these instances. The URL or hyperlink in CHPL will not be published on CHPL until the ONC–ACB takes action to publish it, and the ONC– ACB is required to review the plan and ensure it is complete before publishing the plan link on CHPL. Comments. We received some comments that appeared to construe our intent to be that real world testing for all Health IT Modules certified as of August 31 of a given year would need to be planned, conducted, and reported within five months of that date. Comments that appeared to be based on this interpretation also expressed E:\FR\FM\01MYR3.SGM 01MYR3 25774 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations concern that this would be too much to accomplish on such an annual schedule. Response. We proposed that each developer’s annual real world testing plan required to be published by December 15 of a given year would need to address all of the developer’s Health IT Modules certified to criteria listed in § 170.405(a) as of August 31 of that year (84 FR 7496). We also proposed that this annual real world testing plan would pertain to real world testing activities to be conducted in the year following the December 15 plan publication due date. In light of comments received, we can see how we might have been more precise in how we stated that the annual results report would be due early in the year following the year in which the testing it reported was conducted. The full cycle of real world testing for a given year was never specifically proposed to be contained within a single year, considering that the plan is due in the year prior and the results report was proposed to be due in the year following the one in which a given annual round of real world testing activity occurs. Comments. Comments raised concerns that the January 31 publication deadline might not leave enough time for developers who do not or cannot complete their annual testing activities until late in the testing year to submit their results reports, and ONC–ACBs complete their required reviews, prior to the publication deadline. One commenter raised a specific concern that the proposed January 31 due date for real world testing results falls in the submission window for several CMS programs for which developers’ customers need to submit their clinical quality measurement data for the preceding year. One commenter recommended leveraging the existing quarterly update attestation process and asking developers to conduct real world testing on those items identified as major changes. Response. As with the plan due date, the practical implication of this proposal is that each developer will need to submit their results reports to their ONC–ACB sufficiently in advance of the due date for publication for the ONC–ACB to be able to complete its pre-publication responsibilities for all of the results reports and still publish no later than that due date. In theory, this means that in some cases developers could complete their real world testing relatively early in a given testing year and submit their results report for that year before the CMS submission window for that year’s measurement data even opens for the developer’s customers. However, considering the VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 comments received, we do recognize it is possible developers may for various reasons not be able to complete their annual real world testing activities until fairly late in any given testing (calendar) year. We also recognize that the data submission window for CMS programs can be a busy time for developers, and would not wish to disadvantage newer or smaller developers who may not have separate resources available to finalize a report of real world testing not concluded until late in the testing year while simultaneously supporting customers’ data submissions. In light of these comments, we have decided to finalize a deadline for publication on the CHPL of the publicly accessible hyperlink to developers’ report of real world testing conducted in the prior year at March 15 of each year (see § 170.405(b)(2)(ii)). This finalized date gives an additional six weeks for finalization and submission by developers compared to the date originally proposed. It also implements a single deadline, to which the developers and ONC–ACBs are mutually accountable, in parallel to the annual real world testing plan submission requirement in § 170.405(b)(1). We believe this strikes an appropriate balance between timely availability of annual real world testing results and recognition that some developers may need to devote a substantial amount of focus to the CMS quality measures data submission windows at the beginning of each year. Although we have opted not to mandate developers submit their results reports to their ONC–ACBs by a date providing a minimum required lead time for ONC– ACBs’ required review of the report, we would suggest that ONC–ACBs and developers consider the potential merits of allowing at least one calendar month between the developer’s initial submission of their real world testing results report to the ONC–ACB and the March 15 publication deadline. e. Real World Testing Pilot Year We acknowledged in the Proposed Rule that a subsequent final rule for that may not provide sufficient time for health IT developers to develop and submit plans for a full year of real world testing in 2020 (84 FR 7497). Therefore, we indicated in the Proposed Rule that we expected to provide an appropriate period of time for developers to submit their plans, and potentially treat 2020 as a ‘‘pilot’’ year for real world testing. We expected that the pilot testing of real world testing would match up to the fullest extent practicable with our proposed real world testing requirements (e.g., same criteria but for PO 00000 Frm 00134 Fmt 4701 Sfmt 4700 a shorter duration and without the same consequences for noncompliance). We welcomed comments on this potential approach. Comments. The majority of comments specifically addressing this point were in support of 2020 being treated as a pilot year. One commenter agreed that deferring the implementation or constructing a pilot year for the Program would be appropriate and stated their belief that 2020 may be too early even to conduct a pilot. Response. We thank commenters for their thoughts on potential piloting of real world testing and the timing of initiating real world testing requirements. In consideration of the timing of the final rule, we have decided not to finalize 2020 as a pilot year since developers will now have the majority of calendar year 2020 to develop a prospective plan for real world testing that would begin in 2021. However, we recognize that this first ‘‘performance’’ year of real world testing in 2021 presents unique challenges with respect to the development of initial plans, and we fully intend to approach both the submission of initial plans and submission of retrospective testing results for those plans (i.e., 2021 real world testing results) as learning experiences for developers that can be used to inform future iterations of real world test plans. As noted in the proposed rule (84 FR 7497), the due date for the first annual real world testing plan would be finalized based in part on the timing of the final rule. Because this final rule is publishing well in advance of the December 15 annual due date for publication of developers’ plans of real world testing activities to be conducted in the following year, we have concluded it is reasonable to require the first annual real world testing plan be published via a publicly accessible hyperlink on the CHPL no later than December 15, 2020. This initial real world testing plan must address any and all of the developer’s Health IT Modules that hold a current, valid certificate under the Program as of August 31, 2020. The real world testing plan due to be published in December 2020, will need to address the real world testing activities that will occur during calendar year 2021. The report of results for this initial (2021) annual real world test cycle will be due to be published on the CHPL no later than March 15, 2022. f. Health IT Modules Certified But Not Yet Deployed We proposed (84 FR 7497) that even if a health IT developer does not have customers or has not deployed their E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations certified Health IT Module(s) at the time the real world testing plan is due, the health IT developer would still need to submit a plan that prospectively addresses its plans for real world testing that would occur in the coming year for those Health IT Modules that had been certified on or before August 31 of the calendar year in which the plan is due (the calendar year immediately preceding the calendar year during which testing addressed by any given annual real world testing plan will take place). If a health IT developer has not yet deployed their certified Health IT Module to any real world users when the annual real world testing results are due for that module, we proposed that the developer would need to report as such to meet the proposed Maintenance of Certification requirement. Comments. We received no comments on this proposal. Response. We have finalized this proposal. Any Health IT Module certified to at least one criterion within the scope of real world testing as of August 31 of a given year must be addressed by its developer’s real world testing plan for the subsequent year that must be published via publicly accessible hyperlink on the CHPL by the December 15 due date (see § 170.405(a)). This requirement applies regardless of whether that Health IT Module is in actual real world use prior to December 15 (or the earlier date by which the developer and ONC–ACB agree the developer will submit its annual real world testing plan to the ONC–ACB to ensure the developer and ONC–ACB meet single, December 15, deadline for the plan to have been reviewed for completeness and published on CHPL). To ensure precise clarity about the effect of the August 31 reference date for purposes of real world testing requirements, we reiterate that if a developer has at least one Health IT Module certified to at least any one criterion within the real world testing scope of applicability as of August 31 of a given year, the real world testing Condition and Maintenance of Certification requirements apply to that developer and the developer must submit an annual real world testing plan for that year, addressing each of their Health IT Module(s) certified to any (one or more) criteria listed in § 170.405(a) and that plan must meet the requirements in § 170.405(b)(1)(iii) for each module and criterion. Only developers who have no Health IT Module(s) certified to any criterion within the real world testing scope of applicability as of August 31 of a given year need not submit a real world testing plan that year and would not be VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 required to perform real world testing in the subsequent year. g. Standards Version Advancement Process (SVAP) As discussed in the Proposed Rule (84 FR 7497), as newer versions 111 become available for adopted standards and implementation specifications included in the certification criteria subject to the real world testing Condition and Maintenance of Certification requirements, we believe that a health IT developer’s ability to conduct ongoing maintenance on its certified Health IT Module(s) to incorporate these newer versions of Secretary-adopted standards and implementation specifications (‘‘standards’’) is essential to support interoperability in the real world. Updated versions of standards reflect insights gained from real-world implementation and use. They also reflect industry stakeholders’ interests to improve the capacity, capability, and clarity of such standards to meet new, innovative business needs, which earlier standards versions cannot support. Therefore, as part of the real world testing Condition of Certification, we proposed a Maintenance of Certification flexibility that we refer to as the Standards Version Advancement Process (SVAP).112 This flexibility would permit health IT developers to voluntarily use in their certified Health IT Modules newer versions of adopted standards so long as certain conditions are met. As we stated in the Proposed Rule, these conditions are not limited to but notably include successful real world testing of the Health IT Module using the new version(s) subsequent to the inclusion of these newer standards and implementation specification versions in the Health IT Module’s certification. We proposed to establish the SVAP not only to meet the Cures Act’s goals for interoperability, but also in response to the continuous stakeholder feedback that ONC has received through prior rulemakings and engagements, which requested that ONC establish a predictable and timely approach within the Program to keep 111 We note that standards developing organizations and consensus standards bodies use various nomenclature, such as ‘‘versions’’ or ‘‘releases,’’ to identify updates to standards and implementation specifications. 112 Regulation text implementing the real world testing Condition and Maintenance of Certification requirement was proposed in § 170.405, including but not limited to SVAP-specific provisions proposed in § 170.405(b)(5). The SVAP-specific provisions have now been finalized in § 170.405(b)(8) and (9) (see section VII.B.5.g of this final rule). PO 00000 Frm 00135 Fmt 4701 Sfmt 4700 25775 pace with the industry’s standards development efforts. The SVAP we proposed, with corresponding proposed revisions for §§ 170.500 and 170.555, introduces two types of administrative flexibility for health IT developers participating in the Program (84 FR 7498). First, for those health IT developers with existing certified Health IT Module(s), such Health IT Modules could be upgraded to a new version of an adopted standard within the scope of the certification and have support for that updated version of the standard reflected on the Health IT Module’s certificate so long as: Such version was approved by the National Coordinator for use in the Program; and the developer satisfied all requirements of the SVAP including demonstration of conformance through an acceptable means (84 FR 7498 through 7500). For purposes of the SVAP as applied to updates to Health IT Modules with certificates to criteria listed in § 170.405(a) that include prior version(s) 113 of the standards, acceptable means of demonstrating conformance include but are not necessarily limited to self-declaration of conformance, as proposed in 84 FR 7499 and finalized in this final rule. Second, for those health IT developers presenting health IT for certification to a criterion listed in § 170.405(a), a National Coordinator-approved newer version of a standard included in one of these criteria could be used in lieu of or in addition to the version of that standard incorporated by reference in § 170.299 (84 FR 7498). However, for purposes of the SVAP as applied to health IT that is presented for certification to any criterion listed in § 170.405(a), developer self-declaration is an acceptable means of demonstrating conformance only where there is not yet another conformance method available that can be validly used for that version of that standard (84 FR 7499 through 7500). The regulation text codifying requirements for health IT developers to avail themselves of each of the proposed types of administrative flexibility was proposed (84 FR 7595 through 7596) in § 170.405(b)(5). Corresponding revisions to § 170.550 and § 170.555 were proposed in 84 FR 7598. We proposed that the SVAP would be available only for National Coordinatorapproved newer versions of standards and implementation specifications (‘‘standards’’) that have already been 113 Prior versions for this purpose could include those incorporated by reference in § 170.299, National Coordinator approved newer versions, or a mix of such versions for any or all of the standards adopted by the Secretary in subpart B of part 170 that are included in a given criterion. E:\FR\FM\01MYR3.SGM 01MYR3 25776 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations adopted into the Program by the Secretary through rulemaking in accordance with applicable law including the Administrative Procedures Act (5 U.S.C. 553) and sections 3001 and 3004 of the Public Health Service Act (PHSA) (42 U.S.C. 300jj–1 and 42 U.S.C. 300jj–11) (84 FR 7498). We have finalized this aspect of the standards version advancement flexibility as proposed. Under current law and the finalized SVAP flexibility, a standard must be initially adopted by the Secretary through rulemaking before the National Coordinator can approve the use of newer updated versions of that standard in the Program. We also proposed that a health IT developer would be able to choose which of the updated standards versions approved by the National Coordinator for use in certification to include in its updated certified Health IT Module and would be able to do so on an itemized basis (84 FR 7499). We stated in the Proposed Rule that we welcomed comments on any and all aspects of our proposed SVAP as an option available to developers through maintenance requirements as part of the real world testing Condition and Maintenance of Certification requirements (84 FR 7500). We also invited comments on our proposal to allow in conjunction with this maintenance flexibility the opportunity for developers to elect to present health IT for initial testing and certification either to more advanced versions or to the prior adopted versions of the standards included in regulatory text as of the date the Health IT Modules are presented for certification. Comments. Comments were strongly supportive of the SVAP. Several commenters recommended the description of this process include recognition of the fact that developers and systems might need to maintain operational support for previously adopted versions of standards to avoid potential adverse effects on data access, exchange, and use. Response. We have finalized the SVAP in § 170.405(b)(8) and (9) to provide the flexibility for which stakeholders’ comments expressed support. This flexibility includes the option for a Health IT Module to be certified to the standards versions incorporated by reference in § 170.299 and/or one or more National Coordinator-approved updated versions of standards included in the criteria listed in § 170.405(a). Thus, once the National Coordinator has approved for use in the Program more advanced version(s) of any standard(s) applicable to any of the criteria listed in VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 § 170.405(a), a health IT developer will have flexibility to choose on an itemized basis which of the National Coordinatorapproved updated standards versions they wish to have included in their Health IT Module certification(s). Using the SVAP flexibility does not require a developer cease supporting prior version releases of standards referenced by applicable certification criteria. Comments. Several commenters expressed concerns about the effect of an uneven pace of advanced version implementation across health IT developers and products within and outside the Program. Several of these commenters recommended that, as developers voluntarily seek to support newer versions of standards and specifications through the SVAP, they also be required to maintain support for the adopted version of the standard listed in the Code of Federal Regulations (45 CFR part 170, subpart B) for the applicable criteria until HHS conducts rulemaking that would require all certified health IT upgrade to the newer version of the standard and sunset older versions of the standard from the Program on a mandatory, coordinated timeline. Response. We do recognize the importance of ensuring that updated versions of standards are approved and available for use in the Program only when such use is consistent with the Program’s purposes. We do not anticipate that the National Coordinator would approve a newer version of a standard for use in the Program where that is inconsistent with the Program’s purposes, notably including the maintenance and advancement of interoperability. Moreover, we believe there is substantial value in allowing for the market to, in effect, sunset obsolete standards versions at its own pace unless a hard cutover (or other highly coordinated nationwide timeline for abandoning older versions) would be necessary to sustain functional interoperability. The SVAP flexibility simply allows for a developer to choose to work with their ONC–ACB to obtain certification, or to modify the scope of the of Health IT Module’s certification, to reflect that the Health IT Module as certified includes: The version of each adopted standard that is incorporated by reference in § 170.299; or a specific National Coordinator-approved updated version of each applicable standard; or a National Coordinator-approved updated version for each of one or more applicable standard(s); or multiple version(s) of any one or more adopted standard(s). Previously, developers were free to upgrade certified Health IT Modules to support newer versions of PO 00000 Frm 00136 Fmt 4701 Sfmt 4700 adopted standards, but only in addition to the version(s) of those standards incorporated by reference in § 170.299. In our experience, newer versions render prior versions obsolete on a more rapid pace for some standards than for others and more rapidly than the versions incorporated by reference in regulations could be updated. Prior feedback had indicated that being required to maintain support for the version of a standard that is incorporated by reference in § 170.299 solely for the purpose of maintaining regulatory compliance under the Program represented a burden without commensurate value in cases where customers’ operational interoperability needs could be met only by use of newer version(s) of particular adopted standards than the versions listed in the regulations. The SVAP is designed to eliminate that burden and simultaneously provide, through inclusion of support for advanced standards versions within a Health IT Module’s certification, enhanced assurance to users that Health IT Modules supporting National Coordinator-approved newer versions of standards under the SVAP flexibility continue to meet all of the requirements of the criteria to which the Health IT Module is certified. Comments. A number of commenters requested clarification on how the proposed Standards Version Advancement Process would align with expansion of the USCDI, or whether the USCDI will be versioned through the SVAP. Some commenters expressed an opinion that the USCDI expansion process should not be executed or allowed via the SVAP and instead require rulemaking. Response. As discussed in section IV.B.1, we have adopted the USCDI as a standard in § 170.213 and incorporated USCDI v1 by reference in § 170.299(n)(5). For purposes of the SVAP, the USCDI will be treated like any other standard. This means that health IT when presented for certification to any one or more criteria referencing § 170.213 will be required to support USCDI v1 or a later version, with SVAP providing flexibility for developers to choose whether to support later versions of USCDI that the National Coordinator may approve for use in the Program in lieu of or in complement to USCDI v1. Developers and will not be required to support newer versions of the USCDI standard instead of USCDI v1 until such time as § 170.213 and § 170.299 are updated. However, developers may voluntary choose to use the SVAP flexibility to voluntarily upgrade certified Health IT E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations Modules, or to seek certification of their health IT, to newer version release(s) of the USCDI if such release(s) have been approved by the National Coordinator for use under the Program. As with any other standard relevant to the SVAP flexibility, we would anticipate that the National Coordinator would not approve for voluntary use under the Program an updated version of any standard that would render Health IT Module(s) using it incapable of exchanging EHI with other technology certified under the Program to other version(s) of the standard. We also note that, although HHS is the steward of the USCDI standard, we have not at this time foreclosed the possibility that we could publish a newer update of the USCDI that the National Coordinator would not immediately approve for developers’ voluntary use under the Program via the SVAP flexibility. We recognize a potential that expanding the USCDI to include additional data classes in future versions could lead to Health IT Modules certified to these more advanced versions of USCDI being able to access, use, and exchange more data classes than Health IT Modules certified only to earlier versions of the USCDI. However, the technology certified to National Coordinatorapproved newer versions of the USCDI would be capable of exchanging the data classes included in prior version(s) of the standard. Thus, the flexibility maintains interoperability while allowing those who need additional data classes to be fully supported by certified health IT in their access, exchange, and use of these additional data classes and not forcing other users of certified health IT (who do not yet need to access, exchange, or use such additional data classes) to update their health IT. We therefore believe that allowing for expansion of data for which certified Health IT Modules can support interoperability at a pace driven by the market’s progress in standards development and demand for interoperability is an important benefit of the SVAP flexibility. Comments. One commenter stated the SVAP would be more effective for electronic prescribing if it could be used to allow voluntary adoption of a new version of the NCPDP SCRIPT standard by prescribers, pharmacies, and Part D prescription drug plans without CMS rulemaking. Response. CMS is solely responsible for Medicare Part D program regulations and other policies, including its required e-prescribing standards and standards versions. In the future, the SVAP flexibility could enable developers to have the certifications of VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 their Health IT Modules to e-prescribing criteria updated to reflect conformance of the Health IT Modules to newer versions of adopted standards that might be required by CMS Part D program or other HHS regulatory requirements before we could update the version(s) of e-prescribing standards incorporated by reference in § 170.299. This approach would avoid the need for CMS or ONC to go through joint rulemaking in order maintain programmatic alignment. h. Updating Already Certified Health IT Leveraging SVAP Flexibility We proposed that in instances where a health IT developer has certified a Health IT Module, including but not limited to instances where its customers are already using the certified Health IT Module, if the developer intends to update pursuant to the SVAP election, the developer will be required to provide advance notice to all affected customers and its ONC–ACB: (a) Expressing its intent to update the software to newer versions of the standard approved by the National Coordinator through the SVAP; (b) the developer’s expectations for how the update will affect interoperability of the affected Health IT Module as it is used in the real world; and (c) whether the developer intends to continue to support the certificate for the existing Health IT Module version for some period of time and how long, or if the existing version of the Health IT Module certified to prior version(s) of applicable standards will be deprecated (e.g., that the developer will stop supporting the earlier version of the module and request to have the certificate withdrawn) (84 FR 7498). The notice would be required to be provided sufficiently in advance of the developer establishing its planned timeframe for implementation of the upgrade to the more advanced standard(s) version(s) in order to offer customers reasonable opportunity to ask questions and plan for the update. We requested public comment on the minimum time prior to an anticipated implementation of an updated standard or implementation specification version update that should be considered reasonable for purposes of allowing customers, especially health care providers using the Health IT Module in their health care delivery operations, to adequately plan for potential implications of the update for their operations and their exchange relationships. We also requested comments on specific certification criteria, standards, characteristics of the certified Health IT Module or its implementation (such as locally hosted PO 00000 Frm 00137 Fmt 4701 Sfmt 4700 25777 by the customer using it versus software-as-a-service type of implementation), or specific types or characteristics of customers that could affect the minimum advance notice that should be considered reasonable across variations in these factors (84 FR 7499). Comments. Only a few commenters offered thoughts specifically on the minimum time prior to an anticipated implementation of an updated standard or implementation specification version update that should be considered reasonable. Several of these commenters noted that different market segments and provider types vary in their willingness or ability to upgrade to new software versions. One comment submission indicated two months would be a reasonable minimum time prior to implementation of an updated standard for their customers to be notified. Another commenter observed that the minimum timeframe prior to an anticipated implementation of an updated standard is two to four years. Response. The comments received comport with our prior understanding that the minimum advance notice needed to offer customers reasonable opportunity to ask questions and plan for the update or modification of Health IT Modules the customers are using or have purchased and scheduled for deployment varies across different circumstances. We have, therefore, decided to finalize the advance notice requirement as proposed. The regulation text for this requirement is finalized in § 170.405(b)(8)(i). Thus, a developer choosing to take advantage of the SVAP flexibility must provide notice to its customers sufficiently in advance of the developer’s anticipated timeframe for implementation of the update to the newer version(s) of applicable standard(s) to offer customers reasonable opportunity to ask questions and plan for the update. We note for clarity that we intend to apply a reasonableness standard to evaluating adequacy of advance notice timeframes for particular version updates in their specific factual contexts, prioritizing the perspective of a reasonable person in the situation of the developer’s customers because this requirement is intended to protect the interests of those customers. We would anticipate that proactive engagement between the developers and their customers would result in mutually agreeable timeframes and obviate the need for us to assess reasonableness in at least the vast majority, and ideally the totality, of instances where developers choose to use the SVAP flexibility. E:\FR\FM\01MYR3.SGM 01MYR3 25778 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations i. Health IT Modules Presented for Certification Leveraging SVAP Flexibility In instances where a health IT developer presents health IT for certification to a criterion listed in § 170.405(a) to which the health IT is not already certified, we proposed that the health IT developer would be permitted to use National Coordinatorapproved newer versions of any or all of the standards included in the criterion, instead of or in combination with the versions of these standards incorporated by reference in § 170.299. In such circumstances, a health IT developer would be able to choose which National Coordinator-approved standard version(s) it seeks to include in a new or updated certified Health IT Module and would be able to do so on an itemized basis. To enable this flexibility for developers seeking certification, we proposed to amend ONC–ACB Principles of Proper Conduct (PoPC) to require ONC–ACBs offer certification to National Coordinator-approved newer versions of standards and provide the ability for ONC–ACBs to accept a developer self-declaration of conformity as to the use, implementation, and conformance to a newer version of a standard (including but not limited to implementation specifications) as sufficient demonstration of conformance in circumstances where the National Coordinator has approved a version update of a standard for use in certification but no testing tool is yet available to test to the newer version (84 FR 7501). Comments. Commenters supported the proposal to allow for both updates to existing certifications of Health IT Modules and newly sought certifications to applicable criteria to follow a process of self-declaration where approved test tools are not yet available to support conformance validation of the pertinent National Coordinator-approved newer version of a standard. A few commenters requested we clarify how developers can demonstrate conformance when a newer version of a standard is available for use under this process but does not yet have testing tools available under the Program. Response. We proposed (84 FR 7456) and have finalized modifications in § 170.523(h) to permit ONC–ACBs to certify Health IT Modules that the ONC– ACB has evaluated for conformance with certification criteria without first passing through an ONC–ATL. As finalized, § 170.523(h)(2) provides that an ONC–ACB may certify a Health IT Module that has been evaluated by it for VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 compliance with a conformance method approved by the National Coordinator. This provides flexibility for the National Coordinator to approve a conformance method other than ONC–ATL testing, for evaluating conformance where the National Coordinator has approved a version update of a standard for use in certification but an associated testing tool is not yet updated to test to the newer version. We have also made edits to the text in § 170.405(b) as finalized in comparison to the text included in the Proposed Rule to make more immediately clear which specific requirements apply when developers choose to take advantage of the SVAP flexibility for updating Health IT Modules already certified to a criterion listed in § 170.405(a) and which specific requirements apply when developers choose to leverage the flexibility when presenting Health IT Modules for certification to a criterion listed in § 170.405(a). Comments. Commenters recommended HHS give health IT developers’ flexibility to choose which standards to advance through this process and not obligate them to update to all possible standards at once. Response. In the Proposed Rule, we noted (84 FR 7497) that a health IT developer would be able to choose which National Coordinator-approved standard version(s) it seeks to include in a new or updated certified Health IT Module and would be able to do so on an itemized basis. Under the finalized SVAP flexibility in § 170.405(b)(9), health IT developers are permitted to choose to use National Coordinatorapproved version(s) or the version incorporated by reference in § 170.299 or both for any standard(s) included in applicable criteria it seeks to use in its certified Health IT Module(s) on an itemized, standard-by-standard basis at the developer’s discretion. In the Proposed Rule, the regulation text for all SVAP requirements was proposed to be codified in § 170.405(b)(5). The SVAP requirements, as finalized, are codified in § 170.405(b)(8) and (9). We decided to codify the finalized SVAP requirements in separate paragraphs because it complements other wording changes to the finalized regulation text that we made to make more immediately clear on the face of the regulation which specific requirements (§ 170.405(b)(8)) apply when developers choose to take advantage of the SVAP flexibility for updating Health IT Modules already certified to a criterion listed in § 170.405(a) and which specific requirements (§ 170.405(b)(9)) apply when developers choose to leverage the PO 00000 Frm 00138 Fmt 4701 Sfmt 4700 flexibility when presenting Health IT Modules for certification to a criterion listed in § 170.405(a). j. Requirements Associated With All Health IT Modules Certified Leveraging SVAP As outlined in the Proposed Rule (84 FR 7499), in all cases, regardless of whether a health IT developer is updating an existing certified Health IT Module or presenting a new Health IT Module for certification to new versions of adopted standards approved by the National Coordinator through the Standards Version Advancement Process, we proposed that any developer choosing to take advantage of the proposed flexibility would need to: • Ensure its mandatory disclosures in § 170.523(k)(1) appropriately reflect its use of any National Coordinatorapproved newer versions of adopted standards; and • Address and adhere to all Program requirements—including but not limited to Conditions of Certification and Maintenance of Certification requirements—that are applicable to its certified Health IT Modules regardless of whether those Health IT Modules were certified to the adopted standards found in 45 CFR part 170 or National Coordinator-approved newer version(s) of the adopted standard(s). For example, as we proposed, a developer would need to ensure that its real world testing plan and actual real world testing include the National Coordinator-approved newer versions of standards to which it is claiming conformance, beginning with the plan for and real world testing conducted in the year immediately following the first year the developer’s applicable Health IT Module(s) were, as of August 31, certified to the National Coordinatorapproved newer versions of standards. Under the policies outlined in the Proposed Rule, developers would be held accountable for maintaining all applicable certified Health IT Modules in conformance with any National Coordinator-approved newer versions of standards and implementation specifications that they voluntarily elect to use in their certified health IT under the real world testing Condition and Maintenance of Certification requirements proposed in § 170.405, the attestations Condition and Maintenance of Certification requirements proposed in § 170.406, and through ONC–ACB surveillance applying to certificates that include National Coordinator-approved updated versions as it does to those that do not. We also included discussion indicating our intent that developers would be accountable for correcting E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations non-conformities with certification criteria that were discovered in real world testing of a Health IT Module certified using National Coordinatorapproved newer versions. Under the proposed policies, prompt corrective action would be required by a developer discovering such non-conformity through real world testing, in similar manner as a developer would be accountable for correcting nonconformities discovered through real world testing of Health IT Modules certified using only the versions of Secretary-adopted standards that are incorporated by reference in § 170.299, or through other Program means. Comments. We did not receive specific comments on these general requirements and details of the relationship between the proposed SVAP and other proposed Program enhancements or existing accountability mechanisms. Response. We have finalized these details of our SVAP policies as proposed. We stated in the Proposed Rule that we anticipate providing ONC–ACBs (and/or health IT developers) with a means to attribute information on Health IT Modules’ support for National Coordinator-approved updated versions of standards to the listings on the CHPL for the Health IT Modules the ONC– ACB has certified, and proposed to require in the PoPC for ONC–ACBs that they are ultimately responsible for this information being made publicly available on the CHPL (84 FR 7501). We requested public comment on any additional information about updated standards versions that may be beneficial to have listed with certified Health IT Modules on the CHPL. Comments. One commenter recommended ONC provide a method on the ONC CHPL for documenting the dot version/release associated with the new standard version implementation and clarify the ONC–ACBs reporting timeline for these types of standard version updates. Response. We thank the commenter for the feedback, which will help to inform our internal deliberations about future operational planning. k. Advanced Version Approval for SVAP The Proposed Rule (84 FR 7500) included discussion of how, after a standard has been adopted through notice and comment rulemaking, ONC anticipated undertaking an open and transparent process to timely ascertain whether a more recent version of any standard or implementation specification that the Secretary as VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 adopted in part 170 should be approved for developers’ voluntary use under the Program. We requested commenters’ input on our anticipated approach to standards and implementation specification advanced version approval as outlined in the Proposed Rule. Comments. Some commenters expressed concerns that appeared to suggest an understanding that the SVAP would be used to adopt new standards into the Program. Response. As stated in the Proposed Rule, the SVAP flexibility can only be used for newer (sometimes known as ‘‘updated’’) versions of standards and implementation specifications that the Secretary has already adopted through notice-and-comment rulemaking.114 Comments. One commenter urged that in order to be considered for approval for voluntary use under the Program the full details of a version of a standard should be required to be publicly available online by the start of opportunity for public review and discussion of the list of versions under consideration. Response. We appreciate the feedback. Although specifics of operational processes are outside the scope of this rule, we wish to reassure all stakeholders that we do appreciate the value of ensuring public dialogue around such matters as consideration of standards versions for potential voluntary use in the program is appropriately supported by availability of relevant information. As we operationalize support for finalized policies including the SVAP, we plan to provide ample public outreach and communications through channels familiar to affected stakeholders— including but not limited to ONC’s HealthIT.gov website. Comments. Several commenters suggested various potential features or processes that could be used in ascertaining whether a more recent version of any standard or implementation specification that the Secretary as adopted in part 170 should be approved by the National Coordinator for developers’ voluntary use under the Program. We also received several comments regarding potential uses of information from the 114 As also noted in the Proposed Rule, this policy considers the substance of a standard and not whether its name or version naming and identification track remains unchanged over time, as standards developing organizations and processes may apply different naming or identification methods from one version to another of the same standards or implementation specifications. For more information on version naming and identification tracks for standards and implementation specifications, please see the Proposed Rule (84 FR 7500). PO 00000 Frm 00139 Fmt 4701 Sfmt 4700 25779 standards review and approval processes or the SVAP flexibility itself to inform assessments of various aspects of the health IT ecosystem such as the maturity and uptake of specific standards versions. Response. Although addressing their substance is outside the scope of this final rule, we appreciate these responses to our call for comments. This information will help to inform our deliberations about future program policies and operations. l. Real World Testing Principles of Proper Conduct for ONC–ACBs We proposed to include a new PoPC for ONC–ACBs in § 170.523(p) that would require ONC–ACBs to review and confirm that applicable health IT developers submit real world testing plans and results in accordance with our proposals (84 FR 7501). The proposed requirement was that the ONC–ACBs review the plans for completeness. Once completeness is confirmed, we proposed that ONC– ACBs would provide the plans to ONC and make them publicly available by December 15 of each year (see § 170.523(p)(1) and (3) in 84 FR 7598). We proposed that for the reasons discussed above in context of developer requirements, we have finalized (in § 170.405(b)(1)) December 15 of each year as the due date for the annual real world testing plans. We proposed in § 170.523(p)(2) that the ONC–ACB would ‘‘review and confirm that applicable health IT developers submit real world testing results in accordance with § 70.405(b)(2).’’ And in § 170.523(p)(3) we proposed that the ONC–ACBs would be required to submit real world testing results by April 1 of each year to ONC for public availability (84 FR 7598). Comments. The only comments received relevant to these PoPC proposals were about due dates, and were summarized above in context of the § 170.405 requirements applicable to developers (see section VII.B.5.d Submission Dates, in this final rule). Response. We thank commenters again for their feedback on this proposal and have finalized the PoPC (170.523(p)(1)–(3)) as proposed, with the exception of having adjusted in § 170.523(p)(3) the annual due date for publication of developers’ real world testing results reports on CHPL from the proposed April 1 to the finalized March 15 date. Because we proposed to allow health IT developers to implement National Coordinator-approved newer versions of adopted standards and implementation specifications in certified Health IT E:\FR\FM\01MYR3.SGM 01MYR3 25780 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations Modules, we proposed two requirements to ensure the public has knowledge and ONC–ACBs can maintain appropriate oversight and surveillance of the version of a standard that certified health IT meets. First, we proposed to revise the PoPCs in § 170.523(m) to add subparagraph (4) requiring ONC–ACBs to aggregate, no less than quarterly, all updates successfully made to use newer versions of adopted standards in certified health IT per the requirements for developers choosing to take advantage of the SVAP flexibility. This would ensure that ONC is aware of the version of a standard that certified health IT meets for the purposes of Program administration. Second, we proposed, that a developer that chooses to avail itself of the SVAP flexibility must address its use of newer versions of adopted standards in its real world testing plans and results. We sought comment on the proposed additions to the PoPC for ONC–ACBs. More specifically, we sought comment on whether ONC–ACBs should be required to perform an evaluation beyond a completeness check for the real world testing plans and results and the value versus the burden of such an endeavor. Comments. We did not receive any comments on this proposal. Response. The substance of the requirement is finalized as proposed, though, we have made clarifying edits to the way in which the PoPC amendments are organized and phrased. The requirement proposed in § 170.523(m)(4) (84 FR 7599) has been re-designated in § 170.523(m)(5). In the finalized § 170.523(m)(5), we have revised the citation to the SVAP requirements because they were proposed in § 170.405(b)(5) but are finalized in § 170.405(b)(8) and (9). The wording of requirement finalized in § 170.523(m)(5) was modified in comparison to that proposed in 84 FR 7599 to make clear that ONC–ACBs are required to report on all certifications of Health IT Modules to National Coordinator-approved newer versions of Secretary-adopted standards, both those updated to include newer versions of adopted standards and those of Health IT Modules first presented for certification using newer versions of adopted standards. Another modification to the finalized regulation text in § 170.523(m)(5) in comparison with that proposed clarifies that ONC– ACBs are permitted to obtain the quarterly record of successful use in certified Health IT Modules of newer versions of adopted standards from the ONC–ACB’s records of certification activity. We believe this clarification is VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 important to ensure the regulation text finalized in § 170.523(m)(5) cannot be misconstrued as precluding use of such records as the data source for this requirement. In complement to the above requirements to ensure transparency for the public and end users, we proposed in § 170.523(t) a new PoPC for ONC– ACBs requiring them to ensure that developers seeking to take advantage of the SVAP flexibility in § 170.405(b) comply with the applicable requirements, and that the ONC–ACB both retain records of the timing and content of developers’ required 115 notices and ensure each notice is timely and publicly accessible, and easily located via the CHPL through attribution of the notice to the certified Health IT Modules to which it applies.116 We note that in the proposed regulation text in § 170.523(t) as published in 84 FR 7598, there was an editorial error. The editorial error was in title in § 170.523(t) as published in 84 FR 7598, which read ‘‘Standards Voluntary Advancement Process’’ instead of ‘‘Standards Version Advancement Process,’’ although the proposed introductory text correctly referenced ‘‘Standards Version Advancement Process.’’ Comments. We did not receive public comment on the proposed paragraph (t) or its addition to § 170.523. Response. We have finalized § 170.523(t) with a revised title more consistent with the finalized titles of paragraphs (8) and (9) in § 170.405(b), and a revised citation to § 170.405. The citation to § 170.405 was revised because the SVAP requirements 170.523(t) references were proposed in § 170.405(b)(5) but have been finalized in § 170.405(b)(8) and (9). The substance of the PoPC requirement in § 170.523(t) is finalized as proposed. m. Health IT Module Certification & Certification to Newer Versions of Certain Standards We proposed to add in § 170.550, Health IT Module certification, a new paragraph (e), which would require that ONC–ACBs must provide an option for 115 The advance notice requirement that was proposed in § 170.405(b)(5)(i) and that is now finalized in § 170.405(b)(8)(i) remains specific to developers leveraging SVAP flexibility to update Health IT Modules with existing certifications. 116 We note for clarity that whether a copy of the content is hosted on CHPL, made available via a publicly accessible hyperlink provided by the developer, or another mechanism or method that may emerge as a more advanced and efficient technical approach to achieving this same goal is an operational detail and does not need to be defined in rulemaking. PO 00000 Frm 00140 Fmt 4701 Sfmt 4700 certification of Health IT Modules to any one or more of the criteria referenced in § 170.405(a) based on newer versions of standards included in the criteria which have been approved by the National Coordinator for use in certification through the Standards Version Advancement Process (84 FR 7598). Comments. We received no public comments on this proposed addition to § 170.550 to accommodate the SVAP flexibility. Response. We have finalized the substance of § 170.550(e) as proposed. We have modified the regulatory text finalized in § 170.550(e) in comparison with that proposed in 84 FR 7598 by adding a header. The finalized paragraph reads: ‘‘Standards Updates. ONC–ACBs must provide an option for certification of Health IT Modules to any one or more of the criteria referenced in § 170.405(a) based on newer versions of standards included in the criteria which have been approved by the National Coordinator for use in certification.’’ We proposed to revise § 170.555(b)(1) to accommodate the SVAP flexibility. The revised text in § 170.555(b)(1) as proposed (84 FR 7598) read: ONC–ACBs are not required to certify Complete EHRs and/or Health IT Module(s) according to newer versions of standards adopted and named in subpart B of this part, unless: (i) The National Coordinator identifies a newer version through the Standards Version Advancement Process and a health IT developer voluntarily elects to seek certification of its health IT in accordance with § 170.405(b)(5); or (ii) The new version is incorporated by reference in § 170.299. Comments. We did not receive public comments on revising paragraph (b)(1) of § 170.555 to accommodate the SVAP flexibility. Response. We have finalized the substance of this revision as proposed. However, we have struck ‘‘Complete EHRs and/or’’ from the text finalized in § 170.555(b)(1) consistent with our finalizing the removal from 45 CFR part 170 of references to ‘‘Complete EHRs’’ in conjunction with the removal of the 2014 Edition (as discussed in section III.B.2 of this final rule). We have clarified the text in § 170.555(b)(1) as finalized to use the word ‘‘approves’’ in place of ‘‘identifies,’’ consistent with our phrasing and terminology throughout the preamble of this final rule and finalized regulation text implementing the SVAP flexibility. We have replaced ‘‘under the Standards Version Advancement Process’’ with ‘‘for use in certification’’ because we E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations believe this wording prevents potential confusion about whether the term ‘‘Standards Version Advancement Process’’ refers to the administrative flexibility established in § 170.405(b)(8) and (9) or to the National Coordinator’s approach to approving versions for use in the Program. We have also revised the citation to § 170.405(b) in the finalized text in § 170.555 because the SVAP provisions proposed in § 170.405(b)(5) have been finalized in § 170.405(b)(8) and (9). 6. Attestations The Cures Act requires that a health IT developer, as a Condition and Maintenance of Certification requirement under the Program, provide to the Secretary an attestation to all of the Conditions of Certification requirements specified in PHSA § 3001(c)(5)(D), except for the ‘‘EHR reporting criteria submission’’ Condition of Certification requirement in § 3001(c)(5)(D)(vii). We proposed to implement the Cures Act by requiring health IT developers to attest, as applicable, to compliance with the Conditions and Maintenance of Certification requirements proposed in §§ 170.401 through 170.405. We proposed that, as a Maintenance of Certification requirement for the ‘‘attestations’’ Condition of Certification requirement under § 170.406(b), health IT developers would need to submit their attestations every 6 months (i.e., semiannually). We proposed to provide a 14-day attestation period twice a year. For health IT developers presenting Health IT Modules for certification for the first time under the Program, we proposed that they would be required to submit an attestation at the time of certification and also comply with the semiannual attestation periods. As stated in the Proposed Rule, we would publicize and prompt developers to complete their attestation during the required attestation periods. We also proposed to provide a method for health IT developers to indicate their compliance, noncompliance with, or the inapplicability of each Condition and Maintenance of Certification requirement as it applies to all of their health IT certified under the Program for each attestation period. Last, we proposed to provide health IT developers the flexibility to specify noncompliance per certified Health IT Module, if necessary. We noted, however, that any noncompliance with the proposed Conditions and Maintenance of Certification requirements, including the ‘‘attestations’’ Conditions and Maintenance of Certification VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 requirements, would be subject to ONC direct review, corrective action, and enforcement procedures under the Program. We welcomed comments on the proposed attestations Condition and Maintenance of Certification requirements, including the appropriate frequency and timing of attestations. We also welcomed comments on the proposed responsibilities for ONC– ACBs related to the attestations of Condition and Maintenance of Certification requirements. Comments. We received many comments supporting the ‘‘attestations’’ Condition and Maintenance of Certification requirements. Commenters generally agreed that health IT developers should attest that they are complying with all the required Conditions and Maintenance of Certification requirements. A few commenters were concerned that the Condition of Certification requirements set up unreasonable expectations that health IT developers attest to statements that are subject to interpretation and are ambiguous, and that developers should be able to articulate how their software and businesses meet the expectations. We also received comments suggesting ways to reduce burden for health IT developers. Some commenters suggested less frequent attestation periods ranging from once a year to every two years as a means for reducing burden on health IT developers. Another commenter suggested that we send reminders to health IT developers when an attestation(s) needs renewal. One commenter recommended that we include a specific deadline at the middle and end of each year for attestations in lieu of the proposed predefined 14-day attestation window. Another commenter recommended that attestations should only be sent electronically as any other process of reporting (e.g., written letter) would be onerous on all parties. Response. We thank commenters for their support and have adopted in § 170.406 the ‘‘attestations’’ Conditions and Maintenance of Certification requirement with revisions discussed below. These revisions should both provide clarity for compliance and reduce burden. Health IT developers will be attesting to the Conditions of Certification that are statutory requirements under section 4002 of the Cures Act. This final rule also addresses concerns of ambiguity and interpretation by revising the Conditions and Maintenance of Certification requirements and the information blocking provision, which is a Condition of Certification in PO 00000 Frm 00141 Fmt 4701 Sfmt 4700 25781 § 170.401. We have also revised § 170.406 to provide further clarity on the applicability of each of the Conditions and Maintenance of Certification requirements to health IT developers for the purposes of attestation. For example, all health IT developers under the Program would attest to the ‘‘information blocking’’ Condition of Certification requirement (§ 170.401), while only health IT developers that have health IT certified to the ‘‘API’’ certification criteria (§ 170.315(g)(7)–(10)) would be required to attest to the ‘‘API’’ Condition of Certification and Maintenance requirements (§ 170.404). We have also revised the ‘‘attestations’’ Conditions and Maintenance of Certification requirements in § 170.406 to clearly reflect that all attestations must be approved and submitted by an officer, employee, or other representative the health IT developer has authorized to make a binding attestation(s) on behalf of the health IT developer. This provides regulatory clarity for health IT developers as to their responsibility under the attestation provisions (§ 170.406). A requirement of attestation every 6 months properly balances the need to support enforcement actions with the attestation burden placed on developers. In this regard, allegations of inappropriate actions and noncompliance by health IT developers with Program requirements and the information blocking provision can be more readily cross-referenced against their attestations for enforcement purposes comparative to a one-year or two-year attestation period. Based on the efficient methods we are establishing for attestation as described below, we believe that we have implemented this statutory requirement for health IT developers in ways that will reduce the compliance burden for them. We also refer readers to section VII.D of this preamble for discussion of ONC direct review, corrective action, and enforcement procedures for the Conditions and Maintenance of Certification requirements under the Program. We recognize comments expressing concerns on the potential burden placed on health IT developers to attest semiannually. The process we plan to implement for providing attestations should minimize burden on health IT developers. To further minimize potential burden on health IT developers, we have revised the proposed 14-day attestation window to extend the window to 30 days. In other words, health IT developers will be able to submit their attestations within a E:\FR\FM\01MYR3.SGM 01MYR3 25782 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations designated 30-day window twice a year for purposes of compliance. To note, in accordance with § 170.406(b), the first attestation window will begin April 1, 2021. This attestation period will cover the time period from the effective date of the final rule through March 31, 2021. This irregular time period is due to the publication of the final rule. Subsequently, a regular 6-month period will commence with the attestation window for the 6-month period opening on October 1, 2021 (attesting for the period of April 1 through September 30). We have also revised the Conditions and Maintenance of Certification requirements to reflect that all health IT developers under the Program would adhere to a similar semiannual attestation schedule, rather than new health IT developers also attesting at the time of certification. We believe this is more practical, less burdensome for health IT developers and ONC–ACBs, and creates less confusion as to what actions and statements a health IT developer is attesting to (i.e., for past actions under the Program). As stated in the Proposed Rule, we plan to implement several other means to minimize burden. First, we plan to publicize and prompt developers to complete their attestation during the required attestation periods. Second, as proposed in the Proposed Rule, we will provide a method for health IT developers to indicate their compliance, noncompliance, or the inapplicability of each Condition and Maintenance of Certification requirement as it applies to all or each of their Health IT Modules certified under the Program for each attestation period. Third, to clarify our proposal and respond to the comment recommending electronic submission, we note ONC–ACBs have discretion to specify the format and may choose to require electronic submission. In addition, to support electronic submission, we will provide a webbased form and method for health IT developers to submit attestations in an efficient manner for ONC–ACBs’ review. ONC–ACB Responsibilities We proposed that attestations would be submitted to ONC–ACBs and reviewed in accordance with § 170.523(q) as a means for ONC–ACBs to monitor health IT developers for compliance with Program requirements. ONC–ACBs would be required to share the attestations with ONC. ONC would then make the attestations publicly available through the CHPL. The other responsibility we proposed in § 170.550(l) was that before issuing a certification, an ONC–ACB would need VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 to ensure that the health IT developer of the Health IT Module has met its responsibilities related to the Conditions and Maintenance of Certification requirements as solely evidenced by its attestation. For example, if a health IT developer with an active certification under the Program provided noncompliant designations in their attestation but was already participating in a corrective action plan (CAP) under ONC direct review to resolve the noncompliance, certification would be able to proceed while the issue is being resolved. Comments. One commenter requested clarification on the specific responsibilities of ONC–ACBs when collecting and submitting attestations to ONC, including instances of an attestation indicating non-conformity and the lack of a submission of an attestation by a health IT developer. Response. We thank commenters for their input and have finalized as proposed. We refer readers to section VII.D for further discussion of ONC direct review, corrective action, and enforcement procedures for the Conditions and Maintenance of Certification requirements under the Program, including the roles of ONC– ACBs in enforcement of the Conditions and Maintenance of Certification requirements. 7. EHR Reporting Criteria Submission As stated in the Proposed Rule, the Cures Act specifies that health IT developers shall be required, as a Condition and Maintenance of Certification requirement under the Program, to submit certain information to satisfy the reporting criteria on certified health IT in accordance with the EHR Reporting Program requirements established under section 3009A of the PHSA, as added by section 4002 of the Cures Act. We have not yet established an EHR Reporting Program. Once ONC establishes such an EHR Reporting Program, we will undertake future rulemaking to propose and implement the associated Condition and Maintenance of Certification requirement(s) for health IT developers. C. Compliance The Maintenance of Certification requirements discussed above do not necessarily define all the outcomes necessary to meet the Conditions of Certification. Rather, they provide preliminary or baseline evidence toward measuring whether a Condition of Certification requirement is being met. Thus, ONC could determine that a Condition of Certification requirement is not being met through reasons other PO 00000 Frm 00142 Fmt 4701 Sfmt 4700 than the Maintenance of Certification requirements. For example, meeting the Maintenance of Certification requirement that requires a health IT developer to not establish or enforce any contract or agreement that contravenes the Communications Condition of Certification requirement does not excuse a health IT developer from meeting all the requirements specified in the Communications Condition of Certification requirement. This is analogous to clarifications ONC has previously provided about certification criteria requirements whereby testing prior to certification sometimes only tests a subset of the full criterion’s intended functions and scope. However, for compliance and surveillance purposes, we have stated that ONC and its ONC–ACBs will examine whether the certified health IT meets the full scope of the certification criterion rather than the subset of functions it was tested against (80 FR 62709 and 62710). Comments. We did not receive any comments specific to compliance with Maintenance of Certification requirements as related to meeting Conditions of Certification requirements. Response. We continue to maintain our position that Maintenance of Certification requirements do not define all of the outcomes necessary to meet the Conditions of Certification requirements. Thus, while complying with Maintenance of Certification requirements will provide evidence toward measuring whether a Condition of Certification requirement is being met, reasons beyond the Maintenance of Certification requirements could result in ONC determining that a Condition of Certification requirement has not been met. D. Enforcement The Cures Act affirms ONC’s role in using certification to improve health IT’s capabilities for the access, use, and exchange of EHI. The Cures Act provides this affirmation through expanded certification authority for ONC to establish Conditions and Maintenance of Certification requirements for health IT developers that go beyond the certified health IT itself. The new Conditions and Maintenance of Certification requirements in section 4002 of the Cures Act focus on the actions and business practices of health IT developers (e.g., information blocking and appropriate access, use, and exchange of electronic health information) as well as technical interoperability of health IT (e.g., APIs and real world testing). Furthermore E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations and equally important, section 4002 of the Cures Act provides that the Secretary of HHS may encourage compliance with the Conditions and Maintenance of Certification requirements and take action to discourage noncompliance. Given these considerations, we proposed a general enforcement framework outlining a corrective action process for ONC to review potential or known instances where a Condition or Maintenance of Certification requirement has not been or is not being met by a health IT developer under the Program, including the requirement for a health IT developer to attest to meeting the Conditions and Maintenance of Certification requirements. 1. ONC Direct Review of the Conditions and Maintenance of Certification Requirements Historically we utilized the processes previously established for ONC direct review of certified health IT in the ONC Health IT Certification Program: Enhanced Oversight and Accountability Act (EOA) final rule (81 FR 72404), and as codified in §§ 170.580 and 170.581, to address non-conformities with Program requirements. For multiple reasons, we proposed in 84 FR 7503 to utilize substantially the same processes for the enforcement of the Conditions and Maintenance of Certification requirements. First, these processes were designed to address nonconformities with Program requirements. Conditions and Maintenance of Certification requirements have been adopted as Program requirements and, as such, any noncompliance with the Conditions and Maintenance of Certification requirements constitutes a Program nonconformity. Second, health IT developers are familiar with the ONC direct review provisions as they were established by the EOA final rule in October 2016. Third, §§ 170.580 and 170.581 have provided thorough and transparent processes for working with health IT developers through notice and corrective action to remedy Program non-conformities. Last, the direct review framework has provided equitable opportunities for health IT developers to respond to ONC actions and appeal certain ONC determinations. As further discussed below, we have finalized our proposed approach to utilize the processes previously established and codified in §§ 170.580 and 170.581 for ONC direct review of certified health IT for the enforcement of the Conditions and Maintenance of Certification requirements, along with our proposed revisions to these VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 processes in order to properly incorporate enforcement of these requirements. We note that the Information Blocking Condition of Certification (§ 170.401) and the related Assurances Condition of Certification requirement (§ 170.402(a)(1)) have a delayed enforcement date of 6 months after date of publication of the final rule. 2. Review and Enforcement Only by ONC We proposed in 84 FR 7503 to retain use of the term ‘‘direct review’’ as previously adopted in the EOA final rule to continue to distinguish actions ONC takes to directly review certified health IT or health IT developers’ actions from actions taken by an ONC– ACB to review certified health IT under surveillance. We proposed, however, that ONC would be the sole party responsible for enforcing compliance with the Conditions and Maintenance of Certification requirements. Comments. We received comments requesting clarification that ONC–ACBs are not responsible for enforcement of the Conditions and Maintenance of Certification requirements. Response. We have finalized this review and enforcement approach in §§ 170.580(a)(1) and 170.580(a)(2)(iii) as proposed above. We clarify that ONC– ACBs are not responsible for enforcement of the Conditions and Maintenance of Certification requirements. Under finalized § 170.523(s), and as further discussed later in this section, ONC–ACBs must report any information that could inform whether ONC should exercise direct review of noncompliance with the Conditions and Maintenance of Certification requirements to ONC. ONC–ACBs also address nonconformities with technical and other Program requirements through surveillance and by working with health IT developers through corrective action plans. 3. Review Processes As discussed above, we proposed to utilize the processes previously established and codified in §§ 170.580 and 170.581 for ONC’s direct review and enforcement of the Conditions and Maintenance of Certification requirements, along with certain proposed revisions and additions to these processes to properly incorporate enforcement of these requirements and effectuate congressional intent conveyed through the Cures Act. PO 00000 Frm 00143 Fmt 4701 Sfmt 4700 25783 a. Initiating Review and Health IT Developer Notice We proposed in 84 FR 7503 to fully incorporate the review of compliance with the Conditions and Maintenance of Certification requirements into the provisions of § 170.580(a) and (b). We proposed in § 170.580(a)(2)(iii) that if ONC has a reasonable belief that a health IT developer has not complied with a Condition or Maintenance of Certification requirement, then it may initiate direct review. Similarly, we proposed in § 170.580(b)(1) and (2) that ONC may issue the health IT developer a notice of potential non-conformity or notice of non-conformity and provide the health IT developer an opportunity to respond with an explanation and written documentation, including any information ONC requests. Comments. We received one comment that ONC should communicate with a representative sample of users of a health IT product when enforcing the Conditions and Maintenance of Certification requirements. Response. We appreciate this comment. We are committed to consistent and thorough enforcement of the Conditions and Maintenance of Certification requirements and review of complaints of noncompliance. Our goal is to work with developers to remedy any noncompliance in a timely manner. During the course of our review of a potential noncompliance, we may communicate with users of the health IT, as appropriate. We have finalized this approach regarding initiation of review and health IT developer notice in §§ 170.580(a)(2)(iii) and 170.580(b) as proposed. i. Complaint Resolution In the Proposed Rule, we noted and recommended in 84 FR 7503 that customers and end users first work with their health IT developers to resolve any issues of potential noncompliance with the Conditions and Maintenance of Certification requirements. We proposed that if the issue cannot be resolved, the end user should contact the ONC–ACB for assessment. However, as discussed above and in section VII.D.5 below, the ONC–ACB purview for certified health IT generally applies to certified capabilities and limited requirements of developer business practices. We proposed that if neither of these pathways resolves the issue, end users may want to provide feedback to ONC via the Health IT Feedback Form. Comments. We received one comment recommending that we require complaints regarding developer compliance with Conditions and E:\FR\FM\01MYR3.SGM 01MYR3 25784 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations Maintenance of Certification requirements go directly to ONC rather than to an ONC–ACB. Another commenter requested that we provide guidance regarding how to report issues related to developer compliance. Response. We have finalized in § 170.580 our proposed approach regarding complaint resolution as described above, which is guided by prior Program experience. Comments. One commenter recommended that we adopt a selfdisclosure mechanism for health IT developers to report any non-conformity with the Program and enable such selfdisclosure to offer health IT developers regulatory protection. Response. We appreciate the comment and strongly encourage selfdisclosure by developers, which health IT developers currently do under the Program. We note that currently there are methods by which health IT developers may communicate with ONC–ACBs and/or ONC, and it is our longstanding policy to work with health IT developers to correct nonconformities. While we believe this approach works well, consistent with Executive Order 13892, we are considering whether it would be appropriate to adopt additional procedures that further encourage selfreporting of non-conformities and voluntary information sharing, as well as procedures to provide preenforcement rulings to health IT developers who make inquiries regarding their compliance with regulatory requirements. ii. Method of Correspondence With Health IT Developers Section 170.505 states that correspondence and communication with ONC or the National Coordinator shall be conducted by email, unless otherwise necessary or specified. We noted in the Proposed Rule in 84 FR 7503 that in the EOA final rule we signaled our intent to send notices of potential non-conformity, nonconformity, suspension, proposed termination, and termination via certified mail (81 FR 72429). However, we proposed to follow § 170.505 for correspondence regarding direct review of noncompliance with the Conditions and Maintenance of Certification requirements. As discussed in the Proposed Rule, the type and extent of review by ONC could vary significantly based on the complexity and severity of each fact pattern. For instance, ONC may be able to address certain noncompliance with the Conditions and Maintenance of Certification requirements quickly and VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 with minimal effort (e.g., failure to make public a documentation hyperlink), while other situations may be more complex and require additional time and effort (e.g., violation of API fee prohibitions). Considering this wide range of potential noncompliance with the Conditions and Maintenance of Certification requirements, we proposed that ONC retain discretion to decide, on a case-by-case basis, when to go beyond the provisions of § 170.505 to use means other than email in providing notices and correspondence for noncompliance with the Conditions and Maintenance of Certification requirements. We solicited comment on the nature and types of noncompliance with the Conditions and Maintenance of Certification requirements that ONC should consider in determining the method of correspondence. We also solicited comment on whether the type of notice should determine the method of correspondence. More specifically, we solicited comment on whether certain types of notices under direct review should be considered more critical than others, thus requiring a specific method of correspondence. Comments. We received several comments regarding the proposed method of correspondence with health IT developers. Some commenters stressed that time-sensitive notifications should not be sent via email, with one commenter noting that ONC should use certified mail, with a copy to a designated notice recipient, for notices of potential noncompliance and noncompliance with the Conditions and Maintenance of Certification requirements. Other commenters suggested that ONC should use both email and certified mail for notices regarding initiation of direct review, potential non-conformity, nonconformity, suspension, proposed termination, and termination. One commenter recommended ONC acknowledge receipt of communications received. Response. We appreciate commenters’ support of our proposals, as well as the constructive suggestions. We have finalized our proposal to use the provisions in § 170.505 for correspondence regarding noncompliance with the Conditions and Maintenance of Certification requirements, with minor revisions. While we agree with commenters that there may be situations when sending notice only via email would not be adequate, such situations would be contingent on the circumstances as described in the Proposed Rule. Therefore, we have revised the regulation text of § 170.505 to specify PO 00000 Frm 00144 Fmt 4701 Sfmt 4700 some of those considerations. These considerations include, but are not limited to, whether: The party requests use of correspondence beyond email; the party has responded via email to our communications; we have sufficient information from the party to ensure appropriate delivery of such notice; and, importantly, the alleged violation of a Condition or Maintenance of Certification requirement or other Program requirement within ONC’s purview under § 170.580 indicates a serious violation of the Program with potential consequences of suspension, certification termination, or a certification ban. We did not propose any requirements regarding acknowledgment of receipt, and we have finalized our proposed approach to utilize the processes previously established and codified in §§ 170.580 and 170.581 for ONC direct review of certified health IT for the enforcement of the Conditions and Maintenance of Certification requirements, which include response requirements already codified in §§ 170.580 and 170.581. Comments. One commenter requested clarification on ONC’s timeframe for responding to health IT developers during direct review. Another commenter requested clarity on investigation timelines generally. Response. We have finalized our proposed approach to utilize the processes previously established and currently codified in §§ 170.580 and 170.581 for ONC’s direct review and enforcement of the Conditions and Maintenance of Certification requirements, which include specific response timeframes throughout the direct review process. We refer commenters to §§ 170.580 and 170.581 for the timeframes applicable to the various steps in the direct review process. We also clarify that proposed termination and suspension are excluded from ONC’s direct review process for the Conditions and Maintenance of Certification requirements, so any timeframes related to proposed termination and suspension do not apply. b. Relationship With ONC–ACBs and ONC–ATLs Section 170.580(a)(3) outlines ONC direct review in relation to the roles of ONC–ACBs and ONC–ATLs, which we proposed to revise to incorporate the Conditions and Maintenance of Certification requirements. In the Proposed Rule in 84 FR 7507, we provided situational examples in section VII.D.5 ‘‘Effect on Existing Program Requirements and Processes’’ E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations regarding ONC direct review and the role of an ONC–ACB. As finalized in the EOA final rule and per § 170.580(a)(3)(v), we stressed that ONC may refer the applicable part of its review of certified health IT to the relevant ONC–ACB(s) if ONC determines this would serve the effective administration or oversight of the Program (81 FR 72427 and 72428). We did not receive comments on this specific aspect of the proposed rule and have finalized the relationship with ONC–ACBs and ONC–ATLs in § 170.580(a)(3) as proposed. c. Records Access We proposed in 84 FR 7504 to revise § 170.580(b)(3) to ensure that ONC, or third parties acting on its behalf, have access to the information necessary to enforce the Conditions and Maintenance of Certification requirements. As specified in § 170.580(b)(1)(ii)(A)(2), (b)(2)(ii)(A)(2) and (b)(3), in response to a notice of potential non-conformity or notice of non-conformity, ONC must be granted access to, and have the ability to share within HHS, with other Federal agencies, and with appropriate entities, all of a health IT developers’ records and technology related to the development, testing, certification, implementation, maintenance, and use of its certified health IT, and any complaint records related to the certified health IT. ‘‘Complaint records’’ include, but are not limited to issue logs and help desk tickets (81 FR 72431). We proposed in 84 FR 7504 to supplement these requirements with a requirement that a health IT developer make available to ONC, and third parties acting on its behalf, records related to marketing and distribution, communications, contracts, and any other information relevant to compliance with any of the Conditions and Maintenance of Certification requirements or other Program requirements. If ONC determined that a health IT developer was not cooperative with the fact-finding process, we proposed ONC would have the ability to issue a certification ban and/or terminate a certificate (see § 170.581 discussed below and § 170.580(f)(1)(iii)(A)(1)). We proposed in 84 FR 7504 that ONC would implement appropriate safeguards to ensure, to the extent permissible with Federal law, that any proprietary business information or trade secrets ONC may encounter by accessing the health IT developer’s records, other information, or technology, would be kept confidential by ONC or any third parties working on behalf of ONC. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 Comments. We received one comment recommending that ONC detail the procedural and technical safeguards in place to protect information submitted to ONC by a developer as part of direct review of compliance with a Conditions or Maintenance of Certification requirement. Response. As we stated above, in the Proposed Rule, and in the EOA final rule (81 FR 72429), we will implement appropriate safeguards to ensure, to the extent permissible with Federal law, that any proprietary business information or trade secrets ONC may encounter by accessing the health IT developer’s records, other information, or technology, will be kept confidential by ONC or any third parties working on behalf of ONC. We have finalized in § 170.580(b)(3) our approach regarding records access as proposed. Additionally, we have finalized our recommendation, stated in 84 FR 7504 in the Proposed Rule and the EOA final rule, that health IT developers clearly mark, as described in HHS Freedom of Information Act regulations at 45 CFR 5.65(c), any information they regard as trade secret or confidential prior to disclosing the information to ONC (81 FR 72431). d. Corrective Action We proposed in 84 FR 7504 that if ONC determines that a health IT developer is noncompliant with a Condition or Maintenance of Certification requirement (i.e., a nonconformity), ONC would work with the health IT developer to establish a corrective action plan (CAP) to remedy the issue through the processes specified in § 170.580(b)(2)(ii)(A)(4) and (c). We noted that a health IT developer may be in noncompliance with more than one Condition or Maintenance of Certification requirement. In such cases, we proposed that ONC would follow the proposed compliance enforcement process for each Condition or Maintenance of Certification requirement accordingly, but may also require the health IT developer to address all violations in one CAP for efficiency of process. We also proposed, as we currently do with CAPs for certified health IT, to list health IT developers under a CAP on ONC’s website. We did not receive any comments on this aspect of the Proposed Rule, and in § 170.580(c) we have finalized our proposals regarding corrective action as proposed (84 FR 7504). e. Certification Ban and Termination We proposed in 84 FR 7504 that if a health IT developer under ONC direct PO 00000 Frm 00145 Fmt 4701 Sfmt 4700 25785 review for noncompliance with a Condition or Maintenance of Certification requirement failed to work with ONC or was otherwise noncompliant with the requirements of the CAP and/or CAP process, ONC could issue a certification ban for the health IT developer (and its subsidiaries and successors). A certification ban, as it currently does for other matters under § 170.581, would prohibit future health IT by the health IT developer from being certified. We proposed in 84 FR 7504 that ONC would also consider termination of the certificate(s) of the affected Health IT Module(s) should the health IT developer fail to work with ONC or is otherwise noncompliant with the requirements of the CAP and/or CAP process. We proposed that ONC may consider termination if there is a nexus between the developer’s actions or business practices in relation to the Conditions and Maintenance of Certification requirements and the functionality of the affected certified Health IT Module(s). For example, as discussed in the Proposed Rule, ONC may determine that a health IT developer is violating a Condition of Certification requirement due to a clause in its contracts that prevents its users from sharing or discussing technological impediments to information exchange. In this example, the health IT developer’s conduct would violate the Communications Condition of Certification requirement that we have finalized in § 170.403. If the same conduct were also found to impair the functionality of the certified Health IT Module (such as by preventing the proper use of certified capabilities for the exchange of EHI), ONC may determine that a nexus exists between the developer’s business practices and the functionality of the certified Health IT Module, and may consider termination of the certificate(s) of that particular Health IT Module under the proposed approach. We proposed this approach, which allows ONC to initiate a certification ban and/or certificate termination under certain circumstances, to ensure that health IT developers are acting in accordance with the Conditions and Maintenance of Certification requirements. However, we stressed that our first and foremost priority is to work with health IT developers to remedy any noncompliance with Conditions and Maintenance of Certification requirements through a corrective action process before taking further action. This emphasizes ONC’s desire to promote and support health IT developer compliance with the E:\FR\FM\01MYR3.SGM 01MYR3 25786 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations Conditions and Maintenance of Certification requirements, and ensure that certified health IT is compliant with Program requirements, in order to foster an environment where EHI is exchanged in an interoperable way. We proposed in 84 FR 7505 that in considering whether termination of a Health IT Module’s certificate(s) and/or a certification ban is appropriate, ONC would consider factors including, but not limited to: Whether the health IT developer has previously been found in noncompliance with the Conditions and Maintenance of Certification or other Program requirements; the severity and pervasiveness of the noncompliance, including the effect of the noncompliance on widespread interoperability and health information exchange; the extent to which the health IT developer cooperates with ONC to review the noncompliance; the extent of potential negative impact on providers who may seek to use the certified health IT to participate in CMS programs; and whether termination and/or a certification ban is necessary to ensure the integrity of the certification process. In the Proposed Rule, we noted in 84 FR 7505 that, as found in § 170.580(f)(2), ONC would provide notice of the termination to the health IT developer, including providing an explanation for, information supporting, and consequences of, the termination, as well as instructions for appealing the termination. We proposed to add substantially similar notice provisions to § 170.581 for certification bans issued under ONC direct review for noncompliance with the Conditions and Maintenance of Certification requirements. These provisions would also include instructions for requesting reinstatement. In this regard, in 84 FR 7505 we proposed to apply the current reinstatement procedures under § 170.581 to certification bans resulting from noncompliance with the Conditions and Maintenance of Certification requirements, but with an additional requirement that the health IT developer has resolved the noncompliance with the Condition or Maintenance of Certification requirement. In sum, we proposed that a health IT developer could seek ONC’s approval to re-enter the Program and have the certification ban lifted if it demonstrates that it has resolved the noncompliance with the Condition or Maintenance of Certification requirement, and ONC is satisfied that all affected customers have been provided appropriate remediation. We sought comment on whether ONC should impose a minimum time period for a certification ban, such as when a VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 health IT developer is noncompliant with a Condition or Maintenance of Certification requirement more than once (e.g., a minimum six months for two instances, a minimum of one year for three instances). We also sought comment on whether additional factors should be considered for a certification ban and/or termination of a health IT developer’s certified health IT. Comments. We received several comments regarding a minimum ban length for repeat offenders. A couple of the commenters recommended ONC establish a minimum ban and agreed with ONC’s examples listed above. Other commenters stated that a minimum ban would not be appropriate, with one commenter stating that a minimum ban could have unintended consequences and another commenter stating that it would be better if the length of the ban was determined situationally. Response. We have finalized the provisions regarding termination and certification ban in §§ 170.580 and 170.581 as proposed. We have not established a minimum ban length for repeat offenders, as a reinstatement process has been established in § 170.581(d) that affords ONC the discretion to determine whether a developer has demonstrated appropriate remediation to all customers affected by the certificate termination, certificate withdrawal, or noncompliance with a Condition or Maintenance of Certification requirement. Section 170.581(d)(4) allows ONC to grant reinstatement into the Program if ONC is satisfied with a health IT developer’s demonstration of appropriate remediation, and ONC may consider any and all factors, including past bans, that may affect ONC’s decision to grant reinstatement into the Program. Comments. We received several comments expressing concern for how physicians using products whose developer has been banned would be impacted with respect to payment programs. Response. We appreciate these comments and clarify that the health IT products of a health IT developer under a certification ban (not certificate termination) would still be considered certified. This means that those products would still be available for use by providers participating in programs requiring the use of certified health IT. However, while under a ban, a health IT developer could not make updates to the certification of those products. This means that access to new certified functionalities within a health IT developer’s products would be limited. If the certification status of a product PO 00000 Frm 00146 Fmt 4701 Sfmt 4700 may impact health care providers that are users of that product for HHS program participation, ONC would continue to support HHS and other Federal and State partners, such as CMS, to help identify and make available appropriate remedies for users of terminated certified health IT. This would include supporting policies to mitigate negative impacts on providers, such as the availability of hardship exceptions for the Promoting Interoperability (PI) Programs for hospitals as mandated by section 4002(b)(1)(A) and (b)(2) of the 21st Century Cures Act and finalized by CMS in the FY 2018 Inpatient Prospective Payment System final rule (80 FR 38488 through 38490). Comments. We received one comment that ONC should add a fine as part of the enforcement of the Conditions and Maintenance of Certification requirements. Response. We appreciate this comment, but ONC does not have the authority to add a monetary fine as part of the enforcement of the Conditions and Maintenance of Certification requirements. We note, however, that health IT developers are subject to civil monetary penalties (CMPs) if they engage in information blocking, and that a health IT developer must not take any action that constitutes information blocking as a Condition of Certification requirement (§ 170.401). Comments. One commenter recommended that certification bans apply not only to health IT developers who are noncompliant, but also to the individual management representatives involved, and that account migration review plans be required as an aspect of enforcement in order to address issues around creation of new legal entities in response to a certification ban. Response. We appreciate these comments and note that certification bans affect health IT developers participating in the Program, their subsidiaries, and their successors (81 FR 72443). We do not have the authority to regulate or enforce against individual management representatives, though we believe the certification ban’s reach is an appropriate and sufficient incentive for health IT developers to resolve any noncompliance and meet all required conditions. As stated previously, we are utilizing processes previously established for ONC direct review of certified health IT for the enforcement of the Conditions and Maintenance of Certification requirements, which we believe are familiar to health IT developers and provide a transparent process for working with health IT E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations developers to remedy instances of noncompliance. Comments. One commenter expressed concern that there is no process for measuring the severity of a finding of noncompliance, and ONC’s proposed enforcement approach would allow for banning of all of a health IT developer’s certified health IT based on a finding of noncompliance. The commenter requested that the final rule specify circumstances that could lead to this serious result. Response. We appreciate the comment and clarify that, as proposed, if a health IT developer under ONC direct review for noncompliance with a Condition of Certification requirement failed to work with ONC to correct the noncompliance, or was noncompliant with the requirements of the CAP, ONC could issue a certification ban. However, we stress that our priority is to first work with health IT developers to correct any noncompliance with the Conditions and Maintenance of Certification requirements through corrective action. As stated in the Proposed Rule in 84 FR 7505, factors we would consider prior to issuing a certification ban, or termination of a Health IT Module’s certificate, include whether the health IT developer has previously been found in noncompliance with the Conditions and Maintenance of Certification requirements or other Program requirements; the severity and pervasiveness of the noncompliance; cooperation on the part of the health IT developer during ONC review; potential negative impact on providers participating in CMS programs; and whether termination and/or a certification ban is necessary to ensure the integrity of the certification process. We clarify that while under a CAP or surveillance by ONC or an ONC–ACB, in the event a health IT developer’s approach to remedy a non-conformity and/or to meet Program requirements is to withdraw their current certificate(s) for replacement with a new certificate issued by the ONC–ACB to reflect a new scope, they will not be subject to a certification ban. We note that any open non-conformities will be transferred to the newly issued certificate(s) and must still be resolved by the health IT developer. Similarly, when an ONC– ACB issues a new certificate to reflect 2015 Edition changes, and must withdraw a health IT developer’s current certificate to do so, the health IT developer will not be subject to a certification ban if the developer is currently under a CAP or has health IT with open non-conformities. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 Comments. One commenter stated that in instances of information blocking, the termination of a Health IT Module’s certificate or issuance of a certification ban should not occur until the health IT developer has had the opportunity to respond to the charge of information blocking and appeal the finding. Response. As stated previously, we have finalized in §§ 170.580 and 170.581 our proposed approach to utilize the processes previously established for ONC direct review of certified health IT for the enforcement of the Conditions and Maintenance of Certification requirements. These processes are open and transparent, and they provide an opportunity for health IT developers to remedy instances of noncompliance through corrective action. We again stress that it is our priority to first work with health IT developers to correct any noncompliance with the Conditions and Maintenance of Certification requirements through corrective action. We believe these processes provide ample opportunity for a health IT developer to respond to and address information blocking prior to issuance of a certification ban or termination of a Health IT Module’s certificate. Comments. We received one comment stating that the final rule should provide for an emergency remedy when the blocking of information places an individual at risk of immediate harm. Response. Our current process for direct review enables ONC to respond appropriately in the case of certified health IT that may be causing or contributing to conditions that present a serious risk to public health or safety (§§ 170.580(a)(2)(i) and 170.580(d)(1)). We also refer readers to the information blocking section in this final rule (section VIII of preamble and Part 171) for a detailed discussion regarding the information blocking provision and the exceptions to the information blocking definition, including those designed to prevent harm to patients and others. f. Appeal We proposed in 84 FR 7505 that a health IT developer would have an opportunity to appeal an ONC determination to issue a certification ban and/or certificate termination resulting from noncompliance with a Condition or Maintenance of Certification requirement. We proposed to follow the processes specified in § 170.580(g). As such, we proposed to revise § 170.580(g) to incorporate ONC direct review of compliance with the Conditions and Maintenance of Certification requirements. PO 00000 Frm 00147 Fmt 4701 Sfmt 4700 25787 Comments. We received a number of comments generally supporting our proposal to utilize the Appeals processes in our enforcement of compliance with the Condition or Maintenance of Certification requirements. Response. We appreciate the comments expressing support for our proposal and have finalized our proposal and proposed revisions to § 170.580(g) to incorporate ONC direct review of compliance with the Conditions and Maintenance of Certification requirements. g. Suspension We proposed in 84 FR 7506 to not apply the suspension processes under § 170.580 to our review of compliance with the Conditions and Maintenance of Certification requirements. Section 170.580 includes a process for suspending the certification of a Health IT Module at any time if ONC has a reasonable belief that the certified health IT may present a serious risk to public health and safety. While this will remain the case for certified health IT under ONC direct review (i.e., suspension of certification is always available under ONC direct review when the certified health IT presents a serious risk to public health and safety), we do not believe such circumstances would apply to noncompliance with the Conditions or Maintenance of Certification requirements. Further, we believe the more streamlined processes proposed for addressing noncompliance with Conditions and Maintenance of Certification requirements alleviates the need to proceed through a suspension process. Comments. We received a number of comments generally supporting our proposal not to include Suspension in our enforcement of compliance with the Condition or Maintenance of Certification requirements. Response. We appreciate the comments expressing support for our proposal and have finalized our proposal as proposed. h. Proposed Termination We proposed in 84 FR 7506 to not include an intermediate step between a developer failing to take appropriate and timely corrective action and termination of a certified Health IT Module’s certificate called ‘‘proposed termination’’ (see § 170.580(e) and 81 FR 72437)). Rather, as discussed above, ONC may proceed directly to issuing a certification ban or notice of termination if it determines a certification ban and/ or certificate termination are appropriate per the considerations E:\FR\FM\01MYR3.SGM 01MYR3 25788 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations discussed above. The Conditions and Maintenance of Certification requirements focus on developer business practices and actions for which, as previously discussed, noncompliance is likely to undermine the integrity of the Program and impede widespread interoperability and information exchange. As such, we stated that it is appropriate and consistent with the Cures Act to proceed immediately to a certification ban and/ or termination of the affected Health IT Module’s certificate(s) if a developer does not take appropriate and timely corrective action. A certification ban and/or termination serves as an appropriate disincentive for noncompliance with the Conditions and Maintenance of Certification requirements. Comments. We received a number of comments generally supporting our proposal not to include Proposed Termination in our enforcement of compliance with the Condition or Maintenance of Certification requirements. Response. We appreciate the comments expressing support for our proposal and have finalized our proposal as proposed. 4. Public Listing of Certification Ban and Termination We proposed in 84 FR 7506 to publicly list on ONC’s website health IT developers and certified Health IT Modules that are subject to a certification ban and/or have been terminated, respectively, for noncompliance with a Condition or Maintenance of Certification requirement or for reasons already specified in § 170.581. We take this same approach for health IT with terminated certifications (see 81 FR 72438). Public listing serves to discourage noncompliance with Conditions and Maintenance of Certification and other Program requirements, while encouraging cooperation with ONC and ONC–ACBs and remediation of non-conformities. It also serves to provide notice to all ONC–ATLs, ONC–ACBs, public and private programs requiring the use of certified health IT, and consumers of certified health IT of the status of certified health IT and health IT developers operating under the Program. We sought comment on this proposal, including input on the appropriate period of time to list health IT developers and affected certified Health IT Modules on healthit.gov. Comments. We received several recommendations that we should enable indefinite posting of certification bans VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 and certificate terminations, including a comment recommending that the public listing show the start and end date of bans that were lifted. We also received one comment recommending that ONC differentiate reinstated developers on the public listing. We also received one comment that there should be an option for a ban to be lifted once the developer comes into compliance. Response. Responsive to comments and in order to support transparency, we have decided not to set a time limit for listings on the Certified Health IT Product List (CHPL) and to also provide the start and end dates of bans that were lifted. We clarify that the CHPL provides transparency regarding certified health IT listings, including historical non-conformities assessed through surveillance, even after the nonconformity is resolved. This approach to historical transparency is applied to certification bans as well. We also clarify that a certification ban can be lifted as long as the developer has resolved the noncompliance and met all required conditions. We refer readers to § 170.581 for details about the certification ban and reinstatement processes. 5. Effect on Existing Program Requirements and Processes The Cures Act introduced new Conditions and Maintenance of Certification requirements that encompass technical and functional requirements of health IT and new actions and business practice requirements for health IT developers, which we proposed to adopt in subpart D of Part 170. The pre-Cures Act structure and requirements of the Program provide processes to enforce compliance with technical and functional requirements of certified health IT, and to a more limited extent, requirements for the business practices of health IT developers (see, e.g., 45 CFR 170.523(k)(1)) under subparts C (Certification Criteria for Health Information Technology) and E (ONC Health IT Certification Program) of Part 170. ONC–ACBs are required to perform surveillance on certified Health IT Modules and may investigate reported allegations of non-conformities with Program requirements under subparts A, B, C, and E, with the ultimate goal of working with the health IT developer to correct the non-conformity. Under certain circumstances, such as unsafe conditions or impediments to ONC– ACB oversight, ONC may directly review certified health IT to determine whether it conforms to the requirements of the Program (see § 170.580 and the EOA final rule at 81 FR 72404). These PO 00000 Frm 00148 Fmt 4701 Sfmt 4700 avenues for investigating nonconformities with certified Health IT Modules will continue to exist under the Program and generally focus on functionality and performance of certified health IT, or on more limited requirements of business practices of health IT developers found in subparts A, B, C and E of Part 170, respectively. Thus, there may be instances where one or more Condition or Maintenance of Certification requirement is not being or has not been met that also relate to certified Health IT Module nonconformities under subparts A, B, C and E. We proposed that under these situations, ONC could in parallel implement both sets of processes— existing processes to investigate Health IT Module non-conformities and the proposed process to enforce compliance with the Conditions and Maintenance of Certification requirements. We stressed, however, that under the proposed enforcement approach, only ONC would have the ability to determine whether a Condition or Maintenance of Certification requirement per subpart D has been or is being met. We proposed to delineate the scope of an ONC–ACB’s requirements to perform surveillance on certified Health IT Modules as related only to the requirements of subparts A, B, C and E of Part 170. Given our proposed approach that would authorize solely ONC to determine whether a Conditions or Maintenance of Certification requirement per subpart D has been or is being met, we proposed in 84 FR 7506 to add a new PoPC for ONC–ACBs in § 170.523(s) that would require ONC– ACBs to report to ONC, no later than a week after becoming aware, any information that could inform whether ONC should exercise direct review for noncompliance with a Condition or Maintenance of Certification requirement or any matter within the scope of ONC direct review. We did not receive specific comments on this section of the Proposed Rule and have finalized this approach regarding delineation of the review activities of ONC and ONC–ACBs in §§ 170.580 and 170.581 as proposed. 6. Coordination With the Office of the Inspector General We clarified in the Proposed Rule in 84 FR 7507 that the enforcement approach would apply only to ONC’s administration of the Conditions and Maintenance of Certification requirements and other requirements under the Program, but it would not apply to other agencies or offices that have independent authority to investigate and take enforcement action E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations against a health IT developer of certified health IT. Notably, section 3022(b)(1)(A)(ii) of the PHSA, as added by the Cures Act, authorizes the OIG to investigate claims that a health IT developer of certified health IT has engaged in information blocking, which is defined by section 3022(a)(1) of the PHSA as subject to reasonable and necessary activities identified by the Secretary as exceptions to the definition as proposed in part 171 (see section VIII.D of this final rule). Additionally, section 3022(b)(1)(A)(i) authorizes OIG to investigate claims that a health IT developer of certified health IT has submitted a false attestation under the Condition of Certification requirement which is described at section 3001(c)(5)(D)(vi) of the Cures Act. We emphasized that ONC’s and OIG’s respective authorities under the Cures Act (and in general) are independent and that either or both offices may exercise those authorities at any time. We noted, however, that ONC and OIG may coordinate their respective information blocking activities, as appropriate, such as by sharing information about claims or suggestions of possible information blocking or false attestations (including violations of Conditions and Maintenance of Certification requirements that may indicate that a developer has falsely attested to meeting a Condition or Maintenance of Certification requirement). Therefore, we proposed in 84 FR 7507 that we may coordinate our review of a claim of information blocking with OIG or defer to OIG to lead a review of a claim of information blocking. In addition, we proposed that we may rely on OIG’s findings to form the basis of a direct review action. Comments. The majority of comments received supported the general enforcement approach proposed by ONC. We did receive one comment recommending that we use a process similar to OCR’s enforcement of the HIPAA Rules and centralize enforcement of patient and provider rights with respect to privacy and access to EHI. Additionally, we received several comments seeking clarification regarding ONC’s coordination with OIG and one expressing concern about the potential for a developer to be under review by both OIG and ONC for the same conduct. Response. We welcome the many comments in support of our proposed enforcement approach. We also appreciate the comment regarding using processes similar to OCR and centralizing enforcement of privacy and access rights. We agree that it is crucial that we develop clear processes for VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 reporting and investigating claims of potential information blocking. To that end, ONC and OIG are actively coordinating on establishing referral policies and procedures to ensure the timely and appropriate flow of information related to information blocking complaints. We also note that the information blocking section of this final rule (part 171) has a delayed compliance date of 6 months after date of publication of the final rule. OIG and ONC are also coordinating timing of the effective date of this final rule and the start of information blocking enforcement and enforcement of the Conditions of Certification related to information blocking (§ 170.401, § 170.404(a)(1), and § 170.406(a)(1)). We are providing the following information on timing for actors regulated by the information blocking provision. Enforcement of information blocking civil monetary penalties (CMP) in section 3022(b)(2)(A) of the PHSA will not begin until established by future notice and comment rulemaking by OIG. As a result, actors would not be subject to penalties until CMP rules are final. At a minimum, the timeframe for enforcement would not begin sooner than the compliance date of the information blocking provision and will depend on when the CMP rules are final. Discretion will be exercised such that conduct that occurs before that time will not be subject to the information blocking CMPs. Individuals and entities are subject to the information blocking regulations and must comply with this rule as of the compliance date of this provision. The Cures Act directs the National Coordinator to implement a standardized process for the public to submit reports on claims of health information blocking. ONC intends to implement and evolve this complaint process by building on existing mechanisms, including the current ONC complaint process. We requested comment in the Proposed Rule on ways to adapt our current complaint process for claims of information blocking and refer readers to section VIII.F of this final rule for a more detailed discussion of the complaint process for claims of information blocking. OIG also has the ability to receive and review complaints directly from the public. This ensures that there is no ‘‘wrong door’’ by which a complainant can submit information. OIG will provide training to allow their investigators to identify information blocking allegations as part of their other fraud and abuse investigations. Additionally, as part of their continued efforts to implement the information blocking authorities, OIG will establish PO 00000 Frm 00149 Fmt 4701 Sfmt 4700 25789 policies and procedures for reviewing and triaging complaints. We will continue to work with OIG to establish coordinated and aligned procedures and reviews of information blocking complaints as envisioned by the Cures Act. We also emphasize that in order to promote effective enforcement, the information blocking provision of the Cures Act empowers OIG to investigate claims of information blocking and provides referral processes to facilitate coordination with other relevant agencies, including ONC, OCR, and the Federal Trade Commission (FTC). Future notice and comment rulemaking by OIG will provide more additional detail regarding information blocking enforcement. We clarify that there could be situations when a health IT developer of certified health IT’s practices could be reviewed by both ONC and OIG because ONC and OIG have separate and distinct enforcement authority regarding claims of information blocking. We explained in the Proposed Rule that ONC has statutory authority to enforce the Information Blocking Condition and Maintenance of Certification requirements (§ 170.401) and that ONC would enforce the Conditions of Certification requirements through the direct review process. OIG has investigatory authority for the information blocking provision (42 U.S.C. 300jj-52(b)), which may lead to the issuance of (CMPs) for information blocking conducted by health IT developers of certified health IT, health information networks, and health information exchanges. OIG may also investigate health care providers for information blocking, which could result in health care providers being subject to appropriate disincentives. In addition, OIG may investigate false attestations by health IT developers participating in the Program. Since ONC’s and OIG’s respective authorities with regard to information blocking under the Cures Act (and in general) are independent, it is necessary that either or both offices may exercise those authorities at any time. However, we emphasize, as we explained above in the Proposed Rule, that we anticipate that ONC and OIG will coordinate their respective information blocking activities, as appropriate, such as by sharing information about claims or suggestions of possible information blocking or false attestations (including violations of Conditions and Maintenance of Certification requirements that may indicate that a developer has falsely attested to meeting a Condition or Maintenance of Certification E:\FR\FM\01MYR3.SGM 01MYR3 25790 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations requirement). Therefore, we have finalized in § 170.580(a)(4) the proposed approach that will allow us to coordinate our review of a claim of information blocking with the OIG, or defer to OIG to lead a review of a claim of information blocking. In addition, the finalized approach will allow ONC to rely on OIG findings to form the basis of a direct review action. 7. Applicability of Conditions and Maintenance of Certification Requirements for Self-Developers The HHS regulation that established the Program, ‘‘Establishment of the Permanent Certification Program for Health Information Technology’’ (76 FR 1261), addresses self-developers and describes the concept of ‘‘selfdeveloped’’ as referring to a Complete EHR or EHR Health IT Module designed, created, or modified by an entity that assumed the total costs for testing and certification and that will be the primary user of the health IT (76 FR 1300 and 1301). While we proposed in 84 FR 7508 in the ‘‘Enforcement’’ section of the Proposed Rule that all general Conditions and Maintenance of Certification requirements apply to such developers, we also sought comment on which aspects of the Conditions and Maintenance of Certification requirements may not be applicable to self-developers. Comments. We received one comment that self-developers should not be permitted to rely on the exception available under the ‘‘Communications’’ Condition of Certification requirement that allows developers to place limited restrictions on the communications of their employees who are using their products. Response. We agree with the comment that self-developers should not be allowed to restrict the communications of users of their product who are also employees. We have revised the language of the ‘‘Communications’’ Condition of Certification requirement in § 170.403(a)(2)(ii)(A)(2) to clarify that the limited prohibitions developers may place on employees under the Condition of Certification requirement cannot be placed on users of the developers’ products who also happen to be employees or contractors of the developer. Overall, we intend to hold self-developers to all Conditions and Maintenance of Certification requirements of health IT developers, as applicable based on the health IT certified. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 VIII. Information Blocking A. Statutory Basis Section 4004 of the Cures Act added section 3022 of the Public Health Service Act (PHSA) (42 U.S.C. 300jj–52, ‘‘the information blocking provision’’). Section 3022(a)(1) of the PHSA defines practices that constitute information blocking when engaged in by a health care provider, or a health information technology developer, exchange, or network. Section 3022(a)(3) authorizes the Secretary to identify, through notice and comment rulemaking, reasonable and necessary activities that do not constitute information blocking for purposes of the definition set forth in section 3022(a)(1). We proposed in the Proposed Rule to establish exceptions to the information blocking definition, each of which would define certain activities that would not constitute information blocking for purposes of section 3022(a)(1) of the PHSA because they are reasonable and necessary to further the ultimate policy goals of the information blocking provision. We also proposed to interpret or define certain statutory terms and concepts that are ambiguous, incomplete, or provide the Secretary with discretion, and that we believe are necessary to carry out the Secretary’s rulemaking responsibilities under section 3022(a)(3) (84 FR 7522). B. Legislative Background and Policy Considerations In the Proposed Rule, we outlined the purpose of the information blocking provision and related policy and practical considerations that we considered in identifying the reasonable and necessary activities that we proposed as exceptions to the information blocking definition (84 FR 7508). 1. Purpose of the Information Blocking Provision We explained in the Proposed Rule that the information blocking provision was enacted in response to concerns that some individuals and entities are engaging in practices that unreasonably limit the availability and use of electronic health information (EHI) for authorized and permitted purposes. These practices undermine public and private sector investments in the nation’s health IT infrastructure, and frustrate efforts to use modern technologies to improve health care quality and efficiency, accelerate research and innovation, and provide greater value and choice to health care consumers (84 FR 7508). We emphasized that the nature and extent of information blocking has come PO 00000 Frm 00150 Fmt 4701 Sfmt 4700 into sharp focus in recent years. In 2015, at the request of Congress, we submitted a Report on Health Information Blocking 117 (‘‘Information Blocking Congressional Report’’), in which we commented on the then-current state of technology and of health IT and health care markets. Notably, we observed that prevailing market conditions create incentives for some individuals and entities to exercise control over EHI in ways that limit its availability and use (84 FR 7508). We noted that we have continued to receive complaints and reports of information blocking from patients, clinicians, health care executives, payers, app developers and other technology companies, registries and health information exchanges, professional and trade associations, and many other stakeholders. We noted that ONC has listened to and reviewed these complaints and reports, consulted with stakeholders, and solicited input from our Federal partners in order to inform our proposed information blocking policies. Stakeholders described discriminatory pricing policies that have the obvious purpose and effect of excluding competitors from the use of interoperability elements. Many industry stakeholders who shared their perspectives with us in listening sessions, including several health IT developers of certified health IT, condemned these practices and urged us to swiftly address them. We highlighted that our engagement with stakeholders confirmed that, despite significant public and private sector efforts to improve interoperability and data accessibility, adverse incentives remain and continue to undermine progress toward a more connected health system (84 FR 7508). Based on these economic realities and our first-hand experience working with the health IT industry and stakeholders, in the Information Blocking Congressional Report, we concluded that information blocking is a serious problem, and recommended that Congress prohibit information blocking and provide penalties and enforcement mechanisms to deter these harmful practices (84 FR 7508). We noted in the Proposed Rule that recent empirical and economic research further underscores the intractability of this problem and its harmful effects. In a national survey of health information organizations, half of respondents reported that EHR developers routinely 117 ONC, Report to Congress on Health Information Blocking (Apr. 2015), https:// www.healthit.gov/sites/default/files/reports/info_ blocking_040915.pdf [hereinafter ‘‘Information Blocking Congressional Report’’]. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations engage in information blocking, and a quarter of respondents reported that hospitals and health systems routinely do so. The survey reported that perceived motivations for such conduct included, for EHR vendors, maximizing short-term revenue and competing for new clients, and for hospitals and health systems, strengthening their competitive position relative to other hospitals and health systems.118 We noted that other research suggests that these practices weaken competition among health care providers by limiting patient mobility, encouraging consolidation, and creating barriers to entry for developers of new and innovative applications (also referred to as ‘‘apps’’) and technologies that enable more effective uses of clinical data to improve population health and the patient experience 119 (84 FR 7508). We explained in the Proposed Rule that the information blocking provision provides a comprehensive response to these concerns. The information blocking provision defines and creates possible penalties and disincentives for information blocking in broad terms, while working to deter the entire spectrum of practices that unnecessarily impede the flow of EHI or its use to improve health and the delivery of care. The information blocking provision applies to the conduct of health care providers and health IT developers, exchanges, and networks, and seeks to deter information blocking through civil monetary penalties and disincentives for violations. Additionally, developers of health IT certified under the Program are prohibited from information blocking under 3001(c)(5)(D)(i) of the PHSA (84 FR 7509). The information blocking provision authorizes the HHS Office of Inspector 118 See, e.g., Julia Adler-Milstein and Eric Pfeifer, Information Blocking: Is It Occurring And What Policy Strategies Can Address It?, 95 Milbank Quarterly 117, 124–25 (Mar. 2017), available at https://onlinelibrary.wiley.com/doi/10.1111/14680009.12247/full. 119 See, e.g., Martin Gaynor, Farzad Mostashari, and Paul B. Ginsburg, Making Health Care Markets Work: Competition Policy for Health Care, 16–17 (Apr. 2017), available at ≤https:// www.brookings.edu/research/making-health-caremarkets-work-competition-policy-for-health-care/; Diego A. Martinez et al., A Strategic Gaming Model For Health Information Exchange Markets, Health Care Mgmt. Science (Sept. 2016). (‘‘[S]ome healthcare provider entities may be interfering with HIE across disparate and unaffiliated providers to gain market advantage.’’) Niam Yaraghi, A Sustainable Business Model for Health Information Exchange Platforms: The Solution to Interoperability in Healthcare IT (2015), available at https://www.brookings.edu/research/papers/2015/ 01/30-sustainable-business-model-healthinformation- exchange-yaraghi; Thomas C. Tsai & Ashish K. Jha, Hospital Consolidation, Competition, and Quality: Is Bigger Necessarily Better?, 312 J. AM. MED. ASSOC. 29, 29 (2014). VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 General (OIG) to investigate claims of information blocking and provides for referral processes to facilitate coordination among Federal agencies, including ONC, the HHS Office for Civil Rights (OCR), and the Federal Trade Commission (FTC). The information blocking provision also provides for a process for the public to submit reports on claims of information blocking as well as confidentiality protections to encourage and facilitate the reporting of information blocking. Enforcement of the information blocking provision is buttressed by section 3001(c)(5)(D)(i) and (vi) of the PHSA, which requires the Secretary to establish as a Condition and Maintenance of Certification requirement under the Program that health IT developers do not take any action that constitutes information blocking and require such developers to attest that they have not engaged in such conduct (84 FR 7509). 2. Policy Considerations and Approach to Information Blocking We explained in the Proposed Rule that the information blocking provision encompasses a broad range of potential practices in order to ensure that individuals and entities that engage in information blocking are held accountable. However, we explained that it is possible that some activities that are innocuous, or even beneficial, could technically implicate the information blocking provision. Given the possibility of these activities, section 3022(a)(3) of the PHSA requires the Secretary, through rulemaking, to identify reasonable and necessary activities that do not constitute information blocking. We refer to such reasonable and necessary activities identified by the Secretary as ‘‘exceptions’’ to the information blocking provision. The information blocking provision also excludes from the definition of information blocking those practices that are required by law (section 3022(a)(1) of the PHSA) and clarifies certain other practices that would either not be considered information blocking or penalized (sections 3022(a)(6) and (7) of the PHSA) (84 FR 7509). In considering potential exceptions to the information blocking provision, we strove to balance a number of policy and practical considerations. To minimize compliance and other burdens for stakeholders, we explained that we were seeking to promote clear, predictable, and administrable policies. In addition, we emphasized our intention to implement the information blocking provision in a way that would be sensitive to legitimate practical PO 00000 Frm 00151 Fmt 4701 Sfmt 4700 25791 challenges that may prevent access to, exchange, or use of EHI in certain situations. We also explained our goal to accommodate practices that, while they may inhibit access, exchange, or use of EHI, are reasonable and necessary to advance other compelling policy interests, such as preventing harm to patients and others, promoting the privacy and security of EHI, and promoting competition and consumer welfare (84 FR 7509). At the same time, we explained that we sought to provide a comprehensive response to the information blocking problem. Information blocking can occur through a variety of business, technical, and organizational practices that can be difficult to detect and that are constantly changing as technology and industry conditions evolve. The statute responds to these challenges by defining information blocking broadly and in a manner that allows for careful consideration of relevant facts and circumstances in individual cases. Accordingly, we proposed in the Proposed Rule to establish certain defined exceptions to the information blocking provision as a way to identify reasonable and necessary activities that do not constitute information blocking as required by section 3022(a)(3) of the PHSA. We proposed that these exceptions would be subject to strict conditions and would apply three overarching policy criteria. First, each exception would be limited to certain activities that are both reasonable and necessary. These reasonable and necessary activities include: Promoting public confidence in the health IT infrastructure by supporting the privacy and security of EHI and protecting patient safety; and promoting competition and innovation in health IT and its use to provide health care services to consumers. Second, we noted that each exception addresses a significant risk that regulated individuals and entities will not engage in these reasonable and necessary activities because of uncertainty regarding the breadth or applicability of the information blocking provision. Third, we explained that each exception is intended to be tailored, through appropriate conditions, so that it is limited to the reasonable and necessary activities that it is designed to protect and does not extend protection to other activities or practices that could raise information blocking concerns (84 FR 7509). 3. General Comments Regarding Information Blocking Exceptions Comments. Numerous commenters expressed support for the proposed E:\FR\FM\01MYR3.SGM 01MYR3 25792 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations information blocking exceptions overall. Some commenters stated that information blocking is a widespread problem and perhaps the greatest barrier to interoperability, and supported our approach to addressing information blocking. While most commenters supported our policy goals regarding information blocking, others questioned whether our policies would have detrimental consequences to the industry given the breadth of the definitions, ambiguity of the expectations, and narrowness of the proposed exceptions. Another commenter stated that the proposed information blocking exceptions are too vague and that an alternative approach is necessary to reduce confusion. The commenter stated that we should align the information blocking requirements with the certified capabilities of health IT developers, and that information blocking should be evaluated through the lens of access, exchange, and use of the USCDI. One commenter suggested that our information blocking policies be more patient-focused as offered by the Individual Health RecordTM (IHR) Model.120 A few commenters requested clarification on how each of the exceptions would be arbitrated, and requested that we provide additional examples of actions that may fall within each exception. Response. We appreciate the support expressed by many commenters. This final rule maintains the general direction of the Proposed Rule regarding information blocking but focuses the scope of certain terms, while also addressing the reasonable and necessary activities that would qualify for an exception under the information blocking provision. As an example, we have focused the scope of the EHI and Health Information Network (HIN) definitions and have included a new exception in this final rule, the Content and Manner Exception (§ 171.301). We appreciate the comment regarding the IHR Model, but have determined that the best approach to support interoperability and the access, exchange, and use of EHI is through the policies finalized in this final rule, which are patient-focused. For instance, the Fees Exception (§ 171.302), which allows certain fees to be charged, does not apply to a fee based in any part on the electronic access (as such term is defined in § 171.302(d)) of an individual’s EHI by the individual, their personal representative, or another 120 The IHR is a digital tool that provides an allin-one record of an individual’s health, enabling a person and their care team to help improve collaboration and care. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 person or entity designated by the individual. We emphasize that an actor’s practice of charging an individual, their personal representative, or another person or entity designated by the individual for electronic access to the individual’s EHI would be inherently suspect under an information blocking review. We continue to receive complaints and reports alleging information blocking from a wide range of stakeholders. ONC has listened to and reviewed these complaints and reports, consulted with stakeholders, solicited input from our Federal partners, and reviewed public comments received in response to the Proposed Rule in order to inform our information blocking policies. We look forward to ongoing collaboration with public and private sector partners as we implement the information blocking provision of this final rule. To note, we have provided clarifications and additional examples throughout this final rule. Comments. Numerous commenters expressed concern over the proposed effective date of the information blocking policies. Commenters stated that imposing stringent new mandates with an overly aggressive implementation timeframe could be counterproductive by increasing administrative and financial burdens on physician practices, threatening the security of health information, and potentially compromising patient safety. Several provider organizations requested an enforcement ‘‘grace period’’ after the new information blocking requirements take effect to allow providers sufficient time to understand the requirements and implement new procedures to be compliant before any disincentives would be applied. Specifically, commenters recommended that OIG not take any enforcement action for a period of 18 months or two years after the effective date of the final rule. Several commenters recommended a period of enforcement discretion of no less than five years during which OIG would require corrective action plans instead of imposing penalties for information blocking. One commenter also recommended that we ‘‘grandfather’’ any economic arrangements that exist two years from date of the final rule. We did not receive any comments on the proposed § 171.101, Applicability, which stated that this part applies to health care providers, health IT developers of certified health IT, health information exchanges, and health information networks, as those terms are defined in § 171.102. PO 00000 Frm 00152 Fmt 4701 Sfmt 4700 Response. We thank commenters for their input. Taking these comments into consideration, we have delayed the compliance date of the information blocking section of this rule (45 CFR part 171). The compliance date for the information blocking section of this final rule will be six months after the publication date of this final rule in the Federal Register. This six-month delayed compliance date was established to provide actors with time to thoroughly read and understand the final rule and educate their workforce in order to apply the exceptions in an appropriate manner. We also note that the finalized definition of information blocking (§ 171.103)) and the new Content and Manner Exception (§ 171.301(a)) reduce the scope of the EHI definition for the first 18 months after the compliance date of the information blocking section of this final rule to the EHI identified by the data elements represented in the USCDI. Therefore, in addition to the information blocking section’s compliance date being six months after publication, actors will have an additional 18 months to gain experience applying the exceptions with just the EHI identified by the data elements represented in the USCDI as compared to the full scope of EHI, which would apply thereafter. During this combined period of 24 months, we strongly encourage actors to apply the exceptions to all EHI as if the scope were not limited to EHI identified by the data elements represented in the USCDI. However, given the initial scope of EHI identified in the information blocking definition in § 171.103 and the Content and Manner Exception in § 171.103, if an actor did not, in the first 24 months from this final rule’s publication date, enable access, exchange, or use of data outside the USCDI, or did not appropriately apply an exception to data outside the USCDI, such practice or error would not be considered information blocking because that data would not be considered ‘‘EHI’’ during that time period. We have also delayed the compliance date of the Information Blocking Condition of Certification requirement in § 170.401 and the Assurances Condition of Certification requirement in § 170.402(a)(1). We also note that under 45 CFR part 171, we have focused the scope of the EHI definition and have revised the seven proposed exceptions in a manner that is clear, actionable, and likely to reduce perceived burden. OIG and ONC are coordinating timing of the compliance date of the information blocking section of this E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations final rule (45 CFR part 171) and the start of information blocking enforcement. We are providing the following information on timing for actors. Enforcement of information blocking civil monetary penalties (CMP) in section 3022(b)(2)(A) of the PHSA will not begin until established by future notice and comment rulemaking by OIG. As a result, actors would not be subject to penalties until CMP rules are final. At a minimum, the timeframe for enforcement would not begin sooner than the compliance date of the information blocking section of this final rule (45 CFR part 171) and will depend on when the CMP rules are final. Discretion will be exercised such that conduct that occurs before that time will not be subject to information blocking CMP. We have finalized § 171.101 with an additional paragraph to codify the compliance date for the information blocking section of this final rule (45 CFR part 171). Section 171.101(b) states that health care providers, health IT developers of certified health IT, health information exchanges, and health information networks must comply with this part on and after November 2, 2020. Comments. Several commenters requested that we develop training and educational materials on the information blocking provision. Commenters specifically stated that we should work with other agencies (including CMS, OIG, FTC and OCR) to develop and widely disseminate comprehensive informational materials, such as sub-regulatory guidance and frequently asked questions about what constitutes information blocking. Some commenters recommended we work with OIG to ensure that enforcement focuses on education rather than penalties against non-malicious information blockers. A few commenters suggested that we offer an opportunity for stakeholders to seek advisory opinions from OIG to clarify what constitutes information blocking, or that we create a formal advisory committee on information blocking. Other commenters requested that heath care providers be provided an opportunity to cure an alleged violation and an opportunity to appeal the alleged violation. Response. We thank commenters for their feedback, including their suggestions for establishing a formal advisory committee. While we do not plan to establish an advisory committee, we plan to engage in multiple efforts to educate stakeholders. We intend to provide educational resources such as infographics, fact sheets, webinars, and other forms of educational materials and VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 outreach based on needs identified. We emphasize that the final rule details our information blocking policies, and these educational materials are intended to educate stakeholders on our final policies established in the final rule. We are also actively coordinating with OIG and have provided OIG with comments we received on the Proposed Rule related to information blocking investigations and enforcement. Future notice and comment rulemaking by OIG will provide additional detail regarding information blocking enforcement. C. Relevant Statutory Terms and Provisions In the Proposed Rule, we included regulation text to codify the definition of information blocking in § 171.103. We discussed how we proposed to interpret certain aspects of the information blocking provision that we believe are ambiguous, incomplete, or that provided the Secretary with discretion. We proposed to define or interpret certain terms or concepts that are present in the statute and, in a few instances, to establish new regulatory terms or definitions that we believe are necessary to implement the directive in section 3022(a)(3) of the PHSA to identify reasonable and necessary activities that do not constitute information blocking. We explained that our goal in interpreting the statute and defining relevant terms is to provide greater clarity concerning the types of practices that could implicate the information blocking provision and, relatedly, to more effectively communicate the applicability and scope of the exceptions (84 FR 7509). Comments. We did not receive any comments on the codification of the proposed definition of information blocking in § 171.103. As discussed in more detail in section VIII.C.3, we received many comments expressing concerns regarding the breadth of the proposed EHI definition and requesting flexibility in the implementation of the information blocking provision. Many commenters stated that it would be difficult for actors to provide the full scope of EHI as it was proposed to be defined, particularly as soon as the final rule was published. Some commenters opined that we were trying to do too much too fast. Commenters requested that we provide flexibility for actors to adjust to the scope of the EHI definition, as well as the exceptions. Commenters asserted that such an approach would permit them to adapt their processes, technologies, and systems to enable the access, exchange, and use of EHI as required by the Cures Act and this final PO 00000 Frm 00153 Fmt 4701 Sfmt 4700 25793 rule. Some commenters suggested that EHI under the information blocking provision should be limited to ePHI as defined in 45 CFR 160.103, while others requested that ONC consider constraining the EHI covered by the information blocking provision to only the data included in the USCDI. Response. We have finalized the proposed definition of information blocking in § 171.103 with the addition of paragraph (b). This new paragraph states that until May 2, 2022—which is 18 months after the 6-month delayed compliance date for part 171 (a total of 24 months after the publication date of this final rule)—EHI for purposes of part 171 is limited to the EHI identified by the data elements represented in the United States Core Data for Interoperability (USCDI) standard adopted in § 170.213. This addition aligns with the content condition within the Content and Manner Exception, which states that for up to May 2, 2022, an actor must respond to a request to access, exchange, or use EHI with, at a minimum, the EHI identified by the data elements represented in the USCDI standard adopted in § 170.213 (see § 171.301(a)(1)). This incremental expansion of the access, exchange, and use of EHI in both the information blocking definition (§ 171.103) and Content and Manner Exception (§ 171.301) responds to commenters’ concerns regarding the breadth of health information actors are required to share and the concern about the pace at which we are implementing the information blocking provision. By using USCDI as the baseline of EHI for 18 months after the compliance date of the information blocking section of this final rule (45 CFR part 171),121 we have created a transparent, predictable starting point for sharing the types of EHI that is understood by the regulated community and more readily available for access, exchange, and use. In addition, health IT that has been certified to the 2015 Edition ‘‘CCDS’’ certification criteria will be able to immediately and readily produce almost all of the data elements identified in the USCDI. Furthermore, most, if not all, of such health IT already supports recording USCDI data elements and most HIEs/HINs are routinely exchanging such data elements. Further those developers maintaining certification over the 18-month period from the compliance date of the information blocking section of this 121 The compliance date for the information blocking section of this final rule (45 CFR part 171) is six months after the publication date of the final rule. E:\FR\FM\01MYR3.SGM 01MYR3 25794 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations final rule (45 CFR part 171) will be in the process of updating their certified health IT to produce all of the data elements specified in the USCDI, including being certified to the new standardized application programming interface (API) criterion (§ 170.315(g)(10)) and API Condition of Certification (§ 170.404). We believe the 18-month delay will provide actors with adequate time to prepare for the sharing of all EHI and sunset any non-compliant technology, while providing a clear deadline for when all EHI must be available for access, exchange, and use. During this time period, actors can gain awareness, experience, and comfort with the information blocking provision and exceptions without being required to apply the information blocking exceptions to all EHI as it is defined in § 171.102 (see section VIII.C.3). We expect actors to use this 18-month delay from the compliance date of the information blocking section of this final rule (45 CFR part 171) (in addition to the 6-month period from the publication date of this final rule to the information blocking compliance date) to practice applying the exceptions to real-life situations and to update their processes, technologies, and systems to adapt to the new information blocking requirements. We believe actors will benefit from learning how to respond to requests for all EHI and applying the exceptions during the 18-month delay. Further, this approach will ensure that the application of the information blocking provision is equitable across actors during the 18-month time period. For instance, if we had required actors to respond to a request to access, exchange, or use EHI during this 18month time period with all EHI that the actor is able to provide, then actors who are able to provide more EHI would carry a heavier burden than actors who were only able to provide the data elements specified in the USCDI. Nonetheless, and as discussed above, we encourage actors to respond to requests for access, exchange, or use of EHI with as much EHI as possible in order to promote interoperability and to practice applying the exceptions. We have included language regarding this incremental expansion of the access, exchange, and use of EHI in both the information blocking definition (§ 171.103) and Content and Manner Exception (§ 171.301) in order to ensure that the 18-month delay is uniformly applied in the broad circumstances when requestors request access, exchange, or use of EHI as well as in situations when an actor seeks to satisfy the Content and Manner Exception by VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 fulfilling a request to access, exchange, or use EHI in an alternative manner than the manner requested. This approach will ensure that the requisite content to be included in an actor’s response to a request to access, exchange, or use EHI during the 18-month period is clear and consistent throughout our information blocking policies. 1. ‘‘Required by Law’’ With regard to the statute’s exclusion of practices that are ‘‘required by law’’ from the definition of information blocking, we emphasized in the Proposed Rule that ‘‘required by law’’ refers specifically to interferences with access, exchange, or use of EHI that are explicitly required by State or Federal law. By carving out practices that are ‘‘required by law,’’ the statute acknowledged that there are laws that advance important policy interests and objectives by restricting access, exchange, and use of EHI, and that practices that follow such laws should not be considered information blocking (84 FR 7509). We noted in the Proposed Rule that for the purpose of developing an exception for reasonable and necessary privacy-protective practices, we distinguished between interferences that are ‘‘required by law’’ and those engaged in pursuant to a privacy law, but which are not ‘‘required by law.’’ (The former does not fall within the definition of information blocking, but the latter may implicate the information blocking provision and an exception may be necessary (84 FR 7510)). Comments. We received comments requesting additional clarity regarding the meaning and scope of ‘‘required by law’’ within the information blocking provision. Response. We thank commenters for the feedback. We clarify that our references to Federal and State law include statutes, regulations, court orders, and binding administrative decisions or settlements, such as (at the Federal level) those from the FTC or the Equal Employment Opportunity Commission (EEOC). We further note that ‘‘required by law’’ would include tribal laws, as applicable. For a detailed discussion of the application of ‘‘required by law’’ in the context of the Privacy Exception, please see section VIII.D.1.b. 2. Health Care Providers, Health IT Developers, Exchanges, and Networks We explained in the Proposed Rule that section 3022(a)(1) of the PHSA, in defining information blocking, refers to four classes of individuals and entities that may engage in information blocking PO 00000 Frm 00154 Fmt 4701 Sfmt 4700 and which include: Health care providers, health IT developers, networks, and exchanges. We proposed in the Proposed Rule to adopt definitions of these terms to provide clarity regarding the types of individuals and entities to whom the information blocking provision applies (84 FR 7510). We noted that, for convenience and to avoid repetition in the preamble, we typically refer to these individuals and entities covered by the information blocking provision as ‘‘actors’’ unless it is relevant or useful to refer to the specific type of individual or entity. That is, when the term ‘‘actor’’ appears in the preamble, it means a health care provider, health IT developer, health information exchange, or health information network. We proposed to codify this definition of ‘‘actor’’ in § 171.102. Comments. We did not receive any comments on this general approach to use the term ‘‘actors’’ throughout the rule for clarity or the proposed definition of ‘‘actor’’ in § 171.102. We note that we did receive comments about the definitions of the four categories of actors, which are discussed below. Response. We have finalized this approach and the definition of ‘‘actor’’ in § 171.102 as proposed. a. Health Care Providers We identified in the Proposed Rule that the term ‘‘health care provider’’ is defined in section 3000(3) of the PHSA (84 FR 7510). We proposed to adopt this definition for purposes of section 3022 of the PHSA (that is, for purposes of information blocking) when defining ‘‘health care provider’’ in § 171.102. We noted that the PHSA definition is different from the definition of ‘‘health care provider’’ under the HIPAA Rules. We further stated that we were considering adjusting the information blocking definition of ‘‘health care provider’’ to cover all individuals and entities covered by the HIPAA Rules ‘‘health care provider’’ definition in 45 CFR 160.103. We sought comment on whether such an approach would be justified, and encouraged commenters to specify reasons why doing so might be necessary to ensure that the information blocking provision applies to all health care providers that might engage in information blocking. Comments. A significant number of commenters were in favor of using the definition of health care provider used in the HIPAA Rules. However, other commenters asserted that doing so would exceed the scope intended by the Cures Act. Some commenters requested exclusions or a ‘‘phased-in’’ approach E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations for the requirements for State agencies, institutions, public health departments, ambulatory surgical centers, and other small providers due to their limited resources or limited access to health IT. Other commenters suggested limiting the application of the information blocking provisions only to those health care providers using certified health IT though some commenters also opposed such a limitation. Some commenters suggested including additional categories such as medical device manufacturers and community-based organizations that address social determinants of health (e.g., access to food, housing, and transportation). Response. We have retained in this final rule the definition of ‘‘health care provider’’ as set forth in section 3000(3) of the PHSA as proposed. The definitions listed in section 3000 of the PHSA apply ‘‘[i]n this title,’’ which refers to Title XXX of the PHSA. Section 3022 of the PHSA is included in Title XXX. We note that the last clause of the health care provider definition in section 3000(3) of the PHSA gives the Secretary discretion to expand the definition to any other category determined to be appropriate by the Secretary. We will consider whether the definition should be expanded in the future if the scope of health care providers subject to the information blocking provision does not appear to be broad enough in practice to ensure that the information blocking provision applies to all health care providers that might engage in information blocking. With respect to the requested exclusions or a ‘‘phased-in’’ approach for certain types of entities, we do not believe that this is necessary due to the addition of paragraph (b) within the information blocking definition in § 171.103 and the new Content and Manner Exception in § 171.310. Section 171.103(b) states that until May 2, 2022—which is 18 months after the compliance date of the information blocking section of this final rule (part 171)—EHI for purposes of part 171 is limited to the EHI identified by the data elements represented in the United States Core Data for Interoperability (USCDI) standard adopted in § 170.213 (see the discussion in section VIII.C). Similarly, the Content and Manner Exception allows actors to make available a limited set of EHI (the USCDI) during the first 18 months after the six-month delayed compliance date for part 171 (a total of 24 months after publication of this final rule). This approach, as well as the Infeasibility Exception, will address concerns about certain actors having limited resources or limited access to health IT. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 The health care provider definition and resources we have made available provide clarity and examples of the types of individuals and entities covered by the definition. To this point, medical device manufacturers and community-based organizations, as described by commenters, generally would not meet the health care provider definition unless they are also a type of individual or entity identified in the definition. b. Health IT Developers of Certified Health IT Section 3022(a)(1)(B) of the PHSA defines information blocking, in part, by reference to the conduct of health information technology developers. In the Proposed Rule (84 FR 7510), we explained that, because title XXX of the PHSA does not define ‘‘health information technology developer,’’ we interpreted section 3022(a)(1)(B) in light of the specific authority provided to OIG in section 3022(b)(1)(A) and (b)(2). We noted that section 3022(b)(2) discusses developers, networks, and exchanges by referencing any individual or entity described in section 3022(b)(1)(A) or (C). Section 3022(b)(1)(A) states, in relevant part, that OIG may investigate any claim that a health information technology developer of certified health information technology or other entity offering certified health information technology engaged in information blocking. We believe it is reasonable to interpret these sections together to mean that the information blocking provision extends to individuals or entities that develop or offer certified health IT. That the individual or entity must develop or offer certified health IT, we explained, is further supported by section 3022(a)(7) of the PHSA—which refers to developers’ responsibilities to meet the requirements of certification—and section 4002 of the Cures Act—which identifies information blocking as a Condition of Certification. Consistent with this, we proposed a definition of ‘‘health IT developer of certified health IT’’ in § 171.102 (84 FR 7601) and an interpretation of the use of ‘‘health information technology developer’’ in section 3022 of the PHSA that would apply to part 171 only, and would not apply (84 FR 7511) to the implementation of any other section of the PHSA 122 or the Cures Act, such as section 4005(c)(1) of the Cures Act. 122 Because part 171 is referenced by part 170 subpart D, the definition and interpretation are relevant to developers’ obligations to meet Condition and Maintenance of Certification Requirements. PO 00000 Frm 00155 Fmt 4701 Sfmt 4700 25795 Limiting the Definition of Health IT Developer to Developers of Certified Health IT Comments. A number of commenters suggested broadening the definition of ‘‘health IT developers’’ to include all developers of health IT, whether or not any of their products include Health IT Module(s) certified under ONC’s Health IT Certification Program. Several of these commenters expressed concern that developers of only non-certified health IT would, under our proposed definition, be able to continue to block patients from accessing or directing their EHI to third parties of their choice. A majority of these commenters expressed concerns that an information blocking prohibition limited to developers who participate in the ONC Health IT Certification Program (also referred to as ‘‘the Program’’) will result in an uneven playing field for developers who participate in the Program in comparison to those who do not participate in the Program. Some commenters suggested that this could motivate developers to avoid or withdraw from the Program. Response. We believe that ‘‘health information technology developer’’ as used in PHSA section 3022(a)(1)(B) should be interpreted in light of the specific authority provided to OIG in section 3022(b)(1)(A) and (b)(2). Section (b)(1)(A) states, in relevant part, that OIG may investigate any claim that a health information technology developer of certified health information technology or other entity offering certified health information technology engaged in information blocking. We recognize that health IT developers that are not developers of certified health IT could engage in conduct meeting the definition of information blocking in section 3022(a) of the PHSA. However, the statute places health IT developers of certified health IT on different footing than other developers of health IT with respect to information blocking enforcement. A broader definition of ‘‘health IT developer’’ in § 171.102 would not change the scope or effect of section 3022(b)(1)(A) and (b)(2) of the PHSA. We acknowledge that the information blocking provision may change some health IT developers’ assessments of whether participation in the voluntary ONC Health IT Certification Program is the right decision for their health IT products and customers. However, we believe the value certification offers to the health IT developers’ customers, such as health care providers, is substantially enhanced by both the information blocking provision and the E:\FR\FM\01MYR3.SGM 01MYR3 25796 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations enhancements to certification called for in PHSA section 3001(c)(5)(D). We believe the benefit that certification offers health IT developers’ customers will continue to weigh in favor of the developers obtaining and maintaining certification of their products. For example, the Promoting Interoperability Programs (formerly known as the Medicare and Medicaid EHR Incentive Programs) continue to require use of Certified EHR Technology (CERHT), which makes certification important for developers seeking to market certain types of health IT (notably including, but not limited to, that within the ‘‘Base EHR’’ definition in § 170.102) to eligible clinicians, eligible hospitals, and critical access hospitals (CAHs). Comments. Several commenters recommended alternative approaches to interpreting the Cures Act, to justify broadening the definition of ‘‘health IT developer’’ in 45 CFR 171.102 to include all developers of any products within the definition of ‘‘health information technology’’ in section 3000 of the PHSA. These commenters offered a variety of rationales, including consideration of information that would have been available to Congress at the time the Cures Act was enacted, as the basis for inferring that Congress did not intend to limit the scope of the information blocking provision to developers that participate in the voluntary ONC Health IT Certification Program. Some commenters stated the phrasing of the Cures Act’s information blocking provision appeared to exclude health IT developers that do not participate in our Program and recommended that we address what some comments described as a potential enforcement gap by broadening the regulatory definition of ‘‘health IT developer’’ in 45 CFR 171.102, although they did not identify a specific statutory basis for closing what their comments described as a gap or drafting issue in the statute. One commenter asked that we work with Congress to expand the definition of health IT developer beyond those with at least one product that is or that includes at least one Health IT Module certified under the Program. Response. As explained in the Proposed Rule and in the immediately preceding response to comments, we believe that ‘‘health information technology developer’’ as used in PHSA section 3022(a)(1)(B) should be interpreted in light of the specific authority provided to OIG in section 3022(b)(1)(A) and (b)(2). Our interpretation is that the individual or entity must develop or offer certified health IT to be considered a health IT developer covered by the information VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 blocking provision, which is further supported by PHSA sections 3022(a)(7) and 3001(c)(5)(D). Section 3022(a)(7) refers to developers’ responsibilities to meet the requirements of certification, and section 3001(c)(5)(D) identifies as a Condition of Certification that a health IT developer not engage in information blocking. Moreover, PHSA § 3022 does not specifically address all of the types of individuals and entities (such as health plans and claims data clearinghouses) that could or currently do engage in practices that might otherwise meet the definition of information blocking in PHSA § 3022(a). Applicability of Information Blocking Provision to Non-Certified Health IT Products of a Developer of Certified Health IT Comments. On the whole, the majority of comments supported defining ‘‘health IT developer’’ in a manner that includes all health IT products developed or offered by developers who have at least one Health IT Module certified under the Program. However, multiple comments, predominantly from the perspective of developers of certified health IT, recommended that we limit the definition of ‘‘health IT developers of certified health IT’’ in § 171.102 so that it would encompass only the developers’ conduct specific to their certified health IT products. Commenters advocating this more limited definition stated that these developers’ non-certified health IT products would be competing against similar products of developers who are not subject to the information blocking provision. Response. The Cures Act does not prescribe that only practices involving certified health IT may implicate PHSA section 3022(a). If Congress had intended to limit the application of section 3022 of the PHSA to practices involving certified health IT, we believe PHSA section 3022 would have included language that tied enforcement of that section to the operation or performance of health IT products that include one or more Health IT Module(s) certified under the Program. Instead, PHSA section 3022(b)(1)(A) provides that the HHS Inspector General may investigate under PHSA section 3022 any claim that ‘‘a health information technology developer of certified health information technology or other entity offering certified health information technology—submitted a false attestation under section 3001(c)(5)(D)(vii); or engaged in information blocking.’’ Similarly, neither subparagraph (B) of PHSA PO 00000 Frm 00156 Fmt 4701 Sfmt 4700 section 3022(b)(1), specific to claims that a health care provider engaged in information blocking, nor subparagraph (C), specific to claims that health information exchanges (HIEs) or health information networks (HINs) engaged in information blocking, includes language limiting the Inspector General to investigating claims tied to these actors’ use of certified health IT. Moreover, our observation is that the customers of health IT developers of certified health IT seldom, if ever, rely solely on Health IT Modules certified under the Program to meet their needs to access, exchange, and use EHI. A developer’s health IT product suite that a hospital, clinician office practice, or other health care provider uses (and colloquially references) as its ‘‘EHR system’’ will typically include a wide variety of functions, services, components, and combinations thereof. Even where such a health IT product suite meets the definition of ‘‘Certified EHR Technology’’ for purposes of participation in the Promoting Interoperability Programs, there is no guarantee that every part of the overall product suite will meet the requirements of at least one certification criterion adopted by the Secretary. In fact, typically only a subset of the functions, services, components, and combinations thereof within the overall product suite will meet the requirements of at least one certification criterion adopted by the Secretary and be Health IT Modules certified under the Program. If we were to interpret the information blocking provision as applying only to the certified Health IT Modules within a developer’s product suite(s), we are concerned the developers’ customers might too easily presume, based on the developer’s participation in the ONC Health IT Certification Program, that the developer will not engage in information blocking with respect to any of the EHI that the customer uses of the developer’s product suite(s) to access, exchange, or use. Moreover, limiting our definition of ‘‘health IT developer of certified health IT’’ for purposes of part 171 to only the subset of an individual or entity’s products that are, or that specifically include, Health IT Modules certified under our Program could encourage developers to split various functions, services, or combinations thereof into multiple products so that they could more easily or broadly avoid accountability for engaging in practices otherwise meeting the definition of information blocking in § 171.103 with respect to various pieces of their product suite(s) rather than E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations composing products in response to customers’ needs and preferences. We do not believe this outcome would be in the best interest of patients, health care providers, or other customers of health IT developers of certified health IT. Thus, while acknowledging that our definition of ‘‘health IT developer of certified health IT’’ in specific may, like the information blocking provision in general, change some health IT developers’ assessments of whether participation in the voluntary ONC Health IT Certification Program is the right decision for their health IT products and customers, we believe the definition we have finalized offers necessary assurance to purchasers and users that a health IT developer that has chosen to participate in the Program can be held accountable under part 170 subpart D and under part 171 should that developer also engage in any conduct meeting the definition of information blocking in § 171.103. Duration of Health IT Developer of Certified Health IT Status We proposed that ‘‘health IT developer of certified health IT’’ would mean an individual or entity that develops or offers health information technology (as that term is defined in 42 U.S.C. 300jj(5)) and which had, at the time it engaged in a practice that is the subject of an information blocking claim, health information technology (one or more) certified under the ONC Health IT Certification Program. We proposed (84 FR 7511) that the term ‘‘information blocking claim’’ within this definition should be read broadly to encompass any statement of information blocking or potential information blocking. We also noted in the Proposed Rule that ‘‘claims’’ of information blocking within this definition would not be limited, in any way, to a specific form, format, or submission approach or process. We stated in the Proposed Rule that we were also considering additional approaches to help ensure developers and offerors of certified health IT remain subject to the information blocking provision for an appropriate period of time after leaving the Program. While encouraging commenters to identify alternative approaches for identifying when a developer or offeror should, and when they should no longer, be subject to the information blocking provision, we requested comment on whether one of two specific approaches would best achieve our policy goal of ensuring that health IT developers of certified health IT will face consequences under the information blocking provision if they VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 engage in information blocking in connection with EHI that was stored or controlled by the developer or offeror while they were participating in the Program. One such approach would have defined ‘‘health IT developer of certified health IT’’ as including developers and offerors of certified health IT that continue to store EHI that was previously stored in health IT certified in the Program. The other would have continued to define a developer or offeror of health IT as a ‘‘health IT developer of certified health IT’’ for purposes of part 171 for an appropriate period of time, such as one year, after the developer or offeror left the Program (no longer had any Health IT Modules certified under part 170). Comments. We received several comments in support of defining ‘‘health IT developer of certified health IT’’ in a way that would include developers and offerors who have left the Program so long as they continue to store or control EHI that had been stored in or by their health IT products while the products were, or included one or more, Health IT Module(s) certified in the Program. We also received several comments recommending developers of certified health IT remain subject to the information blocking provision for a period of time after leaving the Program. A couple of commenters recommended a hybrid approach that would include individuals and entities in the definition of ‘‘health IT developer of certified health IT’’ while they continue to store EHI that had been stored in certified health IT or for a reasonable period of time after they ceased participating in the Program, whichever is longer. One reason commenters stated in support of extending the definition of ‘‘health IT developer of certified health IT’’ beyond the time a developer ceased participating in the program was that in commenters’ view this could help former customers access the EHI that the customers need to provide the best care for patients and that they had contracted with a developer to manage while the developer had certified health IT. Some commenters stated that the need for customers to ensure their contracts with Program-participating developers include provisions for retrieval of the EHI upon termination or conclusion of the contract would be eliminated if the period of time during which the ‘‘health IT developer of certified health IT’’ definition applied extended beyond the date a developer leaves the Program. Other comments recommended against developers remaining subject to the information blocking provision after PO 00000 Frm 00157 Fmt 4701 Sfmt 4700 25797 leaving the Program, citing concerns such as burden. Response. We thank commenters for their feedback. We have finalized in § 171.102 that a ‘‘health IT developer of certified health IT’’ for purposes of part 171 means an individual or entity, other than a health care provider that selfdevelops health IT for its own use, that develops or offers health information technology (as that term is defined in 42 U.S.C. 300jj(5)) and which has, at the time it engages in a practice that is the subject of an information blocking claim, one or more Health IT Modules certified under a program for the voluntary certification of health information technology that is kept or recognized by the National Coordinator pursuant to 42 U.S.C. 300jj–11(c)(5) (ONC Health IT Certification Program). This definition will ensure conduct a developer or offeror engages in while it has any health IT product certified under the Program will be within the definition of ‘‘health IT developer of certified health IT’’ for purposes of part 171. We have not extended the definition of ‘‘health IT developer of certified health IT’’ beyond the date on which a developer or offeror no longer has any health IT certified under the Program. It may be that extending duration of ‘‘health IT developer of certified health IT’’ status beyond the date on which a developer or offeror stops participating in the Program could help motivate such a developer or offeror to better support transfers of EHI in their custody if their customers choose to switch products because of the developer’s withdrawal from the Program. However, we believe that ensuring continuity of access to patients’ EHI is an essential consideration in the process of selecting and contracting for health IT. All transitions between different health IT products will require transfer of EHI between those products. Planning for this transfer is, as a practical matter, integral to a successful transition between products that ensures continuity of access to EHI essential to safe, well-coordinated patient care. We are not persuaded that any of the alternative approaches to duration of ‘‘health IT developers of certified health IT’’ status could eliminate the need for health care providers and other customers of ‘‘health IT developers of certified health IT’’ to ensure their health IT planning and contracting provides for appropriate transfer(s) of data at the conclusion or termination of any particular contract. We also note that in the market for certified Health IT Modules today, many of the customers of health IT developers E:\FR\FM\01MYR3.SGM 01MYR3 25798 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations or offerors are HIPAA-covered entities (such as health care providers) or HIPAA business associates (BAs) (such as health information exchanges or clinical data registries) with whom covered entities contract for particular services. In such cases, the HIPAA Rules generally require that a HIPAA covered entity (or BA) enter into a business associate agreement (BAA) that requires that the BA (or subcontractor BA) return or destroy the PHI after the termination of its service as a BA (or subcontractor BA). Because a contract for health IT products or services, and any associated BAA, could extend beyond a developer or offeror’s departure from the ONC Health IT Certification Program, we believe such contracts and agreements provide an appropriate mechanism for customers to guard against a health IT developer or offeror who has left the Program refusing to relinquish EHI. We note further that limiting the definition of ‘‘health IT developer of certified health IT’’ to the time period during which the individual or entity has at least one Health IT Module certified under the Program would not require claims of information blocking to come to our attention during that same period. We have finalized the definition as proposed, with modification to its wording that is discussed below. Comments. A commenter suggested that the definition of ‘‘information blocking claim’’ should not include any ‘‘potential information blocking,’’ but instead should be evaluated with facts and evidence necessary to support a verifiable claim. Response. We did not propose to define in regulation ‘‘information blocking claim.’’ We did note in the preamble to the Proposed Rule that for purposes of the definition of ‘‘health IT developer of certified health IT’’ proposed in § 171.102, claims of information blocking would not be limited, in any way, to a specific form, format, or submission process (84 FR 7511). In the definition of ‘‘health IT developer of certified health IT’’ finalized in § 171.102, we have retained reference to the time at which the individual or entity that develops or offers certified health IT engages in a practice that is the subject of an information blocking claim so that it is immediately clear on the face of the regulation text that the claim need not be brought while the developer still has certified health IT. If a health IT developer of certified health IT engages in a practice that is within the definition of information blocking in § 171.103 while they remain in the Program, that health IT developer cannot avoid applicability of the information blocking VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 provision to those practices by simply leaving the Program before any claim(s) about the practice may come to light. Our reference to claims of information blocking in the finalized definition of ‘‘health IT developer of certified health IT’’ is not intended to imply that any actor whose conduct is the subject of a claim of information blocking that is received by HHS necessarily will be found to have engaged in conduct meeting the definition of information blocking in § 171.103 or that is otherwise contrary to requirements of the ONC Health IT Certification Program (such as the Condition and Maintenance of Certification requirements established in subpart D of part 170).123 If subject to an investigation, each practice that implicates the information blocking provision and does not meet an exception would be analyzed on a caseby-case basis to evaluate, for example, whether it rises to the level of an interference, and whether the actor acted with the requisite intent. Developers and Offerors of Certified Health IT We stated in the proposed rule that within the definition of ‘‘health IT developer of certified health IT’’ for purposes of part 171, we interpret an ‘‘individual or entity that develops the certified health IT’’ as the individual or entity that is legally responsible for the certification status of the health IT, which would be the individual or entity that entered into a binding agreement that resulted in the certification status of the health IT under the Program or, if such rights are transferred, the individual or entity that holds the rights to the certified health IT (84 FR 7511). We also stated that an ‘‘individual or entity that offers certified health IT’’ would include an individual or entity that under any arrangement makes certified health IT available for purchase or license. We requested comment on both of these interpretations, and whether there are particular types of arrangements under which certified health IT is ‘‘offered’’ in which the offeror should not be considered a ‘‘health IT developer of certified health IT’’ for the purposes of the information blocking provision. Comments. Several comments questioned the inclusion of offerors of certified health IT who do not 123 Section 3022(b) of the PHSA authorizes the HHS Office of the Inspector General to investigate claims of information blocking. Simultaneously, ONC has responsibility for assessing developers’ compliance with requirements of the ONC Health IT Certification Program. Coordination between ONC and OIG in our respective roles is discussed in section VII.D.3 of this preamble. PO 00000 Frm 00158 Fmt 4701 Sfmt 4700 themselves develop the health IT in the definition of ‘‘health IT developer of certified health IT.’’ Some commenters recommended the exclusion of offerors who do not modify or configure the health IT in question. Some commenters advocated treating entities that include other developers’ certified health IT in the health IT products or services they offer, but do not themselves develop certified health IT, as being outside the definition of ‘‘health IT developer of certified health IT.’’ Commenters stated that these offerors do not themselves develop the certified health IT and thus do not control its design. Commenters also stated that the products offered by some of these offerors (such as clinical data registries which may be certified to clinical quality measurement and measure reporting criteria) are not primary sources of patients’ EHI, and that offerors of health IT that is not a primary source of EHI should be excluded from the definition of health IT developer of certified health IT. One commenter specifically recommended excluding from the definition individuals and entities that offer under their own brand, but do not modify or configure, certified health IT developed by others. These commenters suggested that this is desirable in order to hold developers accountable for information blocking conduct in the course of development. Response. Including both developers and other offerors in the definition of ‘‘health IT developer of certified health IT’’ is consistent with the policy goal of holding all entities who could, as a developer or offeror, engage in information blocking accountable for their practices that are within the definition of information blocking in § 171.103. PHSA section 3022(b)(1)(A) expressly references both ‘‘a health information technology developer of certified health information technology’’ and ‘‘other entity offering certified health information technology’’ in the context of authority to investigate claims of information blocking. As stated in the Proposed Rule (84 FR 7510), we interpret PHSA section 3022(a)(1)(B) in light of the specific authority provided to OIG in PHSA section 3022(b)(1)(A) and (b)(2). We interpret these sections together as the basis for applicability of the information blocking provision to individuals or entities that develop or offer certified health IT. We refer commenters concerned about holding offerors that do not develop, modify, or configure health IT accountable for the conduct of others to PHSA section 3022(a)(6), which states that the term ‘‘information blocking,’’ with respect to E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations an individual or entity, shall not include an act or practice other than an act or practice committed by such individual or entity. Where the individual or entity that develops health IT is different from the individual or entity that offers certified health IT, each such individual or entity would have the potential to engage in various practices within the definition of information blocking in PHSA section 3022(a) and 45 CFR 171.103, and we believe each should be accountable for their own conduct. Actors who are not primary generators of EHI or who may hold only a few data classes or elements for any given patient (as would be the case for examples specifically cited by commenters), could nevertheless engage in conduct that constitutes information blocking as defined in § 171.103 with respect to that EHI they do hold or control. We therefore see no reason to exclude them from the definition of health IT developer of certified health IT. To do so would not be consistent with the policy goal of addressing the problem of information blocking. Comments. Several commenters recommended that public health agencies that develop and/or offer health IT products and services, such as those related to syndromic surveillance and immunization registries, be excluded from the definition of health IT developer in § 171.102. Response. We believe the vast majority of public health agencies would remain outside of our definition of ‘‘health IT developer of certified health IT’’ finalized in § 171.102. The ‘‘public health’’ certification criteria within the ONC Health IT Certification Program are applicable to the health IT that health care providers would use to exchange information with public health information infrastructure. These criteria are not applicable to the public health information reporting or exchange infrastructure itself. Treatment of ‘‘Self-Developers’’ of Certified Health IT We stated in the proposed rule (84 FR 7511) that a ‘‘self-developer’’ of certified health IT, as the term has been used in the ONC Health IT Certification Program (Program) and described in section VII.D.7 of the Proposed Rule (84 FR 7507), section VII.D.7 of this preamble, and previous rulemaking,124 would be treated as a health care provider for the purposes of information blocking because our description of a self124 The final rule establishing ONC’s Permanent Certification Program, ‘‘Establishment of the Permanent Certification for Health Information’’ (76 FR 1261), addresses self-developers. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 developer for Program purposes 125 would mean that they would not be supplying or offering their certified health IT to other entities (84 FR 7511 and 7512). We stated in the Proposed Rule that self-developers would still be subject to the proposed Conditions and Maintenance of Certification requirements because they have health IT certified under the Program (see also section VII.D.7 of the Proposed Rule (84 FR 7507) and section VII.D.7 of this preamble). We requested comments on our treatment of ‘‘self-developers’’ for information blocking purposes and whether there are other factors we should consider. Comments. A number of comments expressed support of treating ‘‘selfdeveloper’’ health care providers who do not supply or offer their certified health IT to other entities as health care providers for purposes of information blocking. Response. We appreciate commenters’ input. The definition of ‘‘health IT developer of certified health IT’’ that we have finalized in § 171.102 expressly excludes health care providers who selfdevelop health IT for their own use. However, we remind health care providers who may be considering or are embarking on self-development of certified Health IT Modules that ‘‘selfdevelopers’’ are subject to certain Condition and Maintenance of Certification requirements finalized in subpart D of part 170. These requirements include, though they are not limited to, providing assurances and attestations that they will not, have not, and do not engage in conduct constituting information blocking. For purposes of the definition of ‘‘health IT developer of certified health IT,’’ we interpret ‘‘a health care provider that self-develops health IT for its own use’’ to mean that the health care provider is responsible for the certification status of the Health IT Module(s) and is the primary user of the Health IT Module(s). Moreover, we interpret ‘‘a health care provider that self-develops health IT for its own use’’ to mean that the health care provider does not offer the health IT to other entities on a commercial basis or otherwise. This interpretation rests on our established concept of ‘‘selfdeveloped’’ certified Health IT Modules. In this context, it is important to note that some use of a self-developer’s 125 The language in the final rule establishing ONC’s Permanent Certification Program describes the concept of ‘‘self-developed’’ as referring to a complete EHR or EHR Module designed, created, or modified by an entity that assumed the total costs for testing and certification and that will be the primary user of the health IT (76 FR 1300). PO 00000 Frm 00159 Fmt 4701 Sfmt 4700 25799 health IT may be made accessible to individuals or entities other than the self-developer and its employees without that availability being interpreted as offering or supplying the health IT to other entities in a manner inconsistent with the concept of ‘‘selfdeveloper.’’ For example, if a hospital were to self-develop an EHR system, we would not consider inclusion in that system of certain functionalities or features—such as APIs or patient portals—to be offering or supplying the hospital’s self-developed health IT to other entities. We would also not interpret as offering or supplying the self-developed health IT to other entities the issuance of login credentials allowing licensed health care professionals who are in independent practice to use the hospital’s EHR to furnish and document care to patients in the hospital. Keeping in the hospital’s EHR a comprehensive record of a patient’s care during an admission is a practice we view as reasonable and it typically requires that all the professionals who furnish care to patients in the hospital be able to use the hospital’s EHR system. It is also customary practice amongst hospitals that purchase commercially marketed health IT, as well as those that selfdevelop their health IT, to enable health care professionals in independent practice who furnish care in the hospital to use the EHR in connection to furnishing and documenting that care. Clinician portals made available to facilitate independent licensed health care professionals furnishing and/or documenting care to patients in the hospital would also not be interpreted as negating the hospital’s ‘‘selfdeveloper’’ status. However, if a health care provider responsible for the certification status of any Health IT Module(s) were to offer or supply those Health IT Module(s), separately or integrated into a larger product or software suite, to other entities for those entities’ use in their own independent operations, that would be inconsistent with the concept of the health care provider self-developing health IT for its own use. In deciding to exclude health care providers who self-develop health IT for their own use from the definition of ‘‘health IT developer of certified health IT’’ finalized in § 171.102, we rely substantially on our Program experience that self-developed certified health IT currently represents a small, and diminishing, share of the Health IT Modules certified under our Program. We also note that we may consider amending this definition in future E:\FR\FM\01MYR3.SGM 01MYR3 25800 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations rulemaking in response to changing market conditions. For example, the market might evolve in ways that would increase risk of abuse of this exclusion of health care providers who selfdevelop certified health IT from the application of the § 171.103 definition of ‘‘information blocking’’ to their conduct as a developer of health IT. In such circumstances, we might contemplate appropriate revisions to the definition of ‘‘health IT developer of certified health IT’’ for purposes of part 171. Summary of Finalized Policy: Definition of Health IT Developer of Certified Health IT In § 171.102, we have finalized that ‘‘health IT developer of certified health IT’’ means an individual or entity, other than a health care provider that selfdevelops health IT for its own use, that develops or offers health information technology (as that term is defined in 42 U.S.C. 300jj(5)) and which has, at the time it engages in a practice that is the subject of an information blocking claim, one or more Health IT Modules certified under a program for the voluntary certification of health information technology that is kept or recognized by the National Coordinator pursuant to 42 U.S.C. 300jj–11(c)(5) (ONC Health IT Certification Program). This is substantially the definition we proposed (84 FR 7601), but with minor modifications to its text. We have added to this finalized definition ‘‘other than a health care provider that self-develops health IT for its own use,’’ so that this feature of the proposed definition which we stated in the Proposed Rule’s preamble (84 FR 7511) is immediately clear on the face of the regulation text itself. We also replaced the proposed phrasing ‘‘health information technology (one or more) certified’’ (84 FR 7601) with ‘‘one or more Health IT Modules certified’’ because it is more consistent with our Program terminology. We also replaced ‘‘under the ONC Health IT Certification Program’’ from the proposed phrasing with the finalized ‘‘under a program for the voluntary certification of health information technology that is kept or recognized by the National Coordinator pursuant to 42 U.S.C. 300jj–11(c)(5) (ONC Health IT Certification Program).’’ Currently, we keep a single Program that we refer to as the ONC Health IT Certification Program. For purposes of precision, we decided to refer to the statutory basis for the Program, and indicate parenthetically the manner in which we currently reference it. We interpret ‘‘individual or entity that develops’’ certified health IT as the VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 individual or entity that is legally responsible for the certification status of the health IT, which would be the individual or entity that entered into a binding agreement that resulted in the certification status of the health IT under the Program or, if such rights are transferred, the individual or entity that holds the rights to the certified health IT. As we clarified in the final rule ‘‘ONC Health IT Certification Program: Enhanced Oversight and Accountability’’ (81 FR 72404), the consequences under 45 CFR part 170 for a developer’s having had one or more of its products’ certification terminated apply to developers, their subsidiaries, and their successors (81 FR 72443). For purposes of part 171 and the information blocking provision, we interpret an entity that has health IT to include not only the entity that entered into a binding agreement that resulted in the certification status of the health IT under the Program, but also its subsidiaries, and its successors. The facts and circumstances of a particular case may determine which individual(s) or entity (or entities) are culpable and whether enforcement against particular individual(s), the developer entity, a successor in rights to the health IT, the developer or successor’s subsidiary, or a parent entity will be pursued. Similarly, use of the word ‘‘individual’’ in this context does not limit responsibility for practices of an entity that develops or offers health IT to the particular natural person(s) who may have signed binding agreement(s) that resulted in the certification status of the health IT under the Program. Depending on the nature of the organization, the person who signs the binding agreement that results in the certification status may be different from the person who determines the fees, the person who implements the health IT, and the person who sets the overall business strategy for the company. The facts and circumstances of each case may determine who the culpable individual or individual(s) are and whether enforcement against the entity or against specific individual(s) will be pursued. As stated in the Proposed Rule, for purposes of this definition, a developer or offeror of a single certified health IT product that has had its certification suspended will still be considered to have certified health IT (84 FR 7511). c. Health Information Networks and Health Information Exchanges The terms ‘‘network’’ and ‘‘exchange’’ are not defined in the information blocking provision or in any other relevant statutory provisions. We proposed to define these terms in a way PO 00000 Frm 00160 Fmt 4701 Sfmt 4700 that does not assume the application or use of certain technologies and is flexible enough to apply to the full range and diversity of exchanges and networks that exist today and that may arise in the future. We stated that in considering the most appropriate way to define these terms, we examined how they are used throughout the Cures Act and the HITECH Act. Additionally, we considered dictionary and industry definitions of ‘‘network’’ and ‘‘exchange.’’ While the terms have varied usage and meaning in different industry contexts, we noted that certain concepts are common and were incorporated into the proposed definitions. Health Information Network We proposed a functional definition of ‘‘health information network’’ (HIN) that focused on the role of these actors in the health information ecosystem. We stated that the defining attribute of a HIN is that it enables, facilitates, or controls the movement of information between or among different individuals or entities that are unaffiliated. Therefore, we proposed that two parties are affiliated if one has the power to control the other, or if both parties are under the common control or ownership of a common owner. We noted that a significant implication of the definition is that a health care provider or other entity that enables, facilitates, or controls the movement of EHI within its own organization, or between or among its affiliated entities, is not a HIN in connection with that movement of information for the purposes of the HIN definition. We proposed that an actor could be considered a HIN if it performs any one or any combination of the following activities. First, the actor would be a HIN if it were to determine, oversee, administer, control, or substantially influence policies or agreements that define the business, operational, technical, or other conditions or requirements that enable or facilitate the access, exchange, or use of EHI between or among two or more unaffiliated individuals or entities. Second, an actor would be a HIN if it were to provide, manage, control, or substantially influence any technology or service that enables or facilitates the access, exchange, or use of EHI between or among two or more unaffiliated individuals or entities. We noted that, typically, a HIN will influence the sharing of EHI between many unaffiliated individuals or entities. However, we did not propose to establish any minimum number of E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations parties or ‘‘nodes’’ beyond the requirement that there be some actual or contemplated access, exchange, or use of information between or among at least two unaffiliated individuals or entities that is enabled, facilitated, or controlled by the HIN. We stated that any further limitation would be artificial and would not capture the full range of entities that should be considered networks under the information blocking provision. We clarified that any individual or entity that enables, facilitates, or controls the access, exchange, or use of EHI between or among only itself and another unaffiliated individual or entity would not be considered a HIN in connection with the movement of that EHI (although that movement of EHI may still be regulated under the information blocking provision on the basis that the individual or entity is a health care provider or health IT developer of certified health IT). To be a HIN, we emphasized that the individual or entity would need to be enabling, facilitating, or controlling the access, exchange, or use of EHI between or among two or more other individuals or entities that were not affiliated with it. We provided multiple examples to illustrate how the proposed definition would operate. An entity is established within a state for the purpose of improving the movement of EHI between the health care providers operating in that state. The entity identifies standards relating to security and offers terms and conditions to be entered into by health care providers wishing to participate in the network. The entity offering (and then overseeing and administering) the terms and conditions for participation in the network would be considered a HIN for the purpose of the information blocking provision. We noted that there is no need for a separate entity to be created in order for that entity to be considered a HIN. To illustrate, we stated that a health system that ‘‘administers’’ business and operational agreements for facilitating the exchange of EHI that are adhered to by unaffiliated family practices and specialist clinicians in order to streamline referrals between those practices and specialists would likely be considered a HIN. We noted that the proposed definition would also encompass an individual or entity that does not directly enable, facilitate, or control the movement of information, but nonetheless exercises control or substantial influence over the policies, technology, or services of a network. In particular, we stated that there may be an individual or entity that relies on another entity—such as an VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 entity specifically created for the purpose of managing a network—for policies and technology, but nevertheless dictates the movement of EHI over that network. As an example, a large health care provider could decide to lead an effort to establish a network that facilitates the movement of EHI between a group of smaller health care providers (as well as the large health care provider) and through the technology of health IT developers. To achieve this outcome, the large health care provider, together with some of the participants, could create a new entity that administers the network’s policies and technology. In this scenario, we noted that the large health care provider would come within the functional definition of a HIN and could be held accountable for the conduct of the network if the large health care provider used its control or substantial influence over the new entity—either in a legal sense, such as via its control over the governance or management of the entity, or in a less formal sense, such as if the large health care provider prescribed a policy to be adopted—to interfere with the access, exchange, or use of EHI. We clarified that the large health care provider in this example would be treated as a health care provider when utilizing the network to move EHI via the network’s policies, technology, or services, but would be considered a HIN in connection with the practices of the network over which the large health care provider exercises control or substantial influence. We sought comment on the proposed definition of a HIN. In particular, we requested comment on whether the proposed definition was broad enough (or too broad) to cover the full range of individuals and entities that could be considered HINs within the meaning of the information blocking provision. Additionally, we specifically requested comment on whether the proposed definition would effectuate our policy goal of defining this term in a way that does not assume particular technologies or arrangements and was flexible enough to accommodate changes in these and other conditions. We note that we summarize and respond to the comments received on the HIN definition below with the comments received on the health information exchange definition (HIE) due to the overlap in the comments received and our responses. Health Information Exchange We proposed to define a ‘‘health information exchange’’ (HIE) as an individual or entity that enables access, PO 00000 Frm 00161 Fmt 4701 Sfmt 4700 25801 exchange, or use of EHI primarily between or among a particular class of individuals or entities or for a limited set of purposes. We noted that our research and experience in working with exchanges drove the proposed definition of this term. We stated that HIEs would include, but were not limited to, regional health information organizations (RHIOs), State health information exchanges (State HIEs), and other types of organizations, entities, or arrangements that enable EHI to be accessed, exchanged, or used between or among particular types of parties or for particular purposes. As an example, we noted an HIE might facilitate or enable the access, exchange, or use of EHI exclusively within a regional area (such as a RHIO), or for a limited scope of participants and purposes (such as a clinical data registry or an exchange established by a hospital-physician organization to facilitate Admission, Discharge, and Transfer (ADT) alerting). We further noted that HIEs may be established under Federal or State laws or regulations but may also be established for specific health care or business purposes or use cases. We also mentioned that if an HIE facilitates the access, exchange, or use of EHI for more than a narrowly defined set of purposes, then it may be both an HIE and a HIN. We sought comment on the proposed HIE definition and encouraged commenters to consider whether the proposed definition was broad enough (or too broad) to cover the full range of individuals and entities that could be considered exchanges within the meaning of the information blocking provision, and whether the proposed definition was sufficiently flexible to accommodate changing technological and other conditions. Comments on the HIN and HIE Definitions As mentioned above, we received substantially similar comments on both proposed definitions. Based on those comments and our approach to the final definition for these terms, we have combined our comment summary and response for the proposed definitions. Comments. Many commenters suggested that the definitions of HIN and HIE should be combined because confusion could arise in trying to distinguish between the two terms. Commenters asserted that these definitions are used to describe entities that perform the same or similar functions. Some commenters expressed support for the broad functional definitions of HIE and HIN, while others expressed concern that many organizations could be unintentionally E:\FR\FM\01MYR3.SGM 01MYR3 25802 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations covered by the proposed definitions due to the broad scope of the definitions as proposed. Many commenters suggested excluding certain individuals and entities from the HIE and/or HIN definitions, while other commenters noted such an approach could significantly limit the application of the information blocking provision. Proposed exclusions offered by commenters included, but were not limited to: Health plans, payers, health care providers, business associates, accountable care organizations, health care clearinghouses, public health agencies, research organizations, clinical data registries, certified health information technology providers, software developers, mobile app providers, cloud storage vendors, internet service providers, and patient or consumer focused social media. Some commenters suggested limiting the types of activities and/or the purposes for those activities that might be necessary to be considered a HIN or HIE. Commenters also raised concerns with particular language in the proposed HIN definition, noting that the term ‘‘substantially influences’’ was vague and that we should remove ‘‘individual’’ from the definitions as commenters could not foresee an individual acting as a HIN or HIE. Response. The definitions of HIN and HIE in the Proposed Rule achieved a key goal which was to solicit feedback from a wide array of stakeholders that might be considered HINs or HIEs under the proposed definition, including on whether the definitions were too broad or not broad enough. We have adopted a modified definition in this final rule to address much of the feedback without expressly excluding any specific type of entity, which we believe would be unwieldy to appropriately administer and, more importantly, in conflict with our overarching approach to include any individual or entity that performs certain functional activities as outlined in the Proposed Rule. Foremost, in this final rule, we are combining the definitions of HIN and HIE to create one functional definition that applies to both statutory terms in order to clarify the types of individuals and entities that would be covered. This approach is consistent with statements we made in the Proposed Rule noting that a HIE could also be an HIN. In addition, section 3022 of the PHSA often groups these two terms together, and as we noted previously, does not define them. This approach will also eliminate stakeholder confusion as expressed by commenters and respond VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 to commenters who asserted the terms refer to entities performing the same function. To this point, we have found numerous associations and publications referring to entities that perform the same or similar functions that we have specified in the HIN/HIE definition as HINs, HIEs, and regional health information organizations (RHIOs).126 We have finalized under § 171.102 that a health information network or health information exchange means an individual or entity that determines, controls, or has the discretion to administer any requirement, policy, or agreement that permits, enables, or requires the use of any technology or services for access, exchange, or use of EHI: (1) Among more than two unaffiliated individuals or entities (other than the individual or entity to which this definition might apply) that are enabled to exchange with each other; and (2) that is for a treatment, payment, or health care operations purpose, as such terms are defined in 45 CFR 164.501 regardless of whether such individuals or entities are subject to the requirements of 45 CFR parts 160 and 164. In consideration of comments, we also narrowed the definition in three ways. First, the types of actions (e.g., manages or facilitates) that would be necessary for an actor to meet the definition of HIN or HIE were reduced. This includes removing the ‘‘substantially influences’’ element of the proposed definition of HIN to address concerns about possible ambiguity. Second, we have revised the definition to specify that to be a HIN or HIE there must be exchange among more than two unaffiliated individuals or entities besides the HIN/HIE that are enabled to exchange with each other. This revision ensures that the definition does not unintentionally cover what are essentially bilateral exchanges in which 126 See HIMSS FAQ, Health Information Exchange: A catch-all phrase for all health information exchange, including Regional Health Information Organizations (RHIOs), Quality Information Organizations (QIOs), Agency for Healthcare Research and Quality (AHRQ)-funded communities and private exchanges, https:// protect2.fireeye.com/url?k=7d5b6f82-210e66527d5b5ebd-0cc47a6a52defe4abdcde0e54deb&u=https://www.himss.org/ library/health-information-exchange/FAQ; AHIMA, ‘‘An HIE is the electronic movement of healthrelated information among organizations according to nationally recognized standards. HIE is also sometimes referred to as a health information network (HIN)’’, https://bok.ahima.org/ PdfView?oid=104129; SHIEC Member List, SHIEC is the trade association of HIEs, called the Strategic Health Information Exchange collaborative, which has 17 members with ‘‘network’’ in their name, https://protect2.fireeye.com/url?k=f84ddacda418d31d-f84debf2-0cc47a6a52de8424832df6e921dc&u=https://strategichie.com/ membership/member-list/. PO 00000 Frm 00162 Fmt 4701 Sfmt 4700 the intermediary is simply performing a service on behalf of one entity in providing EHI to another or multiple entities and no actual exchange is taking place among all entities (e.g., acting as an intermediary between two entities where the first sends non-standardized data to be converted by the intermediary into standardized data for the receiving entity). To be clear, to be enabled, the parties must have the ability and discretion to exchange with each other under the policies, agreements, technology, and/or services. Third, we focused the definition on three activities: Treatment, payment, and health care operations, as each are defined in the HIPAA Rules (45 CFR 164.501). The activities described by the terms treatment, payment and health care operations were selected for multiple reasons. Many, but not all, individuals and entities that would meet the definition of HIN/HIE for information blocking purposes will be familiar with these terms because they currently function as a covered entity or business associate under the HIPAA Rules. Last, this approach serves to ensure that certain unintended individuals and entities are not covered by the definition, which we discuss in more detail below. Two important points about the definition require clarification. First, the reference to the three types of activities does not limit the application of the HIN/HIE definition to individuals or entities that are covered entities or business associates (as defined in HIPAA). For example, if three unaffiliated entities exchanging information were health care providers that were not HIPAA covered entities, their exchange of information for treatment purposes through a HIN or HIE would qualify for this element of the definition even though the HIN/HIE would not be a business associate to any of the providers. We expect such situations to be rare, but they may occur. Second, the three activities serve as elements of the definition such that if an individual or entity meets them, then the individual or entity would be considered a HIN/HIE under the information blocking regulations for any practice they conducted while functioning as a HIN/HIE. To illustrate, if a HIN/HIE was exchanging EHI on behalf of a health care provider for treatment purposes, but denied an individual access to their EHI available in the HIN/HIE, then the HIN/HIE would be considered a HIN/HIE under the circumstances for the purposes of information blocking. Having said this, the HIN/HIE may not have ‘‘interfered E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations with’’ the individual’s access to their EHI depending on the terms of the HIN/ HIE’s business associate agreements with the participating covered entities or for other reasons such as the EHI could not be disclosed by law or the HIN/HIE met an exception under the information blocking provision. To be clear, the HIN/HIE definition is only applicable to the circumstances of an information blocking claim. For example, a health care provider that may have ownership of a HIN/HIE, would not be considered a HIN/HIE, but instead a ‘‘health care provider’’ with respect to situations that involve their behavior as a health care provider, such as denying another health care provider’s ability to access, exchange, or use EHI for treatment purposes or denying an individual’s access to their EHI via the health care provider’s patient portal. With respect to suggestions to exclude specific types of entities, we believe that the Cures Act goals of supporting greater interoperability, access, exchange, and use of EHI are best advanced by a functional definition without specific exclusions. We note, however, that the narrower definition of HIN/HIE in this final rule should clearly exclude entities that might have been included under the proposed definitions, such as social networks, internet service providers, and technology that solely facilitates the exchange of information among patients and family members. The definition in this final rule continues to focus on the functional activity of the individual or entity in question and not on any title or classification of the person or entity. The reference to ‘‘individual’’ was maintained in the final rule because the Cures Act states that penalties apply to any individual or entity that is a developer, network, or exchange (see section 3022(b)(2)(A) of the PHSA). 3. Electronic Health Information In the Proposed Rule, we noted that the information blocking definition applies to electronic health information (EHI) (section 3022(a)(1) of the PHSA). We further noted that while section 3000(4) of the PHSA by reference to section 1171(4) of the Social Security Act defines ‘‘health information,’’ EHI is not specifically defined in the Cures Act, PHSA, HITECH Act, or other relevant statutes. Therefore, we proposed to include the definition of EHI in § 171.102 and define it to mean (84 FR 7513): (i) Electronic protected health information; and (ii) any other information that— VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 • is transmitted by or maintained in electronic media, as defined in 45 CFR 160.103; • identifies the individual, or with respect to which there is a reasonable basis to believe the information can be used to identify the individual; and • relates to the past, present, or future health or condition of an individual; the provision of health care to an individual; or the past, present, or future payment for the provision of health care to an individual (84 FR 7513). We explained in the Proposed Rule that this definition of EHI includes, but is not limited to: Electronic protected health information and health information that is created or received by a health care provider and those operating on their behalf; health plan; health care clearinghouse; public health authority; employer; life insurer; school; or university. In addition, we clarified that under our proposed definition, EHI includes, but is not limited to, electronic protected health information (ePHI) as defined in 45 CFR 160.103. We noted that EHI may also be provided, directly from an individual, or from technology that the individual has elected to use, to an actor covered by the information blocking provisions. We also proposed that EHI does not include health information that is de-identified consistent with the requirements of 45 CFR 164.514(b) (84 FR 7513). We clarified that the EHI definition provides for an expansive set of health information, which could include information on an individual’s health insurance eligibility and benefits, billing for health care services, and payment information for services to be provided or already provided, which may include price information (84 FR 7513). We generally requested comment on this proposed definition as well as on whether the exclusion of health information that is de-identified consistent with the requirements of 45 CFR 164.514(b). We also sought comment on the parameters and implications of including price information within the scope of EHI for purposes of information blocking (84 FR 7513). Comments. Some commenters were strongly supportive of the proposed EHI definition, stating that it covers the breadth of EHI that should be addressed within the regulation. Conversely, many other commenters, including health care providers and health IT developers, contended that the definition was overly broad and vague. They expressed concern about their ability to know what health information they must make available for access, exchange, and PO 00000 Frm 00163 Fmt 4701 Sfmt 4700 25803 use for the purposes of complying with the information blocking provision. Some other commenters posited that they could be put in a situation of having to separate EHI from PHI for compliance purposes, noting this would be extremely burdensome. Many commenters stated simply trying to determine what constitutes EHI for compliance purposes would be extremely burdensome and costly. Commenters offered various options for narrowing the scope of the EHI definition. Many commenters suggested that EHI should only be electronic protected health information (ePHI) as defined under the HIPAA Rules. Some of these commenters specifically recommended that the EHI definition be limited to align with the definition of a designated record set under HIPAA. A few commenters stated that EHI should be limited to observational health information as described in the Proposed Rule (84 FR 7516). Commenters also recommended that the EHI definition be limited to only standardized health information, with some commenters recommending that EHI be specifically limited to information that meets the USCDI standard. Response. We appreciate the comments and agree that actors should not have to separate ePHI from EHI in order to comply with both the HIPAA Rules and the information blocking provision. It is also important for actors to clearly understand what health information should be available for access, exchange, and use. To address these concerns, we have focused the EHI definition at this time on terms that are used in the HIPAA Rules and that are widely understood in the health care industry as well as on a set of health information that is currently collected, maintained, and made available for access, exchange, and use by actors. By doing so, we believe we have eliminated any perceived burden and actors will be in a situation that will permit them to readily and continually comply with the information blocking provision. While we understand that some commenters supported the EHI definition as proposed or included alternative definitions in their comments, we believe that, for the above reasons, the EHI definition we have codified in regulation through this final rule will enable effective implementation. We have defined EHI (§ 171.102) to mean electronic protected health information (ePHI) as the term is defined for HIPAA in 45 CFR 160.103 to the extent that the ePHI would be included in a designated record set as defined in 45 CFR 164.501 (other than E:\FR\FM\01MYR3.SGM 01MYR3 25804 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations psychotherapy notes as defined in 45 CFR 164.501 or information compiled in reasonable anticipation of, or for use in, a civil, criminal, or administrative action or proceeding), regardless of whether the group of records are used or maintained by or for a covered entity as defined in 45 CFR 160.103. The ePHI definition in 45 CFR 160.103 incorporates the definitions in that section for protected health information and electronic media. Although the definition of designated record set refers to records maintained by or for a covered entity, the EHI definition has been finalized to apply to groups of records (as they are included in the designated record set) regardless of whether they are maintained by or for a covered entity (e.g., a developer of certified health IT, a health information network, a health information exchange, or even a health care provider that may not be a covered entity or may not be acting as a business associate of a covered entity). We did not focus the EHI definition finalized in this final rule on observational health information (OHI) as described in the Proposed Rule (84 FR 7516) for multiple reasons. We did not and cannot not at this time define OHI concretely. The use of OHI as a definition would also not align with our above stated goals to provide alignment with the HIPAA Rules and ease of implementation for actors. We also did not focus the EHI definition solely on the data identified in the USCDI standard. We are strong supporters of interoperability and standards-based access and exchange. To this point, the ONC Health IT Certification Program (Program) supports standards-based interoperability through the adoption of standards and the certification of health IT to those standards. In this respect, we have made the USCDI a baseline set of data that certified health IT must be able to make available for access and exchange (see section IV.B.1 of this preamble). However, this set of EHI is too limiting in terms of what actors are capable of making available in both the near and long term as is evident by compliance with HIPAA’s right of access regulatory provision in 45 CFR 164.524. To be further responsive to commenters expressing compliance concerns about the EHI definition, we have established a new ‘‘Content and Manner’’ exception in this final rule (§ 171.301) that will provide actors time to adjust to the new information blocking paradigm and make EHI available for access, exchange, and use. The new exception permits an actor to provide, at a minimum, a limited set of VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 EHI comprised of the data elements included in the USCDI for access, exchange, and use during the first 18 months after the compliance date of the information blocking provisions (24 months after publication of this final rule). The data elements represented in the USCDI represent an even more focused set of data than the finalized EHI definition (§ 171.102). We refer readers to section VIII.D.2.a of this final rule for further discussion of this new exception. Comments. Commenters argued both for and against the inclusion of price information in the EHI definition. Commenters that argued for the inclusion of price information stated that it was well within the meaning of the term health information found in the PHSA. Many of these commenters argued that the availability of this type of information would be helpful to patients in selecting and obtaining health care. Commenters also contended that the availability of price information would increase competition and reduce health care costs. Conversely, other commenters made various arguments for not including price information within the definition of EHI. Some of these commenters asserted that price information was not within the scope of health information as specified in section 3022 of the PHSA because Congress did not specifically include it. Commenters also asserted that price information is too vague and lacks standardization to be clearly understood and made available for access, exchange, and use. Other commenters contended that disclosing price information would violate trade secret laws and would harm competitive pricing by health plans. Response. The EHI definition codified through this final rule does not expressly include or exclude price information. However, to the extent that ePHI includes price information and is included in a designated record set, it would be considered EHI. This approach is intended to assure that the current scope of EHI for purposes of information blocking is aligned with the definitions of ePHI and designated record set under the HIPAA Rules, with limited exceptions. Comments. A few commenters specifically questioned whether algorithms or processes that create EHI, or the clinical interpretation or relevancy of the results of the algorithms or processes, would be considered EHI. Response. The EHI definition codified through this final rule does not expressly include or exclude algorithms or processes that create EHI, or the PO 00000 Frm 00164 Fmt 4701 Sfmt 4700 clinical interpretation or relevancy of the results of the algorithms or processes. However, any such information would be considered EHI if it was ePHI included in the designated record set (such as the inclusion of the clinical interpretation of an algorithm’s results in an individual’s clinical note). Like with price information, this approach is intended to ensure that the current scope of EHI for purposes of information blocking is aligned with the definitions of ePHI and designated record set under the HIPAA Rules, with limited exception. Comments. Many commenters supported the position that health information which is de-identified in accordance with HIPAA regulations should not be considered EHI. Response. We agree that health information that is de-identified consistent with the requirements of 45 CFR 164.514(b) should not be included in EHI. It is not, however, necessary to specifically exclude such de-identified information from the EHI definition because information that does not identify an individual, and with respect to which there is no reasonable basis to believe that the information can be used to identify an individual, is not individually identifiable information, so it would not be EHI (see 45 CFR 164.514(a)). To note, once PHI has been de-identified, it is no longer considered to be PHI. So, such information would not be considered EHI by definition (see 45 CFR 164.514 (b)). Comments. One commenter viewed the proposed EHI definition as overly restrictive by requiring EHI to be individually identifiable. Response. The EHI definition codified through this final rule retains the core requirement that the health information be individually identifiable in order to be consistent with HIPAA and general health care industry practice regarding use and disclosure of health information. 4. Price Information—Request for Information In the Proposed Rule, we requested comment on the technical, operational, legal, cultural, environmental, and other challenges to creating price transparency within health care, and posed multiple specific questions for commenters to consider (84 FR 7513 and 7514). We received over 1,000 comments regarding price information and price transparency in response to our request, which included recommendations from the HITAC. We thanks commenters for their comments and have shared this E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations feedback with appropriate Department partners. 5. Interests Promoted by the Information Blocking Provision a. Access, Exchange, and Use of EHI We stated in the Proposed Rule that the information blocking provision promotes the ability to access, exchange, and use EHI, consistent with the requirements of applicable law. We interpreted the terms ‘‘access,’’ ‘‘exchange,’’ and ‘‘use’’ broadly, consistent with their generally understood meaning in the health IT industry and their function and context in the information blocking provision (84 FR 7514). We explained in the Proposed Rule that the concepts of access, exchange, and use are closely related: EHI cannot be used unless it can be accessed, and this often requires that the EHI be exchanged among different individuals or entities and through various technological means. Moreover, the technological and other means necessary to facilitate appropriate access and exchange of EHI vary significantly depending on the purpose for which the information will be used. We stated that this explanation is consistent with the way these terms are employed in the information blocking provision and in other relevant statutory provisions. Noting, for example, that section 3022(a)(2) of the PHSA contemplates a broad range of purposes for which EHI may be accessed, exchanged, and used—from treatment, care delivery, and other permitted purposes, to exporting complete information sets and transitioning between health IT systems, to supporting innovations and advancements in health information access, exchange, and use. In addition, we stated in the Proposed Rule that we considered how the terms access, exchange, and use have been defined or used in existing regulations and other relevant health IT industry contexts. We explained that, while those definitions have specialized meanings and are not controlling for the purposes of information blocking, they are instructive insofar as they illustrate the breadth with which these terms have been understood in other contexts. We noted that the HIPAA Security Rule defines ‘‘access’’ as the ability or the means necessary to read, write, modify, or communicate data/information or otherwise use any system resource (45 CFR 164.304). Last, we noted that the HIPAA Privacy Rule defines the term ‘‘use,’’ which includes the sharing, employment, application, utilization, examination, or analysis of individually VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 identifiable health information within an entity that maintains the information (45 CFR 160.103). We stated that the types of access, exchange, and use described above would be promoted under the information blocking provision, as would other types of access, exchange, or use not specifically contemplated in these or other regulations. We emphasized in the Proposed Rule the interrelated nature of the definitions and proposed to define these terms in § 171.102. For example, the definition of ‘‘use’’ that we proposed includes the ability to read, write, modify, manipulate, or apply EHI to accomplish a desired outcome or to achieve a desired purpose, while ‘‘access’’ is defined as the ability or means necessary to make EHI available for use. As such, we specified that the interference with ‘‘access’’ would include, for example, an interference that prevented a health care provider from writing EHI to its health IT or from modifying EHI stored in health IT, whether by the provider itself or by, or via, a third-party app. We encouraged comment on these definitions. In particular, we asked commenters to consider whether these definitions are broad enough to cover all of the potential purposes for which EHI may be needed and ways in which it could conceivably be used, now and in the future. Comments. Several commenters supported our proposed definitions of ‘‘access,’’ ‘‘exchange,’’ and ‘‘use,’’ based on our broad interpretation of the definitions, which they stated supports interoperability. Several health IT developers and developer organizations stated that the definition of ‘‘access’’ was overly broad. They suggested that we clarify and narrow the scope of our proposed definition of ‘‘access.’’ One commenter specifically suggested that we clarify that ‘‘access’’ need not be provided through a direct interface. Some commenters suggested that we remove the proposed language regarding ‘‘any and all source systems.’’ Some commenters expressed concern that the proposed definition of ‘‘exchange’’ is overly broad. Other commenters requested additional clarity regarding the scope of the definition. One commenter suggested that we clarify the meaning of ‘‘transmission’’ within the definition. Some health care providers and provider organizations stated that our proposed definition of ‘‘use’’ was overly broad. Some commenters suggested that we look to more established definitions of ‘‘use,’’ such as HIPAA. Other commenters suggested that the proposed PO 00000 Frm 00165 Fmt 4701 Sfmt 4700 25805 definition would inappropriately increase administrative burden. Response. We have revised these definitions in response to comments. These revisions do not narrow the scope of the definitions in regard to their intended interpretation and purpose in supporting interoperability and the goals of the information blocking provision. We believe, however, the revisions and their explanations below will provide the necessary clarifications for stakeholders to properly implement and comply with the terms. Access We have finalized the definition of ‘‘access’’ as ‘‘the ability or means necessary to make EHI available for exchange, use, or both’’ (§ 171.102). This final definition improves on the proposed definition (see 84 FR 7601) in a couple of ways. First, it makes clear that ‘‘access’’ is the ability or means necessary to make EHI available not only for ‘‘use,’’ but also for ‘‘exchange’’ or both (the proposed definition only included ‘‘for use’’). This modification will provide clarity because, as we noted in the Proposed Rule, these terms are interrelated and EHI cannot be exchanged or used if it is inaccessible. Second, to be responsive to comments and in order to promote additional clarity in the definition, we have removed ‘‘including the ability to securely and efficiently locate and retrieve information from any and all source systems in which the information may be recorded or maintained’’ from the definition. This language was exemplary and resulted in some confusion among stakeholders. Last, we clarify that the definition of ‘‘access’’ is not limited to direct interfaces, which we believe is evident by the final definition. Exchange We have finalized the definition of ‘‘exchange’’ as ‘‘the ability for electronic health information to be transmitted between and among different technologies, systems, platforms, or networks.’’ As with the finalized ‘‘access’’ definition, we have maintained the general scope of the proposed definition while modifying the definition for clarity. First, we removed ‘‘securely and efficiently’’ as proposed descriptors of the way that EHI is to be transmitted under the definition. While we continue to advocate for and promote secure and efficient exchange, we do not think this descriptive language is necessary within the definition of ‘‘exchange’’ because ‘‘exchange’’ for the purposes of the information blocking provision can E:\FR\FM\01MYR3.SGM 01MYR3 25806 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations occur regardless of whether the transaction is ‘‘secure’’ or ‘‘efficient.’’ Our intent with this definition was never to exclude unsecure or ‘‘inefficient’’ exchanges from the definition or enforcement of the information blocking provision because the exchange of EHI was not secure or ‘‘inefficient,’’ so we have removed this extraneous language. We also refer stakeholders to the information blocking exceptions included in this final rule that discuss how EHI may be transmitted and the importance of security as it relates to the access, exchange, and use of EHI. Second, we have removed the provision at the end of the proposed definition, that in order for ‘‘exchange’’ to occur, it must be ‘‘in a manner that allows the information to be accessed and used.’’ This language was potentially confusing because the manner of transmittal is not a necessary component of the ‘‘exchange’’ definition. If EHI is exchanged but is done so in way that does not permit the use of the EHI, then that practice may implicate the information blocking provision because the ‘‘use’’ of the EHI is being prevented. Further, to be responsive to comments, we emphasize that ‘‘transmitted’’ within the definition is not limited to a one-way transmission, but instead is inclusive of all forms of transmission such as bidirectional and network-based transmission. We note this as a point of clarification, as it was always our intent that ‘‘transmission’’ would be interpreted this way. Use We have finalized ‘‘use’’ to mean ‘‘the ability for EHI, once accessed or exchanged, to be understood and acted upon.’’ Put another way, ‘‘use’’ is an individual or entity’s ability to do something with the EHI once it has been accessed or exchanged. We believe this final definition is more concise and clear than the proposed definition—‘‘the ability of health IT or a user of health IT to access relevant EHI; to comprehend the structure, content, and meaning of the information; and to read, write, modify, manipulate, or apply the information to accomplish a desired outcome or to achieve a desired purpose’’ (84 FR 7602). Again, we emphasize the general scope and meaning of the definition is the same as proposed as explained below. First, we have removed language that is more appropriately used as examples in this preamble. For instance, the use of the word ‘‘understood’’ in the final definition encompasses the ability to comprehend various things such the VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 structure, content, and meaning of the information from the proposed definition. However, we clarify that ‘‘understood’’ just like the proposed term ‘‘comprehend’’ does not mean the ability to understand the clinical significance or relevance of the EHI. For example, if an ambulatory provider received patient EHI from a hospital that included a risk score, the concept of ‘‘use’’ does not require the hospital to provide additional resources to interpret the score nor would the tool or technology needed to interpret the information be considered an interoperability element because its sole purpose is clinical interpretation. Similarly to ‘‘understood,’’ ‘‘acted upon’’ within the final definition encompasses the ability to read, write, modify, manipulate, or apply the information from the proposed definition. We also clarify that ‘‘use’’ is bi-directional (to note, we also clarified above in the ‘‘exchange’’ discussion that ‘‘exchange’’ is bi-directional). Thus, an actor’s practice could implicate the information blocking provision not only if the actor’s practice interferes with the requestor’s ability to read the EHI (oneway), but also if the actor’s practice interferes with the requestor’s ability to write the EHI (bi-directional) back to a health IT system. We note that the ability ‘‘to access relevant EHI’’ from the proposed definition will fall under the ‘‘access’’ definition, particularly in light of the modifications we have made to the ‘‘access’’ definition discussed above. Last, we note that we have removed the requirement from the final definition that it would only be considered ‘‘use’’ if the action were ‘‘to accomplish a desired outcome or to achieve a desired purpose.’’ We do not believe this language is necessary because the ultimate purpose of the ‘‘use’’ of the EHI is not relevant to the definition of ‘‘use.’’ We appreciate the comments suggesting that we look to more established definitions of ‘‘use,’’ such as that within the HIPAA Privacy Rule. We did consider adopting the HIPAA Privacy Rule definition, but ultimately decided that our finalized definition is more appropriate and easier to understand within the information blocking context. We also appreciate the comments suggesting that the proposed definition would inappropriately increase administrative burden; however, we do not believe there is a basis for such assertion, particularly with the clarifications we have provided and the focusing of the EHI definition. PO 00000 Frm 00166 Fmt 4701 Sfmt 4700 b. Interoperability Elements We proposed to use the term ‘‘interoperability element’’ to refer to any means by which EHI can be accessed, exchanged, or used. We proposed that the means of accessing, exchanging, and using EHI is not limited to functional elements and technical information but also encompasses technologies, services, policies, and other conditions 127 necessary to support the many potential uses of EHI. Because of the evolving nature of technology and the diversity of privacy and other laws and regulations, institutional arrangements, and policies that govern the sharing of EHI, we did not provide an exhaustive list of interoperability elements in the Proposed Rule. We requested comment on the proposed definition. Comments. Some commenters supported the proposed definition, noting that the breadth and scope of the definition is appropriate. Some commenters requested clarifications and modifications regarding aspects of the proposed definition. A few commenters requested that we clarify whether specific functionalities and technologies, such as certified Health IT Modules and proprietary APIs, would be considered interoperability elements. A commenter requested, within the context of the Licensing Exception (§ 171.303), clarification regarding whether interoperability elements are limited to those elements to which an actor can lawfully confer rights or licenses without the agreement of a third party. A few commenters stated that the definition should exclude underlying substantive content or health facts because such content is not a potential means by which EHI may be accessed, exchanged, or used. One of those commenters also requested that we clarify that legally required data tags are excluded from the ‘‘interoperability element’’ definition. A commenter suggested that we clarify that whether a functionality is considered an interoperability element should be determined without regard to whether it can be protected under copyright or patent law. One commenter requested additional examples of interoperability elements. Another commenter requested clarification regarding the meaning of ‘‘transmit’’ within the definition. Some commenters stated that the definition is too broad and should be narrowed. A couple of commenters 127 See ONC, Connecting Health and Care for the Nation: A Shared Nationwide Interoperability Roadmap at x–xi, https://www.healthit.gov/topic/ interoperability/interoperability-roadmap (Oct. 2015) [hereinafter ‘‘Interoperability Roadmap’’]. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations stated that the definition is confusing and ambiguous. A few commenters noted that we should focus the definition on specific elements that are currently certified and/or are employed to support interoperability through existing standards and requirements that enable the exchange of EHI in a usable fashion. Response. We appreciate commenters’ support of the proposed definition, as well as the comments that requested clarifications and suggested improvements to the definition. We have streamlined the definition, with the intent of maintaining a broad definition of interoperability elements, and leveraged other regulatory and industry terms to add clarity. We have finalized the definition of ‘‘interoperability element’’ to mean hardware, software, integrated technologies or related licenses, technical information, privileges, rights, intellectual property, upgrades, or services that: (1) May be necessary to access, exchange, or use EHI; and (2) is controlled by the actor, which includes the ability to confer all rights and authorizations necessary to use the element to enable the access, exchange, or use of EHI. While this definition remains broad, it is confined by changes we have made to other parts of the information blocking section. Specifically, the more focused definitions of ‘‘electronic health information’’ and ‘‘access,’’ ‘‘exchange,’’ or ‘‘use’’ will result in a smaller scope of interoperability elements, as defined above, being necessary to enable access, exchange, or use of EHI. Further, under the Content and Manner Exception (§ 171.301), we establish that an actor is not required to respond to a request to access, exchange, or use EHI in the manner requested if the actor would be required to license its IP (which could constitute an interoperability element) and cannot reach agreeable terms for the license with the requestor (§ 171.301(b)(1)(i)(B)). This means that actors who do not want to license their interoperability elements will not be required to do so if they are able to respond in an alternative manner in accordance with § 171.301(b)(2). We believe the above definition improves on the proposed definition in multiple ways. First, while preserving the meaning described in the Proposed Rule that would constitute an interoperability element (i.e., hardware, software, technical information, technology, service, license, right, privilege), we have removed descriptive language and examples from the regulation text. Such language did not add clarity, as it was not exhaustive as VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 noted in the regulation text, which included the language: ‘‘Any other means by which electronic health information may be accessed, exchanged, or used.’’ The removal of this language makes the definition clearer and more concise. We note that we provide examples of ‘‘interoperability elements’’ in the discussion below. Second, we leveraged the definition of ‘‘health information technology’’ from title XXX of the PHSA (specifically, section 3000(5) of the PHSA), as added by title XIII of the HITECH Act. The Cures Act amended title XXX of the PHSA to establish the information blocking provision in section 3022 of the PHSA. Section 3000(5) of the PHSA defines ‘‘health information technology’’ as ‘‘hardware, software, integrated technologies or related licenses, intellectual property, upgrades, or packaged solutions sold as services that are designed for or support the use by health care entities or patients for the electronic creation, maintenance, access, or exchange of health information.’’ We emphasize that this definition includes intellectual property. When we drafted the Proposed Rule, we chose to use the term ‘‘interoperability element’’ to describe the means necessary to access, exchange, or use EHI instead of ‘‘health IT’’ because we believed that defining a new term (interoperability element) would allow us to tailor and focus the definition to the specific issue of information blocking. However, after further reflection and review of stakeholder comments—specifically those requesting additional clarity regarding the definition of ‘‘interoperability element’’—we believe a better approach is to leverage the definition of ‘‘health information technology’’ from section 3000(5) of the PHSA because that definition provides the statutory basis for the types of technology, services, functionality necessary to support interoperability, including the access, exchange, and use of EHI. We believe this approach of leveraging an established, statutory definition will promote transparency and clarify ONC’s expectations for regulated actors. As such, we have added ‘‘integrated technologies,’’ ‘‘intellectual property,’’ and ‘‘upgrades’’ from the PHSA definition into our definition of interoperability element. These additions will strengthen the ‘‘interoperability element’’ definition by explicitly identifying types of interoperability elements that would have been covered by our proposed PO 00000 Frm 00167 Fmt 4701 Sfmt 4700 25807 definition, but were not called out in the proposed definition (these types of interoperability elements would have been covered by the provision in the proposed definition that an interoperability element could be any other means by which EHI may be accessed, exchanged, or used). We chose not to substitute the PHSA health information technology definition in its entirety for the ‘‘interoperability element’’ definition in this final rule because some aspects do not fit within the ‘‘interoperability element’’ definition. For instance, the concept of ‘‘packaged solutions’’ is undefined and would not add clarity to the interoperability element definition. Thus, we believe this approach will achieve our goal of establishing a definition of interoperability element that is tailored for the information blocking context. Last, we have clarified within the definition that a requisite component of an interoperability element is that it is controlled by the actor. As used in the interoperability element definition, controlled by the actor includes the ability to confer all rights and authorizations necessary to use the element to enable the access, exchange, or use of EHI. In order to make this point clear, we have added and finalized paragraph (2) within the interoperability element definition (see § 171.102). Thus, if an actor could not confer a right or authorization necessary to use the interoperability element to enable the access, exchange, or use of electronic health information, (e.g., by way of sub-license or assignment), the actor would not have the requisite ‘‘control’’ under the ‘‘interoperability element’’ definition. This clarification reinforces our position that our rule does not require or encourage actors to infringe on IP rights. We appreciate the comments that asked that we specify whether specific functionalities and technologies, such as certified Health IT Modules and proprietary APIs, would be considered interoperability elements. We clarify that most certified Health IT Modules and proprietary APIs would be considered interoperability elements under the interoperability element definition. We also clarify that the underlying substantive content or health facts are not considered interoperability elements because substantive content and health facts are not a means by which EHI is accessed, exchanged, or used. Regarding legally required data tags, we would need additional information concerning the specific data tag to determine whether it could constitute an interoperability element. E:\FR\FM\01MYR3.SGM 01MYR3 25808 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations Generally, data tags would likely be considered technical information under the ‘‘interoperability element’’ definition, but such data tags would need to be necessary to access, exchange, or use EHI to be considered an interoperability element. A determination regarding whether a functionality is considered an interoperability element will be determined without regard to whether it is protected under copyright or patent law. In fact, the finalized definition of interoperability element includes ‘‘licenses’’ and ‘‘intellectual property.’’ We have also established an exception to information blocking that supports the licensing of intellectual property. Thus, we make clear that functionalities generally covered by copyright, patent, or other such laws can be interoperability elements. In response to the commenter who requested additional examples of interoperability elements, we provide the following non-exhaustive list of examples: • Functional elements of health IT that could be used to access, exchange, or use EHI for any purpose, including information exchanged or maintained in disparate media, information systems, or by HINs/HIEs; • Technical information that describes the functional elements of technology, such as a standard, specification, protocol, data model, or schema, that would be required to use a functional element of a certain technology, including for the purpose of developing compatible technologies that incorporate or use the functional elements; • System resources, technical infrastructure, or HIN/HIE elements that are required to enable the use of a compatible technology in production environments; or • Licenses, rights, or privileges that may be required to commercially offer and distribute compatible technologies and make them available for use in production environments. We appreciate the comments requesting that we clarify and narrow the ‘‘interoperability element’’ definition. As discussed above, we believe the revised definition addresses commenters’ concerns regarding the clarity of the definition. Responsive to commenters, the final definition is also narrower than the proposed definition, as we have removed the proposed provision that an interoperability element could be any other means by which EHI may be accessed, exchanged, or used (see 84 FR 7602). We have decided not to focus the definition on certified elements or VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 existing standards or requirements because such a narrowed focus would unduly limit the definition, interoperability, and the access, exchange, and use of EHI. The finalized definition reflects that there are countless means by which EHI may be accessed, exchanged, or used that are not certified or standardized. We note that the new Content and Manner Exception (§ 171.301) supports certified and standards-based exchange as suggested by the commenter. We refer readers to VIII.D.2.a of this preamble for a discussion of that exception. We note that we have removed the term ‘‘transmit’’ from the regulatory text because it no longer fit in the context of other changes made to the definition. 6. Practices That May Implicate the Information Blocking Provision To meet the definition of information blocking under section 3022(a) of the PHSA, a practice must be likely to interfere with, prevent, or materially discourage the access, exchange, or use of EHI. In this section and elsewhere in the Proposed Rule, we discussed various types of hypothetical practices that could implicate the information blocking provision. We did this to illustrate the scope of the information blocking provision and to explain our interpretation of various statutory concepts. However, we stressed that the types of practices discussed in the preamble of the Proposed Rule are illustrative and not exhaustive and that many other types of practices could also implicate the provision. We emphasized that the fact that we did not identify or discuss a particular type of practice did not imply that it is less serious than those that were discussed in the preamble. Indeed, we explained in the Proposed Rule that because information blocking may take many forms, it is not possible to anticipate or catalog all potential types of practices that may raise information blocking concerns. We emphasized that any analysis of information blocking necessarily requires a careful consideration of the individual facts and circumstances, including whether the practice was required by law, whether the actor had the requisite knowledge, and whether an exception applies. A practice that seemingly meets the statutory definition of information blocking would not be information blocking if it was required by law, if one or more elements of the definition were not met, or if it was covered by one of the exceptions for reasonable and necessary activities. In accordance with section 3022(a)(3) of the PHSA, we proposed in the Proposed Rule to establish exceptions to PO 00000 Frm 00168 Fmt 4701 Sfmt 4700 the information blocking provision for certain reasonable and necessary activities. We proposed that if an actor can establish that an exception applies to each practice for which a claim of information blocking has been made, including that the actor satisfied all applicable conditions of the exception at all relevant times, then the practice would not constitute information blocking. Comments. There was broad support from commenters regarding the categories of practices identified in the Proposed Rule that may implicate the information blocking provision, as well as the non-exhaustive list of specific examples provided in the Proposed Rule to assist with compliance. Commenters noted that the illustrative examples provided were helpful in providing further clarity on the scope of the information blocking provision. Many commenters noted that considerable barriers continue to obstruct both provider and patient access to patient data and our approach to the information blocking provision can increase access to this data. Several commenters suggested the need for a comprehensive inventory or repository of examples, including examples of information blocking conduct that have been submitted to ONC. Many commenters suggested specific clarifications and modifications to the examples provided in the Proposed Rule in the sections below, as well as additional examples for inclusion in the final rule, such as additional examples applicable to specific contexts (e.g., imaging providers, and pharmacies) or specific practices (e.g., practices involving clinical data registries and pharmacogenomics). Response. We thank commenters for their support and feedback. We have not revised the examples provided in the Proposed Rule because we believe they are clear, accurate, and helpful to readers. To be responsive to commenters who requested additional examples be added to the final rule, we have added examples in the discussion of ‘‘Limiting or Restricting the Interoperability of Health IT’’ in section VIII.C.6.c.ii. as well as additional examples within the preamble discussion for the exceptions. We used commenters’ suggestions to help inform these examples and highlight important use cases and circumstances that required additional clarification. We emphasize that these listed examples are illustrative, but not exhaustive. We also clarify that when we say that the actor must satisfy all applicable conditions of the exception at all E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations relevant times to meet each exception, all relevant times means any time when an actor’s practice relates to the access, exchange, or use of EHI. a. Prevention, Material Discouragement, and Other Interference We explained in the Proposed Rule that the information blocking provision and its enforcement subsection do not define the terms ‘‘interfere with,’’ ‘‘prevent,’’ and ‘‘materially discourage,’’ and use these terms collectively and without differentiation. Based on our interpretation of the information blocking provision and the ordinary meanings of these terms in the context of EHI, we interpreted these terms to not be mutually exclusive. Instead, prevention and material discouragement may be understood as types of interference, and that use of these terms in the statute to define information blocking illustrates the desire to reach all practices that an actor knows, or should know, are likely to prevent, materially discourage, or otherwise interfere with the access, exchange, or use of EHI. Consistent with this understanding, we used the terms ‘‘interfere with’’ and ‘‘interference’’ as inclusive of prevention and material discouragement. We explained that interference could take many forms. In addition to the prevention or material discouragement of access, exchange, or use, we stated that interference could include practices that increase the cost, complexity, or other burdens associated with accessing, exchanging, or using EHI. Interference could also include practices that limit the utility, efficacy, or value of EHI that is accessed, exchanged, or used, such as by diminishing the integrity, quality, completeness, or timeliness of the data. Relatedly, to avoid potential ambiguity and clearly communicate the full range of potential practices that could implicate the information blocking provision, we proposed to codify a definition of ‘‘interfere with’’ in § 171.102, consistent with our interpretation set forth above (84 FR 7516). Comments. We did not receive comments on our proposed definition of ‘‘interfere with.’’ Response. We have finalized the definition of ‘‘interfere with’’ (also referred to as ‘‘interference’’) in § 171.102 as proposed, but with a modification to remove the phrase ‘‘access, exchange, or use of electronic health information’’ from the definition. We removed this language because it was not necessary in the definition, and to avoid duplication, as we often say in the preamble of this final rule that ‘‘a VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 practice interferes with access, exchange or use of EHI.’’ We also note that we received many comments requesting clarification of whether certain practices would constitute interference with the access, exchange, and use of EHI, and thus implicate the information blocking provision. We address these comments in section VIII.C.6.c (Examples of Practices Likely to Interfere with the Access, Exchange or Use of EHI) below. b. Likelihood of Interference We noted in the Proposed Rule that the information blocking provision is preventative in nature. That is, the information blocking provision proscribes practices that are likely to interfere with (including preventing or materially discouraging) access, exchange, or use of EHI—whether or not such harm materializes. By including both the likely and the actual effects of a practice, the information blocking provision encourages individuals and entities to avoid engaging in practices that undermine interoperability, and to proactively promote access, exchange, and use of EHI. We explained that a practice would satisfy the information blocking provision’s ‘‘likelihood’’ requirement if, under the circumstances, there is a reasonably foreseeable risk that the practice will interfere with access, exchange, or use of EHI. We explained that a policy or practice that limits timely access to information in an appropriate electronic format creates a reasonably foreseeable likelihood of interfering with the use of the information. We noted that whether the risk of interference is reasonably foreseeable will depend on the particular facts and circumstances attending the practice or practices at issue. Because of the number and diversity of potential practices, and the fact that different practices will present varying risks of interfering with access, exchange, or use of EHI, we did not attempt to anticipate all of the potential ways in which the information blocking provision could be implicated. Nevertheless, to assist with compliance, we clarified certain circumstances in which, based on our experience, a practice will almost always be likely to interfere with access, exchange, or use of EHI. We cautioned that the situations listed are not exhaustive and that other circumstances may also give rise to a very high likelihood of interference under the information blocking provision. We noted that in each case, the totality of the circumstances should be evaluated as to whether a practice is likely to constitute information blocking. PO 00000 Frm 00169 Fmt 4701 Sfmt 4700 25809 In the Proposed Rule, we stated that we believe that information blocking concerns are especially pronounced when the conduct at issue has the potential to interfere with the access, exchange, or use of EHI that is created or maintained during the practice of medicine or the delivery of health care services to patients, which we referred to collectively as ‘‘observational health information’’ (84 FR 7516 and7517). We received a few comments seeking clarification regarding our use of the term ‘‘observational health information’’ or that we provide a regulatory definition for the term. Comments. We received some comments requesting clarification regarding the meaning of ‘‘timely’’ access in the discussion in the Proposed Rule. Response. We have not established a set timeframe for what ‘‘timely’’ access means because there is so much variability regarding what ‘‘timely’’ will mean based on the specific facts and circumstances, and particularly with regard to the broad scope of health IT being discussed. We emphasize that whether access is considered timely will be determined based on the specific facts and circumstances. We refer readers to the discussion in section VIII.C.6.c. on ‘‘Limiting or Restricting the Interoperability of Health IT’’ where we discuss how slowing or delaying access, exchange, or use of EHI could be considered information blocking. Comments. We did not receive any additional comments regarding out interpretation of the information blocking provision’s ‘‘likelihood’’ requirement discussed above. Response. We have finalized our interpretation as described above. Comments. We received comments requesting clarification regarding the meaning of ‘‘observational health information’’ as used in the Proposed Rule. Response. As discussed earlier in section VIII.C.3, after consideration of concerns raised by commenters, we have not finalized the definition of EHI as proposed. Instead, we have finalized a more focused definition of EHI. Because we have finalized a definition of EHI with a more focused scope than proposed, we no longer believe our proposed approach regarding observational health information is necessary. Accordingly, we are not using the term ‘‘observational health information’’ in this final rule. We refer readers to section VIII.C.3. for further discussion of the definition of EHI. E:\FR\FM\01MYR3.SGM 01MYR3 25810 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations i. Purposes for Which Information May Be Needed We explained in the Proposed Rule that the information blocking provision will almost always be implicated when a practice interferes with access, exchange, or use of EHI for certain purposes, including but not limited to: • Providing patients with access to their EHI and the ability to exchange and use it without special effort (see section VII.B.4). • Ensuring that health care professionals, care givers, and other authorized persons have the EHI they need, when and where they need it, to make treatment decisions and effectively coordinate and manage patient care and can use the EHI they may receive from other sources. • Ensuring that payers and other entities that purchase health care services can obtain the information they need to effectively assess clinical value and promote transparency concerning the quality and costs of health care services. • Ensuring that health care providers can access, exchange, and use EHI for quality improvement and population health management activities. • Supporting access, exchange, and use of EHI for patient safety and public health purposes. We emphasized that the need to ensure that EHI is readily available and usable for these purposes is paramount. Therefore, practices that increase the cost, difficulty, or other burdens of accessing, exchanging, or using EHI for these purposes would almost always implicate the information blocking provision. We stressed that individuals and entities that develop health IT or have a role in making these technologies and services available should consider the impact of their actions and take steps to support interoperability and avoid impeding the availability or use of EHI (84 FR 7517). Comments. We did not receive comments of the discussion above. Response. Consistent with the Proposed Rule, in this final rule we continue to emphasize that practices that interfere with the access, exchange, or use of EHI for the purposes listed in this section and that do not meet any of the final exceptions will almost always implicate the information blocking provision and will be inherently suspect. These practices may jeopardize the core functions of the health care system that require the access, exchange, or use of EHI. We believe there are few, if any, legitimate reasons for an actor to interfere with the use of EHI in the context of these purposes. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 We specifically emphasize that practices that involve an actor charging an individual a fee to access, exchange, or use their EHI would be inherently suspect, as discussed in more detail in the Fees Exception (section VIII.D.2.b), as there are few, if any, legitimate reasons for an actor to charge an individual for access to their EHI. ii. Control Over Essential Interoperability Elements; Other Circumstances of Reliance or Dependence We explained in the Proposed Rule that an actor may have substantial control over one or more interoperability elements that provide the only reasonable means of accessing, exchanging, or using EHI for a particular purpose. We noted that, in these circumstances, any practice by the actor that could impede the use of the interoperability elements—or that could unnecessarily increase the cost or other burden of using the elements—would almost always implicate the information blocking provision. We explained that the situation described above is most likely when customers or users are dependent on an actor’s technology or services, which can occur for any number of reasons. For example, technological dependence may arise from legal or commercial relations, such as a health care provider’s reliance on its EHR developer to ensure that EHI managed on its behalf is accessible and usable when it is needed. Relatedly, most EHI is currently stored in EHRs and other source systems that use proprietary data models or formats. Knowledge of the data models, formats, or other relevant technical information (e.g., proprietary APIs) is necessary to understand the data and make efficient use of it in other applications and technologies. Because this information is routinely treated as confidential or proprietary, the developer’s cooperation is required to enable uses of the EHI that go beyond the capabilities provided by the developer’s technology. This includes the capability to export complete information sets and to migrate data in the event that a user decides to switch to a different technology. We noted that separate from these contractual and intellectual property issues, users may become ‘‘locked in’’ to a particular technology, HIE, or HIN for financial or business reasons. For example, many health care providers have invested significant resources to adopt EHR technologies—including costs for deployment, customization, data migration, and training—and have tightly integrated these technologies PO 00000 Frm 00170 Fmt 4701 Sfmt 4700 into their information management strategies, clinical workflows, and business operations. As a result, they may be reluctant to switch to other technologies due to the significant cost and disruption this would entail. We explained that another important driver of technological dependence is the ‘‘network effects’’ of health IT adoption, which are amplified by reliance on technologies and approaches that are not standardized and do not enable seamless interoperability. Consequently, health care providers and other health IT users may gravitate towards and become reliant on the proprietary technologies, HIEs, or HINs that have been adopted by other individuals and entities with whom they have the greatest need to exchange EHI. We noted that these effects may be especially pronounced within particular products or geographic areas. For example, a HIN that facilitates certain types of exchange or transactions may be so widely adopted that it is a de facto industry standard. A similar phenomenon may occur within a particular geographic area once a critical mass of hospitals, physicians, or other providers adopt a particular EHR technology, HIE, or HIN. We emphasized that in these and other analogous circumstances of reliance or dependence, there is a heightened risk that an actor’s conduct will interfere with access, exchange, or use of EHI. To assist with compliance, we highlighted the following common scenarios, based on our outreach to stakeholders, in which actors exercise control over key interoperability elements.128 Health IT developers of certified health IT that provide EHR systems or other technologies used to capture EHI at the point of care are in a unique position to control subsequent access to and use of that information. • HINs and HIEs may be in a unique position to control the flow of information among particular persons or for particular purposes, especially if the HIN or HIE has achieved significant adoption in a particular geographic area or for a particular type of health information use case. • Similar control over EHI may be exercised by other entities, such as health IT developers of certified health IT, that supply or control proprietary technologies, platforms, or services that are widely adopted by a class of users or that are a ‘‘de facto standard’’ for 128 As an important clarification, we note that control over interoperability elements may exist with or without the actor’s ability to manipulate the price of the interoperability elements in the market. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations certain types of EHI exchanges or transactions. • Health care providers within health systems and other entities that provide health IT platforms, infrastructure, or information sharing policies may have a degree of control over interoperability or the movement of data within a geographic area that is functionally equivalent to the control exercised by a dominant health IT developer, HIN, or HIE. To avoid engaging in conduct that may be considered information blocking, actors with control over interoperability elements should be careful not to engage in practices that exclude persons from the use of those elements or create artificial costs or other impediments to their use. We encouraged comment on these and other circumstances that may present an especially high likelihood that a practice will interfere with access, exchange, or use of EHI within the meaning of the information blocking provision. Comments. A few commenters appreciated the examples provided and ONC’s acknowledgement in the Proposed Rule that certain parties are in a unique position to control access, exchange, and use of EHI. Other commenters urged ONC to only hold accountable those parties that actually have control of the EHI or control of interoperability elements necessary to access, exchange, or use the EHI in question. Response. We thank commenters for their support. We stress that any analysis of whether an actor’s practices constitute information blocking will depend on the particular facts and circumstances of the case, which may include an assessment of the actor’s control over the EHI or interoperability elements necessary to access, exchange, or use the EHI in question, as applicable. A key element of information blocking is that the actor’s practice is likely to interfere with an individual or entity’s ability to access, exchange, or use EHI. Thus, we look at accountability through the lens of whether the actor is the individual or entity engaging in the practice. Regarding the comment that we should only hold accountable those parties that actually have control of the EHI or interoperability elements necessary to access, exchange, or use the EHI, we note that we have addressed this issue within preamble discussion concerning the definition of ‘‘interoperability element’’ (VIII.C.5.b), Infeasibility Exception (VIII.D.1.d), and Content and Manner Exception VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 (VIII.D.2.a). We refer readers to those discussions. c. Examples of Practices Likely To Interfere With Access, Exchange, or Use of EHI To further clarify the scope of the information blocking provision, we described in the Proposed Rule several types of practices that would be likely to interfere with access, exchange, or use of EHI. Those examples clarified and expanded on those set forth in section 3022(a)(2) of the PHSA. Because information blocking can take many forms, we emphasized that the categories of practices described in the Proposed Rule were illustrative only and did not provide an exhaustive list or comprehensive description of practices that may implicate the information blocking provision and its penalties. We also reiterated that each case will turn on its unique facts. We noted that, for the categories of practices described in the Proposed Rule, we did not consider the applicability of any exceptions. We reiterate that the examples provided in the Proposed Rule were designed to provide greater clarity on the various types of hypothetical practices that could implicate the information blocking provision. Comments. We received comments requesting that we revise or clarify examples provided in the Proposed Rule in the following sections. Response. We have not revised or clarified the majority of the examples for purposes of this final rule, and we believe the majority of the examples are still applicable. We note in the discussion below necessary clarifications concerning concepts expressed in some of the proposed examples. We refer readers to the Proposed Rule (84 FR 7518 through 7521) for a complete listing of the examples provided for each category of practices below. i. Restrictions on Access, Exchange, or Use We explained in the Proposed Rule that the information blocking provision establishes penalties, including civil monetary penalties, or requires appropriate disincentives, for practices that restrict access, exchange, or use of EHI for permissible purposes. We noted that one means by which actors may restrict access, exchange, or use of EHI is through formal restrictions. These may be expressed in contract or license terms, EHI sharing policies, organizational policies or procedures, or other instruments or documents that set forth requirements related to EHI or health IT. Additionally, in the absence PO 00000 Frm 00171 Fmt 4701 Sfmt 4700 25811 of an express contractual restriction, an actor may achieve the same result by exercising intellectual property or other rights in ways that restrict access, exchange, or use (84 FR 7518). We explained that access, exchange, or use of EHI can also be restricted in less formal ways. The information blocking provision may be implicated, for example, where an actor simply refuses to exchange or to facilitate the access or use of EHI, either as a general practice or in isolated instances. The refusal may be expressly stated or it may be implied from the actor’s conduct, such as where the actor ignores requests to share EHI or provide interoperability elements; gives implausible reasons for not doing so; or insists on terms or conditions that are so objectively unreasonable that they amount to a refusal to provide access, exchange, or use of the EHI (84 FR 7518). We emphasized that restrictions on access, exchange, or use that are required by law would not implicate the information blocking provision. Moreover, we recognized that some restrictions, while not required by law, may be reasonable and necessary for the privacy and security of individuals’ EHI and noted that such practices may qualify for protection under an exception (84 FR 7519). Comments. Commenters requested that we clarify the types of contract and agreement terms that could implicate the information blocking provision beyond terms specifying fees and the licensing of intellectual property rights. Some commenters stated that ‘‘legacy EHR platforms’’ impede real time data flow between EHRs and the clinical workflow, including the use of thirdparty clinical decision support applications, through various contract terms. Many commenters also indicated that EHR developers place onerous contract terms on developers of applications that enable patient access to EHI through APIs. A few commenters asserted that a business associate (BA), as defined under the HIPAA Privacy Rule, should not be liable under the information blocking provision (or there should be an exception for information blocking) for not responding to or fulfilling requests for access, exchange, or use of EHI if such access, exchange, or use of EHI would violate the BA’s business associate agreement (BAA). Response. We first clarify that all of the scenarios provided by the commenters might implicate the information blocking provision. We offer specific situations as follows where there might be an implication. As a first example, an actor (e.g., a health care provider that is a covered entity E:\FR\FM\01MYR3.SGM 01MYR3 25812 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations under HIPAA) may want to engage an entity for services (e.g., use of a clinical decision support application (‘‘CDS App Developer’’)) that require the CDS App Developer to enter into a BAA with the health care provider and, in order to gain access and use of the EHI held by another BA of the health care provider (e.g., EHR developer of certified health IT), the CDS App Developer is required by the EHR developer of certified health IT to enter into a contract to access its EHR technology. As a second example, an entity may offer an application that facilitates patients’ access to their EHI through an API maintained by an actor (e.g., EHR developer of certified health IT) that is a BA of a health care provider that is a covered entity under HIPAA. As a third example, a health care provider may request EHI from an actor that is a BA of another health care provider under HIPAA, such as an EHR developer of certified health IT or HIN, that is contracted to make EHI available for treatment purposes. In response to comments and for the situations described above, we clarify that contracts and agreements can interfere with the access, exchange, and use of EHI through terms besides those that specify unreasonable fees and commercially unreasonable licensing terms (see sections VIII.D.2.b (Fees) and VIII.D.2.c (Licensing) for further discussion of unreasonable fees and commercially unreasonable licensing terms and associated exceptions to the information blocking provision). For instance, a contract may implicate the information blocking provision if it included unconscionable terms for the access, exchange, or use of EHI or licensing of an interoperability element, which could include, but not be limited to, requiring a software company that produced a patient access application to relinquish all IP rights to the actor or agreeing to indemnify the actor for acts beyond standard practice, such as gross negligence on part of the actor. Such terms may be problematic with regard to information blocking in situations involving unequal bargaining power related to accessing, exchanging, and using EHI. Business Associate Agreements (BAAs) We designed the final rule to operate in a manner consistent with the framework of the HIPAA Privacy Rule and other laws providing privacy rights for patients. Foremost, we do not require the disclosure of EHI in any way that would not already be permitted under the HIPAA Privacy Rule (or other Federal or State law). However, if an actor is permitted to provide access, exchange, or use of EHI under the VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 HIPAA Privacy Rule (or any other law), then the information blocking provision would require that the actor provide that access, exchange, or use of EHI so long as the actor is not prohibited by law from doing so (assuming that no exception is available to the actor). Under the HIPAA Privacy Rule, a BAA must contain the elements specified in 45 CFR 164.504(e), including a description of the permitted and required uses of PHI by the business associate, and provide that the business associate will not use or further disclose the protected health information other than as permitted or required by the contract or as required by law.129 While the information blocking provision does not require actors to violate these agreements, a BAA or its associated service level agreements must not be used in a discriminatory manner by an actor to forbid or limit disclosures that otherwise would be permitted by the Privacy Rule. For example, a BAA entered into by one or more actors that permits access, exchange, or use of EHI by certain health care providers for treatment should generally not prohibit or limit the access, exchange, or use of the EHI for treatment by other health care providers of a patient. To be clear, both the health care provider(s) who initiated the BAA and the BA who may be an actor under the information blocking provision (e.g., a health IT developer of certified health IT) would be subject to the information blocking provision in the instance described above. To illustrate the potential culpability of a BA, a BA with significant market power may have contractually prohibited or made it difficult for its covered entity customers to exchange EHI, maintained by the BA, with health care providers that use an EHR system of one of the BA’s competitors. To determine whether there is information blocking, the actions and processes (e.g., negotiations) of the actors in reaching the BAA and associated service level agreements would need to be reviewed to determine whether there was any action taken by an actor that was likely to interfere with the access, exchange, or use of EHI, and whether the actor had the requisite intent. We further note that if the BA 129 45 CFR 164.514(e)(3) limits the use and disclosure of a limited data set (LDS) to only the purposes of research, public health or health care operations. Some of the other restrictions on use and disclosure by a party that receives LDS Recipient are similar to those imposed by the HIPAA Rules on business associates so the discussion that follows generally applies to recipients of LDS and their data use agreements as well as to business associates (and their business associate agreements) to the extent of such similar provisions. PO 00000 Frm 00172 Fmt 4701 Sfmt 4700 has an agreement with the covered entity to provide EHI to a third party that requests it and the BA refuses to provide the access, exchange, or use of EHI to a requestor in response to the request received by the CE, then the BA (who is also an actor under the information blocking provision) may have violated the information blocking provision unless an exception applied. Successors to Contractors and Agreements We note that there may be circumstances in which there is a successor to a contract or agreement when, for example, an actor goes out of business, a provider leaves a practice, or an actor engages in a merger or adopts a new corporate structure. If not handled appropriately, it is possible that information blocking could occur. ii. Limiting or Restricting the Interoperability of Health IT We explained in the Proposed Rule that the information blocking provision includes practices that restrict the access, exchange, or use of EHI in various ways (see section 3022(a)(2) of the PHSA). These practices could include, for example, disabling or restricting the use of a capability that enables users to share EHI with users of other systems or to provide access to EHI to certain types of persons or for certain purposes that are legally permissible. In addition, the information blocking provision may be implicated where an actor configures or otherwise implements technology in ways that limit the types of data elements that can be exported or used from the technology. We noted that other practices that would be suspect include configuring capabilities in a way that removes important context, structure, or meaning from the EHI, or that makes the data less accurate, complete, or usable for important purposes for which it may be needed. Likewise, implementing capabilities in ways that create unnecessary delays or response times, or that otherwise limit the timeliness of EHI accessed or exchanged, may interfere with the access, exchange, and use of that information and therefore implicate the information blocking provision. We noted that any conclusions regarding such interference would be based on fact-finding specific to each case and would need to consider the applicability of the exceptions. We explained that the information blocking provision would be implicated if an actor were to deploy technological measures that limit or restrict the ability to reverse engineer the functional E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations aspects of technology in order to develop means for extracting and using EHI maintained in the technology. We noted that this may include, for example, employing technological protection measures that, if circumvented, would trigger liability under the Digital Millennium Copyright Act (see 17 U.S.C. 1201) or other laws. Additional Examples In the context of ONC’s certification rules, including certification criteria and Conditions and Maintenance of Certification requirements, we provide the following more explicit examples of actions by actors that would likely constitute information blocking. The first example of a technical interference that restricts the interoperability of health IT relates to the publication of ‘‘FHIR service base URLs’’ (sometimes also referred to as ‘‘FHIR endpoints’’). As discussed in the API Condition of Certification preamble (section VII.B.4), an API User needs to know a certified API technology’s FHIR service base URL to interact with the certified API technology. This knowledge is foundational for the use of certified API technology without special effort. Therefore, a FHIR service base URL cannot be withheld by an actor as it (just like many other technical interfaces) is necessary to enable the access, exchange, and use of EHI. Notably, in the case of patients seeking access to their EHI, the public availability of FHIR service base URLs is an absolute necessity and without which the access, exchange, and use of EHI would be prevented. Thus, any action by an actor to restrict the public availability of URLs in support of patient access would be more than just likely to interfere with the access, exchange, or use of EHI; it would prevent such access, exchange, and use. Accordingly, as noted in § 170.404(b)(2), a Certified API Developer must publish FHIR service base URLs for certified API technology that can be used by patients to access their electronic health information. Consistent with this example, the above interpretation means that API Information Sources (i.e., health care providers) who locally manage their FHIR servers without Certified API Developer assistance cannot refuse to provide to Certified API Developers the FHIR service base URL(s) that is/are necessary for patients to use to access their EHI. Equally, pursuant to the Maintenance of Certification requirement finalized for Certified API Developers in § 170.404, they would be required to publish the FHIR service base URLs they centrally manage on VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 behalf of API Information Sources. We also clarify that the public availability of FHIR service base URLs is a requirement that is scoped specifically to the context of patients’ access to their EHI and is not intended to be interpreted as requiring all FHIR service base URLs to be made publicly available (i.e., FHIR service base URLs that are created and used among business partners would not need to be made publicly available). Along the same lines discussed in the example directly above, for a patient to be able to use an application of their choice with certified API technology, the software application will need to be ‘‘registered.’’ In that regard, as a second example, an actor’s refusal to register a software application that enables a patient to access their EHI would effectively prevent its use given that registration is a technical prerequisite for software applications to be able to connect to certified API technology. As a result, such refusals in the context of patient access unless otherwise addressed in this rule would be highly suspect and likely to implicate information blocking. We note, however, for the first and second example that neither app registration nor the public availability of a FHIR service base URL means that an application will be able to access any EHI. On the contrary, the application would be unable to do so unless a patient authenticates themselves via an appropriate workflow or, in the case of a health care provider, the application is appropriately configured to work within the provider’s IT infrastructure. As a third example, there is often specific information that may be necessary for certain actors, in this case health care providers, to effectively access, exchange, and use EHI via their Certified EHR Technology and certified Health IT Modules. A health care provider’s ‘‘direct address’’ is an example of this kind of information. If this information were not made known to a health care provider upon request, were inaccessible or hidden in a way that a health care provider could not identify (or find out) their own direct address, or were refused to be provided to a health care provider by a health IT developer with certified health IT, we would consider all such actions to be information blocking because knowledge of a direct address is necessary to fully engage in the exchange of EHI. As a last example, we note that, to the extent that a legal transfer of IP to an individual or entity that is not an actor is intended to facilitate circumvention of the information blocking provision, the transfer itself by an actor could be PO 00000 Frm 00173 Fmt 4701 Sfmt 4700 25813 considered an interference with the access, exchange, or use of EHI. We note that we have added definitions of ‘‘API Information Source,’’ ‘‘API User,’’ ‘‘Certified API Developer,’’ and ‘‘certified API technology’’ to § 171.102. Each of those terms is defined as they are in § 170.404(c). We note that ‘‘API Information Source’’ replaced the proposed definition of ‘‘API Data Provider’’ and ‘‘Certified API Developer’’ replaced the proposed definition of ‘‘API Technology Supplier’’ in order to align with the terms used in § 170.404(c) (see the proposed terms in 84 FR 7601). Comments. A few commenters requested that we provide further clarity on whether slowing or delaying access, exchange, or use of EHI could be considered information blocking. Response. We clarify that slowing or delaying access, exchange, or use of EHI could constitute an ‘‘interference’’ and implicate the information blocking provision. We understand that some delays may be legitimate and inevitable due to factors such as limited legal, project management, and technical resources. Notwithstanding such understandable challenges, we are aware that some actors use and embellish legitimate challenges to create extended and unnecessary delays. For instance, an actor could have legitimate technical scoping and architecture questions regarding data integrations that require attention and take time to address. However, these scoping and architecture questions could constitute interference and implicate the information blocking provision if they are not necessary to enable access, exchange, or use of EHI and are being utilized as a delay tactic. When assessing such practices, facts indicating that an actor created extended or unnecessary delays may be evidence of an actor’s intent. We expect actors to make good faith efforts to work through common and understandable challenges and limitations to enable requestors to access, exchange, and use EHI as quickly and efficiently as possible. iii. Impeding Innovations and Advancements in Access, Exchange, or Use or Health IT-Enabled Care Delivery We explained in the Proposed Rule that the information blocking provision encompasses practices that create impediments to innovations and advancements to the access, exchange, and use of EHI, including care delivery enabled by health IT (section 3022(a)(2)(C)(ii) of the PHSA). Importantly, the information blocking provision may be implicated and E:\FR\FM\01MYR3.SGM 01MYR3 25814 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations penalties or appropriate disincentives may apply if an actor were to engage in exclusionary, discriminatory, or other practices that impede the development, dissemination, or use of interoperable technologies and services that enhance access, exchange, or use of EHI. We emphasized that, most acutely, the information blocking provision may be implicated if an actor were to refuse to license or allow the disclosure of interoperability elements to persons who require those elements to develop and provide interoperable technologies or services—including those that might complement or compete with the actor’s own technology or services. The same would be true if the actor were to allow access to interoperability elements but were to restrict their use for these purposes. We provided a list of nonexhaustive examples to illustrate practices that would likely implicate the information blocking provision by interfering with access, exchange, or use of EHI (84 FR 7519 and 7520). We encourage readers to review those examples in the Proposed Rule, as they are still applicable. We explained that, rather than restricting interoperability elements, an actor may insist on terms or conditions that are burdensome and discourage their use. These practices may implicate the information blocking provision as well. We have chosen not to include those examples in this final rule, but emphasize that they are still applicable and encourage readers to review the examples in the Proposed Rule (84 FR 7520). We explained that the information blocking provision may also be implicated if an actor were to discourage efforts to develop or use interoperable technologies or services by exercising its influence over customers, users, or other persons, and we provided a non-exhaustive list of examples. We have chosen not to include those examples in this final rule, but emphasize that they are still applicable and encourage readers to review the examples in the Proposed Rule (84 FR 7520).We noted that similar concerns would arise were an actor to engage in discriminatory practices— such as imposing unnecessary and burdensome administrative, technical, contractual, or other requirements on certain persons or classes of persons— that interfere with access and exchange of EHI by frustrating or discouraging efforts to enable interoperability. We provided a list of non-exhaustive examples to illustrate some ways this could occur. We have chosen not to include those examples in this final rule, but emphasize that they are still VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 applicable and encourage readers to review the examples in the Proposed Rule (84 FR 7520). Not all instances of differential treatment would necessarily constitute a discriminatory practice that may implicate the information blocking provision. For example, we explained that different fee structures or other terms may reflect genuine differences in the cost, quality, or value of the EHI and the effort required to provide access, exchange, or use. We also noted that, in certain circumstances, it may be reasonable and necessary for an actor to restrict or impose reasonable and nondiscriminatory terms or conditions on the use of interoperability elements, even though such practices could implicate the information blocking provision. For this reason, and as further explained in section VIII.D, we proposed to establish a narrow exception for licensing interoperability elements (see § 171.303) that would apply to these types of practices. Comments. We received some recommendations to describe specific scenarios when a refusal to license would be considered information blocking. Response. We note that for the purposes of the categories of practices described in the Proposed Rule (84 FR 7518 through 7521), we did not consider the applicability of any exceptions, and strongly encouraged readers to review the discussion of practices in this section in conjunction with the section on the exceptions (84 FR 7518). Regarding the specific comment above regarding licensing, we direct readers to our discussion of the Licensing Exception (section VIII.D.2.c.) for additional examples and a discussion of substantive conditions we have finalized for the licensing of interoperability elements under the exception. We note one important clarification that applies to all examples in the Proposed Rule concerning the licensing of interoperability elements. As clarified in the Licensing Exception preamble discussion, an actor will not implicate the information blocking provision in circumstances where the entity requesting to license or use the interoperability element is not seeking to use the interoperability element to interoperate with either the actor or the actor’s customers in order for EHI to be accessed, exchanged, or used. In other words, if there is no nexus between a requestor’s need to license an interoperability element and existing EHI, an actor’s refusal to license the interoperability element altogether or in accordance with § 171.303 would not PO 00000 Frm 00174 Fmt 4701 Sfmt 4700 constitute an interference under the information blocking provision. We refer readers to the Licensing Exception preamble discussion in section VIII.D.2.c. Interference Versus Education When an Individual Chooses Technology To Facilitate Access In the Proposed Rule, we stated that the information blocking provision would likely be implicated when an EHR developer of certified health IT requires third-party applications to be ‘‘vetted’’ for security before use but does not promptly conduct the vetting or conducts the vetting in a discriminatory or exclusionary manner (84 FR 7519). We also stated under the proposed ‘‘promoting the privacy of EHI’’ exception that when the consent or authorization of an individual was necessary for access, exchange, or use of EHI, to qualify for the exception, an actor must not have improperly encouraged or induced the individual to not provide the consent or authorization. We further stated that this does not mean that an actor cannot inform an individual about the advantages and disadvantages of exchanging EHI and any associated risks, so long as the information communicated is accurate and legitimate. However, we noted that an actor could not mislead an individual about the nature of the consent to be provided, dissuade individuals from providing consent in respect of disclosures to the actor’s competitors, or impose onerous requirements to effectuate consent that were unnecessary and not required by law (84 FR 7531). Overview of Comments Commenters expressed concerns that app developers not covered by the HIPAA Rules frequently do not provide patients (individuals) with clear terms of how their EHI will be subsequently used by the app developer once patients authorize (approve) the app to receive their EHI. These commenters, many of whom would be actors under the information blocking provision, expressed these concerns in comments recited below, while also requesting clarification about what steps they may take to assist individuals in protecting the privacy and security of their EHI. Comments. Commenters requested that we clarify the extent of vetting that would be permitted by actors for thirdparty apps. Response. We first clarify that the example provided in the Proposed Rule and recited above was to illuminate practices, such as delaying access and E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations discriminatory behavior, which could implicate the information blocking provision. ‘‘Vetting’’ in the example’s context meant a determination regarding whether the app posed a security risk to the EHR developer’s API, which may be the situation with a proprietary API. For certified API technology, which includes the use of OAuth2 among other security requirements in addition to its focus on ‘‘read-only’’/responses to requests for EHI to be transmitted, there should be few, if any, security concerns about the risks posed by patient-facing apps to the disclosing actor’s health IT systems (because the apps would only be permitted to receive EHI at the patient’s direction). Thus, for thirdparty applications chosen by individuals to facilitate their access to their EHI held by actors, there would generally not be a need for ‘‘vetting’’ on security grounds and such vetting actions otherwise would be an interference. We refer readers to our discussion of ‘‘vetting’’ versus verifying an app developer’s authenticity under the API Condition of Certification earlier in section VII.B.4 of this preamble. We do note, however, that actors, such as health care providers, have the ability to conduct whatever ‘‘vetting’’ they deem necessary of entities (e.g., app developers) that would be their business associates under HIPAA before granting access and use of EHI to the entities. In this regard, covered entities must conduct necessary vetting in order to comply with the HIPAA Security Rule. Comments. Several commenters stated that the information blocking proposals would open the door for third-party apps (e.g., patient-facing apps) to access, exchange, and use copious amounts of patient data without providing patients with clear terms of use. Commenters stated that most individuals may be surprised when commercial application companies that are not subject to the HIPAA Rules shared health information obtained from a hospital or health plan, such as diagnoses, medications, or test results, in ways the HIPAA Rules would not permit. These commenters asserted that individuals would incorrectly blame the hospital or health plan if a third-party app developer sold their EHI or used it for marketing or other purposes. Additionally, the commenters contended that because the third-party apps and the third-party app developers are not subject to the HIPAA Rules, such developers may, through their apps’ required terms of use, grant the developers the right to sell the EHI received or generated by the app VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 without the individual’s consent or could expose all of the individual’s EHI without the individual’s knowledge. Response. This final rule supports an individual’s ability to choose which third-party developer and app are best for receiving all or part of their EHI from a health care provider and to agree to clear and public terms of use on how that initial and ongoing engagement with the third-party developer and app occurs. As discussed in more detail below, this final rule also supports and strongly encourages providing individuals with information that will assist them in making the best choice for themselves in selecting a third-party application. We believe that allowing actors to provide additional information to individuals about apps will assist individuals as they choose apps to receive their EHI and such an approach is consistent with statements in the Proposed Rule recited above regarding informing individuals about the advantages and disadvantages of exchanging EHI and any associated risks. Individuals concerned about information privacy and security can gain a better understanding about how the third-party apps are using and storing their EHI, how individuals will be able to exercise any consent options, and more about what individuals are consenting to before they allow the app to receive their EHI. Practices that purport to educate patients about the privacy and security practices of applications and parties to whom a patient chooses to receive their EHI may be reviewed by OIG or ONC, as applicable, if there was a claim of information blocking. However, we believe it is unlikely these practices would interfere with the access, exchange, and use of EHI if they meet certain criteria. Foremost, the information provided by actors must focus on any current privacy and/or security risks posed by the technology or the third-party developer of the technology. Second, this information must be factually accurate, unbiased, objective, and not unfair or deceptive. Finally, the information must be provided in a non-discriminatory manner. For example, all third-party apps must be treated the same way in terms of whether or not information is provided to individuals about the privacy and security practices employed. To be clear, an actor may not prevent an individual from deciding to provide its EHI to a technology developer or app despite any risks noted regarding the app itself or the thirdparty developer. Comments. Several commenters requested that we require actors, PO 00000 Frm 00175 Fmt 4701 Sfmt 4700 25815 including API technology suppliers, to verify the existence of a privacy notice for each application requesting registration by an API User (third-party app developer). Commenters also suggested that the privacy notices should be commensurate with ONC’s Model Privacy Notice (MPN). One commenter recommended that all thirdparty developers should have to attest ‘‘yes’’ or ‘‘no’’ to having a privacy notice for each app it makes available for use/ (for patients to use) to access EHI. The commenter asserted that requiring attestation would provide transparency about the existence or lack of privacy policies and practices and data uses and serve as a means to support enforcement of acts of deceptive or misleading conduct in relation to stated privacy policies and practices. Response. As noted above, an actor may provide factually accurate, objective, unbiased, fair, and nondiscriminatory information about the third party or third-party app that an individual chooses to use to receive EHI on their behalf. And as also noted above, we strongly encourage actors to educate patients and individuals about the risks of providing other entities or parties access to their EHI. This type of education can be designed to inform the patient about the privacy and security practices of the third party and the third-party app, including whether the third-party developer has not acted in accordance with elements of its privacy policy. In this regard, we think there are many efficient and allowable ways of providing such education without such practices being considered or creating an interference under the information blocking provision, including those similar to the one suggested by the commenter. For example, to the commenter’s specific point, actors may establish processes where they notify a patient, call to a patient’s attention, or display in advance (as part of the app authorization process with certified API technology) whether the third-party developer of the app that the patient is about to authorize to receive their EHI has attested in the positive or negative whether the third party’s privacy policy and practices (including security practices such as whether the app encrypts the EHI) meet certain ‘‘best practices’’ set by the market for privacy policies and practices. We note that we identify minimum best practices for third-party privacy policies and practices below. This notification, would enable a patient to pause, consider this educational information provided by the actor, and decide whether to proceed with approving the E:\FR\FM\01MYR3.SGM 01MYR3 25816 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations app to receive their EHI or to stop midway in the process to do more research into the app or to pick a different app, in which case the patient would not approve the original app in question to receive their EHI. Understandably, in order for an actor to execute this kind of notification or attention grabbing process and to attribute certain app developer practices to educational insights provided to a patient in realtime, certain information may need to be collected by an actor in advance. Such information may include whether the app developer has a privacy notice, policies, or practices. Actors providing patients with educational information (a notice) could help patients better understand how their EHI may be used by the app and the third-party developer. While the ONC 2018 MPN is a voluntary, openly available resource designed to help developers clearly convey comprehensive information about their privacy and security policies and practices to their users, the privacy notice and practices of a third-party developer’s app or personal health record does not have to be identical to the ONC’s 2018 MPN. There may be other privacy policies and practices (including security practices) of thirdparty developers and apps that accomplish the same goals and even provide more information relevant to a user. At a minimum, as it relates to the above, all third-party privacy policies and practices should adhere to the following: (1) The privacy policy is made publicly accessible at all times, including updated versions; (2) The privacy policy is shared with all individuals that use the technology prior to the technology’s receipt of EHI from an actor; (3) The privacy policy is written in plain language and in a manner calculated to inform the individual who uses the technology; (4) The privacy policy includes a statement of whether and how the individual’s EHI may be accessed, exchanged, or used by any other person or other entity, including whether the individual’s EHI may be sold at any time (including in the future); and (5) The privacy policy includes a requirement for express consent from the individual before the individual’s EHI is accessed, exchanged, or used, including receiving the individual’s express consent before the individual’s EHI is sold (other than disclosures required by law or disclosures necessary in connection with the sale of the application or a similar transaction). VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 We note that the market may set different and more stringent expectations for third-party privacy notices and practices than the above minimum. As described above and in the examples below, an actor may provide information or notice to the individual whose EHI is requested from the actor that the privacy policy that applies to the technology used to make the request does or does not meet the minimum privacy policy notice and practices outlined above. Example 1: Providing education to an individual of a third-party app developer’s privacy and security policies and practices through an automated attestation and warning process. An API User (third-party app developer) develops a software application (named ‘‘App-Y’’) and registers it with the Certified API Developer’s (developer of certified health IT) authorization server. During the registration process, the Certified API Developer requests, as a business associate and on behalf of a HIPAA covered entity, that the API User attest that for App-Y, the API User follows the privacy policies and practices outlined above. Given the ‘‘yes or no’’ choice, the API User attests ‘‘no.’’ The Certified API Developer completes App-Y’s registration process and provides it with a client identifier. An individual seeks to use App-Y to obtain their EHI from the health care provider (covered entity) that is a customer of the Certified API Developer. The individual then opens App-Y on their smartphone and after authenticating themselves to their health care provider (covered entity), but prior to the app receiving the EHI from the health care provider, the patient is provided with an app authorization screen controlled by the health care provider. Using the certified API technology and the normal OAuth2 workflow the patient is asked by the health care provider via the app authorization screen whether they want to approve or reject App-Y’s ability to receive their EHI via certified API technology. On the authorization screen, there is a ‘‘warning’’ from the health care provider that the application has not ‘‘attested’’ to having privacy policies and practices that adhere to the minimum policies and practices outlined above or to having other specified privacy and security policies. When presented with that warning, the patient has two choices: (1) Choose to ignore the warning and approve App-Y’s ability to receive their EHI and App-Y receives the patient’s PHI; or (2) reject App-Y’s ability to receive their EHI, and the PO 00000 Frm 00176 Fmt 4701 Sfmt 4700 health care provider does not provide the patient’s EHI to App-Y. Example 2: Patient sending EHI using certified health IT capabilities provided by health IT developer. An individual has made an appointment with a health care specialist for a second medical opinion. During the initial scheduling, the administrative staff requested that the individual bring all their prior health information to the specialist. The patient portal of the individual’s primary care provider allows EHI to be transmitted to a third party using Direct protocol. The individual identifies a third-party app that is able to receive EHI using Direct protocol and creates an account with the app as well as obtain/ create a ‘‘Direct address.’’ During the account creation process with the app, the individual reviews the ‘‘privacy policy’’ for the app. The third-party app also sends the individual a copy of the privacy policy via email once the individual completes the account creation process. Subsequently, the individual logs into the primary care provider’s portal to transmit her EHI to her direct address linked to her new account on the thirdparty app. Her provider uses certified health IT that is capable of sending EHI securely using Direct protocol to thirdparty organizations (including apps) with which they have exchanged trust anchors. It turns out, the health care provider has established prior trust with the third-party app and is able to send EHI to the application. To note, this health care provider may offer education, including a warning (notice), to the patient, as discussed above, if the provider is being directed by the patient to transmit their EHI to a recipient that is unknown to the provider. Prior to sending the EHI, the portal provides a summary screen that provides the privacy policy ‘‘warning’’ about the third-party app. The patient reviews and accepts it. The provider’s system/API technology sends EHI to her Direct address. The patient logs into her application and confirms that the EHI has been received. Comments. Commenters stated that, given the access to personal health information that patient-directed thirdparty apps are expected to have and the potential privacy risks they pose, a process should be implemented by the Federal Trade Commission (FTC) to vet apps for the adequacy of the consumer disclosures which should include the privacy and security of the information and secondary uses that should be permitted. A commenter suggested that the vetting process should be at the application and application developer E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations level, and that the results of such vetting process should be made public in the form of an application ‘‘safe list.’’ Response. The privacy practices of developers of patient-facing health IT products and services are typically regulated by the Federal Trade Commission Act (FTC Act). The FTC Act prohibits unfair or deceptive acts or practices in or affecting commerce (15 U.S.C. 45(a)(1)), but it does not prescribe specific privacy requirements. The FTC has authority to enforce the FTC Act’s prohibition on deception, for example, by challenging deceptive statements made in privacy policies, user interfaces, FAQs, or other consumerfacing materials. The FTC could also, for example, challenge a particular use or disclosure of EHI as unfair if it causes or is likely to cause substantial injury to consumers that is not reasonably avoidable by consumers themselves and not outweighed by countervailing benefits to consumers or to competition (15 U.S.C. 45(n)). We will continue to work with our Federal partners, including the FTC, to assess education opportunities for consumers and app developers about the privacy and security of EHI collected, used, or received by health apps. Comments. A commenter recommended the development of a privacy framework regarding how health information should be shared and to empowering consumers; and it noted that it should be developed and matured in concert with the modernization of our nation’s health IT infrastructure. They expressed that there are private sector and public-private examples of models that we should look to from both health care and other industries. They believed that the Proposed Rule does not, however, fully address patient and consumer privacy protections. They recommended that the Center for Medicare and Medicaid Services and ONC should work together with relevant agencies and departments and private-sector colleagues to develop a companion consumer privacy framework. Response. We are aware of various industry initiatives regarding a ‘‘privacy framework.’’ We have previously published the Nationwide Privacy and Security Framework for Electronic Exchange of Individually Identifiable Health Information; 130 produced, in cooperation with the FTC, FDA, and OCR, the Mobile Health Apps 130 https://www.healthit.gov/sites/default/files/ nationwide-ps-framework-5.pdf. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 Interactive Tool; 131 and more recently published and developed the Privacy and Security Framework for PatientCentered Outcomes Research (PCOR). This project developed tools and resources that address the many different types of data that can be used to conduct patient-centered outcomes research. The framework consists of two initiatives: The Legal and Ethical Architecture for PCOR Data (Architecture), which guides readers through the responsible use and protection of electronic health data for PCOR and The Patient Choice Technical Project which harmonized existing technical mechanisms to enable interoperable exchange of patient consent for basic and granular choice for research and treatment, payment, and health care operations. This project, which remains active, also identifies, tests and validates technical standards that support an individual’s consent preferences.132 We will continue to monitor how individuals are educated about potential privacy and security risks of third-party apps and will continue to work with HHS OCR and industry stakeholders to further educate individuals as part of our implementation of section 4006 of the Cures Act. In this regard, we also encourage individuals to review consumer education materials related to protecting their EHI on our website at healthit.gov (‘‘What You Can do to Protection Your Health Information’’— https://www.healthit.gov/topic/privacysecurity/what-you-can-do-protect-yourhealth-information; and ‘‘Health IT: How to Keep Your Health Information Privacy and Secure: Fact Sheet’’— https://www.healthit.gov/sites/default/ files/how_to_keep_your_health_ information_private_and_secure.pdf). Comments. Commenters expressed concerns that if patients access their health data—some of which could contain family history and could be sensitive—through a smartphone, they should have a clear understanding of the potential uses of that data by thirdparty app suppliers. Response. Under the HIPAA Privacy Rule, when a covered health care provider, in the course of treating an individual, collects or otherwise obtains an individual’s family medical history, this information may become part of the individual’s medical record (45 CFR 164.501 (definition of ‘‘Designated Record Set’’). Thus, if the family 131 https://www.ftc.gov/tips-advice/businesscenter/guidance/mobile-health-apps-interactivetool. 132 See https://www.healthit.gov/topic/scientificinitiatives/pcor/privacy-and-security-frameworkpcor-psp. PO 00000 Frm 00177 Fmt 4701 Sfmt 4700 25817 medical history becomes part of the medical record, the individual/patient may exercise the rights under the HIPAA Privacy Rule, 45 CFR 164.524, to this information in the same fashion as any other information in the medical record, including the right of access. As discussed above, actors may educate patients of the risks related to providing other persons and entities with their EHI, including the various the types of EHI (e.g., family health history) that will be provided to an entity (e.g., thirdparty app) at the patient’s request. iv. Rent-Seeking and Other Opportunistic Pricing Practices Certain practices that artificially increase the cost and expense associated with accessing, exchanging, and using EHI may implicate the information blocking provision. We emphasized in the Proposed Rule that such practices are plainly contrary to the information blocking provision and the concerns that motivated its enactment. We explained that an actor may seek to extract profits or capture revenue streams that would be unobtainable without control of a technology or other interoperability elements that are necessary to enable or facilitate access, exchange, or use of EHI. Most EHI is currently stored in EHRs and other source systems that use proprietary data models or formats; this puts EHR developers (and other actors that control data models or standards) in a unique position to block access to (including the export and portability of) EHI for use in competing systems or applications or to charge rents for access to the basic technical information needed to accomplish the access, exchange, or use of EHI for these purposes. We emphasized that these information blocking concerns may be compounded to the extent that EHR developers do not disclose, in advance, the fees they will charge for interfaces, data export, data portability, and other interoperabilityrelated services (see 80 FR 62719 through 62725; 80 FR 16880 through 16881). We noted that these concerns are not limited to EHR developers. Other actors who exercise substantial control over EHI or essential interoperability elements may engage in analogous behaviors that would implicate the information blocking provision (84 FR 7520). To illustrate, we provided a list of non-exhaustive examples that reflected some of the more common types of rentseeking and opportunistic behaviors of which we were aware and that are likely to interfere with access, exchange, or use of EHI. Those examples are still applicable and we encourage readers to E:\FR\FM\01MYR3.SGM 01MYR3 25818 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations review the examples in the Proposed Rule (84 FR 7520 and 7521). The information blocking provision may be implicated by these and other practices by which an actor profits from its unreasonable control over EHI or interoperability elements without adding any efficiency to the health care system or serving any other procompetitive purpose. However, we stressed that the reach of the information blocking provision is not limited to these types of practices. We interpreted the definition of information blocking to encompass any fee that materially discourages or otherwise imposes a material impediment to access, exchange, or use of EHI. We used the term ‘‘fee’’ in the broadest possible sense to refer to any present or future obligation to pay money or provide any other thing of value and proposed to include this definition in § 171.102. We noted that this scope may be broader than necessary to address genuine information blocking concerns and could unnecessarily diminish investment and innovation in interoperable technologies and services. Therefore, as further explained in section VIII.D, we proposed to create an exception that, subject to certain conditions, would permit the recovery of costs that are reasonably incurred to provide access, exchange, and use of EHI (84 FR 7521). Comments. We did not receive comments specifically on our proposed definition of ‘‘fee.’’ Response. We have finalized the definition in § 171.102 as proposed. Comments. A few commenters requested additional examples and clarity on the types of rent-seeking and opportunistic pricing practices that would be likely to implicate the information blocking provision. Response. We refer readers to our discussion of the Fees Exception (section VIII.D.2.b.) for additional examples, as well as for a detailed discussion of fees that may and may not be charged under this exception. v. Non-Standard Implementation Practices We explained in the Proposed Rule that section 3022(a)(2)(B) of the PHSA states that information blocking may include implementing health IT in nonstandard ways that substantially increase the complexity or burden of accessing, exchanging, or using EHI. In general, this type of interference is likely to occur when, despite the availability of generally accepted technical, policy, or other approaches that are suitable for achieving a particular implementation objective, an VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 actor does not implement the standard, does not implement updates to the standard, or implements the standard in a way that materially deviates from its formal specifications. We noted that these practices lead to unnecessary complexity and burden, such as the additional cost and effort required to implement and maintain ‘‘point-topoint’’ connections, custom-built interfaces, and one-off trust agreements. While each case will necessarily depend on its individual facts, and while we recognized that the development and adoption of standards across the health IT industry is an ongoing process, we explained that the information blocking provision would be implicated in at least two distinct sets of circumstances. First, we stated that information blocking may arise where an actor chooses not to adopt, or to materially deviate from, relevant standards, implementation specifications, and certification criteria adopted by the Secretary under section 3004 of the PHSA. Second, even where no federally adopted or identified standard exists, if a particular implementation approach has been broadly adopted in a relevant industry segment, deviations from that approach would be suspect unless strictly necessary to achieve substantial efficiencies. To further illustrate these types of practices that may implicate the information blocking provision, we provided a list of non-exhaustive examples of conduct that would be likely to interfere with access, exchange, or use of EHI. We have chosen not to include those examples in this final rule, but emphasize that they are still applicable and encourage readers to review the examples in the Proposed Rule (84 FR 7521). We explained that even where no standards exist for a particular purpose, actors should not design or implement health IT in non-standard ways that unnecessarily increase the costs, complexity, and other burdens of accessing, exchanging, or using EHI. We also noted that we were aware that some actors attribute certain non-standard implementations on legacy systems that the actor did not themselves design but which have to be integrated into the actor’s health IT. We noted that such instances will be considered on a caseby-case basis. Comments. A few commenters requested additional clarity on when non-standard based interoperability is permissible. Some commenters urged ONC to be careful and flexible in its interpretation of this information blocking practice given the complexities PO 00000 Frm 00178 Fmt 4701 Sfmt 4700 of health IT implementation, such as implementing newly adopted standards or requirements. One commenter highlighted the importance of being able to retain certain types of optionality, especially for specialized use cases. Other commenters expressed concern that considering non-standard implementation practices as likely to implicate the information blocking provision could have the unintended consequence of stymying innovative or novel technologies used in information exchange. Response. We appreciate the commenters’ suggestions. We emphasize that the problematic nature of nonstandard design and implementation choices was identified by Congress in section 3022(a)(2)(B) of the PHSA, which states that information blocking may include implementing health IT in non-standard ways that are likely to substantially increase the complexity or burden of accessing, exchanging, or using EHI. We continue to be concerned that these practices will lead to unnecessary complexity and burden related to the access, exchange, or use of EHI, and depending on the circumstances, we maintain that such practices would be likely to interfere with access, exchange, or use of EHI. We refer readers to the discussion of this topic in the Fees Exception (section VIII.D.2.b). We also agree, however, that we must give each case careful consideration and assess the individual facts and circumstances to determine whether such practices would be likely to interfere with access, exchange, or use of EHI. 7. Applicability of Exceptions a. Reasonable and Necessary Activities Section 3022(a)(3) of the PHSA requires the Secretary to identify, through notice and comment rulemaking, reasonable and necessary activities that do not constitute information blocking for purposes of the definition in section 3022(a)(1). Section 3022(a)(1) of the PHSA defines information blocking by referring to practices likely to interfere with, prevent or materially discourage access, exchange or use of electronic health information. Based on this terminology used in the PHSA, we noted that conduct that implicates the information blocking provision and that does not fall within one of the exceptions or does not meet all conditions for an exception, would be considered a ‘‘practice.’’ Conduct that falls within an exception and meets all the applicable conditions for that exception would be considered E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations an ‘‘activity.’’ We noted that the challenge with this distinction is that when examining conduct that is the subject of an information blocking claim—an actor’s actions that are likely to interfere with access, exchange, or use of EHI—it can be illusory to distinguish, on its face, conduct that is a practice and conduct that is an activity. Indeed, conduct that implicates the information blocking provision but falls within an exception could nonetheless be considered information blocking if the actor has not satisfied the conditions applicable to that exception. Acknowledging the terminology used in the PHSA, we proposed to define ‘‘practice’’ in § 171.102 as one or more related acts or omissions by an actor. We also proposed to use the term ‘‘practice’’ throughout the Proposed Rule when we described conduct that is likely to interfere with, prevent, or materially discourage the access, exchange, or use of EHI, and clarify when describing the conduct at issue whether it is a practice that is information blocking, a practice that implicates the information blocking provision, or a practice that is reasonable and necessary and not information blocking (84 FR 7522). We stated that adopting the terminology of ‘‘activity’’ to describe conduct that may or may not be information blocking would be confusing and obfuscate our intent in certain circumstances. Consistent with this approach, when describing the exceptions in the final rule, we describe practices that, if all the applicable conditions are met, are reasonable and necessary and not information blocking. Comments. We received no comments specifically on the distinction between ‘‘activities’’ and ‘‘practices’’ and our proposed definition and use of the term ‘‘practice.’’ Response. We have finalized the definition of ‘‘practice’’ in § 171.102 as ‘‘an act or omission by an actor.’’ This definition is a modification of the proposed definition, which was ‘‘one or more related acts or omissions by an actor.’’ We finalized this definition of ‘‘practice’’ in order to clarify that a practice need only be a single act or omission. This modification does not substantively change the proposed definition, as we included in the proposed definition that a ‘‘practice’’ could be one act or omission. We have finalized the use of the term ‘‘practice,’’ rather than the term ‘‘activity,’’ to describe conduct that is likely to interfere with, prevent or materially discourage the access, exchange, or use of EHI. We have also finalized our approach that when VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 identifying exceptions, we describe practices that, if all the applicable conditions are met, are reasonable and necessary and not information blocking. b. Treatment of Different Types of Actors We explained in the Proposed Rule that the proposed exceptions would apply to health care providers, health IT developers of certified health IT, HIEs, and HINs who engage in certain practices covered by an exception, provided that all applicable conditions of the exception are satisfied at all relevant times and for each practice for which the exception is sought. We noted that the exceptions are generally applicable to all actors. However, in some instances, we proposed conditions within an exception that apply to a particular type of actor. Comments. Several commenters agreed that the exceptions should apply to all actors. A few commenters requested that ONC identify exceptions that apply to all actors and identify exceptions that only apply to select actors. Response. We appreciate the support for our approach to the exceptions, as well as the suggestion to restructure the exceptions. We continue to believe that the clearest and most equitable approach to the exceptions is to make all of the exceptions apply to all actors, as proposed. We have addressed the commenters’ concerns by creating conditions within certain exceptions that apply to one or a subset of actors, as applicable. c. Establishing That Practices Meet the Conditions of an Exception We proposed that, in the event of an investigation of an information blocking complaint, an actor must demonstrate that an exception is applicable and that the actor met all relevant conditions of the exception at all relevant times and for each practice for which the exception is sought (84 FR 7522). We considered this allocation of proof to be a substantive condition of the proposed exceptions. As a practical matter, we proposed that actors are in the best position to demonstrate compliance with the conditions of the exceptions and to produce the detailed evidence necessary to demonstrate that compliance. We requested comment about the types of documentation and/ or standardized methods that an actor may use to demonstrate compliance with the exception conditions. Comments. Many commenters requested clarification regarding the type and amount of documentation required to demonstrate that they have PO 00000 Frm 00179 Fmt 4701 Sfmt 4700 25819 met an exception. In particular, many commenters noted that meeting the exceptions will substantially increase documentation burden and other administrative costs for actors. Commenters also noted that organizations may need to update, develop and/or implement policies and procedures focused on documenting compliance with information blocking exceptions. Many commenters requested that ONC develop and provide examples, templates, and guidance on the type of documentation that would be acceptable to support the conditions for each information blocking exception. Several commenters noted that the supporting documentation should clearly demonstrate why the actor qualifies for the exception, why the exception is required, and how all conditions of the exception are fulfilled. One commenter asked that we provide guidance on the appropriate storage method for this documentation, as this information may not be appropriate for the clinical record. Response. We thank commenters for these thoughtful comments and suggestions. We have tailored the exceptions and provided significant detail within each exception to clearly explain what an actor must do to meet each exception. For each exception, we have proposed and finalized conditions that we believe can be consistently applied across a range of actors and practices and also further the goals of the information blocking provision. For some exceptions, this includes a writing or documentation requirement to demonstrate that the practice precisely meets all of the conditions to afford an actor the enhanced assurance an exception offers. Many of these conditions are related to other existing regulatory requirements that have similar documentation standards. For example, an actor’s practice may meet the Security Exception at § 171.203 if it is consistent with an organizational security policy and that policy meets several requirements. We expect that many actors have existing organizational security policies based on the ‘‘Policy and procedures and documentation requirements’’ in the HIPAA Security Rule at 45 CFR 164.316. Consequently, the burden associated with meeting the documentation requirement in the Security Exception should be less if actors are already complying with the HIPAA Security Rule. We encourage actors to voluntarily comply with an exception so that their practices do not meet the definition of information blocking and are not subject E:\FR\FM\01MYR3.SGM 01MYR3 25820 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations to information blocking enforcement. However, failure to meet an exception does not necessarily mean a practice meets the definition of information blocking. If subject to an investigation, each practice that implicates the information blocking provision and does not meet an exception would be analyzed on a case-by-case basis to evaluate, for example, whether it rises to the level of an interference, and whether the actor acted with the requisite intent. D. Exceptions to the Information Blocking Definition We proposed to establish seven exceptions to the information blocking provision. The exceptions would apply to certain practices that may technically meet the definition of information blocking but that are reasonable and necessary to further the underlying public policies of the information blocking provision. We appreciate that most actors will want to meet an exception to guarantee that their practice or practices do not meet the definition of information blocking and be subject to enforcement. The statute defines information blocking broadly and in a manner that allows for careful consideration of relevant facts and circumstances in individual cases, which includes analysis of an actor’s intent and whether it meets the requisite knowledge standard. The proposed exceptions were based on three related policy considerations. First, each exception was limited to certain activities that clearly advance the aims of the information blocking provision. These reasonable and necessary activities included providing appropriate protections to prevent harm to patients and others; promoting the privacy and security of EHI; promoting competition and innovation in health IT and its use to provide health care services to consumers, and to develop more efficient means of health care delivery; and allowing system downtime to implement upgrades, repairs, and other changes to health IT. Second, each proposed exception addressed a significant risk that regulated actors will not engage in these beneficial activities because of uncertainty concerning the breadth or applicability of the information blocking provision. Finally, each exception was subject to strict conditions to ensure that it was limited to activities that are reasonable and necessary. We explained that the first three exceptions extended to certain activities that are reasonable and necessary to prevent harm to patients and others; promote the privacy of EHI; and promote the security of EHI, subject to VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 strict conditions to prevent the exceptions from being misused. We discussed that without these exceptions, actors may be reluctant to engage in the reasonable and necessary activities and that this could erode trust in the health IT ecosystem and undermine efforts to provide access and facilitate the exchange and use of EHI for important purposes. We stressed that such a result would be contrary to the purpose of the information blocking provision and the broader policies of the Cures Act. We explained that the next three exceptions addressed activities that are reasonable and necessary to promote competition and consumer welfare. First, we proposed to permit the recovery of certain types of reasonable costs incurred to provide technology and services that enable access to EHI and facilitate the exchange and use of that information, provided certain conditions are met. Second, we proposed to permit an actor to decline to provide access, exchange, or use of EHI in a manner that is infeasible, subject to a duty to provide a reasonable alternative. And third, we proposed an exception that would permit an actor to license interoperability elements on reasonable and non-discriminatory terms. We emphasized that the exceptions would be subject to strict conditions to ensure that they do not extend protection to practices that raise information blocking concerns. The last exception recognized that it may be reasonable and necessary for actors to make health IT temporarily unavailable for the benefit of the overall performance of health IT. This exception would permit an actor to make the operation of health IT unavailable to implement upgrades, repairs, and other changes. As context for the proposed exceptions, we noted that addressing information blocking is critical for promoting competition and innovation in health IT and for the delivery of health care services to consumers. We noted that the information blocking provision itself expressly addresses practices that impede innovation and advancement in health information access, exchange, and use, including care delivery enabled by health IT (section 3022(a)(2)(C)(ii) of the PHSA). We also noted that health IT developers of certified health IT, HIEs, HINs, and, in some instances, health care providers, may exploit their control over interoperability elements to create barriers to entry for competing technologies and services that offer greater value for health IT customers and users, provide new or improved capabilities, and enable more robust PO 00000 Frm 00180 Fmt 4701 Sfmt 4700 access, exchange, and use of EHI.133 More than this, we emphasized that information blocking may harm competition not just in health IT markets, but also in markets for health care services.134 Dominant providers in these markets may leverage their control over technology to limit patient mobility and choice.135 They may also pressure independent providers to adopt expensive, hospital-centric technologies that do not suit their workflows, limit their ability to share information with unaffiliated providers, and make it difficult to adopt or use alternative technologies that could offer greater efficiency and other benefits.136 The technological dependence resulting from these practices can be a barrier to entry by would-be competitors. It can also make independent providers vulnerable to acquisition or induce them into exclusive arrangements that enhance the market power of incumbent providers while preventing the formation of clinically-integrated products and networks that offer more choice and better value to consumers and purchasers of health care services. We noted in the Proposed Rule that section 3022(a)(5) of the PHSA provides that the Secretary may consult with the Federal Trade Commission (FTC) in defining practices that do not constitute information blocking because they are necessary to promote competition and consumer welfare. We expressed appreciation for the expertise and informal technical assistance of FTC staff, which we took into consideration in developing the exceptions for recovering costs reasonably incurred, responding to requests that are infeasible, and licensing of interoperability elements on reasonable and non-discriminatory terms. We noted that the language in the Cures Act regarding information blocking is substantively and substantially different 133 See also Martin Gaynor, Farzad Mostashari, and Paul B. Ginsberg, Making Health Care Markets Work: Competition Policy for Health Care, 16–17 (Apr. 2017), available at https://heinz.cmu.edu/ news/news-detail/index.aspx?nid=3930. 134 See, e.g., Keynote Address of FTC Chairwoman Edith Ramirez, Antitrust in Healthcare Conference Arlington, VA (May 12, 2016), available at https://www.ftc.gov/system/files/documents/ public_statements/950143/ 160519antitrusthealthcarekeynote.pdf. 135 See, e.g., Martin Gaynor, Farzad Mostashari, and Paul B. Ginsberg, Making Health Care Markets Work: Competition Policy for Health Care, 16–17 (Apr. 2017), available at https://heinz.cmu.edu/ news/news-detail/index.aspx?nid=3930. 136 See, e.g., Healthcare Research Firm Toughens Survey Standards as More CIOs Reap the Profits of Reselling Vendor Software, Black Book, available at https://www.prweb.com/releases/2015/02/ prweb12530856.htm; Arthur Allen, Connecticut Law Bans EHR-linked Information Blocking, Politico.com (Oct. 29, 2015). E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations from the language and goals in the antitrust laws enforced by the FTC. We explained that we view the Cures Act as addressing conduct that may be considered permissible under the antitrust laws. On this basis, the Proposed Rule required that actors who control interoperability elements cooperate with individuals and entities that require those elements for the purpose of developing, disseminating, and enabling technologies and services that can interoperate with the actor’s technology. We emphasized that ONC took this approach because we view patients as having an overwhelming interest in EHI about themselves. As such, access to EHI, and the EHI itself, should not be traded or sold by those actors who are custodians of EHI or who control its access, exchange, or use. We emphasized that such actors should not be able to charge fees for providing electronic access, exchange, or use of patients’ EHI. We explained that the information blocking provision prohibits actors from interfering with the access, exchange, or use of EHI unless they are required to do so under an existing law or are covered by one of the exceptions detailed in this preamble. In addition, we explained that any remedy sought or action taken by HHS under the information blocking provision would be independent of the antitrust laws and would not prevent FTC or DOJ from taking action with regard to the same actor or conduct. We proposed to include a provision in § 171.200 that addresses the availability and effect of exceptions. We requested comment on the seven proposed exceptions, including whether they will achieve our stated policy goals. Comments. We received comments regarding each of the proposed exceptions. Response. We have responded to the comments regarding each exception in the preamble discussions for each exception. Overall, we have made modifications to the structure and scope of the proposed exceptions. In this final rule, we have restructured the proposed exceptions (proposed in §§ 171.201–207) and have added another exception for clarity. In addition, we have divided the exceptions into two categories: (1) Exceptions that involve not fulfilling requests to access, exchange, or use EHI, which are finalized in §§ 171.201–205; and (2) exceptions that involve procedures for fulfilling requests to access, exchange, or use EHI, which are finalized in §§ 171.301–303. We also changed the titles of the exceptions to VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 questions for additional clarity. We believe this new structure will help actors better understand our expectations of them and enhance transparency around the exceptions. We note that we use the term ‘‘fulfill’’ throughout the exceptions in the context of an actor ‘‘fulfilling’’ a request to access, exchange, or use EHI. This term is intended to reflect not just a response to a request to access, exchange, or use EHI, but also making the EHI available for the requested access, exchange, or use. We have finalized the seven exceptions with modifications discussed below. Based on requests for comment we included in the Proposed Rule regarding the scope of the EHI definition (84 FR 7513) and the Infeasibility Exception (84 FR 7542 through 7544), we have also established a new exception in § 171.301 (referred to as the Content and Manner Exception) under section 3022(a)(3) of the PHSA as a means to identify reasonable and necessary activities that do not constitute information blocking. We discuss the details of the new Content and Manner Exception in section VIII.D.2.a of this preamble. We appreciate the FTC’s comments on the Proposed Rule and the expertise and informal technical assistance provided by FTC staff for this final rule, which we took into consideration throughout our development of the final rule, including as it relates to the definitions of various terms in the final rule (e.g., the definitions of ‘‘electronic health information’’ and ‘‘health information network’’ (discussed above)) and the exceptions (e.g., the Infeasibility Exception, Fees Exception, and Licensing Exception; as well as the establishing of the new Content and Manner Exception). Comments. We did not receive any comments on the provision in § 171.200. Response. We have finalized § 171.200 as proposed and have included an identical provision in § 171.300 that is applicable to Part C. This addition was necessary based on the new structure of the exceptions discussed above. 1. Exceptions that involve not fulfilling requests to access, exchange, or use EHI a. Preventing Harm Exception — When will an actor’s practice that is likely to interfere with the access, exchange, or use of electronic health information in order to prevent harm not be considered information blocking? We proposed to establish an exception to the information blocking provision in § 171.201 that would apply to certain practices that are reasonable PO 00000 Frm 00181 Fmt 4701 Sfmt 4700 25821 and necessary to prevent harm to a patient or another person. As discussed in the Proposed Rule’s preamble (84 FR 7523 and 7524), this exception is intended to allow for the protection of patients and other particular persons against substantial risks of harm otherwise arising from the access, exchange, or use of EHI in defined circumstances. Strict conditions were proposed to prevent this exception from being misused. As explained in the Proposed Rule, we use the term ‘‘patient’’ to denote the context in which the threat of harm arises (84 FR 7523). That is, this exception has been designed to recognize practices taken for the benefit of recipients of health care — those individuals whose EHI is at issue — and other persons whose information may be recorded in that EHI or who may be at risk of harm because of the access, use, or exchange of the EHI. This use of the term ‘‘patient’’ in the Proposed Rule did not imply that practices to which the exception is applicable could be implemented only by the licensed health professionals with a clinicianpatient relationship to the person whose EHI is affected by the practices. This exception was proposed to apply to practices when the actor engaging in a practice has a reasonable belief that the practice will directly and substantially reduce a risk of harm to the patient, and/or other particular individuals, that would otherwise arise from the particular access, exchange, or use of EHI affected by the practices. We proposed that actors including but not limited to health care providers would, consistent with conditions of the exception applicable to the circumstances in which the practices are used, be able to engage in practices recognized under this exception without the actor needing to have a clinicianpatient relationship with any of the individuals at risk of harm. Comments. Of more than ninety comment submissions specifically referencing the Preventing Harm Exception, half expressed overarching or general support for the exception. None of the comments specifically referencing this exception expressed opposition to the exception. Some commenters advocated broadening certain aspects of the proposed exception, as discussed in more detail below. Several other commenters expressed support for a relatively narrow exception, and a few of these commenters recommended that once the final rule is effective ONC should engage in monitoring to ensure the exception is not abused in practice. Many commenters requested E:\FR\FM\01MYR3.SGM 01MYR3 25822 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations clarification on specific points, or expressed concerns or suggested modifications to particular aspects of the exception, as will be discussed in more detail below. Response. We appreciate the many thoughtful comments on the value of this exception, particular aspects of the proposed exception, and areas where we could streamline how we express the policy so it is easier to understand. Considering all of the comments received, we have decided to finalize the exception largely as proposed, with modifications to better align with HIPAA Rules as discussed below and to make the regulation text more easily understood. These revisions include modification of the title of § 171.201, from ‘‘Exception—Preventing Harm’’ (84 FR 7602) to ‘‘Preventing Harm Exception — When will an actor’s practice that is likely to interfere with the access, exchange, or use of electronic health information in order to prevent harm not be considered information blocking?’’ Throughout this preamble, we use ‘‘Preventing Harm Exception’’ as a short title for ease of reference to the exception that has been finalized in § 171.201. Comments. Several comments suggested broadening the scope of the exception to allow a broader array of actors to decide what might pose a risk of harm to a patient. Response. The finalized exception is, as we proposed it would be, available to any actor defined in § 171.102, provided that the actor’s use of a practice for purposes of harm prevention meets the conditions in § 171.201. Only where practices are applied to a specific patient’s EHI and based upon a determination of a risk of harm by a licensed health care professional in the exercise of professional judgment does this exception explicitly require the determination to have been made by a particular subset of actors within the definitions in § 171.102. In order to meet the risk of harm condition based on an individualized determination consistent with § 171.201(c)(1), the licensed health care professional who made the determination must have done so in context of a current or prior clinician-patient relationship with the patient whose EHI is affected by the determination.137 However, other actors 137 For purposes of this exception, we interpret ‘‘clinician-patient relationship’’ to include any therapeutic or relationship where the licensed health care professional has or at some point had some clinical responsibility for or to the patient within the professional’s scope of practice. Thus, a clinician-patient relationship on which a qualifying individualized determination of risk of harm could be one of substantial duration over time or formed VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 — such as other health care providers treating the same patient, or an HIE/HIN supporting access, exchange, or use of the patient’s EHI — could rely on such a determination of a risk of harm. The actor’s knowledge of a licensed health care professional’s individualized determination (consistent with § 171.201(c)(1)) that access, exchange, or use posed a risk of a harm of a type consistent with § 171.201(d)(1), (2), or (3) (as applicable) could factor into a determination based on facts and circumstances known or reasonably believed by the actor (consistent with the condition finalized § 171.201(f)(2)). An actor could also implement practices based on knowledge of an individualized determination of risk (§ 171.201(c)(1)) of harm of a type consistent with § 171.201(d)(1), (2), or (3) as applicable and based on an organizational policy (consistent with the condition finalized § 171.201(f)(1)). Thus, the exception is broad enough to cover all actors implementing practices that meet its conditions. We are finalizing this aspect of the exception as proposed, with clarifications to the regulation text to make it easier to understand what the specific conditions of the Preventing Harm Exception are and how they relate to one another. Comments. A large number of commenters requested additional guidance in this final rule preamble or through other avenues. For example, some commenters requested subregulatory guidance and educational resource materials to further illustrate and help actors understand how the Preventing Harm Exception might apply or what it might require without a stakeholder needing to raise particular questions or hypothetical fact patterns. Response. With the revisions we have made to this exception, we do not believe sub-regulatory guidance is necessary for actors who wish to avail themselves of this exception to understand the Preventing Harm Exception, its conditions, or to conform their practices to the conditions. We have made revisions to the regulation text to provide enhanced clarity, such as separately expressing each of its substantive conditions and incorporating granular alignment to 45 CFR 164.524(a)(3) harm standards. This final rule preamble provides additional information and feedback through discussion of the particular questions and suggestions posed by various commenters and this preamble’s in the course of the first or only occasion on which the clinician furnishes or furnished professional services to the patient in any setting, including but not limited to telehealth. PO 00000 Frm 00182 Fmt 4701 Sfmt 4700 statements of finalized policy. We will also provide, in connection to this final rule, educational resources such as infographics, fact sheets, webinars, and other forms of educational materials and outreach. We emphasize, however, that we believe the final rule clearly describes our information blocking policies, and these educational materials are intended only to educate stakeholders on our final policies established in the final rule. Comments. Several commenters questioned whether ‘‘directly and substantially’’ may be a more stringent standard than is necessary for the reduction of risk of harm to a patient or to another person. A number of commenters indicated it could be difficult for actors to know where to draw the line between direct and indirect reductions of risk of harm, given the potential for reasonable minds to disagree on the extent to which a risk arises directly, as opposed to indirectly, from the EHI access, exchange, or use affected by a practice. Several commenters recommended, as an alternative, that the condition be that the actor have a reasonable belief the practice is ‘‘reasonably likely’’ to reduce a risk of harm. Response. After considering comments received, we have finalized in § 171.201(a) that the actor must hold a reasonable belief that the practice ‘‘will substantially reduce’’ a risk of harm to a patient or another natural person. In comparison to the regulation text of this exception in the Proposed Rule (84 FR 7602), we have removed ‘‘directly’’ from the finalized text of § 171.201(a). We believe omitting ‘‘directly’’ from the finalized condition obviates concerns about actors’ ability to determine whether the practice directly reduces a risk of harm that could itself arise indirectly. We have retained ‘‘substantially’’ in the finalized § 171.201(a) because we believe it is necessary to ensure this exception cannot be misused to justify practices that interfere with access, exchange, or use of EHI to achieve only a trivial or illusory reduction in risk of harm. By extension, we interpret a ‘‘substantial reduction’’ as necessarily implying that the risk intended to be reduced was itself substantial and not trivial or illusory. We note that the harm standard under § 164.524(a)(3) of the HIPAA Rules includes that the access requested be ‘‘reasonably likely’’ to cause the type of harm described in the sub-paragraph applicable to a particular denial of access under § 164.524(a)(3). As discussed in context of the finalized type of harm condition (§ 171.201(d)), E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations below, we have aligned the conditions of the Preventing Harm Exception finalized in § 171.201 to use the same harm standards as § 164.524(a)(3) in circumstances where both apply and in circumstances where only § 171.201 applies. In order to maintain alignment and consistency, we clarify that in circumstances where only § 171.201 applies, the risk of harm must also initially be at least ‘‘reasonably likely,’’ regardless of whether the risk of harm is consistent with subparagraph (1) or (2) of the type of risk condition finalized in § 171.201(c). To satisfy the reasonable belief condition finalized in § 171.201(a), the actor must reasonably believe their practices (that are likely to, or in fact do, interfere with otherwise permissible access, exchange, or use of EHI) will substantially reduce that likelihood of harm. Actors who are HIPAA covered entities or business associates have extensive experience in complying with § 164.524(a)(3). Therefore, we believe the belief standard finalized in § 171.201(a), combined with reliance on the harm standards used in § 164.524(a)(3), will address commenters’ concerns about their ability to understand and apply the reasonable belief and type of harm conditions finalized under § 171.201. Comments. A number of commenters advocated closer alignment with the HIPAA Privacy Rule. Some commenters expressed concerns about our ability to maintain such alignment without interruption if this rule were to be finalized prior to any applicable potential updates to the HIPAA Privacy Rule pursuant to a proposed rule that HHS had publicly expressed an aim to publish in 2019. Some commenters specifically questioned whether ‘‘life or physical safety’’ would remain the standard for the type of harm cognizable under the Privacy Rule for denying an individual’s right to access their own information. One commenter stated they had heard the Privacy Rule harm standard might be broadened to recognize additional types of harm, such as emotional or psychological harm, in circumstances where the Privacy Rule would currently recognize only danger to life or physical safety. A number of comments stated that the requirement for the risk to be to life or physical safety for all circumstances where this exception would apply would conflict with current Privacy Rule provisions applicable to individual or proxy access to PHI. A number of commenters recommended we revise the conditions for practices to be recognized under the Preventing Harm Exception so that harm cognizable under the Privacy Rule VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 under particular circumstances would also be cognizable under § 171.201. Response. We understand commenters’ concerns about inconsistency across this exception and the Privacy Rule. In particular, concerns that center on the fact that requiring in § 171.201 that the risk must be to the ‘‘life or physical safety’’ of the patient or another person in all circumstances where § 171.201 applies would have set a different harm standard than applies under § 164.524(a)(3) in particular circumstances where both §§ 171.201 and 164.524(a)(3) apply. Specifically, where § 164.524(a)(3)(ii) or (iii) apply, the reviewable grounds for denial of right of access include where a licensed health care professional has determined, in the exercise of professional judgment, that the access requested is likely to cause ‘‘substantial harm.’’ In contrast, a uniform application of the ‘‘life or physical safety’’ type of harm under § 171.201 would have applied the ‘‘life or physical safety’’ type of harm standard to practices that interfere with access, exchange, or use of EHI for purposes of § 171.201 even where § 164.524(a)(3)(ii) or (iii) would also apply and where § 164.524(a)(3)(ii) or (iii) would apply the ‘‘substantial harm’’ standard. In response to comments, we have reviewed the potential for conflict between § 171.201 requiring ‘‘life or physical safety’’ as the type of harm in circumstances where § 164.524(a)(3(ii) or (iii) also apply. We have determined that for particular types of circumstances where both §§ 171.201 and 164.524(a)(3) apply, the best approach is to apply under § 171.201 the exact same harm standard that each specific sub-paragraph of § 164.524(a)(3) applies in each of these types of circumstances. We believe that extending the application under § 171.201 of the specific harm standards in § 164.524(a)(3)(i) through (iii) to situations that are similar in significant respects to situations where each of these sub-paragraphs of § 165.524(a)(3) would apply, but where § 164.524(a)(3) does not apply, provides consistency that simplifies compliance for actors subject to both 45 CFR part 171 and 45 CFR part 164. Situations where § 171.201 could apply but where § 164.524(a)(3) would not apply include, but are not limited to, those where the actor’s practice is likely to interfere with an individual or their legal representative’s access, exchange, or use of the individual’s EHI but not to the extent of failing to provide access (as the term is used in context of § 164.524) within the timeframe allowed under § 164.524. PO 00000 Frm 00183 Fmt 4701 Sfmt 4700 25823 To make the alignment between the Preventing Harm Exception and the Privacy Rule clear, the final regulation text at § 171.201(d) cross-references the specific types of harm that would serve as grounds for denying an individual or their personal representative access to their PHI under the Privacy Rule (§ 164.524(a)(3)) in particular types of circumstances.138 By cross-referencing to § 164.524(a)(3), we align the regulations to streamline compliance for actors. We also believe this approach will allow that alignment to remain in place if changes were to be made to § 164.524(a)(3) harm standards in the future.139 In particular types of circumstances where both § 164.524(a)(3) and § 171.201 apply, the subparagraphs of finalized § 171.201(d) (the type of harm condition) crossreference to the § 164.524(a)(3)(i), (ii), and (iii) harm standard that applies under § 171.201 in each of these types of circumstances. Moreover, where only § 171.201 applies to a practice where the type of risk is consistent with § 171.201(c)(1), the finalized subparagraphs of § 171.201(d) crossreference and apply the harm standard that § 164.524(a)(3)(i), (ii), or (iii) would apply to denial of the individual’s (§ 164.524) right of access to their own PHI, the individual or their representative’s access to the PII of another person within that PHI, or the individual’s personal representative’s access to the individual’s PHI. One example of a particular circumstance in which both § 164.524(a)(3) and § 171.201 would apply is where a health care provider (as defined in § 171.102) that is also a HIPAA covered entity (as defined in § 160.103) denies the patient’s personal representative access to the patient’s EHI based on a licensed health care professional’s determination in the exercise of professional judgment (§ 171.201(c)(1)) that granting that personal representative access to the patient’s EHI would pose a risk of substantial harm to the patient.140 In 138 Meeting the harm standard is necessary but not alone sufficient for a practice to be recognized as reasonable and necessary under this exception; all other conditions of the exception must also be met. 139 Alignment between part 171 subpart B and § 164.524(a)(1) and (2) is discussed in Section VIII.D.2. We also acknowledge that it is possible some types of revision to 45 CFR part 164 could necessitate modifications to 45 CFR part 171 in the future. 140 For purposes of how the § 171.201 requirements and cross-references to § 164.524 operate within this example, it makes no difference whether the health care provider acting on the individualized determination is the licensed health care professional who made the determination E:\FR\FM\01MYR3.SGM Continued 01MYR3 25824 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations this circumstance, the finalized § 171.201(d)(1), which cross-references the harm standard applicable under § 165.524(a)(3)(iii), applies. In this example situation, the qualifying determination of risk of harm (§ 171.201(c)(1)) is that any access (or exchange, or use) of the EHI by the personal representative is reasonably likely to cause harm consistent with the standard established in § 164.524(a)(3)(iii), and thus the health care professional, or another HIPAA covered entity or business associate with knowledge of the determination, could also deny a request by the representative to access the individual’s ePHI under § 164.524(a)(iii). Under § 164.524(a)(iii), the harm must be a ‘‘substantial harm’’ to qualify for the denial of the patient’s personal representative’s request to access the patient’s PHI. Similarly, both § 171.201 and § 164.524(a)(3) apply where an information blocking actor that is also a HIPAA covered entity, acting in reliance on a determination of risk of harm made by a licensed health care professional in the exercise of professional judgment, does not provide the patient or the patient’s personal representative any access to information within the patient’s EHI that references another person. In this type of circumstance, § 171.201(d)(2) by cross-reference to § 164.524(a)(3)(ii) applies the same ‘‘substantial harm’’ standard under § 171.201 that applies to the actor’s denying the patient or their representative access to that information under § 164.524(a)(3)(ii).141 In § 171.201(d)(1), (2), and (3), as finalized, we also apply the harm standards described in § 164.524(a)(3)(i), (ii), or (iii) to particular types of circumstances where § 164.524 does not apply, but that are similar with respect to whether it is the patient or their representative requesting access, and whether the access requested is to information within the patient’s EHI that is another person’s identifiable information. For example, § 171.201(d)(3) applies the harm standard described in § 164.524(a)(3)(i) where practices that are likely to interfere with a patient’s access, exchange, or use 142 of the patient’s own consistent with § 171.201(c)(1), another licensed health care professional, or another type of health care provider (such as a hospital or skilled nursing facility). 141 Note that the ‘‘individual’’ and ‘‘access’’ have different meanings under 45 CFR 164.524 from those in 45 CFR part 171. Regarding an individual’s right of access under 45 CFR 164.524, the term ‘‘access’’ should be understood in that HIPAA Privacy Rule context. 142 As the terms ‘‘access,’’ ‘‘exchange,’’ and ‘‘use’’ are defined in § 171.102. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 EHI are implemented to substantially reduce a risk of harm arising from data that is known or reasonably suspected to be misidentified or mismatched, corrupt due to technical failure, or erroneous for another reason (§ 171.201(c)(2)). Provided its conditions are met in full, the Preventing Harm Exception (§ 171.201) would apply to such practices as delaying access, exchange, or use, for the time necessary to correct the errors that would otherwise pose a risk of harm to the patient (or another person) that would be cognizable under § 164.524(a)(3)(i) if § 164.524(a)(3)(i) applied.143 Such delays are not explicitly addressed under § 164.524(a)(3), which provides a maximum timeframe for disclosure of PHI to which patients have the right of access, and § 164.524(a)(3) does not expressly contemplate risks of harm arising from data issues as would be consistent with § 171.201(c)(2). By contrast, § 171.201 defines when a practice that is likely to, or does, interfere with the access, exchange, or use of EHI is excepted from the definition of information blocking in § 171.103 that applies to the actor engaged in the practice, and expressly applies where the actor can demonstrate a reasonable belief the practice will substantially reduce a risk of harm arising from data issues consistent with § 171.201(c)(2). Because risks of harm arising from data that is known or reasonably suspected to be misidentified or mismatched, corrupt due to technical failure, or erroneous for another reason (§ 171.201(c)(2)) would apply equally to an individual’s or their representative’s or their health care provider’s access, exchange, or use of the patient’s EHI, § 171.201(d)(4) applies the standard in § 164.524(a)(3)(i) to all of these circumstances. Thus, as § 164.524(a)(3)(i) stands at the time of publication of this final rule, the access, exchange, or use of the EHI affected by the practice must be reasonably likely to endanger the life or physical safety of the patient or another person were the practice not implemented. (Please see Table 3 for a crosswalk of the particular types of circumstances addressed by the subparagraphs under § 171.201(d) to the § 164.524 harm standard applicable to each type of circumstance.) The finalized regulatory text in § 171.201 is revised from the Proposed Rule to reflect this more granular and comprehensive alignment of harm standards across the two regulatory provisions. We believe this alignment achieves the level of granular crossreference necessary and that is preferable to selecting only one of these standards to apply in all types of circumstances under § 171.201. We further note that the revised regulation text is consistent with our decision to completely align the EHI definition with the definition of ePHI within the designated record set.144 Comments. A number of commenters advocated for expanding the definition of harm that is contemplated under this exception to encompass psychological and/or emotional harm in addition to risks to life or physical safety, including but not limited to expanding the concept of individualized determinations of risk of harm by health care professionals. A few commenters specifically advocated recognizing the potential for financial, reputational, or social/cultural harms. A number of other commenters expressed a concern that broadening the exception to address additional types of potential harm could risk its being overused to withhold information from patients where available evidence does not indicate there is a risk. One commenter reported having observed that some clinicians express a belief that mere disclosure of health data directly to patients without the clinician’s professional interpretation will routinely cause harm, despite what the commenter described as existing evidence to the contrary. Response. We believe it would be challenging to define an appropriate and unique standard for purposes of this exception for non-physical harms that all actors defined in § 171.102 could apply consistently and, most importantly, without unduly restricting patients’ rights to access their health information. We also recognize, as discussed above, the practical utility of alignment with relevant Privacy Rule provisions. At this time, only danger to the individual’s ‘‘life or physical safety’’ is recognized as grounds for denial of an individual’s right of access under § 164.524(a)(3)(i). However, ‘‘substantial harm’’ is the standard applied under the Privacy Rule where the access denied is to information identifying another person (other than a health care provider) or where an individual’s personal representative is denied access to the individual’s PHI under § 164.524(a)(3)(ii) or (iii). To align with the relevant Privacy Rule provisions, the final regulation text (§ 171.201(d)(1) and 143 Note, again, that ‘‘access’’ has a different meaning in subpart E of 45 CFR part 164 than it does in 45 CFR part 171. 144 See section VIII.C.3 of this preamble and the finalized definition of ‘‘electronic health information’’ in § 171.102. PO 00000 Frm 00184 Fmt 4701 Sfmt 4700 E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations (2)) references the same harm standards as the Privacy Rule uses where § 164.524(a)(3)(ii) or (iii) as well as § 171.201 applies, and in circumstances where § 164.524(a)(3) is not implicated but the actor’s practice is both based on an individualized determination of harm (consistent with § 171.201(c)(1)) and likely to interfere with: (§ 171.201(d)(2)) a patient’s or their legal representative’s access, exchange, or use of information within their EHI that identifies another person (other than a health care provider); or (§ 171.201(d)(1)) the patient’s legal representative’s access, exchange, or use of the patient’s EHI. The finalized § 171.201(d)(3) and (4) also re-use the familiar § 164.524(a)(3)(i) type of harm for the wide variety of circumstances where § 171.201 applies but the type of risk is consistent with § 171.201(c)(2) or the (otherwise legally permissible) access, exchange, or use of EHI with which the practice is likely to interfere is by someone other than the patient or their legal representative. Thus, the finalized § 171.201 does not establish a standard for non-physical harm that would be unique to the Preventing Harm Exception but instead recognizes ‘‘substantial harm’’ in circumstances where § 164.524(a)(3)(ii) or (iii) apply, and also applies this familiar type of harm in situations where neither § 164.524(a)(3)(ii) nor (iii) applies but where re-use of this same standard under § 171.201 is consistent with the goal of aligning the types of harm recognized under Preventing Harm Exception with the grounds for denying a right of access request under the Privacy Rule. Comments. One commenter specifically recommended allowing actors to rely on an individual’s own subjective beliefs related to harm. Response. We interpret this comment as pertaining to the beliefs of the patient whose EHI would be affected by a practice. We appreciate this opportunity to explain that practices implemented to honor and apply the patient’s expressed preferences regarding access, exchange, or use of their EHI are addressed by the Privacy Exception finalized in § 171.202. Comments. A number of commenters requested clarification of how the Preventing Harm Exception and its conditions might operate in situations involving minors where applicable State laws allow non-emancipated minors to independently consent to certain types of health care and provide for keeping records of such care confidential from the minor’s parents/guardians. Several of these commenters specifically requested clarification about the VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 operation of this exception where State law provides for minors to be able to consent to some or all types of health care but does not provide for or allow the minors to access their health records information at all, or in specific format(s). Response. We appreciate commenters’ offering us the opportunity to reiterate that where a particular access, exchange, or use of EHI is prohibited by applicable Federal, State, or tribal law, an exception to the definition of information blocking is not needed. Nothing in part 171 calls for access, exchange, use, or other disclosure of EHI that is prohibited by other applicable law. If an actor simply cannot effectively segment EHI they could safely and permissibly share from EHI they are not permitted to share in a given requested format, the actor should refer to the exception for requests that are infeasible (§ 171.204). However, if the EHI they could legally disclose could be shared in a different manner than that initially requested but the different manner would support segmentation, then an actor should provide the EHI they can safely and legally share in the most appropriate manner consistent with the Content and Manner Exception (§ 171.301). Comments. Several commenters specifically requested clarification as to the information blocking implications where State law and/or the organization’s account provisioning process do not provide for minors to obtain the login credentials needed to access their own records through an electronic portal, which will often be the login credentials a patient would use to authorize an app to receive the records through the provider’s API. Response. Where the actor does not have a reasonable belief that a practice interfering with minors’ access to their own EHI will substantially reduce a risk of harm cognizable under this exception, the Preventing Harm Exception (§ 171.201) would not apply. This exception would also not apply where any person—whether adult, emancipated minor, or nonemancipated minor—is not able to provide adequate verification of their identity consistent with the actor’s health information privacy or security protection policies. Actors should assess practices related to verifying the identity of a patient, or a legal representative of the patient, for consistency with the conditions of the Privacy Exception as finalized in § 171.202 and/or the Security Exception as finalized in § 171.203. Likewise, practices implemented to confirm a representative’s legal authority to access PO 00000 Frm 00185 Fmt 4701 Sfmt 4700 25825 or request or authorize access, exchange, or use of a minor’s EHI on behalf of the minor, should be analyzed in the context of the Privacy Exception as finalized in § 171.202 and/or the Security Exception as finalized in § 171.203. Where otherwise applicable law prohibits a specific access, exchange, or use of information, an exception to part 171 is not necessary due to the exclusion of ‘‘required by law’’ practices from the statutory information blocking definition in section 3022 of the PHSA (as discussed in section VIII.C.1 of this preamble). However, where an actor simply lacks the technical capability to provide access, exchange, or use in a specific requested mechanism, format, or manner, we would encourage the actor to review its practices for consistency with the new Content and Manner Exception finalized in § 171.301 or the Infeasibility Exception finalized in § 171.204. Comments. Several commenters requested clarification as to whether the Preventing Harm Exception would apply to 42 CFR part 2 data when it is not made available for access, exchange, or use because the patient did not consent to its access, exchange, or use. Response. We appreciate the opportunity to remedy any confusion that may have been caused by the Proposed Rule’s use of an illustrative example (84 FR 7524) within which the requirement to withhold data subject to 42 CFR part 2 regulations rendered a particular access, exchange, or use of only a portion of the patient’s EHI legally permissible. In the example, only those portions of the patient’s EHI to which 42 CFR part 2 does not apply could be permissibly accessed, exchanged, or used. This example was intended only to illustrate that the mere fact that an actor has knowledge, possession, custody, or control of more EHI than the actor could legally share would not, itself, provide a basis for application of the Preventing Harm Exception to the actor’s withholding of any of the EHI that the actor could legally share. When an actor that is subject to 42 CFR part 2 cannot honor a request for access, exchange, or use of data subject to 42 CFR part 2 specifically because the patient has not provided the consent that would be required by 42 CFR part 2 before the actor could disclose that specific data for access, exchange, or use, the Preventing Harm Exception (§ 171.201) would not apply. When an actor has 42 CFR part 2 data for a patient but does not believe it has documented the patient consent that is legally required before the actor can fulfill a request for E:\FR\FM\01MYR3.SGM 01MYR3 25826 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations access, exchange, or use of that data, the actor should refer instead to the Privacy Exception finalized in § 171.202. If the actor lacks the technical capability to effectively segment data that it can legally share from data that it cannot legally share, the actor should also consider the new Content and Manner Exception finalized in § 171.301 or the Infeasibility Exception finalized in § 171.204. Comments. Several commenters noted that some State laws prohibit the release of specific information, such as results of particular diagnostic tests, to patients through electronic means (e.g., patient portals or APIs) until particular protocols have been completed. Commenters cited, as an example, State law mandates for initial communication of particular information to the patient by a health professional in real time. The commenters requested clarification of whether or how § 171.201 would apply in those circumstances. Response. As is the case with 42 CFR part 2 data that the patient has not consented to disclose, the exception finalized in § 171.201 would not apply in these particular types of circumstances. The information blocking definition proposed and finalized in § 171.103 does not include a practice that is likely to, or in fact does, interfere with the access, exchange, or use of EHI when the practice is required by law. If the actor lacks the technical capability to segment data at the level of granularity needed to withhold only those data points, elements, or classes that it is legally prohibited from disclosing in response to a particular request, the actor should consider the Content and Manner Exception finalized in § 171.301 or the Infeasibility Exception finalized in § 171.204. Comments. Several commenters recommended that we recognize under § 171.201 practices requiring patients to obtain their laboratory results information only through the ordering provider’s EHR. Commenters stated that inaccurate display of such results is a safety risk and that other actors such as laboratories and HINs/HIEs may not have the technical capability to display the information accurately in a humanreadable interface that would be in full compliance with regulatory requirements otherwise applicable to human-readable displays of laboratory results information. Response. We agree that display of inaccurate values for laboratory results, or other clinical observations, could represent a safety risk. We do not believe it would be appropriate to broadly limit patients to obtaining their VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 laboratory information only from providers that are (or that employ) professionals whose scope of practice allows them to order the tests. If a laboratory, or a HIN/HIE, has the data in an interoperable format to support its exchange across providers, but does not have the technical capability to appropriately display it for human readability (such as in a patient portal), then the laboratory, or HIN/HIE, should make the data available in the interoperable format to providers or patients who can then view the data using technology the provider or patient has chosen as appropriate to their needs. If any actor receives a request for data access, exchange, or use via a specific mechanism that the actor does not have the technical capability to support, the actor should consider the Content and Manner Exception finalized in § 171.301 or the Infeasibility Exception finalized in § 171.204. Comments. One commenter suggested recognizing a new exception under the Preventing Harm Exception that would allow a health care provider who is also a research institution to require, as a condition of making EHI available for use in research, that the health care provider be a collaborator in that research. The commenter stated that institutions ensure accuracy in the way data is used and analyzed by requiring they participate in any research involving their patients’ information so that they can explain for the research team any anomalies or other characteristics unique to their own institutions’ data and collection methods. This commenter stated that disclosing EHI for research purposes when the research being conducted does not involve the health care provider disclosing the EHI could lead to misinterpreted outcomes based on flawed data that could have a negative impact on scientific discovery. Response. We considered this suggested expansion of the Preventing Harm Exception specifically in the context of the definition of ‘‘electronic health information’’ that we proposed, and the more focused definition of ‘‘electronic health information’’ that we have finalized.145 The Preventing Harm Exception is intended to apply to practices an actor reasonably believes will substantially reduce a risk of harm (of a type cognizable under this exception) to particular person(s), such as a patient or a natural person in the patient’s life or multiple patients whose 145 We note that, although various types of research data and data sets may be or include ‘‘electronic health information’’ as defined in § 171.102, not all research data or data sets are or include data meeting this definition. PO 00000 Frm 00186 Fmt 4701 Sfmt 4700 EHI was corrupted or mismatched due to a technical failure of an actor’s systems. The risk of potential harm described by the comment was specifically of misinterpretations of EHI leading to research findings that negatively impact scientific discovery. This risk is too far removed from a reasonable, and reasonably foreseeable, likelihood of cognizable harm to particular patients or other particular natural persons to fit within the intent of the Preventing Harm Exception finalized in § 171.201. Therefore, we did not modify the exception in response to this comment. Finalized Belief and Harm Conditions for § 171.201 Having considered comments received on the belief and harm standards, we have finalized the exception at § 171.201 with modification, as discussed in responses to comments. These modifications simplify the belief standard, and more thoroughly and specifically align the harm standard applicable for this exception with either the Privacy Rule harm standard applicable under § 164.524(a)(3)(i) (in most circumstances) or the harm standard in § 164.524(a)(3)(ii) or (iii) (in particular circumstances). The harm standard in § 164.524(a)(3)(ii) or (iii) applies where both §§ 171.201 and 164.524(a)(3)(ii) or (iii) would apply, or in particular circumstances that are sufficiently similar as to be analogous to circumstances where both §§ 171.201 and 164.524(a)(3)(ii) or (iii) would apply.146 Please reference the finalized § 171.201(a) for the regulatory text of the belief standard. Please reference the finalized §§ 171.201(d)(1)–(3) for regulatory text that establishes the specific § 164.524(a)(3) harm standard that applies in each of the three particular types of circumstances specific to patients and their representatives’ access to the patient’s EHI, and reference § 171.201(d)(4) for regulatory text establishing the specific § 164.524(a)(3) harm standard applicable in all other types of circumstances where § 171.201 applies. The circumstances where both §§ 171.201 and 164.524(a)(3) would apply are where the practices do 146 Please note that the Preventing Harm Exception will not normally apply where a patient or their representative may seek access to EHI that is excluded from the right of access under § 164.524(a)(1) or to which access may be denied on unreviewable grounds under § 164.524(a)(2). In circumstances where § 171.201 conditions are not met but an actor wishes to withhold EHI from an individual’s right of access under § 164.524(a)(1) or (2), the actor should refer to the privacy exception (§ 171.202). E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations interfere with access, exchange, or use by the patient or their legal representative (who is their personal representative for purposes of § 164.524) of some or all of the patient’s EHI to the point of denying access (as used in context of § 164.524) on grounds of a risk of harm determined on an individualized basis by a licensed health care professional in the exercise of professional judgment (§ 171.201(c)(1) as finalized). Circumstances where § 164.524(a)(3) is not implicated but that are analogous to circumstances where both §§ 164.524(a)(3) and 171.201 apply are those where the risk of harm is determined on an individualized basis consistent with finalized § 171.201(c)(1) and the practice does not entirely deny but is likely to, or does, interfere with the patient’s or their legal representative’s access, exchange, or use of the EHI that is otherwise legally permissible. (For example, the practice may result in delaying access, exchange, or use of the EHI but for less time than is permitted for granting of a right of access request under § 164.524.) In a wide variety of circumstances where § 171.201 will apply, § 164.524 would not apply. Such circumstances include those where the access, exchange, or use of EHI with which the practice is likely to, or does, interfere is not related to right of access under the HIPAA Privacy Rule, such as access, exchange, or use of the patient’s EHI by the patient’s health care providers. Likewise, § 171.201 will apply but § 164.524(a)(3) will not apply when the risk of harm arises from data issues (§ 171.201(c)(2)) rather than having been determined on an individualized basis by a licensed health care professional (§ 171.201(c)(1)). In these circumstances where § 164.524 would not apply, and that are not analogous to circumstances where § 164.524(a)(3) would apply, § 171.201(d)(4) (type of harm condition) applies the harm standard that would be cognizable under § 164.524(a)(3)(i) so that the actor must reasonably believe the practice will reduce a risk otherwise posed to the life or physical safety of the patient or another natural person.147 147 Please note that although ‘‘individual’’ as defined in 45 CFR 169.103 is not limited to natural persons, the belief standard in the finalized VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 This provides, under § 171.201, consistency across this wide array of circumstances where § 164.524(a)(3) would not be implicated regardless of the extent of interference or length of delay the practice may pose to the access, exchange, or use of the EHI. Because the circumstances to which the finalized § 171.201(d)(4) applies include access, exchange, or use of the patient’s EHI by health care providers furnishing services to the patient, we believe it is most appropriate to apply under § 171.201(d)(4) the same standard of harm that would apply to denying a patient access to the patient’s EHI. This is consistent with our proposal (84 FR 7602) to require that practices likely to interfere with any access, use, or exchange of EHI would need to reduce a risk to the ‘‘life or physical safety’’ of a patient or another person to satisfy the conditions in § 171.201 and be excepted from the definition of information blocking in § 171.103. We have also clarified the regulation text so it is expressly clear on its face that the risk to be reduced must be one that would otherwise arise from the specific access, use, or exchange of EHI affected by the practice. Under § 164.524(a)(3)(i), a covered entity may deny an individual access to protected health information (PHI) about that individual in a designated record set only if a licensed health care professional in the exercise of professional judgment determines that releasing the information to them would endanger the life or physical safety of the individual or another person. Under § 171.201(d)(3), an actor 148 may implement a practice that is likely to, or does, interfere with the patient’s access, exchange, or use of their own EHI when the actor reasonably believes the practice will substantially reduce a risk of harm to life or physical safety of the patient or another person, regardless of whether that risk is determined on an § 171.201 is, consistent with the requirement that in most circumstances the risk of harm at issue must be to life or physical safety. 148 An actor could be any individual or entity meeting the definition of ‘‘health care provider,’’ ‘‘health IT developer of certified health IT’’ or ‘‘health information network or health information exchange’’ in § 171.102, and may or may not also be a HIPAA covered entity or business associate as defined in the HIPAA Rules. PO 00000 Frm 00187 Fmt 4701 Sfmt 4700 25827 individualized basis (§ 171.201(c)(1)) or arises from data that is known or reasonably suspected to be corrupt due to technical failure, erroneous for another reason, or misidentified or mismatched (§ 171.201(c)(2)). Under § 164.524(a)(3)(ii) and (iii), the standard of ‘‘substantial harm’’ applies where the individual or their representative are denied access to information in the individual’s record that identifies another person (other than a health care provider), or an individual’s personal representative is denied access to the individual’s information. Thus, the type of harm standard applicable under § 171.201 will in most cases require that the actor’s practice be based on a reasonable belief that the requested access, exchange, or use with which the practice is likely to or does interfere would otherwise endanger the ‘‘life or physical safety’’ of the patient or another person. However, the ‘‘substantial harm’’ standard included in § 164.524(a)(3)(ii) and (iii) would apply in specific circumstances as shown in Table 3. As discussed above, we have made this change to the finalized § 171.201 to align the harm standard applied by § 171.201 with the one applied by § 164.524(a)(3) where both would apply, and in analogous circumstances (as described above). As explained above, we revised the harm standard applicable in particular circumstances to avoid setting a higher threshold under § 171.201 for practices likely to interfere with access, exchange, or use 149 of EHI than would be applicable to entirely denying access under § 164.524(a)(ii) or (iii) 150 in the same circumstances. In the finalized § 171.201(d), we have applied the type of harm described in § 164.524(a)(ii) and (iii) to particular circumstances where § 164.524(a)(ii) and (iii) do not apply, but that are analogous to such circumstances, for the reasons stated in responses to comments above. 149 As ‘‘access,’’ ‘‘exchange,’’ and ‘‘use’’ are defined in § 171.102. 150 Please note that ‘‘access’’ has a different meaning under 45 CFR 164.524 than in 45 CFR part 171. Regarding an individual’s right of access under 45 CFR 164.524, the term ‘‘access’’ should be understood in that HIPAA Privacy Rule context. E:\FR\FM\01MYR3.SGM 01MYR3 25828 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations TABLE 3—MAPPING OF CIRCUMSTANCES UNDER § 171.201(D) TO APPLICABLE HARM STANDARDS Requirements under § 171.201(d) type of harm condition Applicable harm standards 151 § 171.201(d)(1)—where the practice interferes with access, exchange, or use of the patient’s EHI by their legal representative and the practice is implemented pursuant to an individualized determination of risk of harm made by a licensed health care professional in the exercise of professional judgment (§ 171.201(c)(1)). § 171.201(d)(2)—where the practice interferes with the patient’s or their legal representative’s access to, use or exchange of information that references another natural person and the practice is implemented pursuant to an individualized determination of risk of harm made by a licensed health care professional in the exercise of professional judgment (§ 171.201(c)(1)). § 171.201(d)(3)—where the practice interferes with the patient’s access, exchange, or use of their own EHI, regardless of whether the risk the practice is implemented to substantially reduce is determined on an individualized basis by a licensed health care professional in the exercise of professional judgment (§ 171.201(c)(1)) or arises from data that is known or reasonably suspected to be corrupt due to technical failure, erroneous for another reason, or misidentified or mismatched (§ 171.201(c)(2)). § 171.201(d)(4)—where the practice interferes with the patient’s legal representative’s otherwise legally permissible access, exchange, or use of the patient’s EHI and the practice is implemented to reduce a risk arising from data that is known or reasonably suspected to be misidentified or mismatched, corrupt due to technical failure, or erroneous for another reason (§ 171.201(c)(2)). The harm of which the actor reasonably believes the practice will substantially reduce a risk must be the type of harm described in 45 CFR 164.524(a)(3)(iii), which is substantial harm to the individual or another person.152 Types of Risk of Harm to Patients Cognizable Under This Exception We proposed (84 FR 7524) that to qualify for this exception, an actor’s practice must respond to one or more type(s) of risk of harm cognizable under this exception. The three types of risk of harm that we proposed would satisfy the conditions of this exception are: • Risks arising from corrupt or inaccurate data being recorded or incorporated in a patient’s EHI; • risks arising from misidentification of a patient or patient’s EHI; and • risks identified by a determination made by a licensed health care professional that a specific access or disclosure of EHI is reasonably likely to endanger the life or physical safety of the patient or another person. We provided additional explanation and discussion of these types of risk of harm in the preamble of the proposed 151 Note that the ‘‘individual’’ and ‘‘access’’ have different meanings under 45 CFR 164.524 from those in 45 CFR part 171. Regarding an individual’s right of access under 45 CFR 164.524, the term ‘‘access’’ should be understood in that HIPAA Privacy Rule context. 152 Note that grounds for denial of an individual’s right of access include that the access is reasonably likely to cause the harm identified in the particular subparagraph under § 164.524(a)(3). For purposes of 45 CFR part 171, we interpret that the stated type of harm must, to the best of the actor’s knowledge and belief, be substantial, in absence of particular practice(s), in order for an actor to reasonably believe the practice(s) will substantially reduce that risk. We would interpret a reasonable likelihood of the described harm, as used under § 164.524(a)(3) to be a substantial risk for purposes of § 171.201. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 The harm of which the actor reasonably believes the practice will substantially reduce a risk must be the type of harm described in 45 CFR 164.524(a)(3)(ii), which is substantial harm to such other person. The harm of which the actor reasonably believes the practice will substantially reduce a risk must be the type of harm described in 45 CFR 164.524(a)(3)(i), which is a harm to the life or physical safety of the individual or another person. The harm of which the actor reasonably believes the practice will substantially reduce a risk must be the type of harm described in 45 CFR 164.524(a)(3)(i), which is a harm to life or physical safety of the individual or another person. rule (84 FR 7524 and 7425). We also requested comment (84 FR 7525) on: • Whether these categories of harm capture the full range of safety risks that might arise directly from accessing, exchanging, or using EHI; and • Whether we should consider other types of patient safety risks related to data quality and integrity concerns or that may have a less proximate connection to EHI but that could provide a reasonable and necessary basis for an actor to restrict or otherwise impede access, exchange, or use of EHI in appropriate circumstances. We will first discuss those comments that pertain to the cognizable types of risk of harm in general. Comments specific to each of the three types of risk of harm will be discussed separately, in the order they were presented in the Proposed Rule. Comments. Overall, comments were supportive of the exception recognizing risks of harm arising from corrupt or misidentified information, and individualized determinations of risk of harm made by licensed health care professionals in the exercise of professional judgment. Numerous commenters requested clarification or additional information to help actors more effectively understand and efficiently document their risk determinations in connection to practices for which they would seek to claim that the Preventing Harm Exception applies. Response. We appreciate the feedback received. In response to comments PO 00000 Frm 00188 Fmt 4701 Sfmt 4700 calling broadly for additional clarification or information, we have provided detailed responses to comments received. Where useful to enrich the discussion, some responses discuss hypothetical example situations that illustrate how a particular aspect of the exception would operate in such a situation. Comments. Some comments suggested that the determinations and the rationale for individualized determinations by health care professionals in the exercise of professional judgment should be documented in the electronic health record. Response. We believe documentation in the EHR, such as in appropriate notes field(s), may be a practical, efficient approach to documentation of determinations of risk of harm consistent with § 171.201 for some — perhaps many — licensed health care professionals. Therefore, we confirm that EHRs are considered an appropriate approach or method for the documenting, and for retaining documentation, of determinations of risk consistent with § 171.201(c)(1). We also note that much (perhaps all) of the information about the patient’s individual circumstances that factors into the professional’s determination of risk will most naturally and most often be documented in the EHR in the ordinary course of furnishing care to the patient. Nothing in § 171.201 would require duplicating information already captured in the EHR in a different form E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations or format specific or unique to § 171.201, whether in the EHR or elsewhere. However, we also believe that there is substantial potential for variability in health care professionals’ current methods for documenting risk factors and determinations. In addition, we do not believe it is necessary to require different or duplicate documentation of information that is already otherwise captured in reliable business records consistent with the HIPAA Privacy Rule and applicable State laws—including, but not limited to, laws protecting patient privacy or mandating provider reporting of particular types of abuse their patients may experience. Therefore, requiring via regulation that all health care professionals document their determination specifically in the EHR in order to satisfy this exception’s conditions could impose an unnecessary burden on those who would like to conform their practices to this exception but currently take a different approach to documenting risk factors or to documenting individualized determinations of risk specific to access, exchange, or use of the patient’s EHI by the patient or their legal representative(s). Thus, we have not finalized a requirement that licensed health care professionals must document in their EHR or in any other particular system(s) their individualized determinations of risk of harm in order for the determinations of risk to satisfy the risk of harm condition finalized in 171.201(c)(1). Comments. One commenter noted that minors may not fully understand the implications of downloading and sharing their EHI, which represents a different type of risk than the three discussed in the Proposed Rule. The commenter advocated for health care providers to have discretion to impose restrictions on non-emancipated minors’ ability to access their EHI through an API. Response. We did not modify the Preventing Harm Exception in response to this comment. The Preventing Harm Exception (§ 171.201) is intended to apply to practices an actor reasonably believes will substantially reduce a risk of harm to one or more particular person(s), and in many circumstances (§ 171.201(d)(3) or (4)) a risk of harm to the life or physical safety of particular persons, such as: A patient or person in the patient’s life; or multiple patients whose EHI was corrupted or mismatched due to a technical failure of an actor’s systems. Where a nonemancipated minor, or other patient, is otherwise legally entitled to access or receive their own health information VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 that does not include identified information about another person, the Preventing Harm Exception will apply only to those practices reasonable and necessary to address risk to the life or physical safety of another person consistent with § 171.201(d)(3) and its specific cross-reference to § 164.524(a)(3)(i). The Privacy Exception (§ 171.202) is intended to recognize reasonable and necessary practices to protect patients’ privacy. We also note that we have clarified in this final rule that although practices that purport to educate patients about the privacy and security practices of applications and parties with which a patient chooses to share their EHI would always be subject to review by OIG if there were a claim of information blocking, such practices likely would not be considered to interfere with the access, exchange, and use of EHI if they meet certain criteria (see section VIII.C.6, above). Risk of Corrupt or Inaccurate Data Being Recorded or Incorporated in a Patient’s Electronic Health Record We proposed (84 FR 7524) that the Preventing Harm Exception could apply to practices that address risks of harm arising from corrupted or inaccurate EHI being recorded or incorporated in a patient’s electronic health record. We further proposed that recognized risks from incorrect or inaccurate information would be limited to those arising from known or reasonably suspected corruption and inaccuracies caused by performance and technical issues affecting health IT. We clarified that the Preventing Harm Exception would not extend to purported accuracy issues arising from the incompleteness of a patient’s electronic health record generally. We acknowledged that Federal and State laws may require an actor to obtain an individual’s written consent before sharing specific health information, such as information subject to 42 CFR part 2. However, we expressly noted in the Proposed Rule that this exception would not apply to an actor’s conduct in refusing to provide access, exchange, or use of the remainder of the patient’s record on the basis that the information withheld per patient’s nonconsent would render the remainder of the patient’s record incomplete and thus inaccurate. We also noted that known inaccuracies in some data within a record may not be sufficient justification to withhold the entire record so long as the remainder of the patient’s EHI could be effectively shared without also presenting the known incorrect or corrupted information as if it were trustworthy. PO 00000 Frm 00189 Fmt 4701 Sfmt 4700 25829 Comments. Commenters were supportive of the Preventing Harm Exception applying to appropriate practices to address corrupt or incorrect data in EHI and the risks that would otherwise arise from propagation of corrupt or otherwise incorrect EHI within a patient’s record. Response. We appreciate all of the feedback received, including but not limited to confirmation that responding stakeholders are supportive of this exception applying to practices an actor reasonably believes will substantially reduce a risk of harm otherwise arising from access, exchange, or use of corrupt or inaccurate data within a patient’s record. Comments. One commenter, acknowledging that patients’ wishes that specific information not be shared should be honored, advocated expanding this exception to cover physicians’ declining to disclose any EHI to other physicians where withholding of some information at the patient’s request would, in the disclosing physician’s view, render the patient’s record so distorted as to be misleading. Response. As we explained in the Proposed Rule, we would not recognize incompleteness of the EHI that an actor can disclose as a source of a risk of harm cognizable under this exception. For instance, patients may make requests that specific information not be accessed, exchanged, or used beyond a specific clinician-patient (or other relevant) relationship because the information is associated with a stigmatized condition, or for personal reasons (such as the patient’s subjective perception the information may be embarrassing or otherwise detrimental to them). In the Proposed Rule, we provided an illustrative example of a patient declining consent to share 42 CFR part 2 substance abuse treatment information, and stated we would not consider the remainder of the patient’s record inaccurate based on its incompleteness (84 FR 7524). Health care providers receiving any patient’s records of prior care presumably have an awareness of the potential that some information may be omitted from the information they receive for a wide variety of reasons that include, but that are not limited to, patients’ intentional choices to withhold some information. Therefore, we do not believe it would be appropriate to consider EHI to be corrupt, inaccurate, or otherwise erroneous where it is simply a subset of everything an actor knows about the patient. We are not persuaded that a patient’s withholding consent to share specific E:\FR\FM\01MYR3.SGM 01MYR3 25830 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations portions of their overall EHI, regardless of the patient’s rationale for withholding consent, would render the data set their physician (or other health care provider) could share more dangerous to the patient than sharing none of the patient’s EHI with another of the patient’s providers. Instead, we remind health care providers that nothing in part 171 overrides Federal, State, or tribal law protections of patients’ privacy preferences. Likewise, nothing in part 171 reduces variation in what and how much information patients remember, or are willing, to disclose to their health care providers. Patients remain free to withhold various information from their health care providers, including but not limited to what other providers they may have seen in the past. Before enactment of the Cures Act, health care providers could not safely assume every patient record they received from any source necessarily included all the information that could or should be known by that source that would be relevant to the patient’s health or care by that provider, even where the source can permissibly share everything they do know. Thus, we reiterate that we do not believe it is reasonable or necessary for purposes of preventing harm that a provider withhold the EHI that they could permissibly share in any particular circumstance simply because they happen to have more EHI than they can permissibly share. However, we also highlight that for purposes of this exception a data export or access mechanism appropriately showing that some data may be unavailable or omitted from the export or presentation is materially different from a data export or presentation that misrepresents the patient’s EHI. For example, exports or presentations omitting all medication data and correctly stating ‘‘medication data not available,’’ 153 we would not consider corrupt, inaccurate, or otherwise erroneous. By contrast, however, an export or presentation stating ‘‘no current medications,’’ or stating ‘‘none’’ or ‘‘none known’’ in the medication section, when in fact the system producing the export or representation does include current known medications for the patient, represents a type of risk recognized under § 171.201(c)(2). Under § 171.201(d)(4), as finalized, a practice that is likely to, or that in fact does, interfere with otherwise 153 Or otherwise indicating, in a manner appropriate to the circumstances, that absence of information in the extract or representation should not be understood as a statement that there is no such data in the source system. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 permissible access, exchange, or use of a patient’s EHI by their health care providers must be one the actor implementing the practice reasonably believes will substantially reduce a risk of harm of a type that could serve as grounds for denial of the individual’s right of access to their EHI under the 45 CFR 164.524(a)(3)(i). Therefore, in order for a practice likely to interfere with the access, exchange, or use of EHI by one of the patient’s health care providers to satisfy the conditions of the Preventing Harm Exception, the actor must hold a reasonable belief that the practice will substantially reduce a risk to the patient’s, or another natural person’s, life or physical safety that would otherwise arise from the access, exchange, or use of the EHI with which the practice interferes. Erroneous misrepresentations that a patient is not known to be taking any medications, when in fact they are known to be taking one or more medications, is typically a system problem and one that can give rise to risk to the physical safety, or even the life, of any or all patients whose EHI may be affected by the problem. Comments. One comment submission highlighted a tension between the dataprovision preferences of health care providers requesting data and other actors (such as other providers and their health IT developers) from whom data is requested. This commenter indicated providers requesting data, such as longterm/post-acute providers caring for patients after a hospital stay, may currently have to wait days to receive any of the patient’s clinical data from the hospital stay because the hospital or its health IT developer refuses to generate and send the C–CDA document until every last data element is finalized. The commenter suggested we clarify whether § 171.201 would apply to such circumstances. Response. An actor’s practice of delaying fulfillment of an otherwise feasible and legally permissible request for exchange, access, or use of EHI that is finalized and available to the actor merely because the actor knows more EHI for that patient will become available at some later date would not satisfy the conditions of § 171.201. As we stated in the Proposed Rule, we do not view mere incompleteness of a patient record as rendering the remainder of the patient’s record inaccurate (84 FR 7524). We recognize that specific data points may not be appropriate to disclose or exchange until they are finalized. Such data points would include, but are not necessarily limited to: Laboratory results pending confirmation or PO 00000 Frm 00190 Fmt 4701 Sfmt 4700 otherwise not yet considered by the hospital reliable for purposes of clinical decision making; or notes that the clinician has begun to draft but cannot finalize until they receive (confirmed) laboratory or pathology results or other information needed to complete their decision making. We hope it is, and will be increasingly, rare that an actor cannot effectively sequester non-finalized EHI from finalized EHI. However, we cannot rule out the possibility that some actors may face that problem at some point. If an actor cannot effectively sequester non-finalized EHI from a particular access, exchange, or use where inclusion of non-finalized EHI would not be appropriate, the actor should refer to the new Content and Manner Exception (finalized in § 171.301) or the Infeasibility Exception finalized in § 171.204. Comments. A number of commenters expressed concerns that many actors’ health IT systems currently lack the capability to segment data by class and element that would be needed to withhold only those classes or elements that were corrupted or erroneous as described in the Proposed Rule. Commenters requested clarification on whether the § 171.201 Preventing Harm Exception would in these cases apply to the entirety of the patient’s EHI, how it would apply, or if another exception would also be needed. Response. In the circumstances these comments described, the Preventing Harm Exception will apply only to the EHI known or reasonably suspected to be corrupt or erroneous. If an actor lacks the data segmentation capabilities that would be needed to sequester only that data known or reasonably suspected to be corrupt or erroneous from the requested access, exchange, or use, we would encourage the actor to consider meeting the conditions of another exception with respect to the remaining EHI. For example, the Content and Manner Exception (§ 171.301) may allow for the actor to provide the requestor with the EHI not known or reasonably suspected to be corrupt or erroneous, albeit in a different way than was initially requested. Or, if the actor lacks the technical capability to share the EHI that is not known or reasonably suspected to be corrupt or erroneous consistent with the Content and Manner Exception (§ 171.301), then the actor may wish to meet the Infeasibility Exception (§ 171.204). The applicability of the exceptions will depend on the particularized circumstances, including but not limited to the specific request made. We believe the conditions of these exceptions also offer frameworks within which a responding actor and an E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations EHI requester may be able to identify a mutually agreeable approach to making trustworthy EHI appropriately available in at least some of the instances where a request cannot be safely fulfilled in exactly the manner of the requester’s first preference. Comments. One comment expressed a concern that some health care providers, particularly those already receiving feedback from payers about their data quality, might believe the Preventing Harm Exception would allow them to withhold patients’ access to the patients’ own EHI to prevent the patients from seeing data quality issues the provider knows or believes are present in that EHI. Response. If a provider knows that the data quality issues in their records serve as a source of risk consistent with § 171.201(c)(2), so as to form the basis of a reasonable belief the patient’s accessing or using the data would place the patient at risk of harm cognizable under this exception,154 the exception would apply if all other conditions of the exception were met. However, known corruption or other errors that would place a patient accessing their EHI at risk of harm cognizable under this exception on the basis of accessing—and presumably making health or care decisions based on—that EHI would also raise a substantial concern regarding the safety of that EHI for use by the provider. Thus, we would expect that whenever a given health care provider believes the EHI within their records is safe enough for their own use in the delivery of patient care, the Preventing Harm Exception would not excuse the provider from honoring their patients’ requests to access, exchange, or use that EHI simply because the patients might discover error(s) in that EHI. If, to the actor’s knowledge or reasonable belief, only some data classes or elements within a patient’s EHI are a source of risk consistent with § 171.201(c)(2), the actor should continue to make the remaining data classes and elements available to the patients and other requestors (as appropriate under applicable law). Where the actor lacks the technical ability to appropriately sequester only the corrupt or erroneous data within the EHI they hold for given patient(s), the actor should reference the Content and Manner Exception finalized in § 171.301 154 Note that where the practice interferes with a patient’s access to their own EHI, the applicable harm standard is established in § 171.201(d)(3) and is the same one established at § 164.524(a)(3)(i). Currently, that would be harm to life or physical safety. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 or the Infeasibility Exception finalized in 171.204. Comments. Several commenters requested clarification on whether an actor has a responsibility to assess the data in their possession, custody, or control for risk of harm before making it available for access, exchange, or use. Response. The conditions finalized in § 171.201 for practices that interfere with the access, exchange, and use of EHI for purposes of preventing harm to be excepted from the definition of information blocking (§ 171.103) do not require that actors generally evaluate data requested for data quality issues or other sources of risk of harm before fulfilling requests for access, exchange, or use of the EHI. At the same time, actors should be aware that where an actor may have an affirmative duty under otherwise applicable law for the quality or accuracy of data, or for assessing other types of risk of harm that could be implicated by an EHI access, exchange, or use request, nothing in § 171.201 should be construed as lessening or otherwise changing that duty. For example, the Preventing Harm Exception does not lessen or otherwise change an actor’s existing obligations to ensure patient EHI is created, recorded, and maintained to standards of accuracy and reliability consistent with laws, regulations, and accreditation requirements applicable to the particular actor in any given circumstance. Comments. Commenters expressed appreciation for the inclusion of this exception so that health care providers will not be forced to share incorrect data. Several of these commenters requested we clarify a provider’s responsibility for correcting corrupt or incorrect information once it is discovered. Response. For health care providers, existing State and Federal laws and regulations address the responsibility to maintain appropriate records of health care furnished and in support of reimbursement sought from various programs and payers. Health care providers that have obtained voluntary accreditations may have made additional commitments related to record-keeping and data quality in context of obtaining and maintaining those accreditations. These existing responsibilities of health care providers are not lessened or otherwise changed by the Preventing Harm Exception. The exception simply provides for exception from the definition of information blocking at § 171.103 of practices interfering with the access, exchange, or use of mismatched, corrupt due to technical failure, or otherwise erroneous PO 00000 Frm 00191 Fmt 4701 Sfmt 4700 25831 EHI in order to substantially reduce a risk of harm. Presuming its conditions are otherwise met, § 171.201 would apply to a variety of practices appropriate to correct mismatched, corrupt due to technical failure, or otherwise erroneous EHI in a manner consistent with otherwise applicable law, regulations, accreditation standards, and payment program standards. Comments. One comment requested clarity regarding the applicability of this exception to data received from a third party, where the actual accuracy of the data cannot be, or has not been, confirmed by the actor asked to make that data available for access, exchange, or use. Response. We recognize that in some circumstances the available and feasible mechanisms for EHI access, exchange, or use may not support as much data provenance information as an actor might prefer. In such circumstances, the actor would be free to communicate supplemental information about specific data’s provenance to a requestor. However, the conditions of the Preventing Harm Exception would not be met where EHI requested was received from a third party and the actor could not confirm the accuracy of the EHI. Comments. A comment from the perspective of health IT developers and implementers stated that this exception should allow an actor to err on the side of caution as the actor looks to determine the extent of potential distortions in a record before sharing it. A number of commenters described practices used today by HIEs to assess and resolve data quality issues, including but not limited to taking all of the records from a particular source offline while assessing the extent or cause of issues identified in some record(s) from that source. Response. The Preventing Harm Exception is intended to apply to a variety of practices reasonable and necessary to protect patients from risk of harm arising from access, exchange, or use of data that is known or reasonably suspected to be corrupt, inaccurate, mismatched, or misidentified. To be covered by the exception, the practice may interfere with the access, exchange, or use of EHI only to the minimum extent necessary to substantially reduce a risk of harm cognizable under the exception, but the exception does not require that every record affected by the practice have first been confirmed to contain corrupt, mismatched, or otherwise dangerously problematic data. In some circumstances, such as a particular data source experiencing a E:\FR\FM\01MYR3.SGM 01MYR3 25832 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations known or reasonably suspected system or other technical failure producing widespread corruption, mismatching, or other dangerous errors, the minimum reasonable and necessary precautions may make all records from that source unavailable pending resolution of the technical failure and its risk-producing effects. The actor’s knowledge or reasonable suspicion could be appropriately derived in various ways. These ways would include, but are not limited to: Detection of specific data quality issues in a sampling of records from the particular source; or receipt of notice from a source that they had experienced technical issues or failures resulting in corruption, mismatching, or other data quality issues giving rise to risks of harm cognizable under this exception. Comments. A commenter noted that this exception should be applied rarely, and when applied should not be a mechanism to selectively block information from specific actors. However, several other commenters made observations that, in current practice, EHI coming from sources whose data has a pattern of higher-thannormal error rates may be subjected to more extensive review, and potentially delayed in broader availability, compared with EHI from sources whose data error rate is within a more normal range. Comments describing such current practices recommended that this exception should allow for continued application of additional data quality assurance processing to EHI from sources whose data exhibits a history or pattern of more numerous or more risky data quality issues. Response. If an actor were to engage in practices systematically interfering with access, exchange, or use of EHI from a particular source based on considerations extraneous to the prevalence and risk profile of data quality issues in the EHI, such practices would not meet the conditions to be excepted under § 171.201 from the definition of information blocking finalized in § 171.103. Examples of considerations we would consider to be extraneous in this context notably include, but are not limited to, whether the data source was competitor of the actor and whether the actor may harbor personal animus toward the data source. However, this exception would apply to practices not based in whole or any part on considerations extraneous to the prevalence and risk profile of data quality issues in the EHI, provided each such practice meets all conditions in § 171.201 that are applicable to the circumstances in which it is used. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 Comments. Commenters noted that integration of data from various types of sources is challenging because of differences in the data elements that different types of sources can exchange, and because of technical differences in how similar data elements may be structured, defined, or encoded across different types of sources. Commenters also stated that data from new exchange partners may raise questions about potential accuracy issues in interpreting and integrating different types of data as well as integrating similar data from various types of sources. Commenters recommended that § 171.201 recognize that practices may delay integration and availability of EHI in order to address these issues, and also recommended that a time limit be established for completing evaluations of incoming data. Response. We appreciate commenters’ highlighting that the U.S. health care system as a whole includes opportunities for access, exchange, and use of a wider variety of data classes and elements than are currently addressed by standards and implementation specifications adopted in part 170, and more sources than just those actors currently using certified health IT. We are aware that, in a variety of circumstances, safely and appropriately integrating data from a new source may require time to determine and apply appropriate processing approaches to ensure that data are not corrupted in the process of mapping or converting them to the structures and standards used by the recipient. Our finalized exception will apply to appropriately tailored practices for assessing and mitigating risks otherwise posed by integration of data from new sources, that is not standardized, or that is standardized to non-published, proprietary, or obsolete standards. In cases where the original meaning of EHI received cannot be determined in a manner allowing for conversion to the formats and standards used by the recipient’s systems, it may sometimes be necessary to decline to integrate such data in the recipient’s production systems. However, we believe it would be premature to establish via this rulemaking specific time limits for assessment and processing of EHI received from new exchange partners, in large part due to the considerable variability in systems and circumstances of the actors involved in such exchange relationships. Should the need arise to assess the reasonableness, necessity, and timeliness of an actor’s practices applied to data received from new or PO 00000 Frm 00192 Fmt 4701 Sfmt 4700 various types of sources, we would do so in context of the specific circumstances in which particular practices were applied by particular actor(s). Finalized Policy for Risks of Harm Arising From Corrupt or Inaccurate Data We have finalized the type of risk condition with modifications to the proposed regulation text. We have reorganized the regulation text, and in the context of that reorganization rephrased the statement of some conditions. We have also, in § 171.201(c)(2) replaced the word ‘‘inaccurate’’ (used in proposed § 171.201(a)(2)) with ‘‘erroneous’’ to better differentiate between normal shortfalls in the complete accuracy of a record and risk-generating errors in the data. We also combine all data-specific sources of risk of harm in the final § 171.201(c)(2) instead of splitting them across two paragraphs as was the case in § 171.201(a)(1) (‘‘corrupt or inaccurate’’ in the Proposed Rule) and § 171.201(a)(2) (‘‘misidentified or mismatched’’ in the Proposed Rule). We made this change because misidentified, mismatched, corrupt, and otherwise erroneous data are all sources of risk arising from issues with the data rather than characteristics unique to a patient or their circumstances. Additional conditions must be met for § 171.201 to apply to practices implemented to substantially reduce a risk of harm arising from data issues (consistent with § 171.201(c)(2)), including § 171.201(a), (b), (d)(3) or (4), and (f)(1) or (2). Whether (d)(3) or (d)(4) applies turns on whether the practice is likely to, or does, interfere with a patient’s own or other legally permissible access, exchange, or use of the patient’s EHI. Whether (f)(1) or (f)(2) applies turns on whether the actor implements the practice consistent with an organizational policy (f)(1) or based on a determination based on the particularized facts and circumstances known or reasonably believed by the actor at the time the determination was made and while the practice remains in use (f)(2). For purposes of providing additional information and explanation as requested by many commenters, we reiterate that a risk of harm arising from data that is known or reasonably suspected to be misidentified or mismatched, corrupt due to technical failure, or erroneous for another reason (§ 171.201(c)(2) as finalized) will not, consistent with discussion and illustrative examples in the preamble to the Proposed Rule (84 FR 7524), satisfy the conditions of the Preventing Harm E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations Exception if it turns on mere speculation about, or possibilities of, asyet-undetected inaccuracies or other imperfections in the EHI. An electronic health record, like the paper chart it replaces, is inevitably less than perfectly complete and precisely accurate across 100 percent of the variables potentially relevant to the individual’s health. Because the risk that records in general may be imperfect is a risk that we understand as inherent to (and thus ordinarily addressed in the course of) clinical practice, it will not be recognized as justifying practices that implicate the information blocking definition. Thus, the Preventing Harm Exception finalized in § 171.201 does not extend to purported accuracy issues arising from potential, suspected, or known incompleteness of a patient’s electronic health record generally, such as the possibility of a patient choosing, or not remembering, to mention some of the medications they regularly take. Similarly, the possibility that any given patient’s EHI could at any time contain sporadic, undetected, inaccurate data points as a result of data entry errors— such as an entered weight of 123 instead of the accurate observation of 132— would not be interpreted as satisfying the condition finalized in § 171.201(c)(2). The Preventing Harm Exception will apply in those instances where specific EHI of one or more patients is affected by a risk consistent with the finalized § 171.201(c)(2). Assuming its other conditions that are applicable to the specific circumstances are met, the Preventing Harm Exception will apply to appropriately tailored practices that affect a particular patient’s EHI regardless of the origin or cause of known or reasonably suspected data issues giving rise to risk of harm consistent with § 171.201(c)(2), and to the use of the practices for such time as is reasonable and necessary to amend or correct the patient’s EHI. In assessing timeliness and reasonableness of an actor’s approach to making such corrections, we would take into consideration the facts and circumstances within which they operate, including but not limited to licensure or certification requirements applicable to the actor’s EHI governance. For a health care provider, we anticipate such licensure or certification requirements will typically include clinical records standards set by State licensure laws and additional standards applicable to that provider given their specific circumstances, such as patient records maintenance standards set by issuing bodies of VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 facility/organizational accreditations or professional board certifications the provider may also hold. Where an actor lacks the technical capability to sequester from otherwise legally permissible access, exchange, or use only that subset of EHI the actor knows or reasonably suspects is affected by data issues giving rise to risk of harm consistent with § 171.201(c)(2), the Preventing Harm Exception will not recognize withholding of the remaining EHI. In such circumstances, an actor should refer to the exceptions for Content and Manner (§ 171.301) and Infeasibility (§ 171.204), as may be applicable, in regard to the EHI that they do not know or reasonably suspect to be affected by data issues giving rise to risk of harm consistent with § 171.201(c)(2). Risk Arising From Misidentifying a Patient or Mismatching Patients’ Electronic Health Information The Preventing Harm Exception is intended to apply to practices that are designed to promote data quality and integrity and to support health IT applications properly identifying and matching patient records or EHI. As discussed in the preamble to the Proposed Rule (84 FR 7524), accurately identifying patients and correctly attributing their EHI to them is a complex task and involves layers of safeguards. The task requires application of appropriate procedures for verifying a patient’s identity and properly registering the patient in health IT systems. Safeguards include such usability and implementation decisions such as ensuring the display of a patient’s name and date of birth, and perhaps a recent photograph, on every screen from which clinicians and other caregivers access, enter, and/or modify data in the patient’s record. When a clinician, other health IT user, or other actor knows or reasonably suspects that specific EHI is not correctly attributed to one or more particular patient(s), it would be reasonable for them to avoid sharing the EHI that could introduce or propagate errors in patient records and thereby pose risks to the patient(s) affected.155 Under the Preventing Harm Exception as proposed, an actor’s response to the risk of misidentified patient health information would need to be no 155 Please note that practices designed and implemented to ensure that persons requesting access to their EHI are who they claim to be and give them access to only that EHI that is theirs would not be cognizable under the Preventing Harm Exception; we have established two other exceptions designed to address practices reasonable and necessary to protect the privacy (see § 171.202) and security (see § 171.203) of individuals’ EHI. PO 00000 Frm 00193 Fmt 4701 Sfmt 4700 25833 broader than necessary to mitigate the risk of harm arising from the potentially misidentified record or misattributed data (84 FR 7524). For example, under the proposed exception, an actor—such as a health IT developer of certified health IT—refusing to provide a batch export on the basis that the exported records might contain a misidentified record would not find that practice recognized under this exception. Similarly, a health care provider or other actor that identified that a particular piece of information had been misattributed to a patient would not be excused under § 171.201 from exchanging or providing access to all other EHI about the patient that had not been misattributed. The actor knowing or reasonably suspecting some data had been misidentified or misattributed would also be expected to confirm the extent of such errors and to take appropriate steps to correct their own records, consistent with applicable law, regulations, and accreditation standards applicable to the actor, and best practices or other appropriate industry benchmarks for health records and information management. Comments. Commenters recommended we consider that actors bear significant responsibility to preserve and promote data quality and integrity, and that actors generally take risk-averse approaches to preventing and to assessing and resolving errors in identifying EHI and matching patient EHI. Response. We appreciate the opportunity to assure all stakeholders that we are aware that the EHI an actor receives from various sources may feature a variety of characteristics that call for varying degrees of preprocessing to achieve a level of matching accuracy considered by the health care provider community to be sufficient for safe use of the data in patient care. In some circumstances, we understand additional or special processing—including but not necessarily limited to human eyes-on analysis to confirm matches—may be needed before records are deemed to have been accurately matched, and that data requiring human processing may be delayed in integration and availability compared with data that can be satisfactorily matched through an actor’s automated means. Section 171.201 will apply to such practices provided all of its conditions are met. Comments. Commenters recommended the finalized exception recognize as reasonable and necessary to protect patient safety practices such as sequestering from access and exchange all records from a particular source, or E:\FR\FM\01MYR3.SGM 01MYR3 25834 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations affected by a particular system or technical process, until the scope and cause of patient matching or attribution issues can be identified and appropriately resolved. Commenters stated such practices are commonly used today by HINs/HIEs, and provided illustrative examples of current practice. Comments described as an example current practice of HIEs not making available any record(s) that their monitoring for technical or other issues identifies as an improperly matched patient record—and any other records that may be affected by a similar technical issue—until the record(s) can be corrected to include only accurately matched data. Response. We do understand that a variety of methods and approaches may currently be needed to assess the scope, identify, and appropriately address the cause of patient matching or attribution errors. Section 171.201 will apply to practices otherwise meeting its conditions that affect more patients’ records than those specifically confirmed to include mismatched or misattributed EHI. Where its conditions are otherwise met, the exception will apply to use of practices likely to interfere with access, exchange, or use of EHI that the actor knows includes mismatched or misattributed data or reasonably suspects includes such errors. Reasonable suspicion could be formed on various bases, such as objectively observable patterns of association between detected errors and a particular data source, application, system, or process. However, a practice of delaying the availability of records from any particular data source based on factors extraneous to matching processes and accuracy would not be excepted from the definition of information blocking. Examples of extraneous factors include, but are not limited to, whether the data source was competitor of the actor and whether the actor may harbor personal animus toward the data source. Comments. One commenter suggested the Preventing Harm Exception allow for providers to refuse to release pediatric data to direct-to-consumer applications unless the provider was satisfied with the applications’ ability to properly segment the data where multiple users’ records might be stored in the same instance of the application. Specifically, the comment expressed a concern that if applications are not set up to safely handle multiple patients, data from multiple patients could be mixed together in ways that create a potential for serious harm stemming from how those data might then be used or interpreted. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 Response. The potential for EHI to be mismatched (or otherwise mishandled) by an application, whether mobile or otherwise, is neither unique to pediatric patients’ EHI nor particular to apps that receive the patient’s data from a provider’s API. A patient whose provider has not yet implemented a standards-based API could use other means to get their EHI into their chosen direct-to-consumer app. Such means could include accessing view, download, and transmit functionality of the provider’s certified health IT via the patient portal and transmitting an extract of their data in C–CDA format to the recipient of the patient’s (or their legal representative’s) choice. An individual or their representative could also exercise the individual’s right of access under the HIPAA Privacy Rule to obtain the individual’s EHI that is accessible under this right, in another format in which it is readily producible, and then upload it to an app of their choosing. In general, we do not believe it would be appropriate to extend the Preventing Harm Exception to apply to practices whereby actors would limit otherwise legally permissible access, exchange, or use of patient EHI based on concerns that a requestor will not handle patient matching in a manner acceptable to the actor. Therefore, this exception will not apply to actors’ refusal to allow access, exchange, or use of EHI on grounds that the actor may not know, or may not be satisfied with, the matching methods to be used by a recipient of the EHI after the EHI has been securely transferred to the recipient. Provided the practices meet its conditions, the Security Exception (§ 171.203) will apply to a variety of practices directly related and tailored to specific security threats to the actor’s systems and EHI within those systems that may be posed by particular connections or interfaces with thirdparty systems or software. We also note that practices that do not inappropriately discourage patients from accessing, exchanging, or using their EHI as they choose, but that are appropriately designed and implemented to help patients make more informed choices about their EHI and apps can be designed and implemented to avoid meeting the definition of information blocking finalized in § 171.103. Comments. One commenter expressed a concern that this exception could become a pretext for an actor to avoid sharing EHI on basis of the actor not being satisfied with the accuracy achieved by a prospective recipient’s patient matching methods. This PO 00000 Frm 00194 Fmt 4701 Sfmt 4700 commenter requested ONC clarify that this exception does not allow for an actor to take a position that it will not share EHI unless the requesting entity demonstrates it will match patients using a method, or to a degree of accuracy, satisfactory to the actor being requested to share the information. Response. We do not believe it would be appropriate to extend the Preventing Harm Exception to apply to practices whereby actors would limit otherwise legally permissible access, exchange, or use of patient EHI based on concerns that a requestor will not handle patient matching in a manner acceptable to the actor. Various recipients and users of EHI will have different purposes and contexts of data use and thus may appropriately deem differing levels of assurance of match accuracy satisfactory to meet their obligations, for patient safety or otherwise. Therefore, this exception will not apply to actors’ refusal to allow access, exchange, or use of EHI on grounds that the actor may not know, or may not be satisfied with, the matching methods to be used by a recipient of the EHI after the EHI has been securely transferred to the recipient. Comments. Some commenters specifically discussed concerns about potential misuse of this exception on a claim of patient matching concerns, and that this exception could lessen actors’ motivations for improving their patient match capabilities. Some commenters suggested specific additional requirements for applicability of this exception to practices implemented to reduce risks of harm arising from mismatch or misidentification of patient EHI, in order to guard against its misuse or potentially incentivizing stagnation in rates of patient matching capabilities advancement. Additional requirements that commenters suggested were: • That an actor only be able to take advantage of this exception on basis of mismatch if the actor’s matching methods met or exceeded a performance threshold; • that the actor proactively communicates to requestors the actor’s minimum matching criteria and other aspects of its matching methods; and • a requirement for specific features in the actor’s systems, such as returning informative error messages regarding match failures. Response. We are aware there is variation across actors in technical capabilities relevant to patient matching, resources to improve those capabilities, and other operational considerations. We are not aware of clear evidence or broad industry consensus on specific practices or E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations performance thresholds that should apply to across all EHI use cases and operational contexts. We believe it would be premature to limit the availability of this exception to actors able to implement specific practices or meet particular metrics of patient matching performance specified through this rulemaking. Because this exception is intended to except from the definition of information blocking in § 171.103 practices that are reasonable and necessary to protect patients from risks of cognizable harm attributable to types of risk specifically including risks arising from mismatched EHI, rather than to drive changes in patient matching practices in the industry, such requirements could render this exception unavailable in circumstances where it is intended to apply. Thus, we have determined that it is more appropriate to leave actors engaged in using data the discretion and responsibility for determining what level of certainty in the accuracy of record matching is necessary for their use of the EHI. We appreciate this opportunity to clarify that the Preventing Harm Exception would not excuse actors from making appropriate good faith efforts to match patient records, which we expect will ordinarily include communication and cooperation between data sources and recipients. Moreover, we believe an actor will generally have a natural incentive to communicate proactively, appropriately, and in good faith with those with whom they exchange data, specifically to minimize unnecessary extra processing and follow-up communications on the part of both exchange partners. Therefore, we have not modified the Preventing Harm Exception’s conditions in response to these comments. Comments. One commenter expressed a concern that to ensure they do not release information that has potential errors in patient matching or attribution, they will need to invest in improved patient record matching accuracy, which the commenter indicates would for them include new technical solutions compared with their current practice. Response. This exception is not intended, and we are not persuaded that as finalized it will function, to impose a new or specific obligation on actors to ensure they do not release information that could contain latent errors. Other commenters did recommend we consider doing so. However, for the reasons stated above in response to those comments, we have not established a pre-requisite that an actor meet a particular threshold of patient- VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 matching performance before this exception will apply to practices otherwise meeting the conditions of § 171.201 applicable in the particular circumstances, including that the actor can demonstrate a reasonable belief the practice(s) will substantially reduce a risk of harm cognizable under § 171.201. We emphasize that we have not established a pre-requisite for applicability of § 171.201 that would call upon an actor to use particular methods, or satisfy particular threshold performance rates on any specific metric, for patient identification and matching. Comments. A few commenters requested clarification as to whether a patient would be liable for accessing another patient’s EHI that had been mismatched or misattributed to the patient accessing the information. Response. This issue is outside the scope of this rulemaking. Those concerned or curious about it should reference Federal,156 State, or tribal law and regulations—or reliable sources of information about Federal,157 State, or tribal law and regulations—applicable to any individual’s (or entity’s) unauthorized access to or use of another’s personally identifiable information (PII) in the particular jurisdiction(s) and circumstances of potential concern. Comments. One commenter suggested creation of a hold-harmless or ‘‘safe harbor’’ policy protecting data recipients from liability for actions taken in good faith reliance on information received after applying best-practice matching methods. Response. The suggestion appears to reference a safe harbor from liability for decisions or other actions taken in reliance on the EHI in question. That is outside the scope of this rule. Actors should implement matching methodologies and practices in full awareness that this final rule will not change their responsibility under other applicable law for maintaining appropriately reliable medical or other business records. This final rule also does not alter clinicians’ responsibilities for exercising sound professional judgment in making clinical decisions based on EHI available to them in context of what they know or reasonably believe about the EHI’s reliability. 156 Potentially applicable Federal law and regulations are not limited to HIPAA and the HIPAA Privacy Rule, but the HIPAA Privacy Rule may be a useful place for those who share interest in the question raised by these comments to begin obtaining additional information. 157 Authoritative information about the HIPAA Privacy Rule is available in the health information privacy section of the HHS website, starting at https://www.hhs.gov/hipaa/. PO 00000 Frm 00195 Fmt 4701 Sfmt 4700 25835 Comments. Commenters requested, in context and reference to the Preventing Harm Exception, guidance regarding what an actor is obligated to do if they receive EHI as a result of provider matching failure. One commenter specifically requested guidance on what sort of good faith efforts to direct the EHI to the correct recipient would be expected of an inadvertent recipient of mis-directed EHI. Response. A provider or other actor who receives EHI that they have reason to believe may have been directed to them by mistake has no obligation under part 171 to identify the correct recipient or to forward the EHI to the correct recipient. The actor who believes they may have received misdirected EHI should upon forming such belief follow their established practices for handling of PHI and PII received in known or suspected error. We presume these established practices are consistent with Federal, State, or tribal law applicable to the particular actor in the particular operational circumstances. Statement of Finalized Policy for Risks Arising From Misidentified or Mismatched EHI We are finalizing the substance of this part of the exception as proposed, with modifications to how it is expressed in regulation text in comparison with the Proposed Rule. We have reorganized the regulation text in response to comments requesting our regulatory text in general be laid out in a way that is easier to use. For example, we have combined risks arising from misidentified or mismatched EHI with other dataspecific sources of risk of harm in the final § 171.201(c)(2), instead of splitting them across two paragraphs as was the case in § 171.201(a)(1) (‘‘corrupt or inaccurate’’ in the Proposed Rule) and § 171.201(a)(2) (‘‘misidentified or mismatched’’ in the Proposed Rule). We believe this makes the finalized text of § 171.201 easier to use because misidentified, mismatched, corrupt, and otherwise erroneous data are all sources of risk arising from issues with the data rather than characteristics unique to a patient or their circumstances. As was the case in the Proposed Rule, additional conditions must be met for § 171.201 to apply to practices implemented to substantially reduce a risk of harm arising from data issues (consistent with § 171.201(c)(2)). In the structure of the finalized regulation text, these additional conditions are found in § 171.201(a) and (b), and as applicable in the particular circumstances also in (d)(3) or (4), and (f)(1) or (2). Whether (d)(3) or (d)(4) sets out the harm E:\FR\FM\01MYR3.SGM 01MYR3 25836 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations standard that applies to a practice an actor believes will substantially reduce a risk of harm consistent with § 171.201(c)(2) turns on whether the practice is likely to, or does, interfere with a patient’s own or another other legally permissible access, exchange, or use of the patient’s EHI. (We note, however, that the harm required to satisfy this condition is the same under (d)(3) and (d)(4), as both cross-reference § 164.524(a)(3)(i).) Whether (f)(1) or (f)(2) applies to a practice an actor believes will substantially reduce a risk of harm consistent with § 171.201(c)(2) turns on whether the actor implements the practice based on an organizational policy (f)(1) or a determination based on facts and circumstances known or reasonably believed by the actor at the time the determination was made and while the practice remains in use (f)(2). Determination by a Licensed Health Care Professional That the Disclosure of EHI Is Reasonably Likely To Endanger Life or Physical Safety (§ 171.201(c)(1)) We proposed that this exception would recognize practices interfering with EHI access, exchange, or use in circumstances where a licensed health care professional has determined, in the exercise of professional judgment, that the access, exchange, or use of the EHI is reasonably likely to endanger the life or physical safety of the patient or another person (84 FR 7524 and 7525). As we explained, the clinician may have in certain cases individualized knowledge stemming from the clinicianpatient relationship that, given the particular patient and that patient’s circumstances, harm could result if certain EHI were shared or transmitted electronically. We proposed that, consistent with the HIPAA Privacy Rule, a decision not to provide access, exchange, or use of EHI on this basis would be subject to any right that an affected individual is afforded under applicable Federal or State laws to have the determination reviewed and potentially reversed. Comments. Commenters recommended that actors, such as HINs/ HIEs, implementing practices based on a determination by a health care professional, not be required to take steps to review or assess the reasonableness of the health care professional’s judgment or determination that a risk of harm exists or that the harm of which a risk was determined to exist met the standard for recognition under this exception. Response. We did not propose to require that other actors would ordinarily need to evaluate whether they agreed with individualized VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 determinations of risk made by a licensed health care professional in order for the actor’s application of practices consistent with that determination to be recognized under this exception. The finalized exception also does not generally require that actors relying on an individualized determination made by a licensed health care professional in the exercise of professional judgment take steps to review or confirm the health care professional’s judgment.158 Actors other than the licensed health care professional who makes the determination—including but not limited to HINs/HIEs or hospitals— could implement practices based on organizational policy (consistent with § 171.201(f)(1) as finalized) to rely on such determinations upon becoming aware of the determination and until such time as they become aware that the determination has been reversed or revised. Such other actors also, either in absence of such policy or in particularized facts or circumstances not fully covered by their existing policy at the time they became aware of a licensed health care professional’s individualized determination of risk, could demonstrate for those particularized circumstances the reasonable belief required by § 171.201(a) by referencing the licensed health care professional’s determination in making their own determination consistent with § 171.201(f)(2). Comments. One commenter suggested that this exception should recognize determinations of the existence of a risk of harm made by licensed health care professionals without requiring a clinician-patient relationship. Response. In order for practices implemented to substantially reduce a type of risk consistent with finalized § 171.201(c)(1) to be excepted under § 171.201 from the definition of information blocking finalized in § 171.103, the individualized determination of risk of harm in the exercise of professional judgment must be made by a licensed health care professional who has a current or prior clinician-patient relationship with the patient whose EHI is affected by the determination. In the preamble to the Proposed Rule (84 FR 7524) we explained that the clinician may have 158 To the extent any particular actor may have an obligation under other Federal, state, or tribal law or regulations (as may be applicable in any particularized circumstances) to afford a patient a right of review of the determination—or to facilitate the patient’s requesting a review of the determination from another actor—the actor’s practices would need to be in compliance with such law or regulations in order for this exception to apply to those practices. PO 00000 Frm 00196 Fmt 4701 Sfmt 4700 individualized knowledge stemming from the clinician-patient relationship that, for a particular patient and for that patient’s circumstances, harm could result if certain EHI were shared or transmitted electronically. To ensure that both the requirement for a clinician-patient relationship and its specificity to individualized determinations of risk of harm by licensed health care professionals in the exercise of judgment are immediately clear to all actors, we have stated it in the finalized text of § 171.201(c)(1). We are finalizing this as a requirement because a clinician who has never established a clinician-patient relationship to the particular patient would not be expected to have the same individualized knowledge of the individual patient and that patient’s circumstances as one who has such a clinician-patient relationship. In contrast, however, we reiterate that a risk is less individualized when it arises from data issues (consistent with § 171.201(c)(2)) and as a result may be identified by clinicians or by other persons with relevant expertise, including but not limited to biomedical informaticists who are not licensed health care professionals. Nothing in § 171.201 requires the involvement of a licensed health care professional with a clinician-patient relationship to any patient(s) whose data may be affected by the practices in the design of, or decision to implement, practices an actor reasonably believes will substantially reduce a risk arising from data issues consistent with § 171.201(c)(2). Comments. Several commenters recommended that, in the context of a clinician-patient relationship, the clinician should have broader latitude to consider specifics of a patient’s circumstances in determining the existence of a risk of harm or potential harm. Response. It may be helpful to highlight the significant and broad discretion inherent in the policy as we proposed it. An individualized determination made in the exercise of professional judgment by a licensed health care professional allows for that professional to consider a wide array of individual patient characteristics and circumstances and to apply all of the knowledge and skills within the licensed health care professional’s scope of practice. The exception’s conditions as proposed would provide licensed health care professionals broad discretion in how or why they form a reasonable belief that a cognizable risk of harm is associated with particular access, exchange, or use of their E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations patient’s EHI (including by the patient or their legal representative). We have finalized this aspect of the Preventing Harm Exception as proposed, though we have revised how the conditions, and specific requirements within particular conditions, are organized and phrased in regulation text. Nothing in the finalized § 171.201 would limit the types of information on which the licensed health care professional may rely, or the factors they may consider, in exercising their professional judgment to make individualized determinations of risk of harm consistent with § 171.201(c)(1). Comments. A few commenters advocated for clinician discretion to determine whether a disclosure of health information was in the patient’s best interest. Response. We believe an individual clinician’s assessment of the patient’s best interest is a less objective standard than one based on the exercise of professional judgment paired with a defined standard of cognizable harm. It would thus render the exception more difficult to administer as well as more susceptible to inappropriate use of the exception. We are finalizing the substance of this condition of the Preventing Harm Exception as proposed: To satisfy the conditions of the Preventing Harm Exception, an individualized determination by a licensed health care professional in the exercise of professional judgment must be that a risk of harm cognizable under this exception is associated with particular access, exchange, or use of the patient’s EHI. The harm cognizable under this exception will be one that would be recognized under § 164.524(a)(3)(i) (at this time, danger to the life or physical safety of the patient or another person) where a practice affects a patient’s access, exchange, or use of their EHI, per the finalized § 171.201(d)(3). Where § 171.201(d)(1) or § 171.201(d)(2) applies, the harm cognizable under this exception will be one that would be recognized under § 164.524(a)(3)(iii) or § 164.524(a)(3)(ii), respectively. At this time, the harm standard in both § 164.524(a)(3)(iii) and § 164.524(a)(3)(ii) is ‘‘substantial harm.’’ For all legally permissible access, exchange, or use of the patient’s EHI to which § 171.201(d)(1) through (3) do not apply, the finalized § 171.201(d)(4) applies, by cross-reference, the same § 164.524(a)(3)(i) harm standard of danger to the life or physical safety of the patient or another person that is applicable to practices interfering with the patient’s access to their own EHI (that does not include PII of another). VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 Comments. Several commenters expressed a concern that the exception as proposed might not sufficiently recognize the entire array of circumstances where persons should not be granted access, exchange, or use of EHI. For instance, commenters suggested no access, exchange, or use of a patient’s EHI should be available to a person suspected to be abusing, or at risk of beginning to abuse, the patient. Commenters also suggested that the exception should recognize that broader restrictions of EHI access than illustrated by examples in the Proposed Rule would in many cases be indicated by available evidence, widely recognized clinical practice guidelines, or State laws applicable to instances of known or suspected child, intimate partner, elder, or other abuse. Response. This exception applies to practices the actor reasonably believes will substantially reduce a risk of harm determined on an individualized basis in the exercise of professional judgment by a licensed health care professional with a clinician-patient relationship with the patient whose EHI is affected by the determination (finalized § 171.201(c)(1)). Moreover, and as we noted in the Proposed Rule (84 FR 7524), this exception would apply when an actor implements practices that are likely to interfere with the access, exchange, or use of a patient’s EHI pursuant to electing to not treat a person as a personal representative in accordance with 45 CFR 164.502(g)(5). We have finalized the substance of this feature of the exception as proposed, though 45 CFR 164.502(g)(5) is not expressly referenced in the final regulation text. The listed examples described in the Proposed Rule were intended to be illustrative, not exhaustive. There are many other situations where the Preventing Harm Exception will apply to an actor’s practices so long as the conditions of the exception are otherwise met. As another illustrative example, if a determination of risk of harm consistent with § 171.201(c)(1) indicates that a broad withholding of the patient’s EHI from a known, suspected, or potential abuser is reasonably likely to substantially reduce a risk of harm to the patient or another person, then the exception will apply to those practices so long as its conditions are met in full. Moreover, provided its conditions are met in full, this exception will also apply to practices that may be likely to, or do, interfere with a legal representative’s access, exchange, or use of a patient’s EHI to a lesser degree than might an election not to recognize the representative as the PO 00000 Frm 00197 Fmt 4701 Sfmt 4700 25837 patient’s personal representative in accordance with § 164.502(g)(5)(i). Because the finalized § 171.201(d)(1) applies when a practice is likely to, or does, interfere with a legal representative’s access to the patient’s EHI, the harm standard required in such a situation is that stated in § 164.524(a)(3)(iii). Currently, that harm standard is ‘‘substantial harm.’’ We also expressly note that, although the ‘‘substantial harm’’ standard applied by § 171.201(d)(1) through crossreference to § 164.524(a)(3)(iii) is not precisely the same as the requirement in § 164.502(g)(5)(i), we will interpret as sufficient for purposes of § 171.201(c)(1) and (d)(1) a licensed health care professional’s election not to treat a person as the patient’s legal representative in accordance with § 164.502(g)(5)(i). Moreover, having noted above the broad discretion licensed health care professionals have regarding what information to factor into their individualized determinations consistent with § 171.201(c)(1), we highlight that this broad discretion would allow them to consider any knowledge they might have of another licensed health care professional, or other type of covered entity, having elected in accordance with § 164.502(g)(5)(i) not to treat a person as the patient’s representative. Comments. Some comments implied concerns about the potential conflict between the documentation requirements of this exception and those required under other applicable law. Response. Provided its conditions are met, this exception is applicable in circumstances where a licensed health care professional in the exercise of professional judgment has determined that there is a risk of abuse beginning, as well as circumstances in which prior or ongoing abuse is known or suspected. Actors have significant discretion and flexibility in determining how best to document determinations and the bases for their determinations. Where other law or regulations—Federal, State, or tribal—require a specific form, manner, or content of documentation in circumstances that would serve as basis for individualized determinations consistent with the finalized § 171.201(c)(1), we would consider that documentation relevant to assessing the applicability of this exception to those practices. In order to avoid potentially duplicative or other unnecessary burdens on licensed health care professionals or other actors, we have decided not to establish at this time a specific documentation condition and have decided not to establish other E:\FR\FM\01MYR3.SGM 01MYR3 25838 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations unique documentation requirements for this exception. Comments. In reference to a specific illustrative example in the Proposed Rule, one commenter indicated that withholding or delaying availability of only specific sensitive data elements may not be sufficient in circumstances such as those described in the Proposed Rule example, and that revoking a suspected abuser’s proxy access on the whole may be more clinically appropriate in such circumstances (84 FR 7525). Response. In response to this comment, we first clarify the intent and function of the example provided in the Proposed Rule. In the example, the licensed health care professional in the exercise of professional judgment had determined that only some information within the record would need to be withheld from the patient’s partner’s proxy access to her EHI (84 FR 7525). Although not specifically stated in the Proposed Rule, the example presumes a mature technical capability to sequester data from specific user(s) on an itemized basis. The example also presumes that the licensed health care professional, in their exercise of professional judgment, had not formed a reasonable belief that ceasing to recognize the patient’s partner as her personal representative, and entirely revoking the partner’s proxy access to her EHI, would substantially reduce a risk of harm to the patient. We intended that the example illustrate that where the licensed health care professional determined a risk of harm would arise from making a specific piece of information accessible to the patient’s proxy, the minimum interference necessary to substantially reduce that risk of harm would be to withhold that specific piece of information from the patient’s partner’s proxy access to her EHI. Comments. A commenter indicated that if a clinician has a suspicion (confirmed or not) that the patient is suffering intimate partner or elder abuse, it is considered clinically important that notes or other data elements indicating the suspicion not be released to the patient in the company of the suspected abuser. The commenter stated that such disclosure could undermine the clinician’s ability to help the patient because the patient would likely be forced to switch clinicians. The comment also indicated there may be a risk that an abuser could harm the patient as a result of the disclosure of the clinician’s suspicion. Response. Because information blocking policy is specific to the access, exchange, and use of EHI, we read the VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 commenter’s example as suggesting two considerations specific to access, exchange, and use of EHI. First, we believe the comment indicates we should expressly acknowledge that these types of situations are often legally as well as clinically complex. It is not our intent that our policies unnecessarily add to this complexity. It is also not our intent that our policies undermine the ability of a licensed health care professional, or other actor relying on the professional’s determination, to take appropriate steps to reduce abuse risks to which the professional’s patients would otherwise be exposed. Nothing in § 171.201, or in the information blocking provisions generally, requires an actor to disclose their awareness or suspicion of abuse to the patient’s legal representative in order to satisfy the conditions of the Preventing Harm Exception. Second, our understanding of this comment indicates that in some particular individualized circumstances the licensed health care professional may determine in the exercise of professional judgment that to substantially reduce a risk of harm it may be necessary to withhold some portions of a patient’s EHI from the patient’s own access through an API or patient portal. We can, for example, envision possible circumstances where a licensed health care professional with a clinicianpatient relationship to the patient knows or has reason to believe that a person suspected of abusing a patient routinely ‘‘looks over the shoulder’’ of the patient while they access their EHI, or uses the patient’s own credentials to access the patient’s EHI. In such circumstances, this exception would apply to practices interfering with the patient’s own access to their EHI to the extent the practices are not inconsistent with the HIPAA Privacy Rule or the conditions in § 171.201. Comments. Several commenters suggested that the Preventing Harm Exception should recognize more types of abuse, and a broader array of potential types of harm than danger to life or physical safety in the context of interfering with access to a patient’s EHI by a legal representative suspected of abusing the patient. One commenter advocated that the Preventing Harm Exception should recognize all types of violence and abuse. The commenter provided citations to professional specialty expert committee opinions in support of their recommendation. Response. As discussed above in reference to comments that recommended aligning this rule’s harm standards more closely to the HIPAA Privacy Rule, we have, by cross- PO 00000 Frm 00198 Fmt 4701 Sfmt 4700 reference in § 171.201(d)(1), finalized as the harm standard applicable to practices interfering with a legal representative’s access to a patient’s EHI the same harm standard that would apply to denying a personal representative’s access to an individual’s PHI under § 164.524(a)(3)(iii). As § 164.524(a)(3)(iii) stands at the time this rule is finalized, it references ‘‘substantial harm.’’ As discussed above, this exception will also apply to practices likely to interfere with a legal representative’s access, exchange, or use that are employed pursuant to an election not to treat that legal representative as a personal representative in accordance with § 164.502(g)(5)(i). For purposes of § 171.201, ‘‘substantial harm’’ is interpreted as it is for purposes of § 164.524(a)(3)(iii). Thus, for purposes of not recognizing a personal representative, or otherwise restricting patient EHI access, exchange, or use by a representative known or suspected to be abusing the patient, we believe the harm standard applicable under this exception to practices affecting a legal representative’s access, exchange, or use of the patient’s EHI is sufficiently broad. We interpret the discretion afforded to a licensed health care professional in making an individualized determination of risk of harm consistent with the finalized § 171.201(c)(1) (type of risk condition) as allowing them to take into consideration clinical practice guidelines and clinical expert groups’ studied opinions relevant to abuserelated risks of substantial harm. Only practices based on the potential for harms that would not be recognized as meeting the ‘‘substantial harm’’ standard, as it is interpreted by the HHS Office for Civil Rights for purposes of § 164.524(a)(3)(iii), would fail to satisfy the type of harm condition finalized in § 171.201(d)(1). We remind actors that any decision not to provide access, exchange, or use of EHI on the basis of determination of risk of harm consistent with the finalized § 171.201(c)(1) and § 171.201(d)(1), (2), (3), or (4) is subject to rights the individual patient whose EHI is affected may be afforded by applicable regulations or law to have the determination reviewed and potentially reversed. (See the ‘‘patient right to request review of individualized determination of risk of harm’’ condition finalized in § 171.201(e), for which we also use ‘‘patient review rights condition’’ as a short form of reference for ease of discussion.) Where § 164.524(a)(3) applies in addition to § 171.201, § 164.524(a)(4) specifically E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations provides for review of determinations made by licensed health care professionals in the exercise of professional judgment. In circumstances where § 171.201 applies but § 164.524 does not, § 171.201(e) requires that an actor’s practices be consistent with any rights of review of individualized determinations of risk of harm that the patient may be afforded under applicable Federal, State, or tribal law or regulations. However, for purposes of § 171.201(c)(1) determinations, the type of harm must be consistent with: The harm standard stated in § 164.524(a)(3)(i) (interpreted as it is for purposes of § 164.524(a)(3)(i)) where § 171.201(d)(3) or (4) apply; the harm standard stated in § 164.524(a)(3)(ii) (interpreted as it is for purposes of § 164.524(a)(3)(ii)) where § 171.201(d)(2) applies; or the harm standard stated in § 164.524(a)(3)(iii) (interpreted as it is for purposes of § 164.524(a)(3)(iii)) where § 171.201(d)(1) applies. Finalized Policy for an Individualized Determination of Risk of Harm by a Licensed Health Care Professional in the Exercise of Professional Judgment We are finalizing the substance of this aspect of the exception with modifications to the way it is displayed and phrased in the finalized regulation text in comparison to the Proposed Rule. If its other conditions are also met, the finalized Preventing Harm Exception will apply to a practice an actor reasonably believes will substantially reduce a risk of harm consistent with the sub-paragraph of § 171.201(d), as finalized, that applies to the specific access, exchange, or use, where the risk of harm is determined on an individualized basis in the exercise of professional judgment by a licensed health care professional who has a current or prior clinician-patient relationship with the patient whose EHI is affected by the determination. In comparison to the proposed text of § 171.201 (84 FR 7602), we have reorganized the regulation text in response to comments requesting our regulatory text, in general, be easier to use for purposes such as understanding how the conditions of the exception relate to one another and how they apply to practices used in particular types of circumstances. We have left the potential sources of risk of harm in a single paragraph (finalized § 171.201(c)), but separated them from the reasonable belief condition paragraph (finalized § 171.201(a)). The sources of risk of harm are also, as discussed above, presented in two sub-paragraphs in the finalized text of § 171.201(c) (type of harm) instead of being split across three VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 sub-paragraphs as they were in the Proposed Rule. In subparagraph (a)(3) of the proposed text of § 171.201 (84 FR 7602), we expressed the additional condition that practices based on individualized determinations of risk of harm are subject to any rights of review of the determination that the patient may be afforded under applicable law. This patient review rights condition is finalized in § 171.201(e). As finalized, this condition requires that where a risk of harm is determined on an individualized basis (consistent with § 171.201(c)(1) as finalized), the actor must honor any rights the individual patient whose EHI is affected may have under § 164.524(a)(4) or any Federal, State, or tribal law applicable in the circumstances to have the determination reviewed and potentially reversed. We have stated the condition for providing review rights afforded by law in the separate paragraph (e) of § 171.201 instead of including it within subparagraph (c)(1) because in the context of 171.201 the patient review rights condition functions as a condition on how practices based on such belief are implemented more than as a required characteristic of the § 171.201(c)(1) determination itself. The finalized text of § 171.201(c)(1) also differs from the proposed regulation text specific to individualized determinations of risk in explicitly stating the requirement that the licensed health care professional making the determination must have a current or prior clinician-patient relationship with the patient whose EHI is affected by the determination. For purposes of § 171.201—as we discussed in the Proposed Rule’s preamble, and above in this preamble—we believe the broad discretion afforded to licensed health care professionals to make individualized determinations of risks of harm in the exercise of professional judgment is appropriate in the context of the expectation that a licensed health care professional with a clinicianpatient relationship to a patient has the opportunity to have knowledge of the patient and their individual circumstances that is not generally available outside the context of a clinician-patient relationship. We believe that explicitly stating in § 171.201(c)(1) the requirement for a clinician-patient relationship accomplishes two purposes: First, it ensures that this is immediately clear on the face of the finalized regulation text that only determinations made by licensed health care professionals who have or have had a clinician-patient relationship with the patient will be PO 00000 Frm 00199 Fmt 4701 Sfmt 4700 25839 considered consistent with § 171.201(c)(1); and, second, it is also clear that the condition for a clinicianpatient relationship is specific and limited to determinations of risks of harm on an individualized basis in the exercise of professional judgment by a licensed health care professional (§ 171.201(c)(1) as finalized). Please note that this requirement is specific to the individualized determination of risk of harm, and does not limit application of § 171.201 to practices implemented directly by the licensed health care professional making a determination of risk of harm consistent with § 171.201(c)(1) as finalized. Appropriately tailored practices applied because the actor has a reasonable belief the practice will substantially reduce a risk of harm that was determined on an individualized basis consistent with § 171.201(c)(1) will, if all other applicable conditions of § 171.201 are met, be recognized under this exception whether the practices are undertaken by the licensed health care professional making the determination or by another actor (e.g., another licensed health care professional, a hospital, or a HIN) having custody or control of the patient’s EHI and knowledge of the individualized determination of risk of harm associated with particular access(es), exchange(s), or use(s) of that EHI. As finalized, § 171.201(d) differs from the proposed policy in that it does not uniformly require that the risk determined on an individualized basis be to life or physical safety of the patient or another person in all circumstances. Instead, through specified cross-references to the subparagraphs of § 164.524(a)(3), the finalized § 171.201(d) type of harm condition uses the same harm standards for the circumstances where both the Preventing Harm Exception and § 164.524(a)(3) apply. Also through cross-references, the type of harm condition applies the § 164.524(a)(3) harm standards in circumstances similar to those in which § 164.524(a)(3) applies but where only § 171.201 actually applies. The finalized § 171.201(d) does not cross-reference § 164.502(g)(5)(i), but it is constructed so that it does apply to practices interfering with a personal representative or other legal representative’s access to a patient’s EHI consistent with an actor declining to recognize such a representative on the same bases as a HIPAA covered entity could elect not to recognize a person as an individual’s personal representative consistent with § 164.502(g)(5)(i). In order to retain a clear, consistent set of E:\FR\FM\01MYR3.SGM 01MYR3 25840 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations harm standards throughout the § 171.201 type of harm condition, however, we note that where a HIPAA covered entity elects not to recognize an individual’s personal representative consistent with § 164.502(g)(5)(ii), the Preventing Harm Exception would not apply.159 Consistent with the HIPAA Privacy Rule, a decision not to provide access, exchange, or use of EHI on the basis finalized in § 171.201(c)(1) is subject to the rights the individual patient whose EHI is affected may be afforded by applicable law to have the determination reviewed and potentially reversed. While any such determination reviews may be pending, application of practices interfering with the patient’s access, exchange, or use of their EHI based on an individualized determination by a licensed health care professional (§ 171.201(c)) that are otherwise compliant with the conditions of § 171.201 as a whole will be considered to be covered by the exception. Upon becoming aware of a reversal of the determination on which the actor’s required reasonable belief was based, whether as a result of a review requested by the patient or other processes, the actor’s continued application of practices based on the original determination would no longer be consistent with the conditions of § 171.201. Likewise, upon becoming aware of a revision of the determination on which the actor’s required reasonable belief was originally based, whether the revision resulted from a review requested by the patient or other processes, practices applied to the patient’s EHI after the revision is made will need to comply with the conditions of § 171.201 in light of the revised determination in order for the practice to continue to be covered under § 171.201. For the specific purposes of § 171.201, the rights to obtain review or reconsideration of a provider’s individualized determination of risk of harm reside with the patient whose EHI is affected. The rights in many cases may be exercised on the patient’s behalf by the patient’s personal or other legal representative. However, it may not be appropriate, or feasible, for the patient’s representative to exercise the patient’s 159 Because § 164.502(g)(5)(ii) currently applies a standard not of harm but of determination by the covered entity that recognizing a person as personal representative is not in the best interest of the individual, we have determined it is more appropriate to address these circumstances in context of the exception for practices promoting privacy of EHI, finalized in § 171.202 and discussed in Section VIII.D.1.b of this final rule preamble. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 review rights in circumstances where the individualized determination of risk of harm is or includes a determination that recognizing that same person as the patient’s representative, or providing specific information to that same recognized representative, would pose a risk of cognizable harm. In a circumstance where the actor has a reasonable belief that such disclosure could create or increase a risk of harm to the patient, this exception does not require the candid disclosure to a known, suspected, or potential abuser of the rationale for use of particular practices, or even the precise practices, interfering with that representative’s access, exchange, or use of EHI. We would, however, generally expect actors to be as candid with the patient per se as is clinically appropriate and safely practicable in their individualized circumstances. Where an actor lacks the technical capability to sequester only that EHI the actor reasonably believes poses a risk of cognizable harm from other data for which the actor does not pose such risk of harm, this lack of segmentation capability would not render § 171.201 applicable to practices likely to, or that do, interfere with access, exchange, or use of the other data. Rather, where such lack of segmentation capabilities renders the actor unable to support an otherwise legally permissible access, exchange, or use of EHI, the actor should reference the Content and Manner Exception (§ 171.301) or the Infeasibility Exception (§ 171.204). Licensed health care professionals have discretion to determine how to use their EHRs and/or other records kept in their ordinary course of business to capture and preserve documentation of and relevant to their individualized determinations. Information relevant to determinations would include the facts or circumstances that substantially informed each determination, and any other decision-making information that the professional may otherwise have difficulty recalling or reconstructing if later asked to explain how or why they reached their individualized determination in a particular case. Practices Implemented Based on an Organizational Policy or on Determination Specific to the Facts and Circumstances To qualify for the Preventing Harm Exception, we proposed that an actor would be required to have, while engaging in the practice(s) for which application of the exception is claimed, a reasonable belief that the practice(s) PO 00000 Frm 00200 Fmt 4701 Sfmt 4700 will ‘‘directly and substantially’’ 160 reduce the likelihood of harm to a patient or another person. As discussed in the Proposed Rule and above, the type of risk and the potential harm must also be cognizable under this exception (84 FR 7525 and 7526). Under § 171.201 as proposed, an actor would be able to demonstrate having satisfied the condition of reasonable belief that a practice will reduce the likelihood of harm (‘‘reasonable belief condition’’) through a qualifying organizational policy (proposed § 171.201(b)) and/or a qualifying individualized determination (proposed § 171.201(c)). We discuss below the details of our proposal, respond to comments, and summarize finalized policy specific to each of these approaches to demonstrating the required reasonable belief that a practice will substantially 161 reduce a risk of harm cognizable under this exception. Practices Implemented Based on an Organizational Policy In the Proposed Rule (84 FR 7525), we proposed that to qualify for this exception, an actor must have had a reasonable belief that the practice or practices will directly and substantially reduce the likelihood of harm to a patient or another person and that the type of risk must also be cognizable under this exception. We proposed that an actor could meet this condition in two ways: Through a ‘‘qualifying organizational policy’’ (§ 171.201(b) as proposed) or through a ‘‘qualifying individualized finding’’ (§ 171.201(c) as proposed). We stated in the Proposed Rule that we anticipate that in most instances where § 171.201 would apply, the actor would demonstrate that the practices it engaged in were consistent with an organizational policy that was objectively reasonable and no broader than necessary for the type of patient safety risks at issue. We also noted in the Proposed Rule that within any type of actor defined in § 171.102, organizations may vary significantly in structure, size, and resources. Further, even when an organizational policy exists, it may not anticipate all of the potential risks of harm that could arise in real-world clinical or production 160 As, and for the reasons, discussed earlier in this section of this preamble, we have removed ‘‘directly and’’ from the belief standard finalized in § 171.201(a). 161 As, and for the reasons, discussed earlier in this section of this preamble, the belief standard finalized in § 171.201(a) requires the actor believe the practice will ‘‘substantially reduce’’ a risk of harm to a patient or another natural person that would otherwise arise from the access, exchange, or use of electronic health information affected by the practice. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations environments of health IT. Thus, we proposed in § 171.201(c) (84 FR 7602) that in lieu of demonstrating that a practice conformed to a policy that met the conditions described in proposed § 171.201(b) and the Proposed Rule preamble at 84 FR 7525, the actor could justify the practice(s) directly by making a finding in each case, based on the particularized facts and circumstances. We proposed that where the proposed § 171.201(b) (84 FR 7602) would apply, an actor’s policy would need to be: • In writing; • developed with meaningful input from clinical, technical, and other appropriate staff or others who have expertise or insight relevant to the risk of harm that the policy addresses; • implemented in a consistent and non-discriminatory manner; and • no broader than necessary to mitigate the risk of harm. We stated that the proposed condition would not be met if, for example, a hospital imposed top-down information sharing policies or workflows established by the hospital’s EHR developer and approved by hospital administrators without meaningful input from the medical staff, IT department, and front-line clinicians who are in the best position to gauge how effective it will be at mitigating patient safety risks. Comments. Commenters expressed concern that information blocking policy and its interaction with other applicable laws and regulations, such as the HIPAA Rules, are complex and that there will be costs and other burden associated with understanding how the policies affect an actor’s daily operations. Commenters also expressed concern that it would be too burdensome to be required to demonstrate, in any of the ways we proposed, that they have a reasonable belief that practices would reduce a risk of cognizable harm. Response. We understand that complexity can increase difficulty in understanding and complying with any regulation. We also understand that the interaction between the HIPAA Rules and the information blocking provision is inherently complex. However, without an exception from the information blocking definition for practices appropriately tailored to reduce risks of harm, we believe actors would be subject to the greater burden of needing to craft practices that avoid violating the information blocking provision without also making EHI available for access, exchange, or use in circumstances where that puts patients or other natural persons at risk of harm. This exception’s conditions give actors VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 a framework within which they can develop or refine their practices in assurance that practices meeting the conditions in § 171.201 are excepted from the definition of information blocking finalized in § 171.103. At the same time, implementing such an exception without appropriate conditions could have the unintended and undesirable effect of excusing conduct that would more appropriately remain within the definition of information blocking. Therefore, in § 171.201, we have finalized conditions that strike a practical balance between minimizing burdens on actors and ensuring that the interests of patients in the access, exchange, and use of their EHI are adequately protected. These conditions are, in comparison to the Proposed Rule, more granularly and durably aligned with relevant HIPAA right of access provisions (§ 164.526(a)(3)) and this alignment reduces complexity. We have revised the way the regulation text is presented and phrased so that it is easier to understand what is required in order for a practice to be excepted from the definition of information blocking under this exception. Moreover, we have avoided specifying particular or unique forms, methods, or content of documentation for purposes of this exception. We believe the flexibility this offers actors to determine the most efficient approach to documenting their practices and determinations relevant to this exception enables them to achieve and document satisfaction of the exception’s condition with the lowest practicable burden. Comments. A number of commenters noted that there will be burden associated with developing or revising organizational policies and training staff so they can use this exception in compliance with its conditions. Several of these commenters suggested we provide additional guidance and informational resources, in this final rule or otherwise, to help actors develop their policies and staff training. Some commenters advocated that we develop templates or models that actors could use to more efficiently develop policies consistent with the conditions for applicability of this exception. Response. We appreciate the feedback and do recognize that developing or revising internal policies and procedures when compliance requirements change due to changes in law requires some effort. While recognizing the utility of the types of resource materials suggested by commenters, we believe they are best developed and provided outside the PO 00000 Frm 00201 Fmt 4701 Sfmt 4700 25841 rulemaking process. We will continue working to engage with the stakeholder communities to promote understanding and foster compliance with the information blocking provision amongst all actors within the definitions in § 171.102. We also believe that in many cases voluntary groups with relevant expertise, such as professional societies and provider organizations, may be in the best position to develop resources tailored to the particular needs and preferences of specific segments or communities within any given type of actor. Comments. Some commenters stating that developing new or revised organizational policies and training staff in the policies requires time recommended that we establish a grace period before organizations’ policies and actual practices must fully comply with § 171.201 conditions in order to be recognized as reasonable and necessary under § 171.201. Response. This concern is not unique to § 171.201. Commenters also raised this concern in the context of information blocking in general. As we stated in section VIII.B.3 of this preamble, we thank commenters for their input. Comments related to the overall timing of information blocking enforcement have been shared with OIG. We emphasize that individuals and entities subject to the information blocking provision must comply with the ONC final rule as of the compliance date of the information blocking section of this final rule (45 CFR part 171). We have finalized a compliance date for 45 CFR part 171 as a whole that is six months after the date this final rule is published in the Federal Register. OIG and ONC are coordinating timing of the compliance date of the information blocking section of this final rule (45 CFR part 171) and the start of information blocking enforcement. We are providing the following information on timing for actors. Enforcement of information blocking CMPs in section 3022(b)(2)(A) of the PHSA will not begin until established by future notice and comment rulemaking by OIG. As a result, actors would not be subject to penalties until CMP rules are final. At a minimum, the timeframe for enforcement would not begin sooner than the compliance date of the information blocking section of this final rule (45 CFR part 171) and will depend on when the CMP rules are final. Discretion will be exercised such that conduct that occurs before that time will not be subject to information blocking CMP. Specific to § 171.201, as discussed above in response to other comments E:\FR\FM\01MYR3.SGM 01MYR3 25842 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations received specific to the Preventing Harm Exception, we have applied § 164.524(a)(3) harm standards under § 171.201 to circumstances where both sections of 45 CFR would apply, and to circumstances where only § 171.201 applies but that are similar in significant respects to circumstances where § 164.524(a)(3) applies. In substantial part because of this alignment, we do not believe there is a need to delay the applicability of any of the conditions for a practice to be excepted under § 171.201 from the definition of information blocking in § 171.103. Actors who are also HIPAA covered entities or business associates should already have policies in place consistent with the HIPAA Privacy Rule, including but not limited to § 164.524(a)(3). These actors and their staff members should be well versed in these policies and practices. Where § 164.524(a)(3) would not apply but § 171.201(d)(3) or (4) would apply, we believe using the same, familiar standard for the risk that the actor must believe their practice would reduce as would apply to § 164.524(a)(3)(i) should facilitate efficient updates to organizational policies and streamline any staff training that may be indicated specific to § 171.201. We also note that the finalized Preventing Harm Exception also provides, in § 171.201(f)(2), for coverage of practices implemented in absence of an applicable organizational policy or where existing organizational policy does not address the particular practice in the particularized circumstances. Moreover, although we encourage actors to voluntarily conform their practices to the conditions of an exception suited to the practice and its purpose, an actor’s choice to do so simply provides them an enhanced level of assurance that the practices do not meet the definition of information blocking. However, failure to meet an exception does not necessarily mean a practice meets the definition of information blocking. We reiterate, if subject to an investigation by HHS, each practice that implicates the information blocking provision would be analyzed on a case-by-case basis. Comments. Several commenters indicated that providers’ current organizational policies call for practices that delay the release of laboratory results so that the patient’s clinician has an opportunity to review the results before potentially needing to respond to patient questions, or has an opportunity to communicate the results to the patient in a way that builds the clinician-patient relationship. Some commenters indicated their standard practice is to automatically time-delay VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 release of results in general, with an automatic release at the end of a time period determined by the organizational policy in place to ensure that patients can consistently access their information within the timeframe targeted by relevant measures under the CMS Promoting Interoperability Programs. Commenters requested we clarify whether such practices would be recognized under § 171.201 or that we recognize such current organizational policies and practices as excepted from the definition of information blocking. Response. While we recognize the importance of effective clinician-patient relationships and patient communications, we are not persuaded that routinely time-delaying the availability of broad classes of EHI should be recognized as excepted from the information blocking definition under this exception. Consistent with § 171.201(d)(3) as finalized, the harm of which a practice must reduce a risk must, where the practice interferes with the patient’s access to their own EHI, be one that could justify denying the patient’s right of access to PHI under § 164.524(a)(3). Currently, § 164.524(a)(3)(i) requires that for a covered entity to deny an individual access to their PHI within the designated record set, the disclosure of that PHI must be reasonably likely to endanger the life or physical safety of the patient or another person.162 No commenter cited evidence that routinely delaying EHI availability to patients in the interest of fostering clinician-patient relationships substantially reduces danger to life or physical safety of patients or other persons that would otherwise routinely arise from patients’ choosing to access the information as soon as it is finalized. Moreover, we are independently aware, and some comment submissions confirmed, that it is not uncommon to automatically release lab and other findings to patients electronically regardless of whether a clinician has seen the information or discussed it with the patient before the patient can choose to access it electronically. We presume these types of automatic releases would not be the case if patients’ accessing their information on a timeframe that is more of their own choosing routinely posed a risk to the life or physical safety of these patients or other natural persons. Thus, we believe that where applicable law does 162 Note that for purposes of § 164.524(a)(3)(i), ‘‘individual’’ is defined in § 160.103, but for purposes of § 171.201 an actor must reasonably believe a practice will substantially reduce a risk of cognizable harm to patient(s) or other natural person(s). PO 00000 Frm 00202 Fmt 4701 Sfmt 4700 not prohibit making particular information available to a patient electronically before it has been conveyed in another way, deference should generally be afforded to patients’ right to choose whether to access their data as soon as it is available or wait for the provider to contact them to discuss their results. Only in specific circumstances do we believe delaying patients’ access to their health information so that providers retain full control over when and how it is communicated could be both necessary and reasonable for purposes of substantially reducing a risk of harm cognizable under § 171.201(d) (as finalized). Circumstances where § 171.201 would apply to such delay are those where a licensed health care professional has made an individualized determination of risk in the exercise of professional judgment consistent with § 171.201(c)(1), whether the actor implementing the practice is the licensed health care professional acting directly on their own determination or another actor implementing the delay in reliance on that determination. An actor could choose to demonstrate the reasonable belief required by § 171.201(a) through an organizational policy (§ 171.201(f)(1)) with which the practice is consistent, or based on a determination based on facts and circumstances known or reasonably believed by the actor at the time the determination was made and while the practice remains in use (§ 171.201(f)(2)), to rely on a determination consistent with § 171.201(c)(1). Comments. Health care professionals commented that clinical experience indicates a systematic and substantial risk that releasing some patient data through a patient portal or API without first communicating the particular results or diagnosis with the patient in a more interactive venue would pose risks of substantial harm to patients. One example commenters specifically cited was genetic testing results indicating a high risk of developing a neurodegenerative disease for which there is no effective treatment or cure. Commenters recommended that we define this exception to allowing delay of the electronic release of such genetic testing results, as a matter of organizational policy, to ensure patients and their families are not exposed to this information without appropriate counseling and context. One comment indicated that delivery by the clinician of the combined results, counseling, and context is clinically appropriate and consistent with the conclusions of relevant research. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations Response. To satisfy the conditions of § 171.201, and actor would have to demonstrate that they held a reasonable belief that delaying availability of information until the information can be delivered in combination with appropriate counseling and context in an interactive venue will substantially reduce a risk of harm cognizable under this exception. An actor could accomplish such demonstration through showing the practice is consistent with either an organizational policy meeting § 171.201(f)(1) or a determination based on facts and circumstances known or reasonably believed by the actor at the time the determination was made and while the practice remains in use meeting § 171.201(f)(2). However, for a practice likely to, or that does in fact, interfere with the patient’s access to their own EHI (§ 171.201(d)(3)), the actor implementing these practices must demonstrate a reasonable belief that the practice will substantially reduce a risk of harm to the life or physical safety of the patient. The clinician who orders testing of the sort referenced in the comment would, we presume, do so in the context of a clinician-patient relationship. In the context of that relationship, a licensed health care professional should be well positioned to make determinations consistent with § 171.201(c)(1) as to specifically when their patients, or other particular natural persons, would face a risk of harm cognizable under § 171.201(d)(3)—or § 171.201(d)(1) or (2) if or as may be applicable—if the access, exchange, or use of a particular testing result or diagnosis were to be released electronically before it could be explained and contextualized by an appropriately skilled professional, such as a clinician or a health educator, in real time. Summary of Finalized Policy: Practices Implemented Based on an Organizational Policy We have finalized that to demonstrate the reasonable belief required by § 171.201(a) based on an organizational policy, the policy must: (i) Be in writing; (ii) Be based on relevant clinical, technical, and other appropriate expertise; (iii) Be implemented in a consistent and non-discriminatory manner; (iv) Conform each practice to the conditions in paragraphs (a) and (b) of this section, as well as the conditions of paragraphs (c) through (e) of this section applicable to the practice and its use. We have modified the regulation text finalized in § 171.201(f)(1) consistent with other revisions to § 171.201. We VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 have redesignated this paragraph from (b) to (f)(1), and redesignated its proposed sub-paragraphs from (1) through (4) to (i) through (iv). We have in comparison to the main paragraph language of the proposed § 171.201(b) modified the phrasing of the finalized paragraph (f) so that § 171.201 as finalized is more immediately clear on its face that what is finalized in § 171.201(f) is a condition for practices to meet the exception, and that paragraph (f) can be satisfied by meeting either subparagraph (1) or (2). Practices applied based on an organization policy to rely on individualized determinations of risk of harm consistent with § 171.201(c)(1) would be covered under § 171.201 to the extent they otherwise meets its conditions. Neither an organizational policy (§ 171.201(f)(1)), nor a determination based on facts and circumstances known or reasonably believed by the actor at the time the determination was made and while the practice remains in use ((§ 171.201(f)(2)) would be required to routinely evaluate or otherwise assess the licensed health care professional’s exercise of professional judgment in order for practices implemented in reliance on the professional’s § 171.201(c)(1) determination to be meet the conditions of § 171.201. Practices Implemented Based on a Determination Specific to the Facts and Circumstances As discussed in the Proposed Rule, we recognize that some actors (such as small health care providers and small HINs/HIEs) may not have comprehensive and formal policies governing all aspects of EHI and patient safety. Additionally, even if an organizational policy exists, it may not anticipate all of the potential risks of harm that could arise in real-world clinical or production environments of health IT. In these circumstances, in lieu of demonstrating that a practice conformed to the actor’s policies and that the policies met the conditions proposed in § 171.201(b), we proposed that the actor could justify its use of particular practices by making a finding in each case, based on the particularized facts and circumstances, that the practice is necessary and no broader than necessary to mitigate the risk of harm. To do so, we proposed that the actor would need to show that the practices were approved on a case-bycase basis by an individual with direct knowledge of the relevant facts and circumstances and who had relevant clinical, technical, or other appropriate expertise. Such an individual would PO 00000 Frm 00203 Fmt 4701 Sfmt 4700 25843 need to reasonably conclude, based on those particularized facts and circumstances and his/her expertise and best professional judgment, that the practice was necessary, and no broader than necessary, to mitigate the risk of harm to a patient or other persons. We further proposed that a licensed health care professional’s independent and individualized judgment about the safety of the actor’s patients or other persons would be entitled to substantial deference under this proposed exception. So long as the clinician considered the relevant facts and determined that, under the particular circumstances, the practice was necessary to protect the safety of the clinician’s patient or another natural person, we would not second-guess the clinician’s professional judgment. To provide further clarity on this point, we provided an illustrative example in the preamble to the proposed rule (see 84 FR 7525). Comments. Commenters requested that we clarify, provide guidance, or establish specifications for the documentation necessary to substantiate applicability of the Preventing Harm Exception based on qualifying determinations particularized to specific facts and circumstances. Some commenters indicated that such specificity or guidance is needed to avoid imposing on actors such as health care providers and HINs/HIEs excess burden associated with documentation in the absence of such guidance or specification. Response. We appreciate these commenters highlighting that the potential for uncertainty or confusion about what is minimally necessary to demonstrate satisfaction of a new policy can often lead to capturing and retaining a wide array of information just in case it may be needed or useful later. We have clarified the way in which all of the conditions in § 171.201 are stated and organized within the section. We also note here that an actor does not need to draft for each determination consistent with § 171.201(f)(2) a comprehensive defense of their findings. We believe the finalized statement of the condition, reinforced by this preamble discussion, provides certainty that we do not intend or expect actors to create new records systems or types, or to create or retain duplicate information or documentation across their current medical and other business records. Ultimately, it is the actor’s responsibility to demonstrate they met the conditions of an exception. E:\FR\FM\01MYR3.SGM 01MYR3 25844 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations Summary of Finalized Policy: Practices Implemented Based on a Determination Specific to the Facts and Circumstances We have finalized the substance of this condition as proposed, with modifications to the regulation text. We have also reorganized § 171.201 so that it is easier to read and understand. We have redesignated this paragraph from (c) to (f), and broken it into subparagraphs. We have in comparison to the main paragraph language of the proposed § 171.201(c) modified the phrasing of the finalized paragraph (f) so that § 171.201 as finalized is more immediately clear on its face that what is finalized in § 171.201(f)(2) is a means to demonstrate a practice implemented in absence of an applicable, or perhaps any, organizational policy nevertheless meets the conditions to be exempted under § 171.201 from the definition of information blocking in § 171.103. We have separated from both the requirements applicable to individualized determinations of risk (finalized in the type of risk condition in § 171.201(c)(1)) and the requirements applicable to practices implemented based on organizational policy (§ 171.201(f)(1)) or to practices implemented pursuant to a determination based on the facts and circumstances (§ 171.201(f)(2)) the patient review rights condition expressed in subparagraph (a)(3) of the proposed text of § 171.201 (84 FR 7602). We have finalized the patient review rights condition in § 171.201(e) instead of the finalized (f) because it applies equally to practices implemented based on an organizational policy and by practices implemented based on determinations based on facts and circumstances, in parallel to the other conditions for a practice to be excepted under § 171.201 from the definition of information blocking in § 171.103. In the finalized patient review rights condition (§ 171.201(e)), in comparison with proposed § 171.201(a)(3) (84 FR 7602), we have revised the wording in which we state the condition for honoring any rights that applicable law may afford patients to have these individualized determinations reviewed and potentially reversed. The condition finalized in § 171.201(e) is that where the risk of harm is consistent with paragraph (c)(1) of this section, the actor must implement its practices in a manner consistent with any rights the individual patient whose EHI is affected may have under § 164.524(a)(4) of this title, or any Federal, State, or tribal law, to have the determination reviewed and potentially reversed. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 We also revised in finalized § 171.201(e), in comparison with the proposed § 171.201(a)(3), the wording of the condition finalized in § 171.201(e) in comparison to the wording of this condition as proposed in 171.201(a)(3) for two reasons. First, the wording has been revised to fit its placement within the finalized section. Second, the wording has been revised to more clearly and completely state the sources of the review rights that must be afforded, if applicable. We note that such review rights will be afforded by § 164.524(a)(4) in the circumstances where both § 164.524(a)(3) and § 171.201 apply. However, rights that must be honored to meet the conditions of § 171.201 are not limited to those afforded by § 164.24(a)(4) or to circumstances where § 164.524 applies in addition to § 171.201. Rights of review of an individualized determination of risk of harm (§ 171.201(c)(1)) might also be afforded by Federal, State, or tribal law applicable in the particular circumstances. We do not believe it is necessary to expressly state in the regulation text that we interpret regulations promulgated based on such laws, and that have the force and effect of law on individuals and entities they regulate, to be within the meaning of ‘‘law’’ for purposes of § 171.201(e). However, we expressly state this here in order to provide the type of assurance we believe many commenters were seeking when stating in their comment submissions requests or recommendations for additional guidance in the final rule. In order for the practice(s) to satisfy the condition in § 171.201(e), where otherwise applicable law affords a patient right(s) to request review of individualized determinations of risk of harm associated with the patient’s access, exchange, or use of their EHI, the actor’s practice(s) be implemented in a manner consistent with those rights—regardless of which specific law(s) afford the rights applicable in the particular circumstances. b. Privacy Exception—When will an actor’s practice of not fulfilling a request to access, exchange, or use electronic health information in order to protect an individual’s privacy not be considered information blocking? We proposed to establish an exception to the information blocking provision for practices that are reasonable and necessary to protect the privacy of an individual’s EHI, provided certain conditions are met (84 FR 7526). The exception and corresponding conditions were set forth in the PO 00000 Frm 00204 Fmt 4701 Sfmt 4700 proposed regulation text in § 171.202. We noted that any interference practice that an actor is engaged in to protect the privacy of an individual’s EHI must be consistent with applicable laws and regulations related to health information privacy, including the HIPAA Privacy Rule, the HITECH Act, 42 CFR part 2, and State laws. We emphasized that this exception to the information blocking provision does not alter an actor’s obligation to comply with applicable laws (84 FR 7526). We noted that this exception is necessary to support basic trust and confidence in health IT infrastructure. Without this exception, there would be a significant risk that actors would share EHI in inappropriate circumstances, such as when an individual has taken affirmative steps to request that the EHI not be shared under certain conditions or when an actor has been unable to verify a requester’s identity before sharing EHI. We explained that this proposed exception was structured with discrete ‘‘sub-exceptions.’’ An actor’s practice must qualify for a sub-exception to be covered by the exception. We noted that the sub-exceptions were, to a large extent, crafted to closely mirror privacyprotective practices that are recognized under State and Federal privacy laws. In this way, the privacy sub-exceptions to the information blocking provision recognize as reasonable and necessary those practices that are engaged in by actors to be consistent with existing laws, provided that certain conditions are met. We proposed four sub-exceptions that address the following privacy protective practices: (1) Not providing access, exchange, or use of EHI when a State or Federal law requires that a precondition be satisfied before an actor provides access, exchange, or use of EHI, and the precondition is not satisfied (proposed in § 171.202(b)); (2) not providing access, exchange, or use of EHI when the actor is a health IT developer of certified health IT that is not covered by the HIPAA Privacy Rule in respect to a practice (proposed in § 171.202(c)); (3) a covered entity, or a business associate on behalf of a covered entity, denying an individual’s request to access to their electronic protected health information (ePHI) in the circumstances provided in 45 CFR 164.524(a)(1)(2) or (3) (proposed in § 171.202(d)); and (4) not providing access, exchange, or use of EHI pursuant to an individual’s request, in certain situations (proposed in § 171.202(e)) (84 FR 7526). We proposed that an actor would need to satisfy at least one subexception with respect to a purportedly E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations privacy-protective practice that interferes with access, exchange, or use of EHI to not be subject to the information blocking provision. Each proposed sub-exception has conditions that must be met in order for an actor’s practice to qualify for protection under the sub-exception (84 FR 7526). Modification We have changed the title of this exception from ‘‘Exception—Promoting the privacy of electronic health information’’ in the Proposed Rule (84 FR 7602) to ‘‘Privacy Exception—When will an actor’s practice of not fulfilling a request to access, exchange, or use electronic health information in order to protect an individual’s privacy not be considered information blocking?’’ Throughout this final rule preamble, we use ‘‘Privacy Exception’’ as a short form of this title, for ease of reference. As stated in Section VIII.D of this final rule preamble, we have changed the titles of all of the exceptions to questions to improve clarity. We have edited the wording of the introductory text in § 171.202 as finalized, in comparison to that proposed (84 FR 7602) so that it is consistent with the finalized title of § 171.202. We believe these conforming changes in wording of the introductory text also improve clarity in this section. Specific Terminology Used for the Purposes of This Proposed Exception We noted that the proposed exception used certain terms that are defined by the HIPAA Rules 163 but that, for purposes of the exception, may have a broader meaning in the context of the information blocking provision and its implementing regulations as set forth in the Proposed Rule. We explained that, in general, the terms ‘‘access,’’ ‘‘exchange,’’ and ‘‘use’’ have the meaning in proposed § 171.102. However, we noted that in some instances we referred to ‘‘use’’ in the context of a disclosure or use of ePHI under the HIPAA Privacy Rule, in which case we explicitly stated that the term ‘‘use’’ had the meaning defined in 45 CFR 160.103. Similarly, we referred in a few cases to an individual’s right of access under 45 CFR 164.524, in which case the term ‘‘access’’ should be understood in that HIPAA Privacy Rule context. We emphasized that, for purposes of section 3022 of the PHSA, however, the term ‘‘access’’ includes, but is broader than, an individual’s access to their PHI as provided for by the HIPAA Privacy Rule (84 FR 7526). 163 45 CFR part 160 and subparts A, C, and E of part 164. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 Finally, we noted that the term ‘‘individual’’ is defined by the HIPAA Rules at 45 CFR 160.103. Separately, under the information blocking enforcement provision, we noted that the term ‘‘individual’’ is used to refer to actors that are health IT developers of certified health IT, HINs, or HIEs (see section 3022(b)(2)(A) of the PHSA). We clarified that for purposes of this exception (and only this exception), we used neither of these definitions. Instead, the term ‘‘individual’’ encompassed any or all of the following: (1) An individual defined by 45 CFR 160.103; (2) any other natural person who is the subject of EHI that is being accessed, exchanged or used; (3) a person who legally acts on behalf of a person described in (1) or (2), including as a personal representative, in accordance with 45 CFR 164.502(g); or (4) a person who is a legal representative of and can make health care decisions on behalf of any person described in (1) or (2); or (5) an executor or administrator or other person having authority to act on behalf of the deceased person described in (1) or (2) or the individual’s estate under State or other law. We clarified that (2) varies from (1) because there could be individuals who could be the subject of EHI that is being accessed, exchanged, or used under (2), but who would not be the subject of PHI under (1). For example, an actor which is not a covered entity or business associate as defined under HIPAA such as a health IT developer of certified health IT may access, exchange or use a patient’s electronic health information; however this ‘‘health information’’ would not meet the definition of PHI, but nonetheless, would be subject to this regulation. We also clarified that (3) encompasses a person with legal authority to act on behalf of the individual, which includes a person who is a personal representative as defined under the HIPAA Privacy Rule. We explained that we included the component of legal authority to act in (3) because the HIPAA Privacy Rule gives rights to parents or legal guardians in certain circumstances where they are not the ‘‘personal representative’’ for their child(ren). For instance, a non-custodial parent who has requested a minor child’s medical records under a courtordered divorce decree may have legal authority to act on behalf of the child even if he or she is not the child’s ‘‘personal representative.’’ Further, we noted that in limited circumstances and if permitted under State law, a family member may have legal authority to act on behalf of a patient to make health PO 00000 Frm 00205 Fmt 4701 Sfmt 4700 25845 care decisions in emergency situations even if that family member may not be the ‘‘legal representative’’ or ‘‘personal representative’’ of the patient. We noted that we adopted this specialized usage to ensure that the Privacy Exception extends protection to information about, and respects the privacy preferences of, all individuals, not only those individuals whose EHI is protected as ePHI by HIPAA covered entities and business associates (84 FR 7526 and 7527). Interaction Between Information Blocking, the Exception for Promoting the Privacy of EHI, and the HIPAA Privacy Rule We stated in the Proposed Rule that we consulted extensively with the HHS Office for Civil Rights (OCR), which enforces the HIPAA Privacy, Security and Breach Notification Rules, in developing proposals to advance our shared goals of preventing information blocking for nefarious or self-interested purposes while maintaining and upholding existing privacy rights and protections for individuals. We noted that the proposed exception for promoting the privacy of EHI (also referred to as the ‘‘privacy exception’’) operates in a manner consistent with the framework of the HIPAA Privacy Rule. We explained that we designed the subexceptions to ensure that individual privacy rights are not diminished as a consequence of the information blocking provision, and to ensure that the information blocking provision does not require the use or disclosure of EHI in a way that would not be permitted under the HIPAA Privacy Rule. We emphasized that our intent was that the information blocking provision would not conflict with the HIPAA Privacy Rule. We noted that the sub-exception proposed in § 171.202(d) reflects a policy that an actor’s denial of access to an individual consistent with the limited conditions for such denials that are described in the HIPAA Privacy Rule at 45 CFR 164.524(a)(1)(2) and (3), is reasonable under the circumstances (84 FR 7527). We also noted that the information blocking provision may operate to require that actors provide access, exchange, or use of EHI in situations that the HIPAA Rules would not require access of similar information. This is because the HIPAA Privacy Rule permits, but does not require, covered entities to disclose ePHI in most circumstances. We explained that the information blocking provision, on the other hand, requires that an actor provide access to, exchange, or use of EHI unless they are prohibited from E:\FR\FM\01MYR3.SGM 01MYR3 25846 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations doing so under an existing law or are covered by one of the exceptions. As an illustration, we noted that the HIPAA Privacy Rule permits health care providers to exchange ePHI for treatment purposes but does not require them to do so. Under the information blocking provision, unless an exception to information blocking applies, or the interference is required by law, a primary care provider would be required to exchange ePHI with a specialist who requests it to treat an individual who was a common patient of the provider and the specialist, even if the primary care provider offered patient care services in competition with the specialist’s practice, or would usually refer its patients to another specialist due to an existing business relationship (84 FR 7527). Promoting Patient Privacy Rights We stated that the information blocking provision would not require that actors provide access, exchange, or use of EHI in a manner that is not permitted under the HIPAA Privacy Rule or other laws. As such, the privacyprotective controls existing under the HIPAA Rules would not be weakened by the information blocking provision. Moreover, we described that we structured the Privacy Exception to ensure that actors can engage in reasonable and necessary practices that advance the privacy interests of individuals (84 FR 7527). We explained that unless required by law, actors should not be compelled to share EHI against patients’ expectations under applicable law or without adequate safeguards out of a concern that restricting the access, exchange, or use of the EHI would constitute information blocking. We acknowledged that this could seriously undermine patients’ trust and confidence in the privacy of their EHI and diminish the willingness of patients, providers, and other entities to provide or maintain health information electronically. In addition, we noted that such outcomes would undermine and not advance the goals of the information blocking provision and be inconsistent with the broader policy goal of the Cures Act to facilitate trusted exchange of EHI. We stated that trusted exchange requires not only that EHI be shared in accordance with applicable law, but also that it be shared in a manner that effectuates individuals’ expressed privacy preferences. We noted that an individual’s expressed privacy preferences will not be controlling in all cases. An actor will not be able to rely on an individual’s expressed privacy preference in circumstances where the VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 access, exchange, or use is required by law (84 FR 7527). For these reasons, we proposed that the sub-exception in § 171.202(e) would generally permit an actor to give effect to individuals’ expressed privacy preferences, including their desire not to permit access, exchange, or use of their EHI. At the same time, however, we emphasized that the Privacy Exception must be tailored to ensure that protection of an individual’s privacy is not used as a pretext for information blocking. Accordingly, we proposed that this exception would be subject to strict conditions (84 FR 7527). Privacy Practices Required by Law We stated in the Proposed Rule that because the information blocking provision excludes from the definition of information blocking practices that are required by law (section 3022(a)(1) of the PHSA), privacy-protective practices that are required by law do not implicate the information blocking provision and do not require coverage from an exception. We noted that practices that are ‘‘required by law’’ can be distinguished from other practices that an actor engages in pursuant to a law, but which are not ‘‘required by law.’’ Such laws are typically framed in a way that permit an access, exchange or use of health information to be made only if specific preconditions are satisfied but do not expressly require that the actor engage in a practice that interferes with access, exchange, or use of EHI. For example, we noted that the HIPAA Privacy Rule provides that a covered entity may use or disclose PHI in certain circumstances where the individual concerned has authorized the disclosure.164 The effect of this condition is that the covered entity should not use or disclose the PHI in the absence of an individual’s authorization. However, we noted that because the condition does not prohibit the actor from exchanging the EHI in all circumstances, the actor would be at risk of engaging in a practice that was information blocking unless an exception applied. For this reason, we included a sub-exception, proposed in § 171.202(b), that provided that an actor will not be engaging in information blocking if a State or Federal law imposes a precondition to the provision of access, exchange, or use, and that precondition has not been satisfied (84 FR 7527 and 7528). Comments. Commenters recommended that we allow for EHI to be withheld if there are contractual 164 45 CFR 164.508 (Uses and disclosures for which an authorization is required). PO 00000 Frm 00206 Fmt 4701 Sfmt 4700 privacy restrictions for the actor that may define conditions or limits on what the actor may do because of those contractual restrictions. In addition, some commenters suggested that contractual restrictions should be treated similarly to State and Federal privacy laws under the Privacy Exception. Response. Please see section VIII.C.6.a (Prevention, Material Discouragement, and Other Interference) above regarding interference that discusses contracts including business associate agreements where this is discussed in depth. Definitions in This Exception As noted above, we stated in the Proposed Rule that we consulted extensively with the HHS Office for Civil Rights (OCR), which enforces the HIPAA Privacy, Security and Breach Notification Rules, in developing proposals to advance our shared goals of preventing information blocking for nefarious or self-interested purposes while maintaining and upholding existing privacy rights and protections for individuals (84 FR 7527). This Privacy Exception operates in a manner consistent with the framework of the HIPAA Rules. We have finalized the sub-exceptions to ensure that individual privacy rights are not diminished as a consequence of the information blocking provision, and to ensure that the information blocking provision does not require the use or disclosure of EHI in a way that would not be permitted under the HIPAA Privacy Rule. We emphasize that our intent is that the information blocking provision would not conflict with the HIPAA Rules. As such, we added in the definitions section of this exception the term ‘‘HIPAA Privacy Rule’’ to mean 45 CFR parts 160 and 164 to improve readability and support the policy goal of alignment with the HIPAA Privacy Rule. With regards to the definition of ‘‘individual,’’ we have finalized this definition as proposed with a minor clarification, and it is not contrary to the HIPAA Rules. We note that the term ‘‘individual’’ is defined by the HIPAA Rules at 45 CFR 160.103. Separately, under the information blocking enforcement provision, we noted that the term ‘‘individual’’ is used to refer to actors that are health IT developers of certified health IT, HINs, or HIEs (see section 3022(b)(2)(A) of the PHSA). We finalized that for purposes of this exception (and only this exception), we used neither of these definitions. Instead, the term ‘‘individual’’ encompassed any or all of the following: (1) An individual defined by 45 CFR E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations 160.103; (2) any other natural person who is the subject of EHI that is being accessed, exchanged or used; (3) a person who legally acts on behalf of a person described in (1) or (2), in making decisions related to health care, as a personal representative, in accordance with 45 CFR 164.502(g); (4) a person who is a legal representative of and can make health care decisions on behalf of any person described in paragraph (a)(1) or (2); or (5) an executor or administrator or other person having authority to act on behalf of a deceased person described in (1) or (2) or the individual’s estate under State or other law. To clarify, we have finalized that § 171.202(a)(2)(iii) encompasses only a person who is a personal representative as defined under the HIPAA Privacy Rule. We distinguish a ‘‘personal representative’’ defined under the HIPAA Privacy Rule from all other natural persons who are legal representatives and who can make health care decisions on behalf of the individual, and thus those persons are included in § 171.202(a)(2)(iv). We misstated in the Proposed Rule that the HIPAA Privacy Rule gave rights to parents or legal guardians in certain circumstances where they are not the ‘‘personal representatives.’’ We clarify in this final rule that, in limited circumstances and if permitted under State law, a family member may be the legal representative to act on behalf of a patient to make health care decisions in emergency situations even if that family member may not be the ‘‘personal representative’’ of the patient. Comments. We received no comments opposing this condition of the proposed definition of ‘‘individual’’ in the Privacy Exception. Response. We finalized and clarified that § 171.202(a)(2)(iii) refers to only persons who meet the definition of a personal representative under 45 CFR 164.502(g), and § 171.202(a)(2)(iv) refers to all other persons who are legal representatives of and can make health care decisions on behalf of any person that was proposed in § 171.202(a)(4). Sub-Exception 1: ‘‘Precondition Not Satisfied’’ We stated in the Proposed Rule that State and Federal privacy laws that permit the disclosure of PHI often impose conditions that must be satisfied prior to a disclosure being made. In the final rule we are deleting the word ‘‘privacy’’ when it refers to laws in the regulation text in § 171.202(b) in order to alleviate any ambiguity about what is meant as a ‘‘privacy law.’’ VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 We proposed to establish a subexception to the information blocking provision that recognizes that an actor will not be engaging in information blocking if the actor does not provide access, exchange, or use of EHI because a necessary precondition required by law has not been satisfied. We explained that this exception would apply to all instances where an actor’s ability to provide access, exchange, or use is ‘‘controlled’’ by a legal obligation required by law that a certain condition (or multiple conditions) must be met before access, exchange, or use of the EHI may be provided. We emphasized that to be covered by this exception, the actor must comply with certain conditions, which are discussed below. We noted that the nature of the preconditions that an actor must satisfy in order to provide access, exchange, or use of EHI will depend on the laws that regulate the actor. For example, an actor that is regulated by a restrictive State law may need to satisfy more conditions than an actor regulated by a less restrictive State law before providing access, exchange, or use of EHI (84 FR 7527 and 7528). We requested comments generally on this proposed sub-exception. More specifically, we sought comment on how this proposed sub-exception would be exercised by actors in the context of State laws. We noted our awareness that actors that operate across State lines or in multiple jurisdictions sometimes adopt organization-wide privacy practices that conform with the most restrictive laws regulating their business. We stated that we were considering the inclusion of an accommodation in this sub-exception that would recognize an actor’s observance of a legal precondition that the actor is required by law to satisfy in at least one State in which it operates. We noted that, in the event that we did adopt such an accommodation, we would also need to carefully consider how to ensure that before the use of the most stringent restriction is applied in all jurisdictions, the actor has provided all privacy protections afforded by that law across its entire business. This type of approach would ensure that an actor cannot take advantage of a morerestrictive law for the benefit of this exception while not also fulfilling the privacy-protective obligations of the law being relied on. We requested comment on whether there is a need for ONC to adopt such an accommodation for actors operating in multiple states and encouraged commenters to identify any additional conditions that should attach to the provision of such an accommodation. We also requested PO 00000 Frm 00207 Fmt 4701 Sfmt 4700 25847 comment on our proposed approach to addressing variation in State laws throughout this proposed sub-exception (84 FR 7528). We also recognized that some states have enacted laws that more comprehensively identify the circumstance in which an individual or actor can and cannot provide access, exchange, or use of EHI. We stated that we were considering to what extent health care providers that are not regulated by the HIPAA Privacy Rule, and would rely instead on State laws for this sub-exception, would be able to benefit from this sub-exception when engaging in practices that interfere with access, exchange, or use of EHI for the purpose of promoting patient privacy. We sought comment on any challenges that may be encountered by health care providers that are not regulated as covered entities under the HIPAA Privacy Rule when seeking to take advantage of this proposed subexception. We also sought comment on whether there exists a class of health care provider that is not regulated by any Federal or State law that prescribes preconditions that must be satisfied in connection with the disclosure of EHI, and whether any such class of health care provider would benefit from a subexception similar to that proposed in § 171.202(c) for health IT developers of certified health IT (84 FR 7529). Comments. Several commenters recommended that actors who operate across multiple states with different preconditions for disclosure under local laws should be able to adopt uniform requirements across their organizations that satisfy the most stringent preconditions of those local laws for purposes of this sub-exception. They stated that this is appropriate because it is often difficult for organizations operating across State lines to develop different workflows for each State. However, other commenters requested that actors should be permitted to select which portions of a State law should be included in procedures implemented across all states rather than being required to provide all privacy protections afforded by that law across its entire business. Other commenters believed that it should be left to the actor’s discretion to determine whether it is better to have a uniform approach across all the jurisdictions it operates in or whether a State-by-State approach is more appropriate. They mentioned that such flexibility also would align with the Department’s overall goal of reducing administrative burden particularly on providers while ensuring a high degree of privacy protection for patients. E:\FR\FM\01MYR3.SGM 01MYR3 25848 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations Response. We appreciate the various comments and recognize that it is difficult for organizations operating across State lines to have different workflows for each State while assuring privacy, particularly the individual’s right under the HIPAA Rules to obtain their PHI. Additionally, it is important that any uniform policies and procedures must in fact be implemented across an actor’s entire organization and not be applied selectively in ways which might be contrary to the information blocking provision. Balancing these goals, this final rule provides that, except for an individual’s access to their EHI as discussed below, actors may meet this sub-exception if they operate across multiple states and elect to adopt and implement uniform policies and procedures required by one State that are more restrictive (i.e., provide greater privacy protections) than would otherwise be required by another specific State or Federal law. To be considered more restrictive in this context, a law might require more or different preconditions to the access, exchange, or use of EHI than Federal law or the law of another State in which the actor operates. Alternatively, an actor could comply with the preconditions of each State in which it operates on a State-by-State basis with respect to the EHI requested. These alternatives provide multi-state actors with significant flexibility without adversely impacting an individual’s right to obtain EHI as described below. An actor that operates in multiple states could either comply with the laws of each State in which it operates or comply with the most restrictive State laws in which it operates and where applicable, comply with Federal law requirements. The actor will need to document either approach in its policies and procedures in which the actor has adopted and implemented in order to meet the conditions of § 171.202(b)(1)(i) because the uniform approach will not be available to actors that operate on a case by case basis without policies and procedures as contemplated by subsection § 171.202(b)(1)(ii). Those actors without uniform policies and procedures will need to comply with each of the applicable State and Federal laws. As noted above, the uniform policy and procedure approach to individual access requests for EHI must assure alignment with the HIPAA Privacy Rule and individual access implementation specifications to help assure that the broader policy goals for individual access to EHI are met. Specifically, when an actor receives a request by or on behalf of an individual under 45 CFR VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 164.524 for the individual’s EHI, the actor must not impose preconditions in its policies and procedures which would affect the individual’s right to access under the HIPAA Rules even when it is operating in multiple states. We note that an actor may not inappropriately seek to use State or Federal laws as a shield against disclosing EHI. For example, we would expect that actors implement Statemandated preconditions consistently and in a non-discriminatory manner when fulfilling requests to access, exchange, or use EHI. Additionally, we caution actors who repeatedly change their privacy policies depending on the EHI requestor or the request that such actions may be considered intended to materially interfere with, prevent, or discourage the access, exchange, or use of EHI. We note that we have modified the introductory text in § 171.202(b) for clarity and precision. The final introductory text reads as follows: ‘‘To qualify for the exception on the basis that one or more Federal or State preconditions for providing access, exchange, or use of electronic health information have not been satisfied, the following requirements must be met . . .’’ The changes to the final introductory text from the proposed introductory text (see 84 FR 7602) are not substantive and do not change the meaning of the introductory text. We also note that we have added ‘‘and actions’’ in § 171.202(b)(3)—‘‘For purposes of determining whether the actor’s privacy policies and procedures and actions satisfy the requirements of subsections (b)(1)(i) and (b)(2) above when the actor’s operations are subject to multiple laws which have inconsistent preconditions, they shall be deemed to satisfy the requirements of the subsections if the actor has adopted uniform privacy policies and procedures to address the more restrictive preconditions.’’ We added this language for accuracy and clarity. Comments. A commenter requested that we provide clarification on all the Federal and State privacy laws considered when developing the ‘‘applicable State and Federal privacy laws’’ threshold condition of this subexception. They requested that the final rule make clear that those State privacy laws that are more restrictive than Federal privacy laws (e.g., 42 CFR part 2 and HIPAA) take precedence over the less stringent Federal privacy laws. Response. As mentioned above, for clarity purposes, we have not included the word ‘‘privacy’’ in the final regulation text in § 171.202(b) in order to alleviate any ambiguity regarding PO 00000 Frm 00208 Fmt 4701 Sfmt 4700 what is meant as a ‘‘privacy law.’’ The HIPAA Privacy Rule provides a Federal floor of privacy protections for an individual’s individually identifiable health information where that information is held by a covered entity or by a business associate of the covered entity. This sub-exception does not alter an actor’s ability to comply with applicable Federal or State laws. To illustrate this sub-exception, we provided the following examples. We note that this list of examples is not exhaustive and that preconditions required by law that control access, exchange, or use of EHI that are not listed below would still qualify under this proposed sub-exception so long as all conditions are met. • Although the HIPAA Privacy Rule does not have individual ‘‘consent’’ requirements for uses and disclosures of PHI for purposes such as treatment, payment, and health care operations, certain Federal and State laws do require that a person provide consent before their EHI can be accessed, exchanged, or used for specific purposes. For example, some State laws require an individual’s consent for uses and disclosures of EHI regarding some sensitive health conditions such as HIV/ AIDS, mental health, or genetic testing. Additionally, actors that are under ‘‘Part 2 programs,’’ which means federally assisted programs (‘‘federally assisted’’ as defined in 42 CFR 2.12(b) and ‘‘program’’ as defined in 42 CFR 2.11), generally are required to obtain an individual’s consent to disclose or redisclose patient-identifying information related to the individual’s substance use disorder, such as treatment for addiction. The sub-exception would operate to clarify an actor’s compliance obligations in these situations. In such scenarios, it would not be considered information blocking to refuse to provide access, exchange, or use of EHI if the actor has not received the individual’s consent, subject to requirements discussed herein. • If an actor is required by law to obtain an individual’s HIPAA authorization before providing access, exchange, or use of the individual’s EHI, then the individual’s refusal to provide an authorization would justify the actor’s refusal to provide access, exchange, or use of EHI. The actor’s refusal would, subject to conditions discussed herein, be protected under this sub-exception. • The HIPAA Privacy Rule, and many State laws, permit the disclosure of PHI in certain circumstances only once the identity and authority of the person requesting the information has been verified. We acknowledge that it is E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations reasonable and necessary that actors take appropriate steps, consistent with Federal and State laws, to ensure that EHI is not disclosed to the wrong person or to a person who is not authorized to receive it. Where an actor cannot verify the identity or authority of a person requesting access to EHI, and such verification is required by law before the actor can provide access, exchange, or use of the EHI, the actor’s refusal to provide access, exchange, or use of the EHI will, subject to the conditions discussed herein, will not be information blocking. • Under the HIPAA Privacy Rule, a health care provider may share information with another health care provider for a quality improvement project if it has verified that the requesting entity has a relationship with the person whose information is being requested. Where the actor could not establish if the relationship existed, it would not be information blocking for the actor to refuse to provide access, exchange, or use, subject to the conditions discussed herein. Comments. We received comments on the Privacy Exception expressing concern about whether a business associate (as defined under the HIPAA Privacy Rule) would be liable for information blocking practices for not providing access, exchange, or use of EHI because doing so would violate its business associate agreement. Response. Please see section VIII.C.6.a. (Prevention, Material Discouragement and Other Interference) above regarding interference that discusses contracts including business associate agreements where this is discussed in depth. Sub-Exception 1: ‘‘Precondition Not Satisfied’’: Conditions To Be Met To Qualify for This Sub-Exception We noted that in most circumstances, an actor would be in a position to influence whether a precondition is satisfied. For example, an actor could deprive a person of the opportunity to take some step that is a prerequisite for the exchange of their EHI, could assume the existence of a fact prejudicial to the granting of access without seeking to discover the actual facts, or could make a determination that a precondition was not satisfied without properly considering or seeking all relevant information. As such, we proposed that this exception would be subject to conditions that ensure that the protection of an individual’s privacy is not used as a pretext for information blocking (84 FR 7529). We proposed that an actor can qualify, in part, for this sub-exception VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 by implementing and conforming to organizational policies and procedures that identify the criteria to be used by the actor and, as applicable, the steps that the actor will take, in order to satisfy the precondition. We noted that most actors are covered entities or business associates for the purposes of the HIPAA Privacy Rule, and are already required to have policies, procedures, and training programs in place that address how ePHI (as defined in 45 CFR 160.103) is used and disclosed. As such, we expected that the overwhelming majority of actors will already be in a position to meet this condition or would be able to meet this condition with modest additional effort. However, we acknowledged that some actors may not, for whatever reason, have privacy policies and practices in place, or may have implemented privacy policies and practices that do not sufficiently address the criteria to be used, and steps to be taken, to satisfy a precondition relied on by the actor. As such, we proposed to provide an alternative basis on which to qualify, in part, for this sub-exception. We proposed to permit actors to instead document, on a case-by-case basis, the criteria used by the actor to determine when the precondition will be satisfied, any criteria that were not met, and the reason why the criteria were not met (84 FR 7529). Separately, we proposed that if the precondition that an actor purportedly needs to satisfy relies on the provision of a consent or authorization from an individual, it is a requirement for the condition(s) of this sub-exception that the actor (i) did all things reasonably necessary within its control to provide the individual with a meaningful opportunity to provide the consent or authorization and (ii) did not improperly encourage or induce the individual to not provide the consent or authorization (84 FR 7529). Sub-Exception 1: ‘‘Precondition Not Satisfied’’: Practice Must Be Implemented in a Consistent and NonDiscriminatory Manner We proposed that in order for a practice to qualify for this subexception, the practice must be implemented in a consistent and nondiscriminatory manner (proposed § 171.202(b)(3)(ii)). This condition would provide basic assurance that the purported privacy practice is directly related to a specific privacy risk and is not being used to interfere with access, exchange, or use of EHI for other purposes to which this exception does not apply. PO 00000 Frm 00209 Fmt 4701 Sfmt 4700 25849 We proposed that this condition requires that the actor’s privacyprotective practices must be based on objective criteria that apply uniformly for all substantially similar privacy risks. We explained that an actor could not, for example, implement an organizational privacy policy that imposed unreasonably onerous requirements on a certain class of individuals or entities without a legitimate justification for doing so. We explained that this condition provides basic assurance that the purported privacy-protective practice is not being used to interfere with access, exchange, or use of EHI for other purposes to which this proposed exception does not apply (84 FR 7532). We requested comment on this proposed condition. Comments. Commenters agreed that having an organizational policy which outlines patient preference categories and restrictions should be created and utilized in a consistent and nondiscriminatory manner for all patient requests. Response. We agree with the commenters, and for clarity, we moved this proposed section to finalize in § 171.202(b)(1), in order to address when an actor has conformed to its organizational policies and procedures and when an actor documents on a caseby-case basis when a precondition has been satisfied. In both cases, the actor’s practice must be implemented in a consistent and non-discriminatory manner. We provide the following example to illustrate the requirement that a practice must be implemented in a consistent and non-discriminatory manner. For example, we noted an actor that offered a patient-facing software application (app) would not be able to benefit from this exception if it refused to exchange EHI with a competitor app because the individual failed to meet onerous authorization requirements that applied only to the exchange of EHI with the competitor app and did not apply to others that presented no greater privacy or security risk. In context of this condition of the Privacy Exception, and consistent with its interpretation for information blocking exceptions defined in part 171 subpart B in general, ‘‘consistent and non-discriminatory’’ should be understood to mean that similarly situated actors whose interactions pose the same level of privacy risk should be treated consistently with one another under the actor’s privacy practices. Inconsistent treatment across similarly situated actors whose interactions pose the same level of privacy risk based on E:\FR\FM\01MYR3.SGM 01MYR3 25850 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations extraneous factors, such as whether they are a competitor of the actor implementing the privacy practices, would not be considered appropriate. Sub-Exception 1: ‘‘Precondition Not Satisfied’’: Practice Must Be Tailored to the Applicable Precondition We proposed that for actors who seek to qualify for this sub-exception, an actor’s privacy-protective practice (proposed (§ 171.202(b)(3)(i)) must be tailored to the specific privacy risks that the practice actually addresses. This condition necessarily presupposes that an actor has carefully evaluated the privacy requirements imposed on the actor, the privacy interests to be managed by the actor, and has developed a considered response that is tailored to protecting and promoting the privacy of EHI. For example, we noted that the HIPAA Privacy Rule at 45 CFR 164.514(h) requires that, in certain circumstances, the disclosure of PHI is only authorized once the identity and authority of the person requesting the information has been verified. The privacy issue to be addressed in this instance is the risk that PHI will be disclosed to the wrong individual or an unauthorized person. We proposed that if an actor chooses not to provide access, exchange, or use of EHI on the basis that the actor’s identity verification requirements have not been satisfied, the actor’s practice must be tailored to the specific privacy risks at issue. We noted that this would require that the actor ensure that it does not impose identity verification requirements that are unreasonably onerous under the circumstances (84 FR 7531). For the purposes of this subexception, we proposed that engaging in an interference on the basis that a precondition has not been satisfied would be a practice that addresses a privacy risk or interest, and so tailoring that interference to satisfy a precondition could satisfy this requirement if all of the elements are met. We requested comment on this proposed condition. Comments. Commenters expressed a belief that a requirement that a ‘‘practice must be tailored to the specific privacy risk or interest being addressed’’ could lead to unnecessary complexity, and that such a policy could be overly prescriptive. In addition, commenters expressed that we should provide more use cases to help providers and others better understand how this element of the sub-exception could be met. Response. We agree. We believe that a precondition should be tailored to the VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 applicable legal requirement and not be tied only to a privacy risk or interest. To require that an actor’s practice be tailored to the specific privacy risk or interest without a legally imposed requirement could lead to overly strict as well as an ambiguous requirement. As such, we believe that it is an important policy interest that an actor carefully evaluate the State or Federal law requirements imposed upon an actor, and that the actor develop a response that is tailored to the legal precondition which protect and promote the privacy of EHI. We provide the following use case to provide a greater understanding of how this element of the sub-exception can be met. • To meet a legal precondition whereby an actor must identify a patient before accessing, exchanging or using EHI, an actor’s policy that a driver’s license was the only accepted government-issued form of identification (as opposed to other types of legally acceptable forms of identification such as a valid passport) would not be a practice that is tailored to the applicable precondition legal requirement because the provider’s preference for one form of governmentissued identification over another does not meaningfully address this legal precondition. We have finalized that to qualify for this sub-exception on the basis that State or Federal law requires one or more preconditions to be met before providing access, exchange, or use of EHI the precondition should be based upon the applicable legal requirements. Sub-Exception 1: ‘‘Precondition Not Satisfied’’: Organizational Policies and Procedures or Case-by-Case Basis We proposed that if an actor seeks to qualify for this sub-exception, in part, by implementing and conforming to organizational policies and procedures, such policies and procedures must be in writing, and specify the criteria to be used by the actor, and, if applicable, the steps that the actor will take, in order to satisfy the precondition relied on by the actor not to provide access, exchange, or use of EHI. We emphasized that it would not be sufficient for an actor to simply identify the existence of the precondition in their organizational policies and procedures. We proposed that an actor would only be eligible to benefit from this subexception if it has implemented and followed its processes and policies. This would include taking reasonable steps to ensure that its workforce members and agents understand and consistently PO 00000 Frm 00210 Fmt 4701 Sfmt 4700 apply the policies and procedures (84 FR 7529 and 7530). We requested comment on the proposed condition generally, and specifically, on whether an actor’s organizational policies and procedures provide a sufficiently robust and reliable basis for evaluating the bona fides, reasonableness, and necessity of practices engaged in to satisfy preconditions required by State or Federal privacy laws (84 FR 7529 and 7530). Comments. Some commenters recommended that actors should be able to have written organization-specific policies that may be more restrictive than State or Federal law and that health information networks and exchanges should be given an exemption based on their existing written governance policies. Other commenters recommended adding language indicating that organizational policies must comply with Federal, State, and local laws or that the final rule should specify that organizations should implement policies which conform to the specific State laws in which the information originates. Response. As noted above, this final rule includes a limited exception that permits an actor that operates in more than one State to adopt uniform policies and procedures based on more restrictive provisions of State and Federal law, subject to certain conditions. ONC reiterates that an actor’s organizational policies and procedures should not be used as a pretext for information blocking. For example, information blocking may exist if an actor’s policies and procedures impose onerous additional privacy requirements for access, exchange or use of EHI beyond what is required by law, or where an actor repeatedly changes its privacy policies and procedures to circumvent this exception. Further, the actor’s policies and procedures must be tailored and must be implemented in a consistent and non-discriminatory manner. We do not agree that health information exchanges or networks should be given a blanket exemption based on their existing written governance policies because that could lead to a situation involving information blocking if those policies imposed conditions that conflict with the information blocking provision. Secondly, we expect that an actor’s organizational policies will conform with applicable laws, including the information blocking provision, so it is not necessary to further require actors to implement policies which conform to the specific laws, including the law of E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations the State in which the information originated. Documenting Criteria and Rationale If an actor’s practice does not conform to an actor’s organizational policies and procedures as required by § 171.202(b)(1)(i), we proposed that an actor can seek to qualify for this subexception, in part, by documenting how it reached its decision that it would not provide access, use, or exchange of EHI on the basis that a precondition had not been satisfied. We proposed that such documentation must be created on a case-by-case basis proposed in § 171.202(b)(1)(ii). We noted that an actor will not satisfy this condition if, for instance, it sought to document a general practice that it had applied to all instances where the precondition had not been satisfied. Rather, we stated that the record created by the actor must address the specific circumstances of the specific practice (or interference) at issue. We proposed that the record created by the actor must identify the objective criteria used by the actor to determine when the precondition is satisfied. Consistent with the condition to this sub-exception that the practice must be tailored to the privacy interest at issue, those criteria would need to be directly relevant to satisfying the requirement. For example, we explained that if the requirement at issue was the provision of a valid HIPAA authorization, the actor’s documented record should reflect, at minimum, that the authorization would need to meet each of the requirements specified for a valid authorization at 45 CFR 164.508(c). The record would then need to document the criteria that had not been met, and the reason why it was not met. We noted that the actor could record that the authorization did not contain the name or other specific identification of the person making the request because the authorization only disclosed the person’s first initial rather than a first name, and the actor had records about multiple people with that same initial and last name. We noted that this condition would provide the transparency necessary to demonstrate whether the actor has satisfied the conditions applicable to this exception. Moreover, we noted that it will help ensure that a decision to not provide access, exchange, or use of EHI is considered and deliberate, and therefore reasonable and necessary (84 FR 7530). We requested comment on this proposed condition. Comments. Commenters requested that we should provide specificity on VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 what type of documentation would suffice to demonstrate that an actor met this sub-exception. Commenters were concerned that these were stringent documentation requirements and that provider practices may inadvertently trigger a violation of information blocking. Other commenters suggested that we should remove or consider reducing onerous requirements for documentation for qualifying for the privacy sub-exceptions, and other commenters requested specification on what form the documentation must be and to specify whether existing documentation required by the HIPAA Rules (e.g., patient informed consent and authorization forms, Notice of Privacy Practices, Security Risk Analysis, etc.) would satisfy the documentation requirements under this Privacy Exception. Response. The documentation requirements are for the actor to comply with applicable State and Federal laws and to assure that after the fact rationalizations are not used to justify practices that have already occurred, consistent with the policy objectives of the information blocking provision. To finalize the documentation requirements we looked to OIG, which has authority under section 3022(b) of the PHSA to investigate any claim that an actor engaged in information blocking. OIG regulations in other contexts include a writing requirement. For example, OIG has promulgated the ‘‘safe harbors’’ provisions at 42 CFR 1001.952, specifying various payment and business practices that would not be subject to sanctions under the AntiKickback Statute. Several of these safe harbors include a writing requirement to document in writing an agreement, lease, or other transaction. These documentation requirements do not often get into specific terms or requirements, but rather tend to be more general in nature. However, the documentation requirements do provide indicia of evidence that an entity has met the requirements of the safe harbor provisions. In addition, we considered the documentation requirements in the HIPAA Rules. The HIPAA Privacy Rule at 45 C.F.R 164.530 (j) requires a covered entity to maintain its policies and procedures in written or electronic form for six years from the date of its creation or the date when it last was in effect, whichever is later. In our review of the OIG and HIPAA regulations, we believe that the documentation requirement for this sub-exception is consistent with the safe harbor and HIPAA Privacy Rule documentation requirements. Further, we do not PO 00000 Frm 00211 Fmt 4701 Sfmt 4700 25851 believe this documentation requirement would be onerous. Therefore, we have finalized the following requirements for this subexception. An actor must document its organizational policies and procedures and specify the criteria used by the actor and as applicable, the steps that the actor will take to satisfy the precondition. Such steps may include providing the actor’s workforce members with training on those policies and procedures. Alternatively, we have finalized a requirement an actor must document on a case-by-case basis how it reached its decision that it would not provide access, use, or exchange of EHI on the basis that a precondition had not been satisfied, including the criteria it used to determine when the precondition is satisfied. That is, an actor can provide documentation that identifies the objective criteria that the actor applied in order to determine whether the precondition had been satisfied. Additionally, the actor must provide documentation that the practice is tailored to those criteria that are directly relevant to satisfying the precondition. Sub-Exception 1: ‘‘Precondition Not Satisfied’’: Precondition Relies on a Consent or Authorization We proposed that if the precondition that an actor purports to rely upon requires the provision of a consent or authorization from an individual, it is a condition of this sub-exception that the actor must have done all things reasonably necessary within its control to provide the individual with a meaningful opportunity to provide that consent or authorization. We noted that this requirement will be relevant when, for example, a State privacy law or the HIPAA Privacy Rule requires an individual to provide consent and/or a HIPAA authorization before identifiable information can be accessed, exchanged, or used for specific purposes. We stated that we were considering addressing this condition in further detail, whether by way of additional guidance or in regulation text. To this end, we requested comments regarding what actions an actor should take, within the actor’s control, to provide an individual with a meaningful opportunity to provide a required consent or HIPAA authorization, and whether different expectations should arise in the context of a consent versus a HIPAA authorization. Separately, we proposed that to qualify for this subexception, to the extent that the precondition at issue was the provision of a consent or HIPAA authorization by an individual, the actor must not have E:\FR\FM\01MYR3.SGM 01MYR3 25852 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations improperly encouraged or induced the individual to not provide the consent or HIPAA authorization. We clarified that this does not mean that the actor cannot inform an individual about the advantages and disadvantages of exchanging EHI and any associated risks, so long as the information communicated is accurate and legitimate. However, we noted that an actor would not meet this condition in the event that it misled an individual about the nature of the consent to be provided, dissuaded individuals from providing consent in respect of disclosures to the actor’s competitors, or imposed onerous requirements to effectuate consent that were unnecessary and not required by law. We requested comment on whether the proposed condition requiring the provision of a meaningful opportunity and prohibiting improper encouragement or inducement should apply to preconditions beyond the precondition that an individual provide consent or authorization. We requested comment on whether the conditions specified for this sub-exception, when taken in total, are sufficiently particularized and sufficiently strict to ensure that actors that are in a position to influence whether a precondition is satisfied will not be able to take advantage of this sub-exception and seek protection for practices that do not promote the privacy of EHI. We also requested comment on whether we should adopt a more tailored approach to conditioning the availability of this exception. For example, we noted that we were considering whether different conditions should apply depending on: (i) The nature of the EHI at issue; (ii) the circumstances in which the EHI is being access, exchanged, or used; (iii) the interest being protected by the precondition; or (iv) the nature of the precondition to be satisfied. We encouraged commenters to identify scenarios in which the application of the conditions applicable to this subexception, as proposed, give rise to unnecessary burden, or would require activities that do not advance the dual policy interests of preventing information blocking and promoting privacy and security (84 FR 7530 and 7531). Comments. Some commenters noted that the entire condition was too vague and generally inconsistent with current standard industry relationships and practices. Several commenters suggested that the burden to obtain the consent should be on the organization requesting the data rather than on the organization that holds the data. However, commenters who suggested VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 this often acknowledged that modifying our proposal to fit their suggestion would require an actor to receive assurances that consents are legitimate and in their possession before sharing any data. These commenters often noted that it was not clear how recipients of health care data subject to authorizations and consent would be expected to provide individuals with a meaningful opportunity to consent if they do not have an existing relationship with that individual or means to contact that individual. A few commenters recommended modifying this condition so that an actor that does not have a direct relationship with patients is not required to obtain patient consent or authorization. Response. We agree with the commenters and have attempted to address concerns about vagueness and consistency with industry practices and relationships. This finalized subexception requires the actor to have used reasonable efforts within its control if the actor has already received a form of required consent or authorization that does not meet all applicable requirements. Specifically, the actor must have used reasonable efforts within its control to provide the individual with a consent or authorization form that satisfies all applicable requirements or have provided other reasonable assistance with respect to the deficiencies. In effect, this places more of an obligation on the party requesting the EHI and the individual to attempt to satisfy the precondition by providing a consent or authorization. This final rule does not require the actor that receives the request to obtain a patient’s consent or authorization to do all things reasonably necessary within its control to provide the individual with a meaningful opportunity to provide the consent or authorization. Rather, the final rule requires that the actor is obligated to take reasonable steps to provide a sufficient consent or authorization form or other reasonable assistance. Providing other reasonable assistance does not mean that the actor needs to ‘‘chase’’ the individual to obtain a sufficient consent or authorization. Such other reasonable assistance might include notifying the individual of elements that are missing in the consent or authorization initially provided, such as a witness or an expiration date if legally required. We believe that setting the standard for an actor’s actions with respect to an insufficient consent or authorization at reasonable efforts is an appropriate standard to use because it aligns with the case-by-case approach that is PO 00000 Frm 00212 Fmt 4701 Sfmt 4700 captured in the information blocking provision that is the subject of this final rule. We recognize that actors must accommodate variations in laws across the states in which they operate. As discussed above, this final rule provides flexibility to multi-state providers with respect to how they may structure uniform policies and procedures regarding consents and authorizations provided that they do in fact apply them. We also recognize that some types of actors will not have the necessary legal rights or the technical access to detailed patient information to determine if a consent or authorization is required as a precondition. We intend that each actor must do what is reasonable and what is within its control. This applies to actors who are providers that have a direct patient relationship and to actors that are supporting a health care provider with respect to an insufficient consent or authorization that must also use reasonable efforts to avoid possible information blocking. A health information network that receives an insufficient consent or authorization might find that this subexception helpful if it does not have lawful access to the individual’s information to determine what consent might be required under State or Federal confidentiality laws that apply to information about mental health, substance abuse, HIV status or other highly confidential diseases or conditions. We also note that if a network is not able to review such information under applicable law, providing a corrected consent would not be within its control. Comments. Many commenters were concerned that our definition of ‘‘meaningful opportunity’’ was too broad. These few commenters suggested that, as proposed, our definition of ‘‘meaningful opportunity’’ could place a significant burden on providers. Specifically, these commenters suggested that adding a ‘‘meaningful’’ opportunity to consent to the patient, with its requisite new forms and procedures, would add new burdens on actors without appearing to solve any existing problems. One commenter recommended that we modify this requirement to include a reasonable opportunity for the provider to obtain the individual’s consent the next time the patient visits the office if the patient is not present in the office to provide consent. Response. We appreciate the comments that we have received on the meaningful opportunity provision. After considering the comments, we E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations eliminated the ‘‘meaningful opportunity’’ provision in this final rule. However, this sub-exception still requires the actor to use reasonable efforts within its control and to provide reasonable assistance, which might include explaining the required elements of a consent or authorization, or providing a witness if required by law and requested by the patient at an office visit with the actor. However, the requirement of reasonable efforts is based on an assumption that actors may not use the protection of an individual’s privacy as pretext for information blocking. If a requestor provides or obtains some form of patient documented consent or authorization that requires the actor’s assistance to satisfy elements that are not required by law and the actor does not provide such assistance, the actor may be engaged in information blocking. We recognize that meeting certain preconditions may be outside the direct control of the provider. For example, the actor may have a pre-existing consent form from the individual that needs to be modified due to a change in applicable law. The actor may have a very difficult time tracking down a former patient to provide the updated consent form. In most cases, it would be reasonable to mail or email the updated form to the patient’s last address on the actor’s records or present it to the patient at visit scheduled in the near future. If the patient cancels the visit, it may be reasonable for the actor to wait to obtain the consent until the next time the patient visits the physical location of the actor’s office, so long as the actor explains the insufficiency and provides a sufficient consent form at the next visit. Comments. Commenters have mentioned that a health information network (HIN) does not have operational control over or visibility into the detailed decision-making of an individual’s consent or authorization of its participants, and they argue that an actor such as a HIN should not be obligated to review or confirm the individuals’ consent or authorization, and that such confirmation is a requirement of the health care provider because health care provider has a direct relationship with the patient. Response. We believe that actors such as a HIN do have the obligation to comply with the conditions of this subexception. We have taken the approach that each actor must use its ‘‘reasonable efforts’’ and focus on what reasonable steps they can take to provide their reasonable efforts. We do not, however, believe that actors who have a direct VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 patient relationship would have a higher standard of reasonable efforts than those actors such as HINs which do not have a direct relationship with a patient and are acting on behalf of a health care provider. However, even actors that do not have a direct relationship with an individual, should use their reasonable efforts for the activities under their control as it relates to supporting the providing or obtaining of a consent or authorization. Comments. Commenters expressed concerns that actors would be required to create new policies beyond HIPAA aimed at offering patients a ‘‘meaningful’’ opportunity to consent, and as a result, more challenges than solutions would result from this policy. Commenters noted unnecessary administrative burdens, confusion with HIPAA requirements, and complexity for actors as some of the possible challenges. Response. As noted above, the ‘‘meaningful opportunity’’ requirement was not included in this final rule. Comments. Many commenters expressed the opinion that actors meeting certain preconditions may be outside the direct control of the actor and recommended that examples should be provided about what actions are sufficient to meet the ‘‘reasonably necessary’’ standard. Another commenter argued that the reasonably necessary standard for the meaningful opportunity requirement only stands to further aggravate the burdensome nature of more stringent privacy laws. Other commenters were concerned that the requirement that the actor ‘‘did all things reasonably necessary within its control to provide the individual with a meaningful opportunity to provide the consent or authorization’’ was too rigid a requirement and that even if one possible action was not done, the exception would not apply. Other commenters argued that this standard was an extremely onerous requirement and contradicts the stated intent of reducing the overall administrative burden on health care practices. Response. As noted above, the standard is now based on reasonable efforts within the actor’s control, and it applies only after the actor receives a consent or authorization form that does not satisfy all applicable conditions. We believe that this change addresses the comments noted above. We note that we have slightly modified the terminology used in § 171.202(b)(2)(i). We proposed ‘‘a form of consent or authorization’’ (84 FR 7602) and have change that language in the final rule to ‘‘a consent or authorization form’’ for clarity. This PO 00000 Frm 00213 Fmt 4701 Sfmt 4700 25853 modification does not change the meaning of § 171.202(b)(2)(i). Comments. A commenter expressed concern to modify this exception to make it clear that a hospital or health system may claim the exception when an entity requesting patient data does not communicate that it has obtained consent. Response. As noted above, this condition of the sub-exception applies only after an insufficient consent or authorization is received. This condition of the sub-exception in the final rule does not apply when the actor has not received anything regarding the individual’s consent or authorization. In such cases, the actor would not be required to communicate to the entity requesting the EHI that the actor has not obtained the individual’s consent or authorization in order to meet this subexception. Comments. A commenter argued that actors should provide the individual with a ‘‘reasonably convenient opportunity’’ to provide the consent or authorization, rather than requiring ‘‘all things reasonably necessary within its control’’ to provide consent or authorization. The commenter noted that where entities make the request on behalf of the individual, the actor making the request should facilitate the gathering of the consent or authorization. Response. As noted above, both the ‘‘reasonable opportunity’’ and the ‘‘all things reasonably necessary’’ language are not included in this final rule, but the actor must satisfy the reasonable efforts standard when an insufficient consent or authorization has been received. This might include providing a correct form or reasonable assistance to the individual to solve any consent or authorization documentation problems necessary to address the insufficiency. Sub-Exception 1: Precondition Not Satisfied: Did Not Improperly Encourage or Induce the Individual To Withhold the Consent or Authorization We proposed that to qualify for this sub-exception, to the extent that the precondition at issue was the provision of a consent or authorization by an individual, the actor must not have improperly encouraged or induced the individual to not provide the consent or authorization. As proposed, an actor would not meet this condition in the event that it misled an individual about the nature of the consent to be provided, dissuaded individuals from providing consent in respect of disclosures to the actor’s competitors, or imposed onerous requirements to effectuate consent that E:\FR\FM\01MYR3.SGM 01MYR3 25854 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations were unnecessary and not required by law. We sought comment on whether the proposed condition requiring the provision of prohibiting improper encouragement or inducement should apply to preconditions beyond the precondition that an individual provide consent or authorization. We sought comment on whether the conditions specified for this sub-exception, when taken in total, are sufficiently particularized and sufficiently strict to ensure that actors that are in a position to influence whether a precondition is satisfied will not be able to take advantage of this sub-exception and seek protection for practices that do not promote the privacy of EHI. We also sought comment on whether we should adopt a more tailored approach to conditioning the availability of this subexception (84 FR 7531). Comments. We received no comments opposing this condition applicable to practices that implement the provision of a consent or authorization from an individual to an actor. Response. Within the sub-exception (§ 171.202(b)) applicable to practices that implement a consent or authorization, we are finalizing in § 171.202(b)(2)(ii) as proposed. Sub-Exception 2: Sub-Exception: Health IT Developer of Certified Health IT Not Covered by HIPAA The sub-exception we proposed in § 171.202(b) recognized as reasonable and necessary the activities engaged in by actors consistent with the controls placed on access, exchange, or use of EHI by Federal and State laws. We noted that the sub-exception was limited to actors that are subject to those Federal and State laws; an actor that is not regulated by HIPAA cannot benefit from the exception proposed in § 171.202(b). We proposed to establish a subexception to the information blocking provision that would apply to actors that are health IT developers of certified health IT but not regulated by the HIPAA Privacy Rule in respect to the operation of the actor’s health IT product or service (referred to as ‘‘noncovered actors’’ for this sub-exception). We noted that we expect that the class of actors to which this proposed subexception applies will be very small. We explained that the vast majority of health IT developers of certified health IT operate as business associates to covered entities under HIPAA. As business associates, they are regulated by the HIPAA Privacy Rule, and may be able to benefit from the exception proposed in § 171.202(b) to the extent VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 that the HIPAA Privacy Rule (or applicable State law) imposes preconditions to the provision of access, exchange, or use of EHI. However, we recognized that direct-to-consumer health IT products and services are a growing sector of the health IT market. The privacy practices of consumerfacing health IT products and services are typically regulated by the Federal Trade Commission Act (FTC Act). However, while the FTC Act prohibits unfair or deceptive acts or practices in or affecting commerce (15 U.S.C. 45(a)(1)), it does not prescribe specific privacy requirements.165 We proposed that where a health IT developer of certified health IT offers a health IT product or service not regulated by the HIPAA Privacy Rule, such product or service is still subject to the information blocking provision. We wanted to ensure that such noncovered actors under the information blocking provisions are able to avail themselves of the Privacy Exception. As such, we proposed that an entity that is not covered by HIPAA will not engage in information blocking if the actor declines to provide access, exchange, or use of EHI where the practice implements a process that is described in the actor’s organizational privacy policy and has been disclosed to any individual or entity that uses the actor’s health IT. We proposed this subexception in § 171.202(c) which sets forth additional detail (84 FR 7532). In the final rule, we have finalized that when engaging in a practice that promotes the privacy interests of an individual, the non-covered actor must implement the practice according to a process described in the organizational privacy policies, disclosed those organizational privacy policies to the individuals and entities that use the actor’s product or service before they agreed to use them, and the non-covered actor’s organizational privacy policies must: (1) Comply with applicable State or Federal laws; (2) be tailored to the specific privacy risk or interest being addressed; and (3) be implemented in a consistent and non-discriminatory manner. Public comments on specific conditions are summarized below, in context of each condition proposed. We believe our responses to these comments furnish the clarity noncovered actors need to understand the conditions of the sub-exception finalized in § 171.202(c). 165 See HHS, Examining Oversight of the Privacy & Security of Health Data Collected by Entities Not Regulated by HIPAA, https://www.healthit.gov/ sites/default/files/non-covered_entities_report_ june_17_2016.pdf. PO 00000 Frm 00214 Fmt 4701 Sfmt 4700 Practice Must Implement Privacy Policy We proposed that in order to qualify for this sub-exception, the practice engaged in by the non-covered actor— the interference with access, exchange, or use of EHI—must also implement a process described in the actor’s organizational privacy policy. This requires that a non-covered actor must have documented in detail in its organizational privacy policy the processes and procedures that the actor will use to determine when the actor will not provide access, exchange, or use of EHI. For example, we explained that a non-covered actor that proposed to require the provision of written consent for the use or disclosure of EHI would need to describe in its organizational privacy policy the processes and procedures to be utilized by the actor to implement that privacyprotective practice so that the practice be considered reasonable and necessary and qualify for this sub-exception. We noted that compliance with this condition ensures that the subexception recognizes only legitimate practices that have been tailored to the privacy needs of the individuals that use the non-covered actor’s health IT, and does not recognize practices that are a pretext or after-the-fact rationalization for actions that interfere with access, exchange, or use of EHI. We also proposed that the noncovered actor’s practice must implement its documented organizational privacy policy. We noted that practices that diverge from an actor’s documented policies, or which are not addressed in an actor’s organizational privacy policy, would not qualify for this proposed subexception (84 FR 7532). Policies Must Have Been Disclosed to Users We proposed that a non-covered actor that seeks to benefit from the subexception must also ensure that it has previously disclosed the privacyprotective practice to the individuals and entities that use, or will use, the health IT. These users are affected by the practices engaged in by a noncovered actor but may otherwise have no visibility of the non-covered actor’s approach to protecting the privacy of EHI. We noted that we expect that noncovered actors will seek to satisfy this condition by using a privacy notice.166 166 ONC has provided a Model Privacy Notice (MPN) that is a voluntary, openly available resource designed to help developers clearly convey information about their privacy and security policies to their users. The MPN provides a snapshot of a company’s existing privacy practices encouraging transparency and helping consumers make informed choices when selecting products. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations We emphasized that the disclosure must be meaningful. In assessing whether a non-covered actor’s disclosure was meaningful, we explained that regard will be paid to whether the disclosure was in plain language and conspicuous, including whether the disclosure was located in a place, and presented in a manner, that is accessible and obvious to the individuals and entities that use, or will use, the health IT. We proposed that to qualify for this sub-exception, a non-covered actor would not be required to disclose its organizational privacy policy to its customers or to the public generally. Rather, the non-covered actor need only describe, with sufficient detail and precision to be readily understood by users of the non-covered actor’s health IT, the privacy-protective practices that the non-covered actor has adopted and will observe. We explained that this is necessary because a non-covered actor that is not subject to prescribed privacy standards in connection with the provision of health IT will have significant flexibility in the privacyprotective practices that it adopts. If a non-covered actor is not required to inform the individuals and entities that use, or will use, the health IT, about the privacy-protective practices that it will implement in its product, or when providing its service, we noted that there is a risk that the sub-exception will give deference to policies and processes that are post hoc rationalizations used to justify improper practices. We stated that this condition also serves as a check on the nature of the interferences that a non-covered actor writes into its organizational privacy policies; transparency will help to ensure that a non-covered actor takes a balanced approach to protecting privacy interests on one hand, and pursuing business interests that might be inconsistent with the information blocking provision, on the other hand (84 FR 7533). We proposed that it will be a matter for non-covered actors to determine the most appropriate way to communicate its privacy practices to users. We noted that it would be reasonable that noncovered actors would, at a minimum, post their privacy notices, or otherwise describe their privacy-protective practices, on their websites (84 FR 7533). The MPN does not mandate specific policies or substitute for more comprehensive or detailed privacy policies. See https://www.healthit.gov/ topic/privacy-security-and-hipaa/model-privacynotice-mpn. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 Practice Must Be Tailored to Privacy Risk and Implemented in a NonDiscriminatory Manner Finally, we proposed that in order for a practice to qualify for this subexception, an actor’s practice must be tailored to the specific privacy risks that the practice actually addresses and must be implemented in a consistent and non-discriminatory manner. We requested comment on this proposed sub-exception generally. Specifically, we requested comment on whether HIEs or HINs would benefit from a similar sub-exception. We also requested comment on whether the conditions applicable to this subexception are sufficient to ensure that non-covered actors cannot take advantage of the exception by engaging in practices that are inconsistent with the promotion of individual privacy. We also requested comment on the level of detail that non-covered actors should be required to use when describing their privacy practices and processes to user of health IT (84 FR 7533). Comments. Some commenters believed that this sub-exception could be helpful for those developing their own health IT tools, which are outside of the electronic health record. Response. We agree that this subexception would be helpful for those developing their own health IT tools. The sub-exception address those certified Health IT products not covered by HIPAA and would have in place an organizational privacy policy which is tailored to a specific privacy risk or interest. Comments. Commenters noted that regarding the sub-exception proposed for ‘‘non-covered actors’’ that develop patient-facing health IT, they urged the need to balance the conditions of this sub-exception with the requirements placed on actors who institute organizational privacy policies. Response. We appreciate the comment. In order to meet this subexception, the organizational privacy policies of a non-covered actor would need to comply with other applicable State and Federal laws. Further, we have finalized that non-covered actors that seek to benefit from this subexception must also ensure that their organizational privacy policies are disclosed to the individuals and entities that use their product or service before the individuals and entities agree to use them. The organizational privacy policies are important for transparency for users of the certified technologies and to demonstrate compliance with applicable State and Federal laws. Noncovered actors have the discretion to PO 00000 Frm 00215 Fmt 4701 Sfmt 4700 25855 determine the most appropriate way to communicate their privacy policies to individuals and users. As stated above and in the Proposed Rule (84 FR 7533), it would be reasonable for non-covered actors to, at a minimum, post their privacy notices, or otherwise describe their privacy-protective practices, on their websites. Comments. A few commenters stated that it is unclear whether application developers are subject to HIPAA if they are not business associates or covered entities. Response. We appreciate the feedback. Where application developers are not defined as a covered entity or business associate as defined under 45 CFR 160.103, then the application developer is not covered under the HIPAA Privacy Rule or HIPAA Security Rule. Comments. Some commenters expressed concern that data will be made available to third-party application suppliers, commercial analytics companies, and/or entities that are not governed by HIPAA and that such availability of data would not serve patients’ best interests and could result in potential misuse of patient data. Response. We appreciate the feedback and agree that an actor who is a health IT developer of certified health IT that is not required to comply with the HIPAA Privacy Rule must comply with all applicable State and Federal laws, including the FTC Act. Further, such actors must have an organizational privacy policy that is tailored to the privacy risk or interest being addressed in order to meet this sub-exception. We emphasize that where a health IT developer of certified health IT offers a health IT product or service not regulated by the HIPAA Privacy Rule, such product or service is subject to the information blocking provision. Our goal is to ensure that non-covered actors that engage in reasonable and necessary privacy-protective practices that interfere with the access, exchange, or use of EHI could seek coverage under the sub-exception. Comments. Some commenters stated that actors that are not covered by HIPAA should make their privacy policies publicly available. Other commenters did not believe that the Proposed Rule fully addressed patient and consumer privacy protections. Response. We appreciate the comments. We believe that it is important that users know what to expect when electing to use a noncovered actor’s product or service. E:\FR\FM\01MYR3.SGM 01MYR3 25856 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations Sub-Exception 3: Denial of an Individual’s Request for Their Electronic Protected Health Information in the Circumstances Provided in 45 CFR 164.524(a)(1) and (2) We proposed a limited sub-exception to the information blocking provision that would permit a covered entity or business associate to deny an individual’s request for access to their PHI in the circumstances provided under 45 CFR 164.524(a)(1) (2) and (3). We noted that this exception would avoid a potential conflict between the HIPAA Privacy Rule and the information blocking provision. Specifically, the HIPAA Privacy Rule contemplates circumstances under which covered entities, and in some instances business associates, may deny an individual access to PHI and distinguishes those grounds for denial which are reviewable from those which are not. We proposed that this exception applies to both the ‘‘unreviewable grounds’’ and ‘‘reviewable grounds’’ of access. We noted that the ‘‘unreviewable grounds’’ for denial for individuals include situations involving: (1) Certain requests that are made by inmates of correctional institutions; (2) information created or obtained during research that includes treatment, if certain conditions are met; (3) denials permitted by the Privacy Act; and (4) information obtained from non-health care providers pursuant to promises of confidentiality. In addition, we noted that two categories of information are expressly excluded from the HIPAA Privacy Rule individual right of access: (1) Psychotherapy notes, which are the notes recorded by a health care provider who is a mental health professional documenting or analyzing the contents of a conversation during a private counseling session and that are maintained separate from the rest of the patient’s medical record; and (2) information compiled in reasonable anticipation of, or for use in, a civil, criminal, or administrative action or proceeding.167 We noted the ‘‘reviewable grounds’’ of access as described in § 164.524(a)(3), which provides that a covered entity may deny access provided that the individual is given a right to have such denials reviewed under certain circumstances. We explained that one such circumstance is when a licensed health care professional, in the exercise of professional judgment, determines that the access requested is reasonably likely to endanger the life or physical 167 See 45 CFR 164.501; 45 CFR 164.524 (a)(1)(i) and (ii). VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 safety of the individual or another person. In addition, we noted that if access is denied, then the individual has the right to have the denial reviewed by a licensed health professional who is to act as a reviewing official and did not participate in the original decision to deny access (see generally 45 CFR 164.524(a)(3)) (84 FR 7533 and 7534). As mentioned above with regards to the harm exception (§ 171.201) our purpose is to avoid unnecessary complexity. By including the ‘‘reviewable grounds’’ of 45 CFR 164.524(a)(3) in the harm exception at § 171.201, we align these regulations in a way that streamlines compliance for actors subject to the HIPAA Privacy Rule and this regulation. We removed the 45 CFR 164.524(a)(3) reference in the privacy sub-exception in § 171.202(d) and moved it to the harm exception in § 171.201 in order to promote clarity and alignment with the inter-relationship between this final rule and the HIPAA Privacy Rule. In restricting this privacy subexception to only ‘‘unreviewable grounds’’ in 45 CFR 164.524(a)(1) and (2), we clarify the regulation text so that it is immediately clear that actors who are covered entities, and in some instances business associates, may deny an individual access to EHI of the individual and such denials would not provide an opportunity for review of the denial under certain circumstances. We clarify in the final rule that if an individual requests EHI under the right of access provision under 45 CFR 164.524(a)(1) from an actor that must comply with 45 CFR 164.524(a)(1), the actor’s practice must be consistent with 45 CFR 164.524(a)(2). These ‘‘unreviewable grounds’’ are related to specific privacy risks or interests and have been established for important public policy purposes, such as when a health care provider is providing treatment in the course of medical research or when a health care provider is acting under the direction of a correctional institution. Unlike the ‘‘unreviewable grounds,’’ the ‘‘reviewable grounds’’ that are finalized § 171.201 are directly related to the likelihood of harm to a patient or another person and requires that actors seeking to avail themselves of this exception must have a reasonable belief that the practice will substantially reduce a risk of harm that would otherwise arise from the specific access, use, or exchange of EHI affected by the practice, and the harm must be one that would be cognizable under 45 CFR 164.524(a)(3) as a basis for denying an individual’s right of access to their PHI in analogous circumstances. In other PO 00000 Frm 00216 Fmt 4701 Sfmt 4700 words, the ‘‘reviewable grounds’’ of access as described in 45 CFR 164.524(a)(3), provides that a covered entity may deny access provided that the individual is given a right to have such denials reviewed when a licensed health care professional, in the exercise of professional judgment, determines that the access requested is reasonably likely to endanger the life or physical safety of the individual or another person. In addition, we noted that if access is denied, then the individual has the right to have the denial reviewed by a licensed health professional who is to act as a reviewing official and did not participate in the original decision to deny access and the risk to be reduced must be one that would otherwise arise from the specific access, use, or exchange of EHI affected by the practice. We proposed that if an actor who is a covered entity or its business associate denies an individual’s request for access to their PHI on the basis of these unreviewable grounds, and provided that the denial of access complies with the requirements of the HIPAA Privacy Rule in each case, then the actor would qualify for this exception and these practices would not constitute information blocking (84 FR 7534). We requested comment on this proposed sub-exception. Comments. Commenters were concerned that HINs that are business associates may not be authorized to provide individual access on the behalf of covered entity. Further, commenters sought clarification that this subexception would also apply in circumstances where as a business associate, the HIN would deny the individual’s request for access because of its obligations as a business associate. Response. We share this concern. To meet this privacy sub-exception, if an individual requests their ePHI under 45 CFR 164.524(a)(1), the actor may deny the request in the circumstances provided in 45 CFR 164.524(a)(1) or (2). That is, an actor that is a covered entity may deny an individual’s request for access to all or a portion of the PHI and must meet its requirements under the HIPAA Privacy Rule. As we discussed earlier, an individual’s right under the HIPAA Privacy Rule to access PHI about themselves includes PHI in a designated record set maintained by a business associate on behalf of a covered entity. However, if the same PHI that is the subject of an access request is maintained in both the designated record set of the covered entity and the designated record set of the business associate, the PHI need only be E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations produced once in response to the request for access.168 Comments. Commenters requested clarification that covered entities and business associates could meet this subexception when conducting clinical research with a blinded or masked designed. The EHI is typically ‘tagged’ as part of a blinded or masked research during a research study. Response. To meet this privacy subexception, if an individual requests their ePHI under 45 CFR 164.524(a)(1), the actor may deny the request in the circumstances provided in 45 CFR 164.524(a)(1) or (2). Under certain limited circumstances under the Privacy Rule, a covered entity may deny an individual’s request for access to all or a portion of the PHI requested. In some of these circumstances, an individual does not a right to have the denial reviewed by a licensed health care professional. It is known as ‘‘unreviewable grounds’’ for denial.169 One of the ‘‘unreviewable grounds’’ involves individual access to ePHI in a research study. An actor may deny access to an individual provided that the requested PHI is in a designated record set that is part of a research study that includes treatment (e.g., clinical trial) and is still in progress, provided the individual agreed to the temporary suspension of access when consenting to participate in the research. The individual’s right of access can be reinstated upon completion of the research study. Sub-Exception 4: Sub-Exception: Respecting an Individual’s Request Not To Share Information We proposed to establish an exception to the information blocking provision that would, in certain circumstances, permit an actor not to provide access, exchange, or use of EHI if an individual has specifically requested that the actor not do so. This sub-exception was proposed in § 171.202(e). We noted that this subexception is necessary to ensure that actors are confident that they can respect individuals’ privacy choices without engaging in information blocking, and to promote public confidence in the health IT infrastructure by effectuating patients’ preference about how and under what circumstances their EHI will be accessed, exchanged, and used. We recognized in the Proposed Rule that individuals may have concerns about permitting their EHI to be accessed, exchanged, or used electronically under 168 45 169 45 CFR 164.524(c)(1). CFR 164.524(a)(2). VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 certain circumstances. As a matter of public policy, we explained that these privacy concerns, if expressed by an individual and agreed to by an actor, would be reasonable and necessary, and an actor’s conduct in abiding by its agreement would, if all conditions are met, be an exception to the information blocking provision (84 FR 7534). We proposed that this proposed subexception would not apply under circumstances where an actor interferes with a use or disclosure of EHI that is required by law, including when EHI is required by the Secretary to enforce HIPAA under 45 CFR 164.502(a)(2)(ii) and 45 CFR 164.502(a)(4)(i). Stated differently, this sub-exception would not operate to permit an actor to refuse to provide access, exchange, or use of EHI when that access, exchange, or use is required by law. We noted that this sub-exception recognizes and supports the public policy objective of the HIPAA Privacy Rule, which identifies uses and disclosures of EHI for which the public interest in the disclosure of the individual’s information outweighs the individual’s interests in controlling the information. We proposed that this sub-exception would permit an actor not to share EHI if the following conditions are met: (1) The individual made the request to the actor not to have their EHI accessed, exchanged, or used; (2) the individual’s request was initiated by the individual without any improper encouragement or inducement by the actor; and (3) the actor or its agent documents the request within a reasonable time period. We described that to qualify for this sub-exception, the request that the individual’s EHI not be accessed, exchanged, or used must come from the individual. Moreover, the individual must have made the request independently and without any improper encouragement or inducement by the actor. We proposed that if an individual submits a request to an actor not to disclose her EHI, and the actor agrees with and documents the request, the request would be valid for purposes of this sub-exception unless and until it is subsequently revoked by the individual. We proposed that once the individual makes the request, she should not, subject to the requirements of applicable Federal or State laws and regulations, have to continually reiterate her privacy preferences, such as having to re-submit a request every year. Likewise, we proposed that once the actor has documented an individual’s request, the actor should not have to repeatedly reconfirm and re-document the request. We requested comment, however, PO 00000 Frm 00217 Fmt 4701 Sfmt 4700 25857 regarding whether this approach is too permissive and could result in unintended consequences. We also sought comment on this proposed subexception generally, including on effective ways for an individual to revoke their privacy request for purposes of this sub-exception. We also proposed that in order for a practice to qualify for this subexception, an actor’s practice must be implemented in a consistent and nondiscriminatory manner. This condition would provide basic assurance that the purported privacy practice is directly related to the risk of disclosing EHI contrary to the wishes of an individual, and is not being used to interfere with access, exchange, or use of EHI for other purposes to which this exception does not apply. We noted that this condition requires that the actor’s privacyprotective practice must be based on objective criteria that apply uniformly for all substantially similar privacy risks (84 FR 7534 and 7535). We noted that under the HIPAA Privacy Rule, individuals have the right to request restrictions on how a covered entity will use (as that term is defined in 45 CFR 160.103) and disclose PHI about them for treatment, payment, and health care operations pursuant to 45 CFR 164.522(a)(1). Under 45 CFR 164.522(a), a covered entity is not required to agree to an individual’s request for a restriction (other than in the case of a disclosure to a health plan under 45 CFR 164.522(a)(1)(vi)), but is bound by any restrictions to which it agrees (84 FR 7534). We proposed that if an individual submitted a request to an actor not to disclose her EHI, and the actor agreed with and documents the request, the request would be valid for the purposes of this sub-exception unless and until it was subsequently revoked by the individual. We believed that this approach would minimize compliance burdens for actors while also respecting individuals’ requests. We sought comment on this proposed subexception generally, including on effective ways for individuals to revoke their privacy request for purposes of this sub-exception (84 FR 7534). In the final rule, we align with the HIPAA Privacy Rule, specifically, 45 CFR 164.522(a)(2) which includes specific requirements with respect to the termination of an individual’s restriction. Similar to the HIPAA Privacy Rule, we include § 171.202(e)(4) to address situations where the individual terminates its individual’s restriction. An actor may terminate a restriction with the individual’s written or oral agreement. If the individual’s agreement E:\FR\FM\01MYR3.SGM 01MYR3 25858 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations is obtained orally, the actor must document that agreement. A note in the certified EHR or similar notation is sufficient documentation. If the individual agrees to terminate the restriction, the actor may use and disclose EHI as otherwise permitted under this final rule. An actor may only access, exchange or use EHI after it informs the individual of the termination. The restriction continues to apply to EHI accessed, exchanged or used prior to informing the individual of the termination. That is, any EHI that had been collected before the termination may not be accessed, exchanged or used in a way that is inconsistent with the restriction, but any information that is collected after informing the individual of the termination of the restriction may be used or disclosed as otherwise permitted under the final rule. In § 171.201(e)(4), we clarify that an actor must document a restriction to which it has agreed. We do not require a specific form of documentation; a note in the certified EHR or similar notation is sufficient. A restriction is only binding on the actor that agreed to the restriction. We encourage actors to inform others of the existence of a restriction when it is appropriate to do so. If a restriction does not permit an actor to disclose EHI to a particular person, the actor must carefully consider whether disclosing the existence of the restriction to that person would also violate the restriction. We clarified that for the purposes of this proposed sub-exception, the actor may give effect to an individual’s request not to have an actor disclose EHI even if State or Federal laws would allow the actor not to follow the individual’s request. We explained that this is consistent with our position that, absent improper encouragement or inducement, and subject to appropriate conditions, it should not be considered information blocking to give effect to patients’ individual preferences about how their EHI will be shared or how their EHI will not be shared. We requested comments on this subexception generally. Specifically, we sought comment on what would be considered a reasonable time frame for documentation. In addition, we also sought comment on how this subexception would affect public health disclosures and health care research, if an actor did not share a patient’s EHI due to a privacy preference, including any effects on preventing or controlling diseases, injury, or disability, and the reporting of disease, injury, and vital events such as births or deaths, and the VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 conduct of public health surveillance and health care research (84 FR 7534 and 7535). Comments. Commenters recommended that we provide guidance regarding what could be considered a ‘‘reasonable time period’’ under § 171.202(e)(3) and to provide clarity to health information professionals that will be tasked with documenting the individual’s privacy preferences in accordance with this regulation. Response. In order to align with HIPAA, we looked to the HIPAA Privacy Rule at 45 CFR 164.522 for guidance on this issue. The HIPAA Privacy Rule requires a covered entity to document a restriction of PHI, but gives covered entities the discretion to determine the exact timing of the documentation. The documentation requirement is consistent with the HIPAA Privacy Rule, which is already being observed by covered entities and business associates. Under the HIPAA Privacy Rule, a covered entity may voluntarily choose, but is not required, to obtain the individual’s consent for it to use and disclose information about him or her for treatment, payment, and health care operations.170 A ‘‘consent’’ document is not a valid permission to use or disclose PHI for a purpose that requires an ‘‘authorization’’ under the HIPAA Privacy Rule (see 45 CFR 164.508), or where other requirements or conditions exist under the HIPAA Privacy Rule for the use or disclosure of PHI. Similarly, we believe that actors should be given the discretion to document an individual’s request and such documentation should be within a reasonable period of time after making such a request. Although we do not require the request form to be dated at the time it is signed, we would recommend that it be dated so that actors and others can document that the request was obtained prior to an actor’s agreement for the restriction of the individual’s access, exchange or use of EHI. What would be deemed as an unreasonable period of time would be the unreasonable delay in performance and in documentation by the actor as well as whether there were any objective manifestations of expectation expressed between the individual and the actor. Comments. A commenter recommended that a reasonable time frame should balance and not burden an individual or organization such as reviewing preferences with the individual each year and that the risk/ benefit profile in the fast-changing 170 See PO 00000 45 CFR 164.506(b). Frm 00218 Fmt 4701 Sfmt 4700 health-IT market may well have changed and that the individual has a right to have those changes disclosed to make an informed decision. Another commenter expressed a belief that not asking the individual to reconfirm their preference is too permissive. Response. We agree that once the individual makes the request to an actor, she should not, subject to the requirements of applicable Federal or State laws and regulations, have to continually reiterate her privacy preferences, such as having to re-submit a request every year. Likewise, we finalized that once the actor has documented an individual’s request within a reasonable period of time, then the actor is not required to repeatedly reconfirm and re-document the request. Comments. A commenter recommended that the request needs to be in writing, and suggested that we provide guidance regarding how the individual’s request could be documented. Another commenter requested that we develop a template consent form whereby patients could indicate if they would like to have their health information disclosed to third parties and to ensure that the content of this form would be absent of any ‘‘improper encouragement or inducement’’ and that we should work in consultation with OCR to develop the recommended language for a model consent form. Response. We agree that an individual’s request and an individual’s request for revocation should be in writing assuming such a request is not required or prohibited by law. Alternatively, an actor could document a conversation with an individual. Such documentation could be documented in a certified EHR in some manner, and if the individual was provided a specific request form, the form could be included in a certified EHR. We believe that an individual should have sufficient opportunity to consider whether to provide a request and that an actor should minimize the possibility of coercion or undue influence and refrain from any improper encouragement or inducement. Any form provided by the actor should have information provided in plain language that is understandable to the individual. For example, we noted that it would be improper to discourage individuals from sharing information with unaffiliated providers on the basis of generalized or speculative risks of unauthorized disclosure. On the other hand, we noted that if the actor was aware of a specific privacy or security risk, it would be proper to inform individuals of that risk. Likewise, an E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations actor would be permitted to provide an individual with general information about her privacy rights and options, including for example, the option to not provide consent, provided the information is presented accurately, does not omit important information, and is not presented in a way that is likely to improperly influence the individual’s decision about how to exercise their rights. It is important to note that the subexception conditions in the regulation are not intended to preempt any applicable Federal, State, or local laws that may require additional information to be disclosed for an agreement to be legally effective. We will continue to work in consultation with OCR to develop resources as necessary to support actors’ compliance with the conditions of this Privacy Exception. Comments. Commenters requested greater clarity on how this regulation would affect public health disclosures and health care research, if an actor did not share a patient’s EHI due to a privacy preference, including any effects on preventing or controlling diseases, injury, or disability, and the reporting of disease, injury, and vital events such as births or deaths, and the conduct of public health surveillance and health care research. Response. With regard to public health disclosures, to the extent that such disclosures are required by law, the actor would not be in a position to grant the patient’s request for restriction. With regard to EHI used for research, the unavailability of the individual’s information resulting from a restriction would be consistent with the patient’s right to withhold authorization for research uses and disclosures. However, an Institutional Review Board may approve a consent procedure that alters some or all of the elements of informed consent, or waive the requirement to obtain informed consent under HHS regulations at 45 CFR 46.116(c), and to the extent that the researcher has obtained a waiver of informed consent, research could be compromised by the unavailability of certain EHI. One possible way to resolve this issue would be the establishment of a field that actors covered could check in a certified EHR that would indicate that restrictions have been applied to the individual’s EHI (without providing detail of the nature of such restriction). In this case, actors could exclude the individual’s EHI from research. Comments. A commenter suggested that EHI should be accessed, exchanged or used despite a patient’s privacy agreement with an actor in emergency treatment situations particularly when VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 an individual is unavailable to provide a revocation. The commenter was concerned that if the EHI was not disclosed to health care provider in an emergency, the individual could be subject to imminent harm or death. Response. In the Proposed Rule (proposed § 171.202(e)), we did not provide how an individual could revoke her privacy agreement with the actor. In response, we included in the final rule in § 171.202(e)(4) to specifically address the termination of an individual’s request. In order to address these specific circumstances and align with the HIPAA Privacy Rule, we agree that an individual’s restriction may need to be compromised in emergency treatment situations, and we have finalized that an actor may terminate an individual’s request for a restriction to not provide access, exchange or use of EHI under limited circumstances. c. Security Exception—When will an actor’s practice that is likely to interfere with the access, exchange, or use of electronic health information in order to protect the security of electronic health information not be considered information blocking? We proposed in the Proposed Rule (84 FR 7535 through 7538) to establish an exception to the information blocking provision that would permit actors to engage in practices that are reasonable and necessary to promote the security of EHI, subject to certain conditions. We explained that, without this exception, actors may be reluctant to implement security measures or engage in other activities that are reasonable and necessary for safeguarding the confidentiality, integrity, and availability of EHI. This could undermine the ultimate goals of the information blocking provision by discouraging best practice security protocols and diminishing the reliability of the health IT ecosystem. We noted (84 FR 7535) that robust security protections are critical to promoting patients’ and other stakeholders’ trust and confidence that EHI will be collected, used, and shared in a manner that protects individuals’ privacy and complies with applicable legal requirements. We also noted that public confidence in the security of their EHI has been challenged by the growing incidence of cyber-attacks in the health care sector. More than ever, we explained, health care providers, health IT developers, HIEs and HINs must be vigilant to mitigate security risks and implement appropriate safeguards to secure the EHI they collect, maintain, access, use, and exchange. PO 00000 Frm 00219 Fmt 4701 Sfmt 4700 25859 We emphasized (84 FR 7535) that, while the importance of security practices cannot be overstated, the proposed exception would not apply to all practices that purport to secure EHI. Rather, we stated that the exception would only be available when the actor’s security-based practice satisfies the conditions applicable to this exception.171 We noted that it would not be appropriate to prescribe a ‘‘maximum’’ level of security or to dictate a one-size-fits-all approach for all actors as that may not be appropriate in all circumstances and may not accommodate new threats, countermeasures, and best practices in a rapidly changing security landscape. We further noted that we did not intend for the proposed exception to dictate a specific security approach. Moreover, we emphasized that effective security best practices focus on the mitigation and remediation of risks to a reasonable and acceptable level. With consideration of the above (84 FR 7535), we proposed that actors would be able to satisfy the exception through practices that implement either security policies and practices developed by the actor, or case-by-case determinations made by the actor. We proposed that whether a securitymotivated practice meets this exception would be determined on a case-by-case basis using a fact-based analysis of the conditions set forth in the Proposed Rule. We emphasized (84 FR 7535) that the practices implemented by a single physician office with limited technology resources, for example, will be different to those implemented by a large health system, and that this difference does not affect an actor’s ability to qualify for this exception. The fact-based approach that we proposed would allow each actor to implement policies, procedures, and technologies that are appropriate for its particular size, organizational structure, and risks to individuals’ EHI. We noted that a fact-based analysis also aligns with the HIPAA Security Rule 172 concerning the security of ePHI. The HIPAA Security Rule requires HIPAA covered entities or business associates to develop security practices and implement administrative, physical, and 171 In the Proposed Rule (84 FR 7535), we used the phrase ‘‘conditions applicable to this exception’’ to mean the conditions (inclusive of requirements within specific conditions) of the exception applicable to a particular practice in a particular circumstance. Where we are not summarizing what we stated in the proposed rule, in this preamble we have generally used plainerlanguage phrasings, such as ‘‘the conditions of the exception that are applicable to a practice [in the particular circumstances].’’ 172 45 CFR 164.306, 308, 310, and 312. E:\FR\FM\01MYR3.SGM 01MYR3 25860 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations technical safeguards that take into account: The entity’s size, complexity, and capabilities; technical, hardware, and software infrastructure; the costs of security measures; and the likelihood and possible impact of potential risks to ePHI.173 We noted (84 FR 7535 and 7536), however, that while our proposed approach would be consistent with the regulation of security practices under the HIPAA Security Rule, the fact that a practice complies with the HIPAA Security Rule would not establish that it meets the conditions of the exception to the information blocking provision. We emphasized (84 FR 7536) that the HIPAA Security Rule and the proposed exception have different foci. The HIPAA Security Rule establishes a baseline by requiring certain entities to ensure the confidentiality, integrity, and availability of ePHI by implementing security measures, among other safeguards, that the entities determine are sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level. In contrast, we explained that the purpose of the exception to the information blocking provision is to provide flexibility for reasonable and necessary security practices without excepting from the definition of information blocking in § 171.103 practices that purport to promote the security of EHI but that are unreasonably broad and onerous on those seeking access to EHI, not applied consistently across or within an organization, or otherwise may unreasonably interfere with access, exchange, or use of EHI. To qualify for this exception, we proposed that an actor’s conduct must satisfy threshold conditions. As discussed in detail in the Proposed Rule (84 FR 7535 through 7538), the particular security-related practice must be directly related to safeguarding the confidentiality, integrity, and availability of EHI, implemented consistently and in a nondiscriminatory manner, and tailored to identified security risks (84 FR 7535). We also proposed (84 FR 7537) that where an actor has documented security policies that align with applicable consensus-based standards, and where the policies are implemented in a consistent and non-discriminatory manner, a practice’s conformity with such policies would provide a degree of assurance that the practice was reasonable and necessary to address specific security risks and thus should not constitute information blocking. We also stated in the Proposed Rule (84 FR 7537) that we recognize that EHI 173 45 CFR 164.306(b) VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 security may present novel and unexpected threats that even a bestpractice risk assessment and security policy cannot anticipate. We stated that if a practice that does not implement an organizational security policy is to qualify for this exception; however, it must meet certain conditions. The public comments received, our responses to these comments, and the conditions as finalized in § 171.203 are discussed below in this section of this final rule preamble. We encouraged comment on these conditions (84 FR 7538), and our overall approach to the proposed exception, including whether our proposal provided adequate flexibility for actors to implement measures that are commensurate to the threats they face, the technology infrastructure they possess, and their overall security profiles and, equally important, whether this exception adequately mitigates the risk that actors will adopt security policies that are unnecessarily restrictive or engage in practices that unreasonably interfere with access, exchange, or use of EHI. Commenters were encouraged to propose additional conditions that may be necessary to ensure that the exception is tailored and does not extend protection to practices that are not reasonable and necessary to promote the security of EHI and that could present information blocking concerns. We also requested comment on whether the use of consensus-based standards and guidance provides an appropriate reference point for the development of security policies. Finally, we asked commenters to offer an alternative basis for identifying practices that do not offer a security benefit (compared with available alternatives) but that cause an information blocking harm by interfering with access, exchange, or use of EHI (84 FR 7538). Comments. We received several comments supporting, and did not receive any comments opposed to, the establishment of the Security Exception. We also received no comments offering an alternative basis for identifying practices that do not offer a security benefit (compared with other available alternatives) but that cause an information blocking harm by interfering with access, exchange, or use of EHI to a greater degree than necessary. We received a number of comments requesting additional guidance about how the exception’s conditions can be met in practice. Commenters asked questions about, or recommended that we furnish additional guidance on how an actor might determine which a security PO 00000 Frm 00220 Fmt 4701 Sfmt 4700 practices meet the conditions in § 171.203 to qualify for the exception. Response. We appreciate commenters’ feedback. We have finalized the exception in § 171.203, with some modification to the regulation text. We have changed the title of the exception from ‘‘Exception—Promoting the security of electronic health information’’ in the Proposed Rule (84 FR 7603) to ‘‘Security Exception—When will a practice likely to interfere with access, exchange, or use of electronic health information in order to protect the security of electronic health information not be considered information blocking?’’ Throughout this final rule preamble, we use ‘‘Security Exception’’ as a short form of this title, for ease of reference. As stated in Section VIII.D of this final rule preamble, we have changed the titles of all of the exceptions to questions to improve clarity. We have edited the wording of the introductory text of § 171.203 as finalized, in comparison to that proposed (84 FR 7603) so that it is consistent with the finalized title of § 171.203. We believe these conforming changes in wording of the introductory text also improve clarity of expression in this section. Comments on specific conditions are summarized below, in context of each condition proposed. We believe our responses to these comments furnish the clarity actors need to understand the conditions and of the exception finalized in § 171.203 for practices likely to interfere with access, exchange, or use of EHI in order to protect the security of EHI to be considered excepted from the definition of information blocking in § 171.103. Condition: The Practice Must Be Directly Related to Safeguarding the Confidentiality, Integrity, and Availability of Electronic Health Information We proposed that, as a threshold condition, the exception would not apply to practices that are not directly related (84 FR 7536) to safeguarding the security of EHI. We explained that, in assessing the practice, we would consider whether and to what extent the practice directly addressed specific security risks or concerns. We noted that we would also consider whether the practice served any other purposes and, if so, whether those purposes were merely incidental to the overriding security purpose or provided an objectively distinct, non-security-related rationale for engaging in the practice. We noted (84 FR 7536) that it should not be particularly difficult or onerous for an actor to demonstrate that its E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations practice was directly related to a specific security risk or concern. For example, we explained that the actor may show that the practice was a direct response to a known security incident or threat; or that the practice directly related to the need to verify a person’s identity before granting access to EHI; or that the practice was directly related to ensuring the integrity of EHI. We emphasized (84 FR 7536) that the salient issue under this condition, therefore, would be whether the security practice was actually necessary and directly related to the specific security risk being addressed. To that end, we noted that we would consider the actor’s purported basis for adopting the particular security practice, which could be evidenced by the actor’s organizational security policy, risk assessments, and other relevant documentation, which most actors are already required to develop pursuant to requirements under the HIPAA Rules. However, we proposed that the documentation of an actor’s decision making would not necessarily be dispositive. For example, we noted that if the practice had the practical effect of disadvantaging competitors or steering referrals, this could be evidence that the practice was not directly related and tailored to the specific security risk. We proposed that such an inference would also not be warranted where the actor has not met the other conditions of this exception, as where the actor’s policies were not developed or implemented in a reasonable manner; its security policies or practices were not tailored to specific risks; or it applied its security policies or practices in an inconsistent or discriminatory manner. Comments. We received a number of comments supporting the applicability of this exception to practices directly related to safeguarding the confidentiality, integrity, and availability of EHI and that are consistent with the HIPAA Security Rule. We received no comments recommending that this exception not be applicable to such practices. Response. We have finalized this condition as proposed. In order to meet this specific condition (finalized in § 171.203(a)), a practice must be directly related to safeguarding the confidentiality, integrity, and availability of EHI. Comments. Commenters expressed concerns with what commenters described as the complexity of factbased analysis and use of terms such as ‘‘directly related.’’ Commenters stated that analyzing their policies and practices against such standards could be burdensome, especially in the VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 context of the requirement to meet all conditions at all relevant times. Response. While fact-based analysis may not be as simple as determining if a particular security practice does or does not conform to a pre-specified approach, we believe that it is the most practical approach given the inherent complexity of the regulatory and threat landscapes relevant to an actor’s cybersecurity practices. This landscape complexity contributes substantially to our belief that a one-size-fits-all detailed definition or test for security measures or methods to be deemed ‘‘directly related’’ to safeguarding the confidentiality, integrity, and availability of EHI would not be the optimal approach at this time. We have not established a specific, regulatory definition for ‘‘directly related’’ as we are using both ‘‘directly’’ and ‘‘related’’ in their ordinary meanings.174 With respect to the condition that a practice meet all conditions in § 171.203 at all relevant times in order to satisfy the exception, we do not believe it would be particularly difficult, in context of a fact-specific analysis, for an actor to demonstrate that its practice was directly related to a specific security risk or concern. For example, the actor may show that the practice was a direct response to a known security incident or threat, or that the practice was directly related to the need to verify a person’s identity before granting access to EHI. We also note that, although we encourage actors to voluntarily conform their practices to the conditions of an exception suited to the practice and its purpose, an actor’s choice to do so simply provides it an enhanced level of assurance that the practices do not meet the definition of information blocking. Failure to meet an exception does not necessarily mean a practice meets the definition of information blocking. If subject to an investigation by HHS, each practice that implicates the information blocking provision and that does not meet any exception would be analyzed on a caseby-case basis. The overarching purpose of the Security Exception is to provide flexibility for reasonable and necessary security practices while screening out practices that purport to promote the security of EHI but that otherwise unreasonably and/or unnecessarily interfere with access, exchange, and use of EHI. Confidentiality, integrity and 174 Ordinary meanings of the adverb ‘‘directly’’ and the adjective ‘‘related’’ in American usage can be found in widely published dictionaries, such as The American Heritage Dictionary of the English Language, Dictionary.com, or MerriamWebster.com. PO 00000 Frm 00221 Fmt 4701 Sfmt 4700 25861 availability, also known as the CIA triad, is a model designed to guide policies for information security practices within an organization. The elements of the triad are considered the three most crucial components of information security practices.175 In assessing whether a practice meets the condition finalized in § 171.203(a), the information that we would expect to consider includes, but is not necessarily limited to, the actor’s purported basis for adopting the particular security practice, which could be evidenced by the actor’s organizational security policy, risks assessments the actor had performed that informed the actor’s security-based practice(s), and other relevant documentation that an actor maintains. We also reiterate our observation that many actors are also HIPAA covered entities or business associates. For that reason, many actors are likely to have, pursuant to their meeting the requirements of the HIPAA Security Rule, documentation relevant to showing their security-based practice(s) satisfy the Security Exception condition that is finalized in § 171.203(a).176 Condition: The Practice Must Be Tailored to the Specific Security Risk Being Addressed To meet the exception, we proposed (84 FR 7536) that an actor’s securityrelated practice must be tailored to specific security risks that the practice actually addressed. We explained that this condition necessarily presupposes that an actor has carefully evaluated the risk posed by the security threat and developed a considered response that is tailored to mitigating the vulnerabilities of the actor’s health IT or other related systems. Comments. Commenters expressed concerns with what commenters described as the complexity of factbased analysis and use of terms such as ‘‘tailored.’’ Commenters stated that analyzing their policies and practices against such standards could be burdensome, especially in context of the requirement to meet all conditions at all relevant times. Response. While fact-specific analysis may not be as simple as determining if a particular security practice does or does not conform to a pre-specified approach, we believe that it is the most practical approach given the inherent complexity of the regulatory and threat landscapes relevant to an actor’s cybersecurity practices. This landscape 175 See NIST Special Publication 800–12, revision 1, An Introduction to Information Security. 176 45 CFR 164.316 E:\FR\FM\01MYR3.SGM 01MYR3 25862 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations complexity contributes substantially to our belief that a one-size-fits-all definition or test for security measures or methods to be deemed conformant with the condition finalized in § 171.203(b) would not be the optimal approach at this time. Instead, we have finalized the condition proposed in § 171.201(b) as proposed. We believe requiring that the actor’s policies and practices be tailored to the risk being addressed is currently the most appropriate and practical approach. We intend for this exception to be applicable to a wide array of practices that are reasonable and necessary to protect the security of EHI in various actors’ specific operational contexts. In assessing whether a practice meets the condition finalized in § 171.203(b), we would consider whether and to what extent the practice directly addresses specific security risks or concerns and whether it was tailored to those risks. We would also consider whether the practice served any other purposes and if so, whether those purposes were merely incidental to an overriding security purpose or provided an objectively distinct, non-security related rationale for engaging in the practice. We also believe the ordinary meaning of ‘‘tailored’’ 177 provides sufficient clarity that we expect the practices to be made or adapted to serve the particular purpose or need for which they are deployed. With respect to the requirement that a practice meet all conditions in § 171.203 at all relevant times in order to satisfy the exception, we do not believe it would be particularly difficult, in context of a fact-specific analysis, for an actor to demonstrate that each practice was made or adapted to serve the particular purpose or need for which is was deployed. For example, where a practice meets the condition finalized in § 171.203(a) by being a direct response to a known security incident or threat, it logically follows that the practice should also be made or adapted to the purpose of responding to such incident or threat. In which case, the practice’s inherent characteristics would support the actor’s ability to show that it meets the condition finalized in § 171.203(b). Similarly, where an identity-proofing practice satisfies the condition finalized in § 171.203(b) by being directly related 177 See, e.g., sense 1.b. of the entry for the verb ‘‘tailor’’ in the Merriam-Webster dictionary: ‘‘to make or adapt to suit a special need or purpose’’ (https://merriam-webster.com/dictionary/tailor, last accessed Feb. 6, 2020). See also, e.g., sense 3 of the entry for the verb ‘‘tailor’’ in The American Heritage Dictionary of the English Language: ‘‘to make, alter, or adapt for a particular end or purpose’’ (https:// ahdictionary.com, last accessed Feb 6, 2020). VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 to the need to verify a person’s identity before granting access to EHI, it would be logical to expect the practice would also be tailored to address that need. Comments. Commenters recommended that actors should be permitted to develop and implement security policies that exceed the minimum requirements of HIPAA with the intent to promote data security or to comply with State law or policies. Response. If its conditions are otherwise met, this exception would apply to security-based practices that exceed the minimum conditions of the HIPAA Security Rule. As would be the case with a practice implemented to comply with the HIPAA Security Rule requirements, the fact that a practice was implemented to meet another applicable legal mandate would be considered in assessing whether a practice meets this exception. However, a practice that is consistent with a law or regulation setting a minimum requirement for protecting confidentiality, integrity, and availability of EHI might not meet this exception. For example, a practice that is consistent with a minimum legal condition related to the security of EHI might not meet this exception if it is not also tailored to avoid interfering with the access, exchange, or use of EHI to a greater extent than reasonable and necessary to appropriately mitigate the risk it addresses. We have finalized this condition in § 171.203(b) without modification to the text of this condition as proposed (84 FR 7603). Condition: The Practice Must Be Implemented in a Consistent and NonDiscriminatory Manner We proposed (84 FR 7536 and 7537) that in order for a practice to qualify for this exception, the actor’s practice must have been implemented in a consistent and non-discriminatory manner. We explained that this condition would provide basic assurance that the purported security practice is directly related to a specific security risk and is not being used to interfere with access, exchange, or use of EHI for other purposes to which this exception does not apply. As an illustration solely of the nondiscriminatory manner condition (84 FR 7536 and 7537), we discussed a hypothetical example of a health IT developer of certified health IT that offers apps to its customers via an app marketplace. We stated that if the developer requires that third-party apps sold (or made available) via the developer’s app marketplace meet certain security requirements, those PO 00000 Frm 00222 Fmt 4701 Sfmt 4700 security requirements must be imposed in a non-discriminatory manner. We noted that this would mean, for example, that if a developer imposed a requirement that third-party apps include two-factor authentication for patient access, the developer would need to ensure that the same requirement was imposed on, and met by, all other apps, including any apps made available by the developer itself. We also noted that such a developer requirement must also meet the other conditions of the exception (e.g., the condition that the practice be tailored to the specific security risk being addressed). Comments. We received no comments opposed to the condition that practices must be implemented in a consistent and non-discriminatory manner. We did receive one comment recommending that we recognize under this exception risk-based cybersecurity practices that may result in applying different security requirements to different exchange partners based on risk posed. Response. We intend this exception, including but not limited to this specific condition, to allow for recognition of risk-based security practices. Assessment of whether practices satisfy the conditions of this exception will be fact-based. We also recognize that objectively reasonable practices applied on the basis of the cybersecurity risks posed by particular system connections or data exchanges may result in practices that are tailored to this risk and thus not necessarily identical across all connections, interchanges, and therefore all individuals or entities with whom an actor engages. In context of this condition of the Security Exception, ‘‘consistent and non-discriminatory’’ should be understood to mean that similarly situated actors whose interactions pose the same level of security risk should be treated consistently with one another under the actor’s security practices. Inconsistent treatment across similarly situated actors whose interactions pose the same level of security risk based on extraneous factors, such as whether they are a competitor of the actor implementing the security practices, would not be considered appropriate. We have finalized this condition as proposed. It is codified in § 171.203(c). Condition Applicable to Practices That Implement an Organizational Security Policy We discussed in the Proposed Rule (84 FR 7537) that an actor’s approach to information security management would reflect the actor’s particular size, organizational structure, and risk E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations posture. Because of this, we emphasized that actors should develop and implement organizational policies that secure EHI. We proposed that, where an actor has documented security policies that align with applicable consensusbased standards, and where the policies are implemented in a consistent and non-discriminatory manner, a practice’s conformity with such policies would provide a degree of assurance that the practice was reasonable and necessary to address specific security risks and thus should not constitute information blocking. We stated (84 FR 7537) that a practice that went beyond an actor’s established policies or procedures by imposing security controls that were not documented would not qualify for this exception under this condition (although the actor may be able to qualify under the alternative basis for practices that do not implement a security policy). We further stated that such practices would be suspect under the information blocking provision if there were indications that the actor’s security-related justification was a pretext or after-the-fact rationalization for its conduct or was otherwise unreasonable under the circumstances. We reiterated (84 FR 7537) that, to the extent that an actor seeks to justify a practice on the basis of its organizational security policies, such policies must be in writing and implemented in a consistent and nondiscriminatory manner. We emphasized that what a policy requires will depend on the facts and circumstances. However, we proposed that to support a presumption that a practice conducted pursuant to the actor’s security policy was reasonable, the policy would have to meet conditions stated and discussed in Section VIII.D.3 of the Proposed Rule (84 FR 7537). The details within paragraph (d) of § 171.203 were proposed in regulation text (84 FR 7603). The detailed requirements of the condition as proposed in § 171.203(d) were: If the practice implements an organizational security policy the policy must— • Be in writing; • Have been prepared on the basis of, and directly respond to, security risks identified and assessed by or on behalf of the actor; • Align with one or more applicable consensus-based standards or best practice guidance; and • Provide objective timeframes and other parameters for identifying, responding to, and addressing security incidents. We discuss each of these requirements (subparagraphs) within VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 the condition applicable to practices that implement an organizational security policy (§ 171.203(d)) in more detail below. Paragraph (d)(1): Security Policy in Writing We proposed that the actor’s security policy must be in writing (84 FR 7537). This requirement is applicable to practices that implement an organizational security policy and is consistent with the HIPAA Security Rule.178 The importance of written security policies is also consistent with consensus-based standard and best practice guidance.179 Comments. We received no comments opposed to this condition proposed in § 171.203(d). Response. Within the condition (§ 171.203(d)) applicable to practices that implement an organizational security policy, we have finalized in § 171.203(d)(1) the requirement that the policy must be in writing. We have finalized this condition as proposed. Paragraph (d)(2): Security Risks Identified and Assessed We proposed (84 FR 7537) that the actor’s security policy must be informed by an assessment of the security risks facing the actor. While we did not propose any requirements as to a risk assessment, we noted that a good risk assessment would use an approach consistent with industry standards,180 and would incorporate elements such as threat and vulnerability analysis, data collection, assessment of current security measures, likelihood of occurrence, impact, level of risk, and final reporting.181 Comments. We received no comments opposed to requiring a linkage between an organization’s security policy and a risk assessment. We did receive a couple of comments expressing a concern that not all actors may yet be proficient in identifying and assessing the risks associated with specific health IT functionalities, such as standardsbased APIs. Response. Within the condition (§ 171.203(d)) applicable to practices that implement an organizational security policy, we have finalized 178 45 CFR 164.316 SP 800–53 Rev. 5 Security and Privacy Controls for Information Systems and Organizations. 180 See OCR, Guidance on Risk Analysis, https:// www.hhs.gov/hipaa/for-professionals/security/ guidance/guidance-risk-analysis/ index.html?language=es. 181 ONC and OCR have jointly launched the HHS HIPAA Security Risk Assessment (SRA) Tool, https://www.healthit.gov/providers-professionals/ security-risk-assessment-tool. 179 See PO 00000 Frm 00223 Fmt 4701 Sfmt 4700 25863 § 171.203(d)(2) with a revision to the wording of the regulation text in comparison with that proposed (84 FR 7603). Specifically, we have replaced ‘‘and respond directly to’’ that appeared in the regulation text with ‘‘and be directly responsive to’’ in the text finalized in § 171.203(d)(2). Thus, the finalized text in § 171.203(d)(2) reads: ‘‘have been prepared on the basis of, and be directly responsive to, security risks identified and assessed by or on behalf of the actor.’’ We made this editorial revision because we believe it makes the resulting regulation text easier to read. Although actors may have obligations under other existing law or regulations, such as the HIPAA Security Rule, to conduct security risk assessments, this condition, which is applicable to security-based practices that implement an organizational security policy, does not establish a set threshold for an actor’s proficiency in identifying, assessing, and responding to security risks. If any actor believes it may lack the technical or other expertise necessary to conduct a risk assessment appropriate to its operations and the EHI for which it is responsible, we would encourage that actor to seek additional information, training, or support from an individual or entity with the required expertise. As finalized in § 171.203(d)(2), the requirement that risks have been identified and assessed expressly provides for this to have been done either by the actor or on the actor’s behalf. We are sensitive to the possibility that some actors, including but not limited to small clinician practices, may not be in a position to meet the condition finalized in paragraph (d) of § 171.203 immediately or for all of their security-based practices, and we therefore reiterate that we have finalized in § 171.203(e) an alternative condition that an actor may choose to meet in circumstances where it may not be practical for them to meet the condition finalized in § 171.203(d). We also reiterate that, while we do encourage actors to voluntarily conform their practices to the conditions of an exception suited to the practice and its purpose, an actor’s choice to do so simply provides them an enhanced level of assurance that the practices do not meet the definition of information blocking. Failure to meet an exception does not necessarily mean a practice meets the definition of information blocking. If subject to an investigation by HHS, each practice that implicates the information blocking provision and that does not meet any exception would be analyzed on a case-by-case basis. E:\FR\FM\01MYR3.SGM 01MYR3 25864 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations Paragraph (d)(3): Consensus-Based Standards or Best Practice Guidance We proposed (84 FR 7537) that the actor’s policy must align with one or more applicable consensus-based standards or best practice guidance. We noted that at present, examples of relevant best practices for development of security policies include, but are not limited to: NIST–800–53 Rev. 5; the NIST Cybersecurity Framework; and NIST SP 800–100, SP 800–37 Rev. 2, SP 800–39, as updated and as interpreted through formal guidance. We noted that best practice guidance on security policies is also developed by consensus standards bodies such as ISO, IETF, or IEC. We stated that HIPAA covered entities and business associates may be able to leverage their HIPAA Security Rule compliance activities and can, if they choose, align their security policy with those parts of the NIST Cybersecurity Framework that are referenced in the HIPAA Security Rule Crosswalk to NIST Cybersecurity Framework to satisfy this condition. We noted that relevant consensus-based standards and frameworks provide actors of varying sizes and resources with the flexibility needed to apply the right security controls to the right information systems at the right time to adequately address risk. Comments. One commenter expressed a concern that a small independent clinician practice that conducts a risk analysis consistent with its obligation under the HIPAA Security Rule may lack the technical expertise or other organizational capabilities needed to develop a customized security policy that appropriately applies consensusbased standards to each risk identified. This commenter recommended that we incorporate in § 171.203(d) regulation text a statement that these conditions apply ‘‘subject to the actor’s sophistication and technical capabilities.’’ Response. We appreciate the point highlighted by the commenter that, even within a given type of actor, specific individuals or organizations may have different operational contexts that include variations in their technical capabilities, expertise, and other resources. We do not, however, believe it is necessary to revise the regulation text as recommended in order to allow for assessment of whether the actor’s practices, such as its organizational security policy, were objectively reasonable in the circumstances in which they were implemented. Comments. A number of commenters requested that this exception allow providers to be proactive when VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 promoting the security of EHI rather than taking a reactive stance. Commenters contended that for novel threats, consensus-based standards and best practice guidance may not exist, making it impossible for an actor to meet the condition that the organizational security policy align with such standards. Response. With cybersecurity risk continuously evolving and the large number of threat sources active in the modern cybersecurity landscape, we recognize that actors must continuously monitor, assess, and respond to security risks that can themselves represent an impediment to EHI access, exchange, and use. Thus, this exception allows actors flexibility in selecting and tailoring their practices to mitigate specific security risks, provided each such practice otherwise meets the conditions of this exception, notably including that it be directly related and tailored to the specific security risk being addressed and be implemented in a consistent and non-discriminatory manner. We also note that best security practices in security mitigation can take a proactive as well as a reactive approach. A documented policy that provides explicit references to consensus-based standards and best practice guidance (such as the NIST Cybersecurity Framework) offers an objective and robust means by which we can evaluate the reasonableness of a particular security control for the purpose of the exception. We also recognize that, as a practical matter, some actors (such as small health care providers or those with limited resources) may have organizational security policies that are less robust or that otherwise fall short of the minimum conditions proposed. In such circumstances an actor can still benefit from this exception by demonstrating that the practice met the conditions of this exception for circumstances where no formal (organizational) security policy was implemented (see our discussion under ‘‘conditions applicable to practices that do not implement an organizational security policy’’ header, below within this section of this final rule preamble). Comments. A commenter noted that it could be a difficult for an actor to meet the standard to that the actor’s organizational policy on security must align with one or more consensus-based standards or best practice guidance because there are many emerging security threats that occur that are new and unexpected. Response. We do not believe that it would be difficult for an actor’s organizational policy on security to PO 00000 Frm 00224 Fmt 4701 Sfmt 4700 align with one or more consensus-based standards or best practice guidance documents. An actor’s written security policies should be based on consensusbased standards or best practice guidance documents which specifically address security risks and threats. A security policy should be clearly written and observed and refers to clear, comprehensive, and well-defined plans, rules, and practices that regulate access to an actor’s information systems and the EHI included in it. We believe a good policy serves as a prominent statement to the outside world about the actor’s commitment to security, and that such a policy should be based on objective consensus-based standards and should not be ad hoc or arbitrary. We do agree that there are emerging and novel security threats that occur, and in those situations which are not specifically addressed by an actor’s security policies, we included in the exception as proposed an alternative condition (proposed in § 171.203(e)) to address those situations in which those security risks can be addressed based on particularized facts and circumstances. Within the condition (§ 171.203(d)) applicable to practices that implement an organizational security policy, the actor’s policy must align with one or more applicable consensus-based standards or best practice guidance. The finalized condition is codified in § 171.203(d)(3). Paragraph (d)(4): Objective Timeframes and Other Parameters We proposed that the actor’s security policy must provide objective timeframes and common terminology used for identifying, responding to, and addressing security incidents. We noted examples of acceptable sources for development of a security response plan include: NIST Incident Response Procedure (https://csrc.nist.gov/ publications/detail/sp/800-61/rev-2/ final), US–CERT for interactions with government systems (https://www.uscert.gov/government-users/reportingrequirements), and ISC–CERT for critical infrastructure (https://icscert.us-cert.gov/) (84 FR 7537). As a point of clarification, we noted that an actor’s compliance with the HIPAA Security Rule (if applicable to the actor) would be relevant to, but not dispositive of, whether the actor’s policies and procedures were objectively reasonable for the purpose of the exception. We explained that an actor’s documentation of its security policies and procedures for compliance with the HIPAA Security Rule may not offer a sufficient basis to evaluate whether the actor’s security practices E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations unnecessarily interfere with access, exchange, or use of EHI. We further noted that a documented policy that provides explicit references to consensus-based standards and best practice guidance (such as the NIST Cybersecurity Framework) would offer an objective and robust means by which to evaluate the reasonableness of a particular security control for the purpose of the exception (84 FR 7537). Comments. We received no comments opposing this requirement of the condition applicable to practices that implement an organizational security policy. Response. Within the condition (§ 171.203(d)) applicable to practices that implement an organizational security policy, we have finalized in § 171.203(d)(4) the condition that the actor’s organizational security policy ‘‘provide objective timeframes and other parameters for identifying, responding to, and addressing security incidents.’’ We have finalized this condition as proposed. Condition Applicable to Practices That Do Not Implement an Organizational Security Policy In the Proposed Rule (84 FR 7537), we recognized that, as a practical matter, some actors (such as small health care providers or those with limited resources) may have organizational security policies that are less robust or that otherwise fall short of the minimum conditions proposed. We proposed that in these circumstances an actor could still benefit from the exception by demonstrating that the practice at issue was objectively reasonable under the circumstances, without regard to a formal policy. While we noted in the Proposed Rule (84 FR 7537) that we expect that most security practices engaged in by an actor will implement an organizational policy, we recognized that EHI security may present novel and unexpected threats that even a bestpractice risk assessment and security policy cannot anticipate. We noted that if a practice that does not implement an organizational policy is to qualify for this exception, however, it must meet certain conditions. We stated that the actor’s practice must, based on the particularized facts and circumstances, be necessary to mitigate the security risk. Importantly, we proposed that the actor would have to demonstrate that it considered reasonable and appropriate alternatives that could have reduced the likelihood of interference with access, exchange, or use of EHI and that there were no reasonable and appropriate alternatives that were less likely to VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 interfere with access, exchange or use of EHI. We noted (84 FR 7538) that an actor’s consideration of reasonable and appropriate alternatives will depend on the urgency and nature of the security threat in question. We further noted that we anticipate that an actor’s qualification for the exception would accommodate exigent circumstances. For example, we stated that we would not expect an actor to delay the implementation of a security practice in response to an emergency on the basis that it has not yet been able to initiate a fully realized risk assessment process. However, we also stated that we would expect that in these exigent circumstances, where the actor has implemented a security practice without first considering whether there were reasonable and appropriate alternatives that were less likely to interfere with access, exchange or use of EHI, the actor would expeditiously make any necessary changes to the practice based on the actor’s re-consideration of reasonable and appropriate alternatives that are less likely to interfere with access, exchange or use of EHI. We proposed that the exception would apply in these instances so long as an actor takes these steps and complies with all other applicable conditions. Comments. Commenters stated that the absence of a policy means that one is dealing with an unexpected and evolving situation as best one can (e.g., a sustained and sophisticated attack). Commenters suggested we create a further ‘‘safety valve’’ for short-lived actions that are taken in good faith while a situation is being evaluated and understood and that we should recognize the valid need to allow for due diligence as distinct from simply delaying access and such due diligence should not need the Security Exception to avoid implicating or being judged as engaged in information blocking. Commenters stated this is a core need for small medical practices with limited resources. Response. We anticipate that the exception’s conditions as proposed and finalized would accommodate exigent circumstances. For example, we would not expect an actor to delay the implementation of a security measure in response to an emergency such as a cyberattack simply because it has not yet been able to implement a fully realized risk assessment process. We believe the exception as posed does provide a ‘‘safety valve’’ for situations where an actor in direct response to exigent circumstances may have implemented in good faith a security practice without first considering PO 00000 Frm 00225 Fmt 4701 Sfmt 4700 25865 whether there were reasonable and appropriate alternatives that were less likely to interfere with access, exchange, or use of EHI, but where the initialresponse practice may be in place for only a short while. Presumably, such initial-response practices are in place for only a short time precisely because, upon more fully identifying and assessing current risks in context or as follow-up to the exigent circumstances, the actor will have concluded it carried a greater than necessary burden— including the burden of interference with access, exchange or use of EHI— and consequently modified or replaced its initial-response practice with a less onerous alternative that was reasonable and appropriately tailored to the specific risk addressed. Comments. A commenter agreed that this exception allows for an actor to maintain flexibility in its approach to address security incidents or threats. Response. We agree that this exception provides an actor the flexibility to address security incidents or threats based on particularized facts and circumstances which are necessary to mitigate the security risk to EHI, provided that there are no reasonable and appropriate alternatives to the practice that address the security risk that are less likely to interfere with, prevent, or materially discourage access, exchange or use of EHI. We have finalized as proposed, in § 171.203(e), the requirements applicable to practices that meet the threshold conditions established in §§ 171.203(a), (b) and (c) and that do not implement an organizational security policy. d. Infeasibility Exception—When will an actor’s practice of not fulfilling a request to access, exchange, or use electronic health information due to the infeasibility of the request not be considered information blocking? We proposed in the Proposed Rule in § 171.205 (84 FR 7542 and 7603) to establish an exception to the information blocking provision that would permit an actor to decline to provide access, exchange, or use of EHI in a manner that is infeasible, provided certain conditions are met. We proposed that in certain circumstances legitimate practical challenges beyond an actor’s control may limit its ability to comply with requests for access, exchange, or use of EHI. In some cases, the actor may not have—and may be unable to obtain—the requisite technological capabilities, legal rights, financial resources, or other means necessary to provide a particular form of access, exchange, or use. In other cases, the actor may be able to comply with the E:\FR\FM\01MYR3.SGM 01MYR3 25866 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations request, but only by incurring costs or other burdens that are clearly unreasonable under the circumstances (84 FR 7542). We proposed that the exception would permit an actor to decline a request in certain narrowly-defined circumstances when doing so would be infeasible (or impossible) and when the actor otherwise did all that it reasonably could do under the circumstances to facilitate alternative means of accessing, exchanging, and using the EHI. We proposed a structured, fact-based approach for determining whether a request was ‘‘infeasible’’ within the meaning of the exception. We noted that this approach would be limited to a consideration of factors specifically delineated in the exception and that the infeasibility inquiry would focus on the immediate and direct financial and operational challenges of facilitating access, exchange, and use, as distinguished from more remote, indirect, or speculative types of injuries (84 FR 7542). We encouraged comment on these and other aspects of this proposal (84 FR 7542). Comments. We received several comments in general support of the proposed exception. Response. We thank commenters for their support of our proposal. We note that we have changed the title of this exception from ‘‘Exception— Responding to requests that are infeasible’’ (84 FR 7603) to ‘‘When will an actor’s practice of not fulfilling a request to access, exchange, or use electronic health information due to the infeasibility of the request not be considered information blocking?’’ Throughout this final rule preamble, we use ‘‘Infeasibility Exception’’ as a short form of this title, for ease of reference. As stated in Section VIII.D of this final rule preamble, we have changed the titles of all of the exceptions to questions to improve clarity. We have also edited the wording of the introductory text in § 171.204 as finalized, in comparison to that proposed (84 FR 7603 and 7604), so that it is consistent with the finalized title of § 171.204. We believe these conforming changes in wording of the introductory text also improve clarity in this section. i. Infeasibility of the Request To qualify for the exception, we proposed that compliance with the request for access, exchange, or use of EHI must be infeasible. We proposed a two-step test that an actor would need to meet in order to demonstrate that a request was infeasible. Under the first step of the infeasibility test, we VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 proposed that the actor would need to show that complying with the particular request in the manner requested would impose a substantial burden on the actor. Second, we proposed that the actor must also demonstrate that requiring it to comply with the request—and thus to assume the substantial burden demonstrated under the first part of the test—would have been plainly unreasonable under the circumstances (84 FR 7542 and 7543). We proposed that whether it would have been plainly unreasonable for the actor to assume the burden of providing access, exchange, or use will be highly dependent on the particular facts and circumstances. We proposed to rely primarily on the following key factors enumerated in proposed § 171.205(a)(1): • The type of EHI and the purposes for which it may be needed; • The cost to the actor of complying with the request in the manner requested; • The financial, technical, and other resources available to the actor; • Whether the actor provides comparable access, exchange, or use to itself or to its customers, suppliers, partners, and other persons with whom it has a business relationship; • Whether the actor owns or has control over a predominant technology, platform, health information exchange, or health information network through which EHI is accessed or exchanged; • Whether the actor maintains ePHI on behalf of a covered entity, as defined in 45 CFR 160.103, or maintains EHI on behalf of the requestor or another person whose access, exchange, or use of EHI will be enabled or facilitated by the actor’s compliance with the request; • Whether the requestor and other relevant persons can reasonably access, exchange, or use the information from other sources or through other means; and • The additional cost and burden to the requestor and other relevant persons of relying on alternative means of access, exchange, or use (84 FR 7543). We acknowledged in the Proposed Rule that there may be situations when complying with a request for access, exchange, or use of EHI would be considered infeasible because an actor is unable to provide such access, exchange, or use due to unforeseeable or unavoidable circumstances that are outside the actor’s control. As examples, we stated that an actor could seek coverage under this exception if it is unable to provide access, exchange, or use of EHI due to a natural disaster (such as a hurricane, tornado or earthquake) or war. We emphasized that, consistent with the requirements PO 00000 Frm 00226 Fmt 4701 Sfmt 4700 for demonstrating that practices meet all the conditions of a proposed exception, the actor would need to produce evidence and ultimately prove that complying with the request for access, exchange, or use of EHI in the manner requested would have imposed a clearly unreasonable burden on the actor under the circumstances (84 FR 7543 and 7544). We stated that certain circumstances would not constitute a burden to the actor for purposes of this exception and would not be considered in determining whether complying with a request would have been infeasible. We proposed that it would not be considered a burden if providing the requested access, exchange, or use of EHI in the manner requested would have (1) facilitated competition with the actor; or (2) prevented the actor from charging a fee (84 FR 7544). We requested comment on the proposed approach for determining whether a request is ‘‘infeasible’’ within the meaning of the exception. We encouraged comment on, among other issues, whether the factors we specifically delineated properly focus the infeasibility inquiry; whether our approach to weighing these factors is appropriate; and whether there are additional burdens, distinct from the immediate and direct financial and operational challenges, that are similarly concrete and should be considered under the fact-based rubric of the exception (84 FR 7544). Comments. We received several comments in support of our proposed approach for determining whether a request was ‘‘infeasible.’’ We also received several comments that expressed various concerns and suggestions for improvement regarding our proposals. Several commenters expressed concern that the language in the proposed exception, particularly regarding the ‘‘infeasibility’’ of a request, was too vague or ambiguous and that the inclusion of undefined terms could create uncertainty for actors regarding whether they meet the conditions under the exception. Commenters noted that such uncertainty could dissuade actors from taking advantage of the exception. Commenters requested additional examples and guidance to clarify the conditions under the exception. A few commenters questioned whether it would be considered information blocking if they could not segment EHI to respond to a request for a patient’s EHI (e.g., when patient consent to share EHI subject to 42 CFR part 2 or a State privacy law has not been provided). These commenters E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations expressed concern about the ability of their technology to segment a patient’s EHI. Response. We thank commenters for their support of our proposed approach for determining whether a request is ‘‘infeasible,’’ as well as the constructive feedback. We agree with commenters that each exception should clearly explain the conduct that would and would not be covered by each exception. We also reiterate that failure to meet the exception does not mean that an actor’s practice related to infeasible requests necessarily meets the information blocking definition. However, as we noted in the Proposed Rule, the broad definition of information blocking in the Cures Act means that any practice that is likely to interfere with the access, exchange, or use of EHI implicates the information blocking provision. As a result, practices that do not meet the exception will have to be assessed on a case-bycase basis to determine, for example, the actor’s intent and whether the practice rises to the level of an interference. We have restructured this exception to provide further clarity. Toward that end, we have eliminated the proposed two-step test that an actor would need to meet in order to demonstrate that a request is infeasible (84 FR 7542 and 7543). Instead, we have finalized a revised framework for this exception that provides two new conditions that must be met in order for an actor to be covered by the exception and a revised condition that provides an exception for those actors unable to meet the new Content and Manner Exception. When the practice by an actor meets one of the conditions in § 171.204(a) and the actor meets the requirements for responding to requests in § 171.204(b) (which are discussed in more detail below), the actor is not required to fulfill a request for access, exchange, or use of EHI due to the infeasibility of the request. The first new condition is that the actor cannot fulfill the request for access, exchange, or use of EHI due to events beyond the actor’s control, namely a natural or human-made disaster, public health emergency, public safety incident, war, terrorist attack, civil insurrection, strike or other labor unrest, telecommunication or internet service interruption, or act of military, civil or regulatory authority (§ 171.204(a)(1)). This is consistent with our statements in the Proposed Rule describing events that an actor could seek coverage for under this exception if it is was unable to provide access, exchange, or use of EHI due to events beyond its control (84 FR 7543). This new condition makes clear that such VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 events are all that are necessary to meet this exception and no consideration of factors must be demonstrated and proven. The second new condition is that the actor is not required to fulfill a request for access, exchange, or use of EHI if the actor cannot unambiguously segment the requested EHI from other EHI: (1) Because of a patient’s preference or because the EHI cannot be made available by law; or (2) because the EHI is withheld in accordance with the Harm Exception in § 171.201 (§ 171.204(a)(2)). For instance, an actor will be covered under this condition if the actor could not fulfill a request to access, exchange, or use EHI because the requested EHI could not be unambiguously segmented from patient records created by federally assisted programs (i.e., Part 2 Programs) for the treatment of substance use disorder (and covered by 42 CFR part 2) or from records that the patient has expressed a preference not to disclose. The revised condition in § 171.204(a)(3)(i) specifically aligns with our proposal (84 FR 7543) in that an actor would not be required to fulfill a request for access, exchange, or use of EHI if the actor demonstrates, through contemporaneous written record or other documentation, its consideration of the following factors in a consistent and non-discriminatory manner, prior to responding to the request pursuant to paragraph (b) of this section, that led to its determination that complying with the request would be infeasible under the circumstances: • The type of EHI and the purposes for which it may be needed; • The cost to the actor of complying with the request in the manner requested; • The financial and technical resources available to the actor; • Whether the actor’s practice is nondiscriminatory and the actor provides the same access, exchange, or use of EHI to its companies or to its customers, suppliers, partners, and other persons with whom it has a business relationship; • Whether the actor owns or has control over a predominant technology, platform, health information exchange, or health information network through which electronic health information is accessed or exchanged; and • Why the actor was unable to provide access, exchange, or use of EHI consistent with the Content and Manner Exception in § 171.301. We note that the above provisions align with our proposal in the Proposed Rule that the actor must provide the requestor with a detailed written PO 00000 Frm 00227 Fmt 4701 Sfmt 4700 25867 explanation of the reasons why the actor cannot accommodate the request (84 FR 7544). The difference in the final language is that we have not specified the level of detail required in the written record or other documentation, and have clarified that such a written record or other documentation must be contemporaneous so that an actor cannot use a post hoc rationalization for claiming the request was infeasible under circumstances that were not considered at the time the request was received. We proposed in the Proposed Rule (84 FR 7544) and have finalized in this final rule in § 171.204(a)(3)(ii) the following factors that may not be considered in the determination: (1) Whether the manner requested would have facilitated competition with the actor; and (2) whether the manner requested prevented the actor from charging a fee or resulted in a reduced fee. We note that we have clarified in the final rule that charging ‘‘a’’ fee includes a reduced fee as well. Our rationale for carving out these considerations is that the purpose of the Infeasibility Exception is to provide coverage to actors who face legitimate practical challenges beyond their control that limit their ability to comply with requests to access, exchange, or use EHI. We do not believe that whether the manner requested would have facilitated competition with the actor or prevented the actor from charging a fee or resulted in a reduced fee qualify as the type of legitimate practical challenges beyond the actor’s control that should be covered by the exception. Regarding the consideration of fees, the actor is able to charge fees for costs reasonably incurred, with a reasonable profit margin, for accessing, exchanging, or using EHI under the Fees Exception in § 171.302. We have finalized in § 171.204(a)(3)(i)(F) the criterion that considers an actor’s ability to provide access, exchange, and use of EHI consistent with the Content and Manner Exception in § 171.301 in order to assure alignment of this exception with the Content and Manner Exception. We further discuss the Content and Manner Exception in section VIII.D.2.a of this final rule. We did not finalize three factors that were proposed in the context of the infeasibility analysis: (1) Whether the actor maintains electronic protected health information on behalf of a covered entity, as defined in 45 CFR 160.103, or maintains electronic health information on behalf of the requestor or another person whose access, exchange, or use of electronic health information will be enabled or facilitated by the E:\FR\FM\01MYR3.SGM 01MYR3 25868 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations actor’s compliance with the request; (2) whether the requestor and other relevant persons can reasonably access, exchange, or use the electronic health information from other sources or through other means; and (3) the additional cost and burden to the requestor and other relevant persons of relying on alternative means of access, exchange, or use (see the proposed factors at 84 FR 7543). We removed the first factor because it was confusing and was not a strong indicator of whether a request was infeasible. We removed the second and third factors because we proposed them with the intention that they would be indicators of whether the relative burden on the requestor was greater than that on the actor. However, we have shifted away from this relative burden analysis in the final rule. To illustrate, consideration does not have to be given as to whether other means are available for access, exchange, or use of EHI or the cost to the requestor for that alternative means because of the new Content and Manner Exception (§ 171.301) and its relationship to this exception. Comments. One commenter recommended that claims of infeasibility based on the classification of EHI as proprietary and claims of infeasibility rooted in discriminatory practices should not be included in the exception, as they do not support ONC’s policy goals of promoting competition and innovation in health IT and ultimately disadvantage customers and patients. Response. We agree with the commenter that claiming the EHI itself as proprietary is not a justification for claiming this exception. As discussed in more detail in the Fees Exception, we emphasize that almost all of the patient EHI found in the U.S. health care system has been generated and paid for with either public dollars through Federal programs, including Medicare and Medicaid, or directly subsidized through the tax preferences for employer-based insurance. We explained in the Proposed Rule how use of IP rights for interoperability elements can serve to interfere with access, exchange, and use of EHI. We also explained in the Proposed Rule that the mere fact that EHI is stored in a proprietary format or has been combined with confidential or proprietary information does not alter the actor’s obligations under the information blocking provision to facilitate access, exchange, and use of the EHI in response to a request (84 FR 7517). We emphasize that actors who control proprietary interoperability elements and demand royalties or VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 license terms from competitors or other persons who are technologically dependent on the use of those interoperability elements would also be subject to the information blocking provision, unless they meet all conditions of the Licensing Exception (§ 171.303). We note, however, that actors may seek coverage under the Infeasibility Exception (§ 171.204) or Content and Manner Exception (§ 171.301) for certain issues related to IP. For instance, an actor may claim to be unable to fulfill a request to access, exchange, or use EHI because the actor is not the owner of the IP rights and lacks requisite authority to provide the requested access, exchange, or use of EHI. In such a situation, the actor could claim that the request is infeasible under the circumstances (see § 171.204(a)(3)). Under § 171.204(a)(3)(i)(E), one factor that can be considered when determining whether a practice is infeasible under the circumstances is whether the actor owns or has control over a predominant technology, platform, HIE, or HIN through which EHI is accessed or exchanged. The actor could also seek coverage under the Content and Manner Exception. Under § 171.301(b)(2), an actor may provide the EHI requested in an alternative manner if responding to the request in the manner requested would require the actor to license IP. As we have explained throughout this final rule, each information blocking case, and whether the actor’s practice would meet all conditions of an exception, will depend on its own unique facts and circumstances. We refer readers to the detailed discussions regarding the Content and Manner Exception (VIII.D.2.a) and Licensing Exception (VIII.D.2.c) in this preamble. We also agree with the commenter that infeasibility rooted in discriminatory practices should not be a justification for claiming this exception. It was never our intention to allow such conduct to be covered by this exception. In response to this comment, we have clarified the factor in § 171.204(a)(3)(i)(D) to explicitly state that one consideration for determining whether a request is infeasible under the circumstances is whether the actor’s practice is non-discriminatory and the actor provides the same access, exchange, or use to its companies or to its customers, suppliers, partners, and other persons with whom it has a business relationship. Comments. Some commenters expressed concern that this exception does not fully consider potential conflicts between valid contracts, such as business associate agreements PO 00000 Frm 00228 Fmt 4701 Sfmt 4700 (BAAs), and subsequent requests for access, exchange, and use of EHI that are inconsistent with those contracts. Commenters urged ONC to specify whether an actor can refuse a request to access, exchange, or use EHI as being infeasible due to such contractual restrictions and obligations. Response. We appreciate these comments. We reiterate, as we explained in the Proposed Rule, that one means by which actors restrict access, exchange, or use of EHI is through formal restrictions, such as contract or license terms, EHI sharing policies, organizational policies or procedures, or other instruments or documents that set forth requirements related to EHI or health IT (84 FR 7518). We emphasize that such restrictions are one of the forms of information blocking the Cures Act and our final rule seek to address. We refer readers to the discussion of ‘‘Practices that May Implicate the Information Blocking Provision’’ in section VIII.C.6 of this final rule for a more detailed discussion of when contracts and agreements will be considered an ‘‘interference’’ with access, exchange, or use of EHI. Comments. A few commenters encouraged ONC to add a provision to the exception that would enable entities who have joined Trusted Exchange Framework and Common Agreement (TEFCA) to claim the Infeasibility Exception if a requestor or third party refused to join the TEFCA and instead demanded a one-off interface. Response. We appreciate these comments, but have decided not to adopt this suggested addition at this time. The TEFCA is still new, the Common Agreement is not yet finalized, and it would be premature to establish special treatment for entities that join the TEFCA. We may reconsider this suggestion at a later date. We note that this does not necessarily mean that actors in these situations will not be covered by the exception, as they could still show that a request for a one-off interface is infeasible under the circumstances (see § 171.204(a)(3)). However, not joining TEFCA is not de facto proof of infeasibility. We note that in addition to seeking coverage for infeasibility under the circumstances, the actor could also seek coverage from: (1) The Content and Manner Exception if the actor could not fulfill request to access, exchange, or use EHI in the manner requested (via a one-off interface), but could fulfill the request through an acceptable alternative manner (see § 171.301(b)); or (2) the Fees Exception or Licensing Exception if the actor chooses to provide the oneoff interface as requested, but charges E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations fees/royalties related to developing or licensing the one-off interface, which could include fees or royalties that result in a reasonable profit margin (see § 171.302 and 303). ii. Responding to Requests—Timely and Written Responses We proposed, in addition to demonstrating that a particular request was infeasible, that an actor would have to show that it satisfied additional conditions. Specifically, we proposed that to qualify for the exception, the actor must have timely responded to all requests relating to access, exchange, and use of EHI. Further, we proposed that for any request that the actor claims was infeasible, the actor must have provided the requestor with a detailed written explanation of the reasons why the actor could not accommodate the request. We proposed that the actor’s failure to meet any of these conditions would disqualify the actor from the exception and could also be evidence that the actor knew that it was engaging in practices that contravened the information blocking provision (84 FR 7544). We proposed that the duty to timely respond and provide reasonable cooperation would necessarily be assessed from the standpoint of what is objectively reasonable for an individual or entity in the actor’s position. We emphasized that we will look at the specific facts and circumstances of each case to determine whether the practice is objectively reasonable (84 FR 7544). We encouraged comment on these conditions and related considerations. Specifically, we requested comment regarding potential obstacles to satisfying these conditions and improvements we could make to the proposed process (84 FR 7544). Comments. Many commenters, primarily provider organizations, expressed concern that the proposed response requirements could create burden on providers, hospitals, and clinical data registries. Commenters explained that each time a requester makes a request that an actor deems infeasible, the actor would be required to timely respond and provide a detailed written explanation of its reasons for denial. A commenter also recommended that, in the event a request is infeasible and a written explanation is necessary, that such explanation need not contain detailed technical information. Response. We appreciate these comments and have revised the response condition in this exception to address commenters’ concerns and establish a set timeframe for responding VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 to requests (§ 171.204(b)). We removed the use of the term ‘‘timely’’ and restructured the provision to more clearly explain ONC’s expectations for responding to requests. Under the response condition, if an actor does not fulfill a request for access, exchange, or use of EHI for any of the reasons in § 171.204(a), the actor must, within ten business days of receipt of the request, provide to the requestor in writing the reason why meeting the request was infeasible. Our decision to finalize a 10business day response timeframe was informed by our knowledge of the industry, stakeholder commenters, and a desire to create consistent timeframes across exceptions, such as alignment with the 10-business day response timeframe in the Licensing Exception (see § 171.303(a)(1)). In instances when an actor is unable to respond within 10 business days, the actor may be unable to avail themselves of the requirements of the exception. As part of an information blocking investigation, ONC and OIG may consider documentation or other writings maintained by the actor around the time of the request that provide evidence of the actor’s intent. Additional documentation would not permit the actor to avail themselves of this exception, but ONC or OIG could examine the actor’s intent using this documentation when assessing the information blocking claim. We have decided not to specify the level of detail or specific type of information (such as technical information) that must be contained in a written response. We believe it would be imprudent to create such boundaries for the written response given that the facts and circumstances will vary significantly from case to case. Instead, the finalized provision allows actors to determine what content is necessary to include in the written response in order to explain the reason the request is infeasible. We note that we have revised the requirement for the written response from the Proposed Rule. In the Proposed Rule an actor was required to provide a ‘‘detailed written explanation of the reasons why the actor cannot accommodate the request’’ (84 FR 7544) whereas we have finalized the requirement that the actor must provide ‘‘in writing the reason(s) why the request is infeasible’’ (§ 171.204(b)). We believe this revised requirement will alleviate burden on actors by providing them discretion to decide the appropriate level of detail to include in their written responses. It also places a greater emphasis on establishing that the request was infeasible to meet. PO 00000 Frm 00229 Fmt 4701 Sfmt 4700 25869 Reasonable Alternative We proposed that, if the actor could not meet the request for EHI, the actor must work with the requesting party in a timely manner to identify and provide a reasonable alternative means of accessing, exchanging, or using the EHI, as applicable (84 FR 7544). Comments. Commenters, primarily provider organizations, were supportive of the proposed requirement to provide a reasonable alternative. We also received a range of comments related to improving ONC’s proposals regarding the provision of a reasonable alternative, including comments requesting more examples and guidance as to what would be considered a ‘‘reasonable alternative.’’ Another commenter requested that ONC provide greater deference to the actor to determine the appropriate format/functionality for sharing the requested EHI when a comparable functionality, distinct from the format/functionality requested, is made available and enables access, exchange, or use of EHI on equivalent terms. One commenter requested ONC place guardrails around requests for information sharing, such that if an actor is able to share data in an industry-accepted format, the requesting organization cannot make an information blocking claim if that format does not meet their preferred, specific data transmission standard. A few commenters requested that ONC remove the requirement that an actor both ‘‘identify’’ and ‘‘provide’’ a reasonable alternative means of accessing EHI, and instead require only that an actor ‘‘identify’’ a reasonable alternative. One commenter requested that ONC clarify that the proposed requirement to identify a reasonable alternative means of accessing, exchanging, or using EHI is only necessary where any such alternative exists. The commenter noted that there could be instances in which no reasonable alternative exists, and the request is in effect impossible to comply with. One commenter requested that ONC clarify that, regarding the provision of a reasonable alternative, an actor must only work with the requestor in a timely manner to identify and provide a reasonable alternative means of accessing, exchanging, or using the EHI as applicable. One commenter expressed concern that this exception could be used to send patients to other sources to get their health information because that approach would be less burdensome than providing the information to the patient directly. The commenter recommended that ONC E:\FR\FM\01MYR3.SGM 01MYR3 25870 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations preclude the use of this exception for patient access requests. Some provider, hospital, and clinical data registry commenters expressed concern regarding the potential burden on the actor related to identifying and providing a reasonable alternative means of accessing, exchanging or using the EHI. Other commenters, primarily health IT developers, expressed concern regarding the potential impact and burden on health IT developers, HINs, and HIEs of complying with a request to access, exchange, or use EHI, especially when the request requires custom development. Commenters explained that if a system, even a large system, were required to comply with many custom forms of integration, collectively they would cause a significant burden to both business and budget. Some commenters also noted that the proposed exception seems imbalanced, favoring the requester of the EHI over the actor providing the EHI. Response. We appreciate the support for our proposal, as well as the array of constructive comments. We first note that, in many instances, the exceptions, including the finalized third condition of this exception (§ 171.204(a)(3)), favor the request for EHI because the overall information blocking paradigm is to eliminate interference with access, exchange, and use of EHI. We have removed the ‘‘reasonable alternative’’ requirement from this exception and instead have finalized the new Content and Manner Exception in § 171.301 that establishes the content (i.e., the EHI) required in the response and the manner in which the actor may respond to the request for access, exchange, or use of EHI. This new exception improves on the ‘‘reasonable alternative’’ requirement in the Proposed Rule by clarifying actors’ obligations for providing access, exchange, or use of EHI in all situations and creating actionable technical procedures. We believe the Content and Manner Exception in § 171.301 is responsive to the above comments, will reduce burden on actors, and is principled and tailored in a manner that will promote basic fairness and encourage parties to work cooperatively to implement efficient solutions to interoperability challenges. We refer readers to the Content and Manner Exception and the discussion of such exception in this preamble in sections VIII.C and VIII.D.2.a. With regard to the comment suggesting that no reasonable alternative may exist, we believe that the new exception will address this concern. However, if the actor still could not meet the new exception, the actor could avail itself of the third condition in this VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 exception and demonstrate that the request was infeasible under the circumstances. e. Health IT Performance Exception— When will an actor’s practice that is implemented to maintain or improve health IT performance and that is likely to interfere with the access, exchange, or use of electronic health information not be considered information blocking? We proposed to establish an exception to the information blocking provision for certain practices that are reasonable and necessary to maintain and improve the overall performance of health IT, provided certain conditions are met (84 FR 7550). We stated in the Proposed Rule that this exception would apply to the unavailability of health IT occasioned by both planned and unplanned maintenance and improvement. We noted that planned maintenance or improvements are often carried out at regular intervals and address routine repairs, updates, or new releases while unplanned maintenance or improvements typically respond to urgent or time-sensitive issues. We proposed to codify the exception’s regulation text in § 171.207 (84 FR 7605). To ensure that the actor’s practice of making health IT, and in turn EHI, unavailable for the purpose of carrying out maintenance or improvements is reasonable and necessary, we proposed conditions that would need to be satisfied at all relevant times a practice to be recognized as excepted from the definition of information blocking under this proposed exception. Comments. We received numerous comments supporting the establishment of this exception. We did not receive comments opposing the establishment of this exception. Many of the comments received requested clarification or recommended revisions to specific points within the proposed exception. The comments requesting clarification or making recommendations are summarized below. Response. We appreciate the feedback. We have established the proposed exception with modifications from the regulation text proposed in the Proposed Rule. We have retitled the exception from ‘‘Exception— Maintaining and improving health IT performance’’ (proposed § 171.207, at 84 FR 7605) to ‘‘Health IT Performance Exception—When will a practice that is implemented to maintain or improve health IT performance and that is likely to interfere with the access, exchange, or use of electronic health information not be considered information blocking?’’ PO 00000 Frm 00230 Fmt 4701 Sfmt 4700 (§ 171.205 as finalized). For ease of reference and discussion, we use ‘‘Health IT Performance Exception’’ as a short title for the finalized exception throughout this preamble. Unless we are directly quoting the Proposed Rule or accurate re-statement of Proposed Rule content requires otherwise, we use ‘‘Health IT Performance Exception’’ in this section of this preamble when discussing this exception as proposed as well as the finalized exception. As stated in section VIII.D of this preamble (under the heading ‘‘modifications’’), we changed the titles of all of the information blocking exceptions to questions for additional clarity. We revised the wording of the finalized § 171.205 introductory text in comparison with that proposed in § 171.207 so that it is consistent with the finalized title of the exception (and § 171.205). Consistent with the restructuring of part 171 that is also described in section VIII.D of this preamble (under the heading ‘‘modifications’’), this exception has been redesignated from § 171.207 in the Proposed Rule (84 FR 7605) to § 171.205 as finalized. Commenters’ requests for clarification and suggested revisions on specific points are discussed below. Other revisions we have made to the regulation text finalized in § 171.205 in comparison to that proposed in § 171.207 are also discussed below. Unavailability of Health IT Must Be for No Longer Than Necessary To Achieve the Maintenance or Improvements for Which the Health IT Was Made Unavailable We proposed that any unavailability of health IT must be for a period of time no longer than necessary to achieve the maintenance or improvement purpose for which the health IT is made unavailable or its performance degraded (84 FR 7550 and 7551). We provided as an illustrative example that a health IT developer of certified health IT that has the right under its contract with a large health system to take its system offline for four hours each month to conduct routine maintenance would not qualify for this exception if an information blocking claim was made about a period of unavailability during which no maintenance was performed. Comments. We received comments from a variety of stakeholders on the proposed requirement that any unavailability of health IT would need to be for a period of time no longer than necessary to achieve the maintenance or improvements for which the health IT was made unavailable. Some commenters agreed that temporary unavailability of health IT ‘‘for a period E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations of time no longer than necessary’’ created an appropriate standard for both planned and unplanned downtimes. Other commenters indicated they did not support this standard, stating concerns that the requirement that the health IT be made unavailable ‘‘for a period of time no longer than necessary’’ would be too difficult to assess without more specific criteria such as defined time periods. Some commenters suggested we modify our language to allow for greater flexibility in maintenance downtime situations. Response. We have finalized within the condition for maintenance and improvements to health IT in § 171.205(a)(1) the requirement proposed in § 171.201(a)(1), with modifications to the regulation text that are described below (immediately preceding the preamble discussion of the next subparagraph of § 171.205(a)). When an actor choosing to conform its practice to the health IT performance exception implements a practice that makes health IT under that actor’s control temporarily unavailable, or temporarily degrades the performance of health IT, in order to perform maintenance or improvements to the health IT, the actor’s practice must be (§ 171.205(a)(1)) implemented for a period of time no longer than necessary to complete the maintenance or improvements for which the health IT was made unavailable or the health IT’s performance degraded. We believe that establishing specific timeframes applicable to various maintenance and improvement purposes would be impractical at this time due to the wide variety of system architectures and operational contexts in which health IT to which part 171 is applicable is currently, or may in the future be, deployed. We have finalized the ‘‘no longer than necessary’’ requirement of this condition, which we believe provides substantial flexibility to consider the particular circumstances of each case, and a variety of factors including but not limited to the service level agreements in place for the specific health IT at issue, the type of maintenance or improvements, the technical resources available to the actor, or best practices or other industry benchmarks relevant to the particular maintenance or improvements. Comments. Noting our use of the phrase ‘‘as soon as possible’’ in the Proposed Rule’s preamble discussion of this condition (84 FR 7551), specifically in an example where an actor takes health IT offline in response to a software failure, some commenters requested we clarify how we interpret that phrase. A commenter described VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 practices such as procedures that phased restoration of full functionality across a complex system, to manage system loads or confirm the original failure is fully resolved, and asked if we would interpret this exception’s proposed conditions as excluding such procedures. Some comments from members of the developer community suggested that we modify our proposed language from ‘‘for a period of time no longer than necessary’’ to ‘‘a reasonable period of time.’’ Response. The ‘‘no longer than necessary’’ standard provides actors substantial flexibility to address the particular circumstances of each case, allowing for consideration of a variety of factors including but not limited to the service level agreements in place for the specific health IT at issue, the type of maintenance or improvements, the technical resources available to the actor, or best practices or other industry benchmarks relevant to the particular maintenance or improvements. In response to comments requesting we clarify how we interpret ‘‘as soon as possible’’ and how it would apply to specific types of practices, we first ask readers to note that in this final rule preamble for the Health IT Performance Exception we use the phrase ‘‘as soon as possible’’ only in summarizing and responding to these comments. We see how this phrase could be read as implying that we might uniformly expect restarts in a shorter time or more abrupt manner than might be consistent with best practices for ensuring the affected component(s) or production environment are restored to stable, reliable operating status. We do not, however, interpret the finalized condition as uniformly mandating immediate full restarts of any or every system. In determining whether an actor’s practice made health IT under its control unavailable, or degraded the health IT’s performance, for longer than was necessary in the particular circumstances, we would consider a variety of factors such as (but not limited to) the service level agreements in place for the specific health IT at issue, the type of maintenance or improvements, the technical resources available to the actor, or best practices or other industry benchmarks relevant to the particular maintenance or improvements. Comments. Several commenters recommended that this exception apply to downtime necessary for testing whether a maintenance or improvement activity, such as deploying a new or updated application into a particular production environment for the first time, will operate in that environment PO 00000 Frm 00231 Fmt 4701 Sfmt 4700 25871 as it is intended to operate or without adversely affecting other functions of the system. Response. We interpret ‘‘minimum time necessary’’ to complete a maintenance or improvement purpose, objective, or activity to include reasonable and necessary practices, such as confirmatory testing and phased restart protocols, to ensure that a newly deployed or newly updated application functions in a particular production environment as it is intended to perform and does not adversely affect system stability or the performance of critical functions or components of that system. In determining whether an actor’s practice affected health IT’s availability or performance for longer than was necessary in the particular circumstances, we reiterate that we would consider a variety of factors such as (but not limited to) the service level agreements in place for the specific health IT at issue, the type of maintenance or improvements, the technical resources available to the actor, or best practices or other industry benchmarks relevant to the particular maintenance or improvements. Comments. Some commenters recommended that we recognize there may be circumstances where an instance of downtime may exceed service level agreements but still be no longer than necessary to address the issue. These commenters suggested such violations of service level agreements and other provisions of contracts between the parties should remain to be resolved through contractual mechanisms and not automatically considered information blocking on basis of exceeding the terms of the agreements. One commenter suggested actors who make their health IT temporarily unavailable under this exception be held to industry standards for necessary timeframes to complete any maintenance or improvements. Response. For purposes of determining whether a period of health IT unavailability or performance degradation is (or was) no longer than necessary to accomplish its purpose, we note that service level agreements and industry practices would be relevant information to be considered but not necessarily dispositive. For example, a period of health IT unavailability or performance degradation could be within the parameters of applicable service level agreements but still be longer than necessary to accomplish the maintenance or improvement purpose for the health IT was made unavailable or its performance degraded. For a contrasting example, a period of health IT unavailability or performance E:\FR\FM\01MYR3.SGM 01MYR3 25872 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations degradation could be outside the parameters of applicable service level agreements—a contractual matter for the parties to resolve through other appropriate channels—without being ‘‘longer than necessary’’ in the totality of applicable circumstances and, therefore, without necessarily constituting information blocking as defined in § 171.103. Comments. Several commenters requested we clarify whether this exception would apply to practices that degrade some aspects of a health IT system’s performance, without making it entirely unavailable, for purposes of conducting maintenance and improvement of the health IT system or some of its components. Response. We appreciate the feedback. We agree that there may be circumstances where the minimum disruption of an overall health IT system’s availability needed to accomplish particular maintenance or improvement purposes may be less than total. We do not intend that this exception would apply only to complete unavailability of health IT. We intend the exception to apply to reasonable and necessary practices that disrupt EHI access, exchange, or use not only for the shortest time but also to the least extent practicable to accomplish their specific maintenance or improvement purposes under the particular circumstances. Accordingly, we have modified the language of § 171.205(a)(1) as finalized to expressly include temporary performance degradation as well as temporary unavailability of health IT affected by maintenance and improvement practices. Discussion of Finalized Text of § 171.205(a)(1) The regulation text finalized in § 171.205(a)(1) has been modified in comparison to the regulation text proposed in § 171.207(a)(1) in several ways. The finalized regulation text expressly includes ‘‘or the health IT’s performance degraded,’’ for the reasons stated in response to comments (above). In the text of this provision, finalized at § 171.205(a)(1), we have also replaced the verb ‘‘to achieve’’ with the verb ‘‘to complete.’’ Reflecting on the comments received, we have reviewed the dictionary definition of ‘‘achieve’’ and now believe that our use of ‘‘achieve’’ in the regulation text proposed in in § 171.207(a)(1) may have contributed to commenters’ concerns about whether we would interpret time for confirmatory testing of system performance or phased restart protocols as falling within the ‘‘minimum time VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 necessary’’ for any particular maintenance or upgrade. We believe ‘‘complete’’ less ambiguously expresses our intent that this requirement of this condition encompasses the minimum time necessary, in the totality of the particular circumstances, to fully complete the maintenance or improvement activity, including any confirmatory testing or other protocols necessary to ensure an orderly and reliable restoration of normal operating status. We have also revised the wording of § 171.205(a) as finalized so that it is consistent with the title and introductory text of § 171.205 as finalized.182 We made modifications to the titles and introductory text of all of the finalized exceptions for reasons described in section VIII.D of this preamble (under the heading ‘‘modifications’’). As finalized, § 171.205(a)(1) requires, in order to meet the condition in § 171.205(a), that when an actor implements a practice that makes health IT under that actor’s control temporarily unavailable, or temporarily degrades the performance of health IT, in order to perform maintenance or improvements to the health IT, the actor’s practice must be implemented for a period of time no longer than necessary to complete the maintenance or improvements for which the health IT was made unavailable or the health IT’s performance degraded. Unavailability of Health IT for Maintenance or Improvements Must Be Implemented in a Consistent and NonDiscriminatory Manner We proposed (in proposed § 171.207(a)(2)) that any unavailability of health IT occasioned by the conduct of maintenance or improvements must be implemented in a consistent and non-discriminatory manner (84 FR 7551). We explained that this condition provides a basic assurance that when health IT is made unavailable for the purpose of performing maintenance or improvements the unavailability is not abused by the actor that controls the health IT. However, we indicated that this condition would not require that actors conduct all planned maintenance or improvements simultaneously, or require that every health IT contract provide the same promises in regard to planned maintenance or improvements. We further noted that a recipient of health IT could agree to a longer 182 As noted above in this section of this preamble, titles of all the finalized exceptions have been revised to be more clear and easy to understand. PO 00000 Frm 00232 Fmt 4701 Sfmt 4700 window for unavailability in exchange for a reduced fee for system maintenance, which would not contravene this condition of this exception. Comments. Several commenters expressed support for requiring practices be implemented in a nondiscriminatory manner to meet the conditions of the Health IT Performance Exception. One commenter supported the requirement but stated that they believed practices applied selectively against an actor or third-party application inappropriately accessing interoperability resources should be exempt from this condition. Response. We appreciate the opportunity to clarify two points. First, we want to reiterate that there is an important distinction between conduct of individuals or entities (or the behavior of applications) that poses a security risk and conduct or behavior that may merely adversely affect performance of a health IT system or its core functions. If an actor or an application is making or attempting unauthorized access to systems or to EHI, the actor with control of the system subject to that security risk should take prompt action to address that risk. As stated in the finalized § 171.205(d), the Health IT Performance Exception expressly does not apply to securityrelated practices. If the unavailability of health IT for maintenance or improvements is initiated by an actor in response to a security risk to electronic health information, the actor does not need to satisfy the conditions of § 171.205, but must comply with all applicable conditions of § 171.203 at all relevant times if they wish to seek the added assurance of conforming their practices to an exception to the information blocking provision. Second, we recognize there are circumstances where an application’s behavior does not pose a security risk but does adversely impact the performance of a health IT system’s overall or core functions performance. We decline to modify § 171.205(a)(2) in the manner the commenter recommended in order to address adverse impacts on health IT performance. Instead, in response to this and other comments, we have finalized in § 171.205(b) an alternative condition that expressly provides for the finalized Health IT Performance Exception to apply to practices implemented to mitigate a third-party application’s negative impact on an actor’s health IT’s performance. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations Unavailability of Health IT for Maintenance or Improvements Must Be Agreed In order to benefit from this exception, we proposed that the unavailability of health IT due to maintenance or improvements initiated by a health IT developer of certified health IT, HIE, or HIN, must be agreed to by the individual or entity to whom the health IT is supplied (84 FR 7551). We noted that the availability of health IT is typically addressed in a written contract or other written agreements, that puts the recipient of the health IT on notice about the level of EHI and health IT unavailability that can be expected for users of the health IT. By such agreements, the recipient of the health IT willfully agrees to that level of planned and unplanned unavailability (typically referred to in health IT contracts as ‘‘downtime’’). We proposed that in circumstances where health IT needs to be taken offline for maintenance or improvements on an urgent basis and in a way that is not expressly permitted under a health IT contract an actor could satisfy the proposed condition so long as the maintenance or improvements are agreed to by the recipient of the health IT. We proposed that this could be achieved by way of an oral agreement such as reached between the parties by telephone, but we noted that because an actor must demonstrate that it satisfies the conditions of this exception, it would be best practice for an actor to ensure the agreement was in writing or, at minimum, contemporaneously documented. We proposed that this condition would only apply when the unavailability of health IT is caused by a health IT developer of certified health IT, HIE, or HIN because it is the supplier of the health IT and thus controls if and when health IT is intentionally taken offline for maintenance or improvements. We proposed that this condition would not apply when health IT is made unavailable for maintenance or improvements at the initiative of a recipient (or customer) of health IT, noting that when it is a customer of health IT who initiates unavailability, the unavailability would not need to be the subject of an agreement with the supplier of that health IT, nor anyone else, in order for the customer of health IT to benefit from this exception. Comments. Several commenters from the provider community recommended advance notice of downtime. Several commenters from the provider community suggested that planned downtimes should be documented, VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 scheduled, and executed within a predefined window of time. One commenter recommended that actors create a public website that displays planned and unplanned system downtime and allow other actors to subscribe to notifications of these downtimes. One commenter suggested we explicitly prohibit an entity from regularly scheduling extensive time periods where query and response services are unavailable. Another commenter suggested we make allowances within the conditions of this exception for an actor who may fall slightly out of compliance with terms agreed to regarding downtime in a service level agreement if the impact is de minimis and the actor was acting in good faith. One commenter contended that the information blocking provisions should not regulate the level of service provided by health IT developers to their customers. We also received several comments from members of the HIE and HIN community that recommended against any requirement to include specific details such as dates and times for maintenance because such a requirement could result in HIEs and HINs having to undertake the process of amending thousands of legal agreements. Response. We do not believe it is necessary to dictate the availability or health IT or other contractually defined details of the business relationship between parties for the purposes of this exception. Parties to a health IT contract can determine and communicate their respective service level needs and capabilities or commitments in legally enforceable contracts. Contractual provisions can establish specific details of service levels, planned downtime, unplanned downtime, and communications regarding planned and unplanned downtime, that are practical and appropriate to the context of a particular contract. In the event parties do not honor such contract provisions, remedies are available to the parties outside and independent of part 171. We also agree with commenters’ observations that any specific requirements, such as those recommended by some other commenters, could require amending contracts in ways that could create significant burden and costs for actors. Thus, we did not modify this exception in response to commenters’ recommendations that we require service level or other contractual agreements between parties conform to specific prescribed timeframes, scheduling (including specifically or query and response services), notice, PO 00000 Frm 00233 Fmt 4701 Sfmt 4700 25873 and scope of planned downtimes expectations in order for maintenance and improvement health IT downtimes to meet the information blocking exception for maintenance and improvement. Similarly, we have not modified the exception in response to recommendations from some commenters that we require display of planned and unplanned downtime on publicly available websites. We are not persuaded such measures would generally render benefits commensurate with the time and effort that would be needed for actors to implement and maintain them. Comments. Two commenters disagreed with our proposed requirement that temporary unavailability initiated by a health IT developer of certified health IT, HIE, or HIN must be agreed to by the individual or entity to whom the health IT developer of certified health IT, HIE, or HIN supplied the health IT. Both commenters recommended removing the ‘‘agreed upon with user’’ provision we proposed and recommended that ONC eliminate the requirement for prior agreement of planned downtime in order to meet the conditions of this exception. These commenters suggested that we instead allow for unilateral notice to organizations at least 10 days prior to scheduled maintenance. Response. We continue to believe that unplanned downtime must be done with the agreement of the individual or entity to which the health IT is supplied. This condition protects health care providers and other uses or health IT under the specific circumstance of health IT being made temporarily unavailable due to unplanned maintenance or improvements. It also reduces the potential for downtime purportedly for purposes of health IT maintenance or improvement to be a pretext for information blocking and thus makes it less likely that this exception will be abused. However, the conditions of this exception finalized in § 171.205 can be met by unplanned downtime in the absence of contemporaneous agreement so long as it is consistent with an existing service level agreement. We also note that specific agreement by all users to temporary unavailability is not required in all instances of unplanned downtime not already covered by an existing service level or other contractual agreement, such as downtime resulting from events beyond the actor’s control that prevent it from meeting the requirement, and practices that are consistent with the conditions of the Preventing Harm Exception (§ 171.201), E:\FR\FM\01MYR3.SGM 01MYR3 25874 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations Security Exception (§ 171.203), or Infeasibility Exception (§ 171.204). Comments. Several commenters from the developer community expressed appreciation for the opportunity to comment on throttling, arguing that it is a reasonable approach to maintain access to functionality. Many of these commenters stated that, when applied with the agreement of health IT users, strategies such as throttling or metering certain health IT functions should not be considered information blocking. One commenter suggested that throttling should not be considered information blocking if the health IT developer or health care provider is forced to throttle access so as not to negatively impact hospital operations. The commenter recommended that when requests for EHI from third-party applications created an unreasonable and significant burden on health IT and the installed infrastructure, the two contracting parties could mutually agree that the third-party application was poorly designed and could be throttled or even denied access. Another commenter suggested that the practice of throttling should only occur if that portion of the health IT affected by an application is impacting highly critical functions such as inpatient or emergency department care delivery and documentation. The commenter stated that it was important to distinguish between the practice of throttling generally and the practice of throttling as a response to impact on critical functions because the practice of throttling generally could be applied too broadly. Response. We appreciate commenters’ input. We recognize that in some circumstances it may be appropriate for actors to take action (e.g., deny access, throttle, or meter) to limit the negative impact on the performance of health IT that may result from the technical design, features, or behavior of a thirdparty application. This would include, but not be limited to, third-party applications that a patient might choose to use to access their EHI. The regulation text finalized in § 171.205 has been expanded, in comparison to the text proposed in § 171.207 (84 FR 7605), to include paragraph (b), which we have titled ‘‘assured level of performance.’’ As finalized, § 171.205(b) establishes a condition expressly applicable to actions taken against a third-party application that is negatively impacting the health IT’s performance. The specific requirements for action against a third-party application to meet the condition finalized in § 171.205(b) and thus be excepted from the definition of information blocking parallel the VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 requirements finalized in § 171.205(a), the condition applicable to practices that make health IT temporarily unavailable, or its performance degraded, for purposes of maintenance and improvement. To meet the Health IT Performance Exception under the assured level of performance condition, an action against a third-party application (§ 171.205(b)) must be: (1) For a period of time no longer than necessary to resolve any negative impacts; (2) implemented in a consistent and nondiscriminatory manner; and (3) consistent with existing service level agreements, where applicable. For example, if the service level agreement stated how and to what extent negative impacts should be addressed (e.g., overcapacity), then it is expected that such provisions of an existing service level agreement would be followed unless they violated one of the other requirements of the (§ 171.205(b)) assured level of performance condition (e.g., resulted in discriminatory application or lasted longer than necessary to resolve the negative impacts). We believe this approach will help to address situations where actions such as throttling become necessary to protect the overall performance of health IT. Interaction With the Preventing Harm and Security Exceptions We proposed that when health IT is made unavailable for maintenance or improvements aimed at preventing harm to a patient or other person, or securing EHI, an actor must comply with the conditions specified in the proposed Harm Exception or proposed Security Exception, respectively, in order for these particular practices to be excepted from the definition of information blocking in § 171.103. Comments. We received a few comments that expressed concern that our maintenance exception, as proposed, did not address unplanned downtime without notice in the instance of a potential threat to security of EHI. Response. Unplanned downtime or other practices reasonable and necessary in response to exigent threats to EHI security should be implemented consistent with the conditions for the Security Exception as finalized in § 171.203. We expressly stated in the proposed regulation text at § 171.207(c), and have finalized in § 171.205(d), that if the unavailability of health IT for maintenance or improvements is initiated by an actor in response to a security risk to EHI, the actor does not need to satisfy the conditions of the PO 00000 Frm 00234 Fmt 4701 Sfmt 4700 Health IT Performance Exception, but must comply with all conditions of § 171.203 at all relevant times for such practices to be excepted from the definition of information blocking in § 171.103. We believe this paragraph of the finalized Health IT Maintenance Exception’s regulation text (finalized in § 171.205(d)) provides ample clarity that this exception is not intended to apply to unplanned downtime implemented specifically in response to emergent security threats. We have finalized this approach to the relationship between the Health IT Performance Exception and Security Exception as proposed, because we continue to believe it ensures that the Health IT Performance Exception cannot be used to avoid compliance with conditions applicable under the Security Exception when the practice leading to unplanned downtime is implemented specifically in response to a risk to security of EHI. Comments. We received several comments from stakeholders in the developer community that it would be impossible for certified health IT developers, HIEs, or HINs to meet the conditions of this exception as proposed in the event of downtime as a result of something like a natural disaster because those parties would be unable to secure agreement from entities and individuals prior to uncontrollable downtime. Response. The Infeasibility Exception finalized in § 171.204 has been revised, in comparison to the proposed regulation text in the Proposed Rule, to expressly address uncontrollable events. In cases of natural or human-made disaster, public health emergency, public safety, incident war, terrorist attack, civil insurrection, strike or other labor unrest, telecommunication or internet service interruption, or act of military, civil or regulatory authority, an actor can avail itself of the Infeasibility Exception. We determined these situations should be addressed in the Infeasibility Exception rather than the Health IT Performance Exception in part because the breadth of circumstances where access, exchange, or use of EHI may be interfered with due to these uncontrollable events is more consistent with the intent and function of the Infeasibility Exception. Thus, we have not modified the Health IT Maintenance Exception (§ 171.205) to address uncontrollable events of the type expressly addressed by the finalized Infeasibility Exception (§ 171.204). We have finalized the substance of the relationship between the Health IT Maintenance Exception and the Preventing Harm and Security Exceptions as proposed. We have also E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations finalized as proposed the provisions of the Health IT Maintenance Exception specific to ‘‘practices that prevent harm’’ and ’’security-related practices,’’ but have redesignated them within the structure of the Health IT Maintenance Exception as finalized in § 171.205 in comparison to the structure proposed at § 171.207 (84 FR 7605). Specifically, the ‘‘practices that prevent harm’’ provision is finalized in paragraph (c) of the finalized Health IT Maintenance Exception in § 171.205 instead of paragraph (b) as was the case in the Proposed Rule (84 FR 7605). Likewise, the ‘‘security-related practices’’ provision is finalized in paragraph (d) of the finalized Health IT Maintenance Exception in § 171.205 instead of paragraph (c) as was the case in the Proposed Rule (84 FR 7605). Both of these provisions were moved down to accommodate the addition of the ‘‘assured level of performance’’ condition as paragraph (b) of § 171.205 as finalized. The paragraph of the Health IT Maintenance Exception finalized in § 171.205(c), specific to ‘‘practices that prevent harm,’’ continues to provide that if the unavailability of health IT for maintenance or improvements is initiated by an actor in response to a risk of harm to a patient or another person, the actor does not need to satisfy the requirements of this section, but must comply with all conditions of § 171.201 at all relevant times to qualify for an exception. Likewise, the paragraph of the Health IT Maintenance Exception finalized in § 171.205(d), specific to ‘‘security-related practices,’’ continues to provide that if the unavailability of health IT for maintenance or improvements is initiated by an actor in response to a security risk to electronic health information, the actor does not need to satisfy the requirements of this section, but must comply with all conditions of § 171.203 at all relevant times to qualify for an exception. Request for Comment We requested comments on the exception in general, and on whether the proposed conditions would impose appropriate limitations on actorinitiated health IT maintenance or improvement activities that lead to temporary unavailability of EHI. Comments. We did not receive comments generally opposed to the establishment of this exception. One commenter recommended that if a patient is affected by a practice that could be recognized under this exception, such as unavailability of health IT for an app registration, the VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 patient should be provided an opportunity to access the EHI through another means, such as the patient portal. Response. The Health IT Performance Exception is applicable to a variety of specific practices making health IT unavailable. It does not recognize only downtime or performance degradation of an actor’s entire health IT system. An actor who takes down one means of EHI access to conduct health IT maintenance or improvement could provide alternative access to EHI, in circumstances where this may be practical, and remain in compliance with the requirements for their practices to be excepted under § 171.205 from the definition of information blocking in § 171.103. However, we stress that an actor conducting maintenance or improvement of health IT in the actor’s control is not required to provide an alternative electronic health information access mechanism during the downtime in order for the Health IT Performance Exception to apply to the actor’s maintenance or improvement practices. We are aware that actors’ operational contexts and existing health IT capabilities vary substantially throughout the health IT ecosystem. In a variety of circumstances where downtime or performance degradation may be reasonable and necessary to maintain or improve health IT performance, an actor may not have the capability needed to meet a requirement that EHI must always be immediately available in response to every patient request. For example, in some circumstances it may be impossible to achieve a particular maintenance or improvement purpose within a specific system without temporarily rendering all EHI in the system unavailable to all functions, services, and other components of the system (such as APIs and portals) through which EHI is ordinarily accessed, exchanged, or used. 2. Exceptions that involve procedures for fulfilling requests to access, exchange, or use EHI a. Content and Manner Exception— When will an actor’s practice of limiting the content of its response to or the manner in which it fulfills a request to access, exchange, or use electronic health information not be considered information blocking? In this final rule, we have established a new exception in § 171.301 (referred to as the Content and Manner Exception) under section 3022(a)(3) of the PHSA as a means to identify reasonable and necessary activities that do not constitute information blocking. Although we did not propose this PO 00000 Frm 00235 Fmt 4701 Sfmt 4700 25875 exception in the Proposed Rule, it is related to our proposals and requests for comment in the Proposed Rule regarding the proposed EHI definition (84 FR 7513) and the proposed requirement to identify and provide a reasonable alternative means for accessing, exchanging, or using EHI as part of the proposed Infeasibility Exception (84 FR 7544). We discuss below the connection between these proposals and requests for comment in the Proposed Rule and the conditions in the Content and Manner Exception. We note that a failure to meet the Content and Manner Exception does not mean that an actor’s practice meets the information blocking definition. However, as we noted in the Proposed Rule, the broad definition of information blocking in the Cures Act means that any practice that is likely to interfere with the access, exchange, or use of EHI implicates the information blocking provision (see 84 FR 7515). As a result, practices that do not meet the Content and Manner Exception will have to be assessed on a case-by-case basis to determine, for example, the actor’s intent and whether the practice rises to the level of an interference. We discuss the comments received regarding the proposals related to the EHI definition (84 FR 7513) and the requirement to identify and provide a reasonable alternative means for accessing, exchanging, or using EHI under the Infeasibility Exception (84 FR 7544) below. Comments. As discussed in more detail section VIII.C.3, we received many comments expressing concerns regarding the breadth of the proposed EHI definition and requesting flexibility in the implementation of the information blocking provision. Many commenters stated that it would be difficult for actors to provide the full scope of EHI as it was proposed to be defined, particularly as soon as the final rule was published. Some commenters opined that we were trying to do too much too fast. Commenters requested that we provide flexibility for actors to adjust to the scope of the EHI definition, as well as the exceptions. Commenters asserted that such an approach would permit them to adapt their processes, technologies, and systems to enable the access, exchange, and use of EHI as required by the Cures Act and this final rule. Some commenters suggested that EHI under the information blocking provision should be limited to ePHI as defined in 45 CFR 160.103, while others requested that ONC consider constraining the EHI covered by the information blocking provision to only the data included in the USCDI. E:\FR\FM\01MYR3.SGM 01MYR3 25876 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations We also received a range of comments requesting clarification and concerning improvements to our proposal in the Infeasibility Exception that, for any request that the actor claims is infeasible, the actor must work with the requesting party in a timely manner to identify and provide a reasonable alternative means of accessing, exchanging, or using the EHI, as applicable (proposed in § 171.205(d), 84 FR 7604). Commenters, primarily provider organizations, were supportive of the proposed condition. Some commenters requested clarification and additional examples about what manner of response would constitute a ‘‘reasonable alternative’’ and when it would be acceptable to enable requestors to access, exchange, or use EHI in an alternative manner. One commenter requested that ONC place guardrails around requests for information sharing, such that if an actor is able to share data in an industry-accepted format, the requesting organization cannot make an information blocking claim if that format does not meet the organization’s preferred, specific data transmission standard. One commenter requested that ONC clarify that the proposed requirement to identify a reasonable alternative means of accessing, exchanging, or using EHI is only necessary where any such alternative exists. The commenter noted that there could be instances in which no reasonable alternative exists, and the request is in effect impossible to comply with. A few commenters requested that ONC remove the requirement that an actor both ‘‘identify’’ and ‘‘provide’’ a reasonable alternative means of accessing EHI, and instead require only that an actor ‘‘identify’’ a reasonable alternative. One commenter expressed concern that this exception could be used to send patients to other sources to get their health information because that approach would be less burdensome than providing the information to the patient in the manner requested. The commenter recommended that ONC preclude the use of this exception for patient access requests. Some provider, hospital, and clinical data registry commenters expressed concern regarding the potential burden on the actor related to identifying and providing a reasonable alternative means of accessing, exchanging or using the EHI. Other commenters, primarily health IT developers, expressed concern regarding the potential impact and burden on health IT developers, HINs, and HIEs of complying with a request to access, exchange, or use EHI, especially VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 when the request requires custom development. Some commenters also noted that the proposed exception seems imbalanced, favoring the requester of the EHI over the actor providing the EHI. Response. The Content and Manner Exception in § 171.301 addresses the two groups of comments noted above: (1) Comments expressing concerns regarding the breadth of the proposed EHI definition (proposed in § 171.102, 84 FR 7601) and requesting flexibility in the implementation of the information blocking provision; and (2) comments requesting clarification concerning and improvement to our proposal in the Infeasibility Exception regarding the provision of a reasonable alternative (proposed in § 171.205(d), 84 FR 7604). In response to these comments, we have removed the reasonable alternative provision from the Infeasibility Exception and we have finalized the Content and Manner Exception in § 171.301 which describes the content (i.e., the EHI) required to be provided in an actor’s response to a request to access, exchange, or use EHI and the manner in which an actor must fulfill the request in order to satisfy the exception. We believe this new exception will address the broad range of comments we received about the content of an actor’s response to and manner for fulfilling a request to access, exchange, or use EHI, and will provide the clarity and transparency sought by commenters. We also believe, as discussed in more detail below, that this new exception provides market participants the ability to reach and maintain market negotiated terms for the access, exchange, and use of EHI. Content The first condition of this exception (‘‘content condition’’) in § 171.301(a) establishes the content an actor must provide in response to a request to access, exchange, or use EHI in order to meet this exception. As discussed in section VIII.C.3 of this preamble, we have focused the scope of the EHI definition in this final rule to ePHI as defined in 45 CFR 160.103 to the extent that it would be included in a designated record set as defined in 45 CFR 164.501, with limited exception. We also address commenter concerns regarding the scope of the EHI definition and the pace at which we are implementing the information blocking provision through the Content and Manner Exception. Specifically, section 171.301(a)(1) states that for up to May 2, 2022, an actor must respond to a request to access, exchange, or use EHI with, at a minimum, the EHI identified PO 00000 Frm 00236 Fmt 4701 Sfmt 4700 by the data elements represented in the United States Core Data for Interoperability (USCDI) standard adopted in § 170.213. Section 171.301(a)(2) states that on and after May 2, 2022, an actor must respond to a request to access, exchange, or use EHI with EHI as defined in § 171.102. We explained in section VIII.C of this final rule that we have finalized a new paragraph in the information blocking definition in § 171.103 that aligns with the content condition described above. That new paragraph, which is finalized in § 171.103(b), states that, until May 2, 2022, EHI for purposes of part 171 is limited to the EHI identified by the data elements represented in the USCDI standard adopted in § 170.213. We have included a detailed discussion in section VIII.C of our rationale for including the content condition in the Content and Manner Exception and for including paragraph (b) in § 171.103. That discussion includes an explanation of how those provisions address the commenters’ concerns detailed above. We refer readers to the discussion in section VIII.C. Manner The second condition of this exception (‘‘manner condition’’) in § 171.301(b) establishes the manner in which an actor must fulfill a request to access, exchange, or use EHI in order to meet this exception. This condition is similar to our proposal in the Infeasibility Exception in the Proposed Rule that, for any request the actor claims is infeasible, the actor must have worked with the requesting party in a timely manner to identify and provide a reasonable alternative means of accessing, exchanging, or using the EHI, as applicable (see proposed § 171.205(d), 84 FR 7604). We explained in the Proposed Rule that this proposed condition would minimize the risk that the Infeasibility Exception could protect improper refusals to enable access, exchange or use of EHI, including discriminatory blanket refusals as well as other practices, such as improper delays for access or exchange that would present information blocking concerns (84 FR 7544). After review of comments, further consideration of proposed conditions, and taking into account the revised structure of the exceptions, we determined that the concept of providing a ‘‘reasonable alternative’’ fits better in the Content and Manner Exception than in the Infeasibility Exception. As such, we removed the ‘‘reasonable alternative’’ requirement from the Infeasibility Exception and incorporated the general concept into E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations the Content and Manner Exception. We believe this approach improves on the ‘‘reasonable alternative’’ requirement in the Proposed Rule by clarifying actors’ obligations for providing access, exchange, or use of EHI in all situations; creating actionable technical procedures; and aligning the requirement for providing an alternative with the Fees and Licensing Exceptions. Under § 171.301(b)(1), an actor must fulfill a request described in the content condition (paragraph (a) of the exception) in any manner requested, unless the actor is technically unable to fulfill the request or cannot reach agreeable terms with the requestor to fulfill the request (§ 171.301(b)(1)(i)). If an actor fulfills a request described in the content condition in any manner requested: (1) Any fees charged by the actor in relation to its response are not required to satisfy the Fees Exception in § 171.302; and (2) any license of interoperability elements granted by the actor in relation to fulfilling the request is not required to satisfy the Licensing Exception in § 171.303 (§ 171.301(b)(1)(ii)). Section 171.301(b)(2) provides requirements for fulfilling a request to access, exchange, or use EHI in an alternative manner than the manner requested. If an actor does not fulfill a request described in the content condition of this exception in any manner requested because it is technically unable to fulfill the request or cannot reach agreeable terms with the requestor to fulfill the request, the actor must fulfill the request in an alternative manner in order to satisfy the exception. Section 171.301(b)(2)(i) states that the actor must fulfill the request without unnecessary delay in the following order of priority, starting with the first paragraph and only proceeding to the next consecutive paragraph if the actor is technically unable to fulfill the request in the manner identified in a paragraph. That order of priority is as follows: (1) Using technology certified to standard(s) adopted in part 170 that is specified by the requestor (§ 171.301(b)(2)(i)(A)); (2) using content and transport standards specified by the requestor and published by the Federal Government or a standards developing organization accredited by the American National Standards Institute (ANSI) 183 (§ 171.301(b)(2)(i)(B)); and (3) using an alternative machine-readable format, including the means to interpret the EHI, agreed upon with the requestor (§ 171.301(b)(2)(i)(C)). Section 171.301(b)(2)(ii) requires that any fees charged by the actor in relation to 183 See https://www.ansi.org/. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 fulfilling the request must satisfy the Fees Exception in § 171.302. Similarly, § 171.301(b)(2)(iii) requires that any license of interoperability elements granted by the actor in relation to fulfilling the request is required to satisfy the Licensing Exception in § 171.303. We chose this approach because we believe actors should, first and foremost, attempt to fulfill requests to access, exchange, or use EHI in the manner requested. This principle is central to our information blocking policies (e.g., it was part of the proposed Infeasibility Exception) and will help ensure that EHI is made available where and when it is needed. Our approach acknowledges, however, that there may be instances when an actor should not be required to respond in the manner requested. First, if an actor is technically unable to fulfill a request to access, exchange, or use EHI in the manner requested, the actor is allowed to fulfill the request in an alternative manner (§ 171.301(b)(1)(i)). We emphasize that we use ‘‘technically unable’’ in this context to mean that actors cannot fulfill a request to access, exchange, or use EHI due to technical limitation. For example, if an individual requested their EHI via an API and the actor could not fulfill the request via the API, but the individual then requested the EHI be provided via email and the actor was technically able to do so, we expect that the actor would fulfill the request in that ‘‘manner requested.’’ This standard sets a very high bar, and would not be met if the actor is technically able to fulfill the request, but chooses not to fulfill the request in the manner requested due to cost, burden, or similar justifications. If, for instance, under the alternative manner, fulfilling the request would prove costly for the actor, the actor would be able to charge a fee that results in a reasonable profit margin under the Fees Exception in § 171.302 or license any requisite interoperability elements and make reasonable royalties under the Licensing Exception in § 171.303. If the burden on the actor for fulfilling the request is so significant that the actor chooses not to fulfill the request at all, the actor could seek coverage under the Infeasibility Exception in § 171.204. We believe this framework for utilizing this exception, which works in harmony with the Infeasibility Exception (§ 171.204), Fees Exception (§ 171.302), and Licensing Exception (§ 171.303), is principled and tailored in a manner that will promote basic fairness and encourage parties to work cooperatively to implement PO 00000 Frm 00237 Fmt 4701 Sfmt 4700 25877 efficient solutions to interoperability challenges. Second, we establish that an actor is not required to fulfill a request to access, exchange, or use EHI in the manner requested if the actor cannot reach agreeable terms with the requestor to fulfill the request (§ 171.301(b)(1)(i)). We also establish that if an actor fulfills a request to access, exchange, or use EHI in any manner requested, the fees or licenses associated with fulfilling such requests will not be limited by the conditions in the Fees Exception or Licensing Exception. These provisions will allow actors to first attempt to negotiate agreements in any manner requested with whatever terms the actor chooses and at the ‘‘market’’ rate— which supports innovation and competition. We then allow flexibility for actors to still satisfy the exception by fulfilling the request in an alternative manner if the actor cannot reach agreeable terms with the requestor to fulfill the request. For instance, under the exception, actors who cannot reach agreeable terms with the requestor to fulfill the request are not required to license their IP to proprietary technology in order to satisfy the exception. In contrast, § 171.301(b)(2)(ii) and (iii) require that any fees charged or licenses granted by the actor in relation to fulfilling a request to access, exchange, or use EHI in an alternative manner must satisfy the Fees Exception in § 171.302 and the Licensing Exception in § 171.303. We recognize that it is possible that responding in an alternative manner may require licensing of interoperability elements. However, we do not believe that, in most cases, licensing certified technology (§ 171.301(b)(2)(i)(A)) or standards-based technology (§ 171.301(b)(2)(i)(B)) would involve the type of licensing of proprietary interoperability elements that concerned the majority of commenters because the standards in § 171.301(b)(2)(i)(a) and (B) are ‘‘open’’ standards. Therefore, it is our understanding that a health IT developer of certified health IT would not normally be required to license its IP in order to meet the requirements for fulfilling a request to access, exchange, or use EHI in those alternative manners. On the other hand, the technology/ software that the developer uses to fulfill a request in any manner requested could constitute the developer’s IP, depending on the request. We emphasize that this exception does not require developers to open-source their technology/software. For instance, if a health IT developer of certified health IT enables access to E:\FR\FM\01MYR3.SGM 01MYR3 25878 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations EHI using HL7 (which is an ANSIaccredited standards developing organization) FHIR Release 2 (R2) Standard, that means the developer will provide EHI in the format specified in FHIR R2. In this example, the actual software code that is used by the developer to convert the EHI from the developer’s proprietary format to FHIR R2 is the developer’s IP and is not required to be provided to the requestor. We also note that our experience and knowledge of the health IT landscape indicate that the market is increasingly moving toward open standards, and we believe this movement will further decrease the need to license IP in the future. We believe this framework and approach are supportive of innovation and address commenter concerns regarding their ability to protect their IP. We included in § 171.301(b)(2)(i) that an actor must fulfill the request without unnecessary delay in order to make clear that actors seeking coverage under this exception by responding in an alternative manner will be held to same unnecessary delay or ‘‘timeliness’’ considerations as all actors are in determining whether there is an interference under the information blocking provision. The fact that an actor responds in an alternative manner does not entitle that actor to any additional time to respond to a request to access, exchange, or use of EHI that the actor would not be afforded if responding in any manner requested. As such, any unnecessary delays related to responding in an alternative manner could disqualify an actor from meeting the alternative manner condition in the same way that an unnecessary delay in responding to a request to access, exchange, or use EHI in any manner requested could constitute an interference. We refer readers to the discussion of ‘‘Limiting or Restricting the Interoperability of Health IT’’ in section VIII.C.6.c.ii. Under § 171.301(b)(2)(i)(A), if an actor does not fulfill a request described in the content condition of this exception in any manner requested because it is technically unable to fulfill the request or cannot reach agreeable terms with the requestor to fulfill the request, the actor must fulfill the request in an alternative manner. Specifically, the actor must attempt to fulfill the request using technology certified to standards adopted in part 170 specified by the requestor. This manner of response is given precedence because it advances a certified, standards-based approach that supports the Promoting Interoperability Programs (previously Medicare and Medicaid EHR Incentive Programs) administered by the Centers for VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 Medicare & Medicaid Services (CMS), other Federal and State programs that use certified health IT, and other Federal Departments (Department of Defense and Veterans Affairs). In addition, the certification criteria under the ONC Health IT Certification Program (the Program) include robust oversight, including technical and interoperability requirements, ONC-Authorized Certification Body (ONC–ACB) in-thefield surveillance expectations, and cost transparency and other disclosure requirements. To illustrate how this would work, if the requestor only requests the EHI using the C–CDA 2.1 content standard, then the actor would not have to also use the Direct transport standard to provide the EHI. However, if the requestor requests the EHI through the use of both standards, then the actor would be expected to respond in such a manner if the actor has certified health IT that supports both standards. If the actor is technically unable to respond using technology certified to standards adopted in part 170 specified by the requestor, then the actor may respond using content and transport standards specified by the requestor and published by the Federal Government or a standards developing organization accredited by the ANSI (§ 171.301(b)(2)(i)(B)). We chose to specify that standards published by a standards developing organization accredited by ANSI would qualify for this manner of response because ANSI oversees the development of voluntary consensus standards in the United States and it accredits standards that are developed by representatives of other standards organizations. ANSI accreditation signifies that the procedures used by standards developing organizations meet the institute’s requirements for openness, balance, consensus, and due process. Voluntary consensus standards developed by an ANSI-accredited standards developing organization carry a high degree of acceptance both in United States and internationally. ANSI has broad membership across government agencies, industry, academia, and international bodies and is the official United States representative to the International Organization of Standards (ISO). This manner of response also advances interoperability through standardsbased exchange, even if the standard is not certified under the Program. As noted above, the ‘‘manner’’ of response specific in § 171.301(b)(2)(i)(B) includes two distinct components: (1) Content standard; and (2) transport standard. The content standard deals with whether the information is in an PO 00000 Frm 00238 Fmt 4701 Sfmt 4700 appropriate format and is universally understood. This standard includes the structure (i.e., syntax) and terminology (i.e., semantics) of the EHI. Examples of content standards include: US Fast Healthcare Interoperability Resources (FHIR) Core IG; Consolidated Clinical Document Architecture (C–CDA 2.1); HL7 V2.5.1; HL7 v2.7 (which is a standard that is not part of certification from an ANSI-accredited standards developing organization); and Argonaut Data Query Implementation Guide. The transport standard is the method to connect two or more parties without a focus on the data that is transported from one party to another. Put another way, the transport standard is the method by which information moves from one point to another. Examples of transport standards include: Direct Project Standard, ONC Applicability Statement for Secure Health Transport, Version 1.0 (incorporated by reference in § 170.299) (§ 170.202(a)); and Simple Object Access Protocol (SOAP) based exchange specifications such as ‘‘Nationwide Health Information Network Messaging Platform Specification.’’ 184 Under the manner condition, an actor could proceed to the next consecutive ‘‘manner’’ under § 171.301(b)(2)(i) if the actor was technically unable to respond with either the content standard or the transport standard requested. Last, if an actor is technically unable to fulfill a request for access, exchange, or use of EHI using a content and transport standard specified by the requestor and published by the Federal Government or a standards developing organization accredited by ANSI, only then can the actor respond using an alternative machine-readable format, including the means to interpret the EHI, agreed to by the actor and requestor (§ 171.301(b)(2)(i)(C)). This option to respond using an agreed upon alternative machine-readable format is a flexible option for actors who cannot meet the ‘‘manner’’ requirements in § 171.301(b)(2)(i)(A) and (B), but still want to be responsive to the requestor and seek coverage under this exception. Examples of alternative machine readable formats include CSV, public domain standards, public advisory 184 See ONC, Connecting Health and Care for the Nation, A Shared Nationwide Interoperability Roadmap, FINAL Version 1.0, https:// www.healthit.gov/sites/default/files/hieinteroperability/nationwide-interoperabilityroadmap-final-version-1.0.pdf; ONC, 2015 Interoperability Standards Advisory, https:// www.healthit.gov/isa/sites/default/files/2015 interoperabilitystandardsadvisory01232015final_ for_public_comment.pdf. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations standards, and other community efforts used to represent the data. We emphasize two key components of § 171.301(b)(2)(i)(C). First, the alternative machine-readable format must include the means to interpret the EHI. The goal with this requirement is to ensure that, if an actor fulfills a request for access, exchange, or use of EHI using an alternative machinereadable format, the EHI provided through that format will be usable by the requestor. As an example, the format used for the EHI Export functionality (§ 170.315(b)(10)) discussed earlier in this final rule could be used to fulfill such a request. Second, the alternative machine-readable format must be agreed upon with the requestor. This condition ensures that, even if the actor is technically unable to meet the requirements in § 171.301(b)(2)(i)(A) and (B), the actor is still providing the requestor the opportunity to access, exchange, or use the EHI in a manner that is amenable to the requestor. b. Fees Exception—When will an actor’s practice of charging fees for accessing, exchanging, or using electronic health information not be considered information blocking? We proposed in the Proposed Rule to establish an exception at § 171.204 (84 FR 7589) to the information blocking provision that would permit the recovery of certain costs reasonably incurred for the access, exchange, or use of EHI. We interpreted the definition of information blocking to include any fee that is likely to interfere with the access, exchange, or use of EHI. We noted that this interpretation may be broader than necessary to address genuine information blocking concerns and could have unintended consequences on innovation and competition. Specifically, unless we establish an exception, actors may be unable to recover costs that they reasonably incur to develop technologies and provide services that enhance interoperability. This could undermine the ultimate goals of the information blocking provision by diminishing incentives to invest in, develop, and disseminate interoperable technologies and services that enable more robust access, exchange, and use of EHI. Therefore, we proposed to establish an exception that would permit the recovery of certain costs that we believe are unlikely to present information blocking concerns and would generally promote innovation, competition, and consumer welfare, provided certain conditions are met. We emphasized that actors can make a reasonable profit under this exception, provided that all applicable VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 conditions are met (84 FR 7538 through 7541). We proposed that the exception would be subject to strict conditions to prevent its potential abuse. Specifically, we explained our concern that a broad or insufficiently tailored exception for the recovery of costs could protect rentseeking, opportunistic fees, and exclusionary practices that interfere with the access, exchange, and use of EHI. We explained that these practices fall within the definition of information blocking and reflect some of the most serious concerns that motivated its enactment (see 84 FR 7538 and section VIII.B of this preamble). For example, in the Information Blocking Congressional Report,185 we cited evidence of wide variation in fees charged for health IT products and services. While we cautioned that the issue of fees is nuanced, and that variations in fees could be attributable in part to different technology architectures, service models, capabilities, service levels, and other factors, we concluded that these factors alone could not adequately explain all of the variation in prices that we had observed. Based on these and other indications, we concluded that some actors were engaging in opportunistic pricing practices or, in some cases, charging prices designed to deter connectivity or exchange with competing technologies or services. In the time since we published the Information Blocking Congressional Report, these practices have persisted and, in certain respects, become more pronounced. In a national survey of HIE executives published in 2017, 47 percent of respondents reported that EHR developers ‘‘often/routinely’’ charge high fees for exchange that are unrelated to cost, and another 40 percent reported that they ‘‘sometimes’’ do.186 Meanwhile, we have continued to receive credible evidence of rentseeking and other opportunistic behaviors, such as fees for data export and data portability that are not plausibly related to any time, materials, or other costs that a developer would reasonably incur to provide these services. And, while some practices described in the Information Blocking Congressional Report have become less prevalent (such as the charging of pertransaction fees), other practices have 185 ONC, Information Blocking Congressional Report (April 2015), https://www.healthit.gov/sites/ default/files/reports/info_blocking_040915.pdf. 186 Julia Adler-Milstein and Eric Pfeifer, Information Blocking: Is It Occurring And What Policy Strategies Can Address It?, 95 Milbank Quarterly 117, 124–25 (Mar. 2017), available at https://onlinelibrary.wiley.com/doi/10.1111/14680009.12247/full. PO 00000 Frm 00239 Fmt 4701 Sfmt 4700 25879 emerged that are equally concerning (84 FR 7538). As just one illustration, some EHR developers have begun conditioning access or use of customer EHI on revenue-sharing or royalty agreements that bear no plausible relation to the costs incurred by the EHR developer to grant access to the EHI. We have also heard of discriminatory pricing policies that have the obvious purpose and effect of excluding competitors from the use of interoperability elements. Many of the industry stakeholders who shared their perspectives with us in listening sessions prior to the Proposed Rule, including several health IT developers of certified health IT, condemned these practices and urged us to swiftly address them (84 FR 7538). In light of these concerns, we proposed that this exception would apply only to the recovery of certain costs and only when the actor’s methods for recovering such costs comply with certain conditions at all relevant times. In general, these conditions would require that the costs the actor recovered were reasonably incurred, did not reflect costs that are speculative or subjective, were appropriately allocated, and based on objective and verifiable criteria. Further, the exception would not apply to certain fees, such as those based on the profit or revenue associated with the use of EHI (either being earned by the actor, or that could be realized by another individual or entity) that exceed the actor’s reasonable costs for providing access, exchange, or use of the EHI (84 FR 7539 through 7541). Finally, the exception would provide additional conditions applicable to fees charged in connection with: (1) The certified APIs described in § 170.404 (84 FR 7594); and (2) the EHI export criterion proposed in § 170.315(b)(10) (84 FR 7590) to support single patient EHI export and to support the export of all EHI when a health care provider chooses to migrate information to another health IT system. We emphasized that access to EHI that is provisioned by supplying some form of physical media, such as paper copies (where the EHI is printed out), or where EHI is copied onto a CD or flash-drive, would not be a practice that implicated the information blocking provision provided that the fee(s) charged for that access complied with the HIPAA Privacy Rule (45 CFR 164.524(c)(4)) (84 FR 7539). Clarification We clarify that the Fees Exception we have finalized in this rule in no way supports or encourages the sale of EHI. E:\FR\FM\01MYR3.SGM 01MYR3 25880 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations We emphasize that this exception permits the recovery of certain costs reasonably incurred for the access, exchange, or use of EHI. We note that many individuals and entities who are considered ‘‘actors’’ under the information blocking provision are also subject to the HIPAA Privacy Rule and therefore prohibited from selling PHI unless certain conditions are met, and in particular, receiving remuneration for a disclosure of PHI in accordance with 45 CFR 164.502(a)(5)(ii). This exception to the information blocking definition in no way affects existing HIPAA Privacy Rule compliance responsibilities of entities subject to the HIPAA Rules. Comments. We received many comments in general support of the proposed exception. Commenters appreciated ONC’s goal of addressing rent-seeking, opportunistic fees, and exclusionary practices that interfere with the access, exchange, and use of EHI. Some commenters suggested that ONC should take additional steps and measures to ensure that the requirements under this exception are clear. A couple of commenters recommended that fees and costs of information exchange should be made publicly available. Another commenter suggested that ONC develop a process for actors to routinely report their use of this exception, including specific timeframes for actors to submit information to ONC and for ONC to determine whether the exception can be applied under specific circumstances. Response. We thank commenters for their support of and feedback on this exception. We appreciate the suggestions for improved transparency under this exception. We believe actors should have discretion to decide if they would like to enhance transparency by making fees and costs of information exchange publicly available. We believe that choosing not to disclose fees, on its own, would not likely implicate the information blocking provision. Further, while we wholeheartedly support the goal of enhanced transparency and commend commenters’ desire to enhance transparency in the final rule, we believe their suggestions could create additional burden for actors and such burden could outweigh the benefits of the measures they suggest. We will continue to consider steps to further promote transparency regarding our information blocking policies in future rulemakings. We appreciate the comment that we should develop a process for letting actors know whether this exception could be applied under certain circumstances. We may consider developing materials in the future VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 regarding the application of the exceptions should the need arise. However, we believe the final rule clearly describes the conditions actors must meet in order to be covered by each exception, and informational materials are not necessary at this time. Requirement That Costs Be Reasonably Incurred In the Proposed Rule, we stated that, regardless of the type of cost at issue, a basic condition of the proposed exception was that any costs the actor seeks to recover must have been reasonably incurred to provide the relevant interoperability elements for the access, exchange, or use of EHI. Whether a cost was reasonably incurred will ultimately depend on the particular facts and circumstances. We requested comment on considerations that may be relevant to assessing the reasonableness of costs incurred for purposes of this exception (84 FR 7539). Comments. Several commenters requested additional clarity in the final rule regarding various terms and concepts in the proposed exception. Commenters noted that many terms and concepts regarding the reasonableness of fees, and which fees would or would not be considered ‘‘reasonably incurred’’ under the exception, were ambiguous and overly broad. Some commenters were concerned that such ambiguity and vagueness could undercut ONC’s overall intent to prevent rent-seeking and opportunistic fees and could create a loophole that would enable actors to use the exception to continue to charge unreasonably high fees. Some commenters requested additional examples of ‘‘costs reasonably incurred’’ under the exception. One commenter asked that ONC outline different cost categories (such as development costs, deployment costs, usage costs) and indicate which of those costs would or would not fall under the exception. A couple of commenters requested that ONC explicitly state that fees the actor pays to a developer for ‘‘Release of Information’’ (ROI) services and technology would be considered ‘‘costs reasonably incurred.’’ Response. We appreciate these comments. Actors may choose to satisfy the conditions of this exception to be certain that the fees they charge for the access, exchange, or use of EHI do not implicate the information blocking provision. We reiterate that failure to meet the exception does not mean that an actor’s practice related to charging fees meets the information blocking definition. However, as we explained in the Proposed Rule, we interpret the PO 00000 Frm 00240 Fmt 4701 Sfmt 4700 broad definition of information blocking in section 3022(a) of the PHSA to encompass any fee that is likely to interfere with the access, exchange, or use of EHI (84 FR 7521). Fees that do not meet this exception may implicate the information blocking provision and will have to be assessed on a case-bycase basis to determine, for example, the actor’s intent and whether the practice rises to the level of an interference. Consistent with the conditions of this exception, an actor seeking the significant protection afforded by this exception will have to assess the fees they charge in light of the costs incurred. We emphasize that our intention with this exception is not to set any particular fees related to products or services for accessing, exchanging, or using EHI, but rather to allow the market to define the appropriate price for such products or services so long as certain methods are followed and certain criteria are met. We believe this approach is appropriate for this exception in light of the considerable diversity in the types of costs actors might incur and the range of factors that could bear on the reasonableness of those costs. For example, the costs of developing software may vary with the purposes it is intended to serve, the settings in which it will be deployed, the types and scope of capabilities included, and the extent to which these development efforts build on existing development efforts and know-how. Additionally, the costs of providing services, including the implementation of technology in production environments, may vary based on the technology design or architecture, individual customer needs, local implementation conditions, and other factors. An analysis of the approach for recovering costs will also account for different distribution and service models under which the costs are calculated. For these reasons, we have decided not to specify cost categories, such as development costs, deployment costs, usage costs, or ROI services and technology costs. However, we note that if an actor meets all necessary conditions of the finalized exception, the actor could recover such categories of cost under the exception. We have taken a few distinct steps to clarify this exception and address the overall concern from commenters regarding the clarity of this exception. First, we have restructured the exception for clarity. We have changed the title of the exception from ‘‘Exception—Recovering costs reasonably incurred’’ to ‘‘When will an actor’s practice of charging fees for E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations accessing, exchanging, or using electronic health information not be considered information blocking?’’ Throughout this final rule preamble, we use ‘‘Fees Exception’’ as a short form of this title, for ease of reference. As stated in Section VIII.D of this final rule preamble, we have changed the titles of all of the exceptions to questions to improve clarity. We have also edited the wording of the introductory text in § 171.302, in comparison to that proposed (84 FR 7603), so that it is consistent with the finalized title in § 171.302. We believe these conforming changes in wording of the introductory text also improve clarity in this section. We have also divided the exception into three conditions in § 171.302—(a) Basis for fees condition; (b) Excluded fees condition; and (c) Compliance with the Conditions of Certification condition. We explain upfront in the introductory sentence of the exception that, pursuant to these conditions, an actor may charge fees, including fees that result in a reasonable profit margin, for the access, exchange, or use of EHI without implicating the information blocking provision. We believe this framework provides actors with a clear roadmap for voluntarily satisfying the conditions of the exception. We discuss the substantive changes we have made to these provisions in the discussion of each condition later in this section of the preamble. We also note that we have further clarified the fees allowed under this exception by focusing the scope of the EHI definition (discussed in section VIII.C.3 of this preamble) and adding paragraph (b) to the information blocking definition in § 171.103 (discussed in section VIII.C of this preamble). By changing the definition of EHI to electronic protected health information (ePHI) as defined in 45 CFR 160.103 included in a designated record set as defined in 45 CFR 164.501, we have focused the scope of information covered by the information blocking provision. In addition, under the finalized information blocking definition, for up to 18 months after the six-month delayed compliance date of the information blocking section of this final rule (part 171) (a total of 24 months after the publication date of this final rule), EHI for purposes of the information blocking definition is limited to the EHI identified by the data elements represented in the USCDI standard adopted in § 170.213 (see (§ 171.103(b)). Basis for Fees Condition To qualify for this exception, we proposed that the method by which the VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 actor seeks to recover its costs must meet certain conditions. We proposed that this would require that the actor base its recovery of costs on objective and verifiable criteria that are uniformly applied for all substantially similar or similarly situated classes of persons and requests. We proposed that any differences in prices or price terms would have to be based on actual differences in the costs that the actor incurred or other reasonable and nondiscriminatory criteria. We further proposed to require that the method by which the actor recovers its costs must be reasonably related to the actor’s costs of providing the type of access, exchange, or use to, or at the request of, the person or entity to whom the fee is charged (84 FR 7539). We also proposed that the costs must be reasonably allocated among all customers to whom the technology or service is supplied, or for whom the technology is supported. A reasonable allocation of costs would require that the actor allocate its costs in accordance with criteria that are reasonable and between only those customers that either cause the costs to be incurred or benefit from the associated supply or support of the technology (84 FR 7539). We proposed that the exception would not apply if the method by which the actor recovers its costs is based, in any part, on whether the requestor or other person is a competitor, potential competitor, or will be using the EHI in a way that facilitates competition with the actor. The use of such criteria would be suspect because it suggests the fee the actor is charging is not based on its reasonable costs to provide the services and may have the purpose or effect of excluding or creating impediments for competitors, business rivals, or other persons engaged in developing or enabling the use of interoperable technologies and services (84 FR 7539). Last, we stated that the method by which the actor recovers its costs must not be based on the sales, profit, revenue, or other value that the requestor or other persons derive or may derive from the access to, exchange of, or use of EHI, including the secondary use of such information, that exceeds the actor’s reasonable costs for the access, exchange, or use of EHI (84 FR 7539). We requested comment on the proposed conditions and other issues we should consider in assessing whether the methodology by which an actor distributes costs and charges fees should be considered reasonable and necessary for purposes of the exception. In particular, we noted that we were considering whether to introduce PO 00000 Frm 00241 Fmt 4701 Sfmt 4700 25881 specific factors and methods for assessing when profit will be reasonable. We requested comment on whether the pro-competitive or efficiency-adding aspect of an actor’s approach to providing access, exchange, or use of EHI should be taken into account when assessing the reasonableness of profits. We asked commenters to consider whether there are specific use cases for which actors’ profits should be limited or prohibited for purposes of meeting the exception (84 FR 7539). We also asked commenters to consider alternate approaches to the exception that would also achieve the goal of allowing actors to recover certain types of costs that would promote innovation, competition and consumer welfare and that are unlikely to present information blocking concerns. In assessing other potential approaches to this exception, we encouraged commenters to contemplate such considerations as enforceability, potential burden on the parties, and overall effectiveness in meeting the above stated goals (84 FR 7539). Comments. We received several comments regarding our proposed approach for cost recovery and profits. Some commenters supported our proposed approach. A couple of commenters recommended that we prohibit all profits under the exception to ensure that actors cannot continue rent-seeking and exclusionary pricing practices. Several commenters requested clarification regarding the profits that would be allowed under the exception and expressed concern that the regulation text does not clearly state that profits are allowed under the exception. Several other commenters, primarily health IT developers, disagreed with the proposed cost recovery approach and limits on profits, expressing concern that ONC’s proposals will serve as a barrier to innovation, competition, and interoperability. Some commenters stated that ONC’s proposals regarding fees and profits go beyond the congressional intent in the Cures Act and questioned whether ONC has regulatory authority to regulate costs and profits. We received some comments that recommended we take a different approach for assessing whether an actor’s costs recovered are reasonable. Commenters recommended using an approach that distinguishes, as appropriate, between: (1) Pure cost or expense recovery, with no provision for margin or profit; (2) ‘‘cost-based pricing’’ or ‘‘cost plus accounting,’’ where margin or profit is allowed; and (3) ‘‘market-based pricing,’’ where there E:\FR\FM\01MYR3.SGM 01MYR3 25882 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations are no restrictions on pricing. A couple of commenters recommended that where a cost-based pricing mechanism is required, the method for assessing the cost basis should be reasonably associated with the complexity or cost of providing the capabilities. Such methods could include reasonable heuristics, estimates, or other commonly used methods. Commenters recommended that we distinguish ‘‘basic access’’ (with no profits or limited profits) from ‘‘valueadded’’ access, exchange, or use (which would allow for increased profits). A couple of commenters recommended that allowed fees for ‘‘basic access’’ be on a pure direct cost recovery basis only. Those commenters recommended that the cost to develop and/or map to standards should not be part of the cost basis for fees for ‘‘basic access;’’ rather any such costs should be a part of the fees for the health IT. The commenters recommended that when the outputs of value-added services are incorporated into, or from, an essential part of the legal medical record, or are routinely used for decision making, they constitute part of the set to which basic access is required. The commenters also recommended that we distinguish between intellectual property (IP) rights that are essential to access EHI and IP rights that allow for value-added services. Response. We thank commenters for their support of our proposals and for the thoughtful comments on this aspect of the exception. We appreciate that commenters were concerned both about the elimination of rent-seeking, opportunistic fees, and exclusionary pricing practices that interfere with the access, exchange, and use of EHI as well as the importance of finalizing policies that support and promote innovation. We have finalized the proposed approach for determining whether the basis for fees charged is acceptable under this exception, with some clarifications and updates detailed below. As we discussed in the Proposed Rule, we believe our approach will provide actors that seek to meet this exception certainty that charging fees to recover certain costs reasonably incurred for the access, exchange, or use of EHI will not implicate the information blocking provision, provided the actor’s practice meets the conditions of the exception. We reiterate that an actor who seeks to comply with the conditions of this exception will not be prevented from making a reasonable profit in connection with the access, exchange, or use of EHI, provided that all applicable conditions are met. We VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 emphasize that our intention with this exception is not to set any particular costs that would be considered ‘‘reasonably incurred,’’ but rather to allow the market to define the appropriate price so long as certain methods are followed and certain criteria are met as established by the conditions. To be responsive to comments, we have added text in the introductory sentence of this exception that clarifies that fees that result in a reasonable profit margin will be covered by this exception so long as they are in compliance with the conditions in the exception (§ 171.302). We also appreciate the comments that encouraged us to prohibit all profits under this exception. We considered this approach, but believe that actors should be able to make a reasonable profit margin, subject to the conditions in this exception. The allowance of a reasonable profit margin is necessary to incentivize innovation and allow innovators to earn returns on the investments they have made to develop, maintain, and update innovations that ultimately improve health care delivery and benefit patients. We believe the finalized approach strikes the appropriate balance of addressing the rent-seeking and exclusionary pricing practices noted by the commenters while enabling and supporting innovation. However, to be responsive to these comments related to limiting profits, we added a provision in § 171.302(a)(1)(iv) that the fees an actor charges must be based on costs not otherwise recovered for the same instance of service to a provider and third party. The intent of this provision is that the exception will not apply to practices where an actor charges twice for the same exact service. For example, the exception likely would not apply where an actor charges a hospital for providing a third party that the hospital contracts with access to certain EHI, and then charges that same third party an additional fee for access to the same EHI. This condition creates a necessary guardrail to address potential misuse of this exception that could result in a windfall for certain actors who charge fees for the same services multiple times. We have also modified other aspects of this final rule that address commenter concerns regarding this exception. First, as discussed previously in this section and in more detail in section VIII.C.3 of this preamble, we have focused the scope of the EHI definition. This change addresses commenters’ concerns regarding potential ambiguity regarding the types of information for which profits could be realized. Actors seeking PO 00000 Frm 00242 Fmt 4701 Sfmt 4700 certainty about their practices related to charging fees only need to comply with this exception if their practices interfere with the access, exchange, and use of EHI. We emphasize that we are not limiting the fees and/or profits related to the access, exchange, or use of information outside the scope of EHI. We refer readers to section VIII.C.3 of this preamble for a detailed discussion of focused scope of the EHI definition. Second, under the finalized information blocking definition, for up to 18 months after the six-month delayed compliance date of the information blocking section of this final rule (part 171) (a total of 24 months after the publication date of this final rule), EHI for purposes of part 171 is limited to the EHI identified by the data elements represented in the USCDI standard adopted in § 170.213 (see (§ 171.103(b)). The fees an actor charges during that time will only be limited pursuant to the conditions in this exception for that subset of EHI. We note that we revised § 171.302(a)(1)(i) for clarity by limiting the requirement to ‘‘objective and verifiable criteria that are uniformly applied for all similarly situated classes of persons and requests’’ instead of ‘‘objective and verifiable criteria that are uniformly applied for all substantially similar or similarly situated classes of persons and requests.’’ We believe the final standard achieves the same goal as the proposed standard and provides a clearer condition for the regulated community to follow. We updated § 171.302(a)(2)(ii) by removing the illustrative language regarding the ‘‘secondary use of such information’’ and by removing the proposed language about exceeding the actor’s reasonable costs for providing access, exchange, or use of EHI (see 84 FR 7539). The provision finalized in § 171.302(a)(1)(ii)—that an actor’s fees must be reasonably related to the actor’s costs of providing the type of access, exchange, or use of EHI to, or at the request of, the person or entity to whom the fee is charged—achieves the same purpose of limiting fees to those necessary to recover the costs reasonably incurred. We removed the ‘‘secondary use’’ language because it seemed superfluous to include in the regulation text; however, we emphasize that we maintain that the fees an actor charges must not be based on the sales, profit, revenue or other value that the requestor or other persons derive or may derive from the subsequent use of EHI. Our policy on this point has not changed from the Proposed Rule. Practices that use this method to recover costs will not E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations benefit from this exception and may implicate the information blocking provision. Last, we note that we have added ‘‘or entities’’ to follow ‘‘person’’ to align with the language in § 171.302(a)(1)(ii). We note, with regard to the ‘‘basis for fees’’ and ‘‘excluded fees’’ conditions (§ 171.302(a) and (b), respectively), that each provision under these conditions was proposed in the Proposed Rule with the exception of two new provisions: (1) The fees an actor charges must be based on costs not otherwise recovered for the same instance of service to a provider and third party (§ 171.302(a)(1)(iv)); and (2) the fees an actor charges must not be based on any costs that led to the creation of IP, if the actor charged a royalty for that IP pursuant to § 171.303 and that royalty included the development costs for the creation of the intellectual property (§ 171.302(a)(2)(vi)). We discuss each of these additions in the discussion below. Regarding the conditions that were included in the proposed exception, we note that some of the conditions were in different subsections of the proposed exception and/or have been updated for clarity and consistency with other sections of this final rule. We describe all the substantive changes to these provisions in this preamble, but refer readers to the proposed exception to review the full scope of structural changes and clarifications we have made (see 84 FR 7603). Comments. We received some comments regarding the scaling of fees and the proposed condition that the method by which the actor recovers its costs must be reasonably allocated among all customers to whom the technology or service is supplied or for whom the technology is supported. Some commenters stated that the notion that costs can be evenly divided among clients is flawed. Commenters requested that ONC allow a fee scale as opposed to a blanket fee structure. Commenters noted that a sliding scale structure would ensure that smaller entities would not be limited by a restrictive pricing application that threatens their operating costs, which may exist on a slim margin. A couple of commenters requested that ONC recognize that for many organizations, especially nonprofits, it is common and appropriate for fees to scale with the size of a member/participant organization. Several HIEs and HINs expressed concern that the proposed condition regarding the reasonable allocation of costs could have the unintended effect of prohibiting the fee structure of many public HIEs/HINs. Commenters noted that many HIEs/HINs choose to charge VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 fees to only a subset of their participants. However, as proposed, the condition that costs be reasonably allocated among all customers could undercut this ability. Commenters emphasized that the ability to offer free services to smaller providers, particularly as HIEs/HINs work to engage providers across the care continuum, is an important flexibility for such organizations. Commenters requested that HIE/HIN membership/ participation costs and subscription fees not be considered restricted fees under the information blocking provision. Response. We thank commenters for these thoughtful comments. We maintain that the condition regarding reasonable allocation of costs in § 171.302(a)(iii) is necessary to ensure that actors do not allocate fees in an arbitrary or anti-competitive manner. The final condition requires that an actor allocate its costs in accordance with criteria that are reasonable and between only those customers that either cause the costs to be incurred or benefit from the associated supply or support of the technology. We have finalized this condition with a modification discussed below. We agree with commenters that there may be situations when it would be reasonable for an actor to allocate costs differently for different classes of customers. In response to these comments, we have revised the condition in § 171.302(a)(1)(iii) so that the fees an actor charges must be reasonably allocated among all similarly situated customers to whom the technology or service is supplied, or for whom the technology is supported. This addition addresses commenters’ concerns by providing actors with the discretion to allocate costs differently for different classes of customers, while ensuring that any differences in cost allocation are based on actual differences in the class of customer. For instance, under this provision, fees must be reasonably allocated among all similarly situated large hospital systems (above a certain established size threshold) to whom a technology or service is supplied, or for whom the technology is supported. However, the allocation of fees for the same technology or service could be quite different for a small, non-profit, rural health clinic. We also note that we have replaced ‘‘customers’’ with ‘‘persons or entities’’ in § 171.302(a)(1)(iii) in order to align the language with § 171.302(a)(1)(i) and (ii). We believe aligning the provisions within § 171.302(a) will strengthen the exception and provide actor’s with PO 00000 Frm 00243 Fmt 4701 Sfmt 4700 25883 clarity regarding what is necessary to meet the exception. Comments. We received many comments, primarily from providers and provider organizations, regarding the potential financial burden the proposed exception will place on actors. Commenters recommended that ONC carefully consider the downstream financial impact of new requirements, especially that providers, including providers without certified health IT and who do not participate in CMS programs, will bear the brunt of the financial burden of these policies. More specifically, commenters expressed concern regarding potential recordkeeping and administrative burden caused by this exception. Commenters explained that actors may need to retain extensive records to document all of the costs that the actor incurred so that it can prove that its fees only constitute those costs plus a reasonable profit. Further, commenters stated that the administrative burden required to assess and monitor this exception would be significant and not sustainable. Commenters explained that cost accounting is challenging for even very large and well-resourced organizations and there is concern that the exception will result in unintended negative consequences for many actors. Response. We appreciate these comments. We reiterate that actors may choose to satisfy the conditions of this exception to be certain that the fees they charge for the access, exchange, or use of EHI do not implicate the information blocking provision. We also reiterate that failure to meet the exception does not mean that an actor’s practice related to charging fees meets the information blocking definition. However, as we explained in the Proposed Rule, we interpret the broad definition of information blocking in section 3022(a) of the PHSA to encompass any fee that is likely to interfere with the access, exchange, or use of EHI (84 FR 7521). Fees that do not meet this exception may implicate the information blocking provision and will have to be assessed on a case-by-case basis to determine, for example, the actor’s intent and whether the practice rises to the level of an interference. This exception, as well as the other finalized exceptions, strike a balance by identifying, as the Cures Act requires, activities that interfere with access, exchange, or use of EHI but which are reasonable and necessary. We believe the overwhelming benefits of the information blocking provision and the exceptions to the information blocking definition—which enable patients to access, exchange, and use their EHI where and when it is E:\FR\FM\01MYR3.SGM 01MYR3 25884 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations needed—far outweigh the potential burden on actors. We believe the revisions we have made to this exception, the addition of paragraph (b) in the information blocking definition (see § 171.103(b)) and the discussion in section VIII.C of this preamble), the addition of the Content and Manner Exception, as well as the revisions we have made to the other exceptions and relevant terms will have the overall effect of reducing burden on actors. The fact the information blocking section of this rule (part 171) has a 6-month delayed compliance date from the publication date of this final rule will also relieve the burden on actors and give them time to prepare for administrative changes. Comments. We received comments about the interplay and potential overlap between the proposed Fees Exception and Licensing Exception. Some commenters suggested that we combine the two exceptions for clarity. Some commenters requested clarification as to whether an actor may charge both a fee to recover reasonable costs associated with EHI services and a reasonable royalty for licensing interoperability elements. One commenter expressed concern that the overlap between the two exceptions creates the potential for actors to recover the same costs twice. The commenter explained that licensing of IP is intended to recoup the costs of development of that IP, so where the IP is an interoperability element, the costs reasonably incurred for its development should be incorporated into the royalty rate. The commenter recommended that we should be clearer that, in these circumstances, only a single recovery is permitted. Response. We thank commenters for the thoughtful feedback and agree that the distinction between the Fees Exception and the Licensing Exception (§ 171.303) must be clear. We emphasize that both exceptions deal with the fees actors may charge regarding the access, exchange, or use of EHI and under both exceptions actors use interoperability elements (as defined in § 171.102) to facilitate the access, exchange, or use of EHI. The exception for recovering costs reasonably incurred enables actors to recover their costs to develop technologies and provide services that enhance interoperability. On the other hand, the exception for licensing interoperability elements specifically addresses circumstances when it is necessary for an actor to license interoperability elements in order fulfill a request to access exchange, or use EHI. The Licensing Exception deals with the requisite licensing conditions. We VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 believe there should be a distinction made between these two exceptions, and have therefore decided not to combine the two exceptions. We agree with the commenter that actors should not be able to recover the same costs twice and have added a provision in § 171.302(a)(2)(vi) that the fees an actor charges must not be based on any costs that led to the creation of IP, if the actor charged a royalty for that IP pursuant to § 171.303 and that royalty included the development costs for the creation of the intellectual property. Excluded Fees Condition We proposed that certain costs should be explicitly excluded from the exception regardless of the method for recovering the costs (84 FR 7540). Comments. We did not receive comments regarding the overall proposed approach of excluding certain costs from this exception. Response. We have finalized the structure of this exception to exclude certain fees with the changes described in the discussions above and below. We note that we have substituted the ‘‘or’’ that preceded the final excluded fee in the proposed exception (see 84 FR 7603) with an ‘‘and’’ in the final exception. This is not a substantive change, as our intent has always been that the exception does not apply to each of ‘‘excluded fees.’’ This revision clarifies that point. Costs Due to Non-Standard Design or Implementation Choices We proposed that this exception would not permit the recovery of any cost that the actor incurred due to the health IT being designed or implemented in non-standard ways that unnecessarily increase the complexity, difficulty or burden of accessing, exchanging, or using EHI. To the extent that such costs can be reasonably avoided, we stated that we believe that actors should internalize the costs of such behaviors, which do not benefit consumers, and which create unnecessary impediments to access, exchange, and use of EHI. We requested comments on the proposed exclusion of these types of costs from the exception (84 FR 7540). Comments. We received several comments regarding the proposed exclusion of costs due to non-standard design or implementation choices from this exception. A couple of commenters expressed support for the proposal. A couple of other commenters disagreed with the proposal and recommended that actors should be able to recover all reasonable implementation costs independent of design decisions. One PO 00000 Frm 00244 Fmt 4701 Sfmt 4700 commenter requested additional clarity about what ‘‘non-standard’’ means. A couple of commenters noted that requestors may prefer information in a non-standard manner to meet their business purposes, due to their own constraints, or for other reasons. Response. We thank commenters for their support of this proposal, as well as the constructive feedback. We emphasize that the problematic nature of non-standard implementation choices was identified by Congress in the Cures Act. Section 3022(a)(2)(B) of the PHSA states that information blocking may include implementing health IT in nonstandard ways that are likely to substantially increase the complexity or burden of accessing, exchanging, or using EHI. Due to Congress’s clear objective to restrict these practices, along with our continued concern that these practices will lead to unnecessary complexity and burden related to the access, exchange, or use of EHI, we have finalized the proposed provision regarding non-standard design and implementation choices. We have updated § 171.302(a)(2)(iii) to address comments indicating that requestors may prefer information in a nonstandard manner to meet their business purposes, due to their own constraints, or for other reasons. We agree with commenters that in those situations— when the requestor requests access, exchange or use of EHI in the nonstandard way—the exception should allow the actor to charge fees for the reasonable costs associated with the requested non-standard design or implementation. We emphasize, however, and make clear in § 171.302(a)(2)(iii), that such fees related to non-standard design or implementation are only covered by the exception when the requestor agreed to the fee associated with the non-standard design or implementation to access, exchange, or use EHI. We note that this provision was proposed as an ‘‘excluded cost’’ but has been finalized within the ‘‘Basis for fees condition’’ for clarity and to align with the revised structure of this exception. We also note that the new Content and Manner Exception in § 171.301 further addresses commenter concerns because it provides actors with clear procedures regarding the manner in which they may provide access, exchange, or use of EHI if they are technically unable to respond in the manner requested or the manner requested requires the actor to license intellectual property and the actor cannot reach agreeable terms with the requestor (discussed in section VIII.D.2.a of this preamble). If an actor E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations meets that exception, its practice would not implicate the information blocking provision. For instance, if a requestor requested that the actor provide EHI in a non-standard manner, but the actor is technically unable to provide the EHI in the manner requested, the actor’s response to the request would not implicate the information blocking provision if it provides the EHI via an alternative manner in accordance with § 171.301(b). The actor could also potentially seek coverage under the Infeasibility Exception if the request is infeasible and the actor meets all the conditions in § 171.204. Regarding the comment concerning additional clarity about what ‘‘nonstandard’’ means, we explained and provided examples in the Proposed Rule of practices related to implementing health IT in non-standard ways that substantially increase the complexity or burden of accessing, exchanging, or using EHI, and therefore implicate the information blocking provision (84 FR 7521). In addition, the Cures Act specifically describes information blocking practices to include implementing health IT in nonstandard ways that are likely to substantially increase the complexity or burden of accessing, exchanging, or using electronic health information (see section 3022(a)(2)(B) of the PHSA). Therefore, the Proposed Rule discussion regarding non-standard ways of implementing health IT also applies for purposes of the Fees Exception. As explained in the Proposed Rule, nonstandard implementation of health IT may arise where an actor chooses not to adopt, or to materially deviates from, relevant standards, implementation specifications, and certification criteria adopted by the Secretary under section 3004 of the PHSA (84 FR 7521). Even where no federally adopted or identified standard exists, if a particular implementation approach has been broadly adopted in a relevant industry segment, deviations from that approach will be suspect unless strictly necessary to achieve substantial efficiencies. For further discussion regarding our rationale for this provision, as well as specific, non-exhaustive examples of conduct that would be likely to interfere with the access, exchange, or use of EHI, we refer readers to the Proposed Rule (84 FR 7521). Subjective or Speculative Costs We proposed to limit this exception to the recovery of costs that an actor actually incurred to provide the relevant interoperability element or group of elements (which may comprise either products or services). We proposed that VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 the exception would not permit the recovery of certain types of costs that are subjective or speculative. We noted two important examples of this limitation. First, we proposed that an actor would not be permitted to recover any costs associated with intangible assets (including depreciation or loss of value), other than the actual development or acquisition costs of such assets. For example, an actor could not charge a customer a fee based on the purported ‘‘cost’’ of allowing the customer to use the actor’s patented technology, computer software, databases, trade secrets, copyrighted works, and the like. We noted that the customer’s use of the asset could be considered a ‘‘cost’’ in the sense that, were it not for the information blocking provision, the actor could charge a royalty or other fee for the use of its intangible assets. For this reason we proposed to permit an actor to license most interoperability elements on reasonable and non-discriminatory terms, subject to certain conditions. For purposes of this more general exception, however, we explained that it would be inappropriate to permit an actor to charge a fee based on these considerations, which are inherently subjective and could invite the kinds of rent-seeking and opportunistic pricing practices that fall squarely within the definition of information blocking. We proposed that an actor’s practices could qualify for both this exception (Fees Exception) and the Licensing Exception (finalized in § 171.303). In that case, the actor could recover costs under both exceptions (84 FR 7540). Second we stated the exception would not apply to ‘‘opportunity costs,’’ such as the revenues that an actor could have earned had it not provided the interoperability elements. We clarified that the exclusion of opportunity costs would not preclude an actor from recovering its reasonable forwardlooking cost of capital (84 FR 7540). Comments. We did not receive any comments on our proposals regarding subjective or speculative costs. Response. We have finalized this provision as proposed with some modifications for clarity. We have modified the provision regarding intangible assets in § 171.301(a)(2)(iv) by removing the parenthetical that noted that such costs include the depreciation or loss of value. The parenthetical was illustrative and was not necessary in the regulation text, as it is just one of the many types of intangible assets on which a fee must not be based. We have also modified the provision regarding opportunity costs in § 171.301(a)(2)(v) by clarifying that the PO 00000 Frm 00245 Fmt 4701 Sfmt 4700 25885 specific opportunity costs on which a fee must not be based are those unrelated to the access, exchange, or use of EHI instead of the proposed qualifying language of ‘‘except for the reasonable forward-looking cost of capital’’ (see 84 FR 7603). We believe this finalized language is clearer than the proposed language. In addition, it is more precise than the proposed language because it creates a connection to the information blocking definition. We note that we proposed these provisions as ‘‘excluded costs’’ (see 84 FR 7603) but have finalized them within the ‘‘Basis for fees condition’’ for clarity. Fee Prohibited by 45 CFR 164.524(c)(4) We also proposed that the exception would not apply to fees prohibited by 45 CFR 164.524(c)(4). We noted in the Proposed Rule that the HIPAA Privacy Rule permits a covered entity to impose a reasonable, cost-based fee if the individual requests a copy of the PHI (or agrees to receive a summary or explanation of the information). The fee may include only the cost of: (1) Labor for copying the PHI requested by the individual, whether in paper or electronic form; (2) supplies for creating the paper copy or electronic media (e.g., CD or USB drive) if the individual requests that the electronic copy be provided on portable media; (3) postage, when the individual requests that the copy, or the summary or explanation, be mailed; and (4) preparation of an explanation or summary of the PHI, if agreed to by the individual (45 CFR 164.524(c)(4)). The fee may not include costs associated with verification; documentation; searching for and retrieving the PHI; maintaining systems; recouping capital for data access, storage, or infrastructure; or other costs not listed above even if such costs are authorized by State law (84 FR 7540). Comments. We received a couple of comments regarding copying fees allowed under the HIPAA Privacy Rule. One commenter stated that reasonable, cost-based fees for certain costs, consistent with the HIPAA Privacy Rule individual access provisions, should not be allowed under the exception. One commenter requested that ONC harmonize the exception with the HIPAA Privacy Rule provisions that govern the charging of fees for electronic copies of medical records. Response. We appreciate these comments. We have decided to finalize the provision as proposed, which harmonizes this part of the exception (§ 171.302) with those provisions of the HIPAA Privacy Rule. The exception does not apply to fees prohibited by 45 CFR 164.524(c)(4). Consistent with the E:\FR\FM\01MYR3.SGM 01MYR3 25886 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations HIPAA Privacy Rule’s individual access fee implementation specification, an actor can charge a reasonable, costbased fee related to certain costs (described above) if a patient requests a copy of her records. Individual Electronic Access We proposed that the exception would not apply if the actor charged a fee based in any part on the electronic access by an individual or their personal representative, agent, or designee to the individual’s EHI. We stated that such fees are distinguished from the costbased fees that a covered entity is permitted to charge individuals for the provision of copies of ePHI under the HIPAA Privacy Rule access provisions (45 CFR 164.524(c)(4)), and similar allowable costs under State privacy laws, which would not be excluded from the costs recoverable under the exception. We clarified that access to EHI that is provisioned by supplying some form of physical media, such as paper copies (where the EHI is printed out), or where EHI is copied onto a CD or flash-drive, would not be a practice that implicated the information blocking provision provided that the fee(s) charged for that access complied with the HIPAA Privacy Rule access provisions (45 CFR 164.524(c)(4)) (84 FR 7540). We stated that a fee based on electronic access by an individual or their personal representative, agent, or designee to the individual’s EHI, in contrast, would arise if an actor sought to impose on individuals, or their personal representatives, agents, or designees, a fee that operated as a toll to electronically access, exchange, or use EHI. For example, a health care provider that charges individuals a fee in order for the individuals to receive access to their EHI via the health care provider’s patient portal or another internet-based method, would not be able to benefit from this exception. Similarly, where an individual authorizes (approves) a consumer-facing app to receive EHI on the individual’s behalf, the exception would not apply to practices where an actor charges the app or its developer a fee to access or use APIs that enable an individual’s access to the individual’s EHI. We explained that this would be true whether the actor is a supplier of the API technology or an individual or entity that has deployed the API technology, such as a health care provider (84 FR 7540). Comments. Commenters expressed overwhelming support for our proposal regarding individual electronic access. Commenters from across stakeholder groups emphasized that patients have a VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 fundamental right to access their data and should be able to access, exchange, and use their EHI at no charge. Commenters emphasized that the EHI belongs to the patient, and neither health care providers, EHR developers, nor payers should profit from the sale of EHI, as that will only serve to limit data transfer, increase health care costs, and adversely affect patient care. Commenters strongly supported our proposal (within the API Condition of Certification) that API fees should not be a barrier in allowing patient access to their EHI (see proposed § 170.404 and 84 FR 7487 through 7491). They stressed that neither individuals nor app developers (i.e., API Users) should be charged a fee for API uses that are associated with the access, exchange, and use of EHI by patients or their applications, technologies, or services. Several commenters supported our efforts to bolster patient access, noting that the capacity to offer a patient access to EHI, through an API, without cost, is well-supported in the Proposed Rule. One commenter requested that we differentiate between an individual electronically accessing EHI and third parties, at the direction of the individual, electronically accessing EHI. Response. We thank commenters for the support and have finalized this provision as proposed with a slight modification to the text in § 171.302(b)(2) and clarification of the meaning of electronic access, which we have codified in § 171.302(d). We have reordered the language for clarity and, in order to clarify the terms ‘‘agent’’ and ‘‘designee,’’ we have replaced them with ‘‘another person or entity designated by the individual.’’ These other individuals or entities (e.g., a third-party app) receive access to EHI at the direction of the individual and individuals control whether the third-party receives access to the individual’s EHI. This modification is merely a clarification of our proposal and is not a substantive change as we clearly stated in the Proposed Rule that, as summarized above, this exception would not apply to practices where an actor charges the app or its developer a fee to access or use APIs that enable access to the individual’s EHI. Fees can be a method of interfering with the access, exchange, and use of EHI, as we have emphasized in the Proposed Rule and this final rule. When it comes to an individual’s electronic access to their EHI, we believe that any fee, whether direct or indirectly passed on through a fee charged to a third-party app that the individual has chosen to facilitate access to their EHI, could interfere with an individual’s access and use of their PO 00000 Frm 00246 Fmt 4701 Sfmt 4700 EHI. ONC’s implementation of the Cures Act is predicated on an understanding that access to EHI should not be treated as a commodity that should be traded or sold. ONC takes this approach because we view patients as having an overwhelming interest in EHI about themselves, and because we understand that the true value of EHI can only be realized if it is available where and when it is needed, including providing electronic access to patients. Patients have already effectively paid for their health information, either directly or through their employers, health plans, and other entities that negotiate and purchase health care items and services on their behalf. We have codified this provision in § 170.302(b)(2) to not permit ‘‘[a] fee based in any part on the electronic access of an individual’s EHI by the individual, their personal representative, or another person or entity designated by the individual.’’ For purposes of the Fees Exception, we define electronic access to mean an internet-based method that makes EHI available at the time the EHI is requested and where no manual effort is required to fulfill the request (§ 171.302(d)). We discussed the meaning of ‘‘electronic access’’ in the Proposed Rule (see 45 FR 7540). We have defined ‘‘electronic access’’ in § 171.302(d) in this final rule consistent with the Proposed Rule, including distinguishing it from the methods and efforts we cited in the Proposed Rule that we did not consider electronic access and for which a fee could be charged (see 45 FR 7540). We have chosen ‘‘internet-based method’’ in lieu of the proposed ‘‘web-based delivery’’ because it more technically aligns with the concept we were attempting to convey in the Proposed Rule. Such methods would be, as described in part in the Proposed Rule, access via an API, patient portal, or other internet-based means. To note, the 2015 Edition ‘‘view, download, and transmit to 3rd party’’ certification criterion uses this same concept of ‘‘internet-based’’ to convey that ‘‘patients (and their authorized representatives) must be able to use internet-based technology to view, download, and transmit. . . .’’ In terms of fulfilling a request without manual effort, we clarify that it entails the completion of the process where there is no manual effort involved to meet the request at the time of the request. To illustrate the inverse, we recognize that there are times that manual effort may be involved in collating or assembling EHI from various systems in response to a request. In such instances, this provision (§ 170.302(b)(2)) would not E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations apply to the costs of those efforts because the efforts would not fall under the definition of ‘‘electronic access.’’ We reaffirm that this exception would not apply to an actor that charges individuals a fee in order for the individuals to receive access to their EHI using an internet-based delivery method, including where an individual uses consumer-directed technology (e.g., patient-chosen apps, personal health apps, standalone/untethered personal health records (PHR), email) to request and/or receive their EHI. This includes sharing it with an entity designated by the individual (e.g., allowing individuals to donate/share EHI with a biomedical research program of the individual’s choice). Practices that involve an actor charging an individual (or the individual’s personal representative or another person or entity designated by the individual) a fee to access, exchange, or use their EHI would be inherently suspect and would be extremely likely to implicate the information blocking provision. We emphasize that practices that do not meet this condition, or any other conditions in the Fees Exception, would be subject to case-by-case review (unless another exception applies). We further refer readers to our discussion of ‘‘interfere with’’ or ‘‘interference,’’ including examples of practices that would likely interfere with access, exchange, and use of EHI (section VIII.C.6). Export and Portability of EHI Maintained in EHR Systems We explained in the Proposed Rule that the definition of information blocking specifically mentions transitions between health IT systems and the export of complete information sets as protected forms of access, exchange, and use (see section 3022(a)(2)(C)(i) of the PHSA). We noted that in our experience, health care providers frequently encounter rentseeking and opportunistic pricing practices in these and other contexts in which they are attempting to export EHI from their systems for use in connection with other technologies or services that compete with or could reduce the revenue opportunities associated with an EHR developer’s own suite of products and services. We explained that most EHI is currently maintained in EHRs and other source systems that use proprietary data models or formats; this puts EHR developers in a unique position to block the export and portability of EHI for use in competing systems or applications, or to charge rents for access to the basic technical information needed to facilitate the VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 conversion or migration of data for these purposes. We emphasized that our concerns are compounded by the fact that EHR developers rarely disclose in advance the fees they will charge for data export and data portability services (see 80 FR 62719; 80 FR 16880 and 81). For these reasons, we proposed that fees charged for the export, conversion, or migration of data from an EHR technology would not qualify for this exception unless they also meet two additional conditions. First, we proposed that health IT developers of certified health IT would, for purposes of the exception, be precluded from charging a fee to perform an export of EHI via the capability of health IT certified to the proposed 2015 Edition ‘‘EHI export’’ certification criterion for the purposes of supporting single patient EHI export upon a valid request from that patient or a user on the patient’s behalf, or supporting the export of all EHI when health care provider chooses to transition or migrate information to another health IT system. We stated that, as part of the ‘‘Assurances’’ Condition of Certification, health IT developers that produce and electronically manage EHI would need to be certified to the criterion and provide the functionality to its customers. We stated that fees or limitations associated with the use of the ‘‘EHI export’’ certification criterion (as distinguished from deployment or other costs reasonably incurred by the developer) would not receive protection under the exception and may be suspect under the information blocking provision (84 FR 7541). We clarified that the condition would not preclude a developer from charging a fee to deploy the ‘‘EHI export’’ certification criterion in a health care provider’s production environment, or to provide additional services in connection with this capability other than those reasonably necessary to enable its intended use. For example, we explained that this condition would not preclude a developer from charging a fee to perform an export of EHI via the capability of health IT certified to the proposed § 170.315(b)(10) for a thirdparty analytics company. We noted in the Proposed Rule that, because the certification criterion provides only a baseline capability for exporting data, we anticipated that health IT developers of certified health IT will need to provide other data portability services to facilitate the smooth transition of health care providers between different health IT systems. We proposed that such fees may qualify for protection under the exception, but only if they meet the PO 00000 Frm 00247 Fmt 4701 Sfmt 4700 25887 other conditions described above and in proposed § 171.205(a). Second, we proposed that the exception would not apply to a fee to export or convert data from an EHR technology unless such fee was agreed to in writing at the time the technology was acquired, meaning when the EHR developer and the customer entered into a contract or license agreement for the EHR technology (84 FR 7541). Comments. A commenter requested clarification regarding the proposal to exclude from the exception costs related to fees to export or convert data from an EHR technology, unless such fee was agreed to in writing at the time the technology was acquired. The commenter asked that ONC clarify if this provision is applicable to export or the conversion of EHI from certified health IT or if it is applicable to any export or conversion of EHI from any health IT. The commenter also requested that ONC clarify if this provision is prospective in nature, meaning it would only apply to agreements entered into after the effective date of a final rule. The commenter recommended that ONC change the focus of this proposal so that it only requires that the parties agree in writing that fees of a particular nature may be charged for the export of EHI. Response. We appreciate this comment. In response to the comment, we clarify that this exclusion from the exception is not limited to the export of EHI from certified health IT. Instead, this provision applies to the export or conversion of any EHI from an actor’s technology(ies). As we discuss elsewhere in this Final Rule, we interpret the information blocking provision broadly such that practices of a health IT developer of certified health IT that do not pertain specifically to certified health IT may implicate the information blocking provision. Consistent with this interpretation of the information blocking provision, the exception will not protect practices where an actor charges fees to export or convert data from any EHR technology, unless such fee was agreed to in writing at the time technology was acquired. Further, we clarify that if a fee to export or convert data is not subject to this exclusion in § 171.302(b)(4) because it was agreed to in writing, it still must meet the other applicable conditions in § 171.302 to be covered by the Fees Exception. Without this exclusion, actors may seek to take advantage of the exception and enable rent-seeking or opportunistic pricing practices. Thus, we have decided not to limit the condition so that it only requires that the parties E:\FR\FM\01MYR3.SGM 01MYR3 25888 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations agree in writing that fees of a particular nature may be charged for the export of EHI as suggested by the commenter. Only requiring the parties to agree to the fee in writing (without applying the other conditions in this exception), may allow an actor to charge an unreasonable fee or engage in a practice that is likely to interfere with the access, exchange, or use of EHI. While a party may agree to pay a fee under specific circumstances, that agreement does not change the fact that the fee must be reasonably related to the actor’s costs or may otherwise interfere with the access, exchange, or use of EHI. We have finalized these provisions as proposed with a slight modification. We changed the condition from ‘‘A fee to export or convert data from an EHR technology, unless such fee was agreed to in writing at the time the technology was acquired’’ (see 84 FR 7603) to ‘‘A fee to export or convert data from an EHR technology that was not agreed to in writing at the time the technology was acquired’’ (§ 171.302(b)(4)). We made this change for clarity based on the change we made to the introductory language in the exception, that a practice will not be considered information blocking when the practice meets the conditions in paragraph (a), does not include any of the excluded fees in paragraph (b), and, as applicable, meets the condition in paragraph (c). This modification does not change the substance of this condition in any way. Compliance With the Conditions of Certification We stated in the Proposed Rule that health IT developers of certified health IT subject to the API Condition of Certification may not charge certain types of fees and are subject to more specific cost accountability provisions than apply generally under this proposed exception. We noted that the failure of developers to comply with these additional requirements would impose impediments to consumer and other stakeholder access to EHI without special effort and would be suspect under the information blocking provision. We proposed, therefore, that a health IT developer of certified health IT subject to the API Condition of Certification must comply with all requirements of that condition for all practices and at all relevant times in order to qualify for the exception (84 FR 7541). We also stated that a health care provider that acts as an API Data Provider should be subject to the same constraints. We noted that the API Condition of Certification prohibits a health IT developer from charging a VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 usage fee to patient-oriented apps. We noted that information blocking concerns would arise if a provider were to charge such a fee, notwithstanding the fact that the provider is not subject to the certification requirements. For this reason, we proposed that, if the actor is an API Data Provider, the actor would only be permitted to charge the same fees that an API Technology Supplier would be permitted to charge to recover costs consistent with the permitted fees specified in the Condition of Certification (84 FR 7541). Comments. We did not receive comments on these proposals. Response. We have finalized the first provision detailed above as proposed with a slight modification for clarity. The final provision in § 171.302(c) states: Notwithstanding any other provision of this exception, if the actor is a health IT developer subject to the Conditions of Certification in § 170.402(a)(4), § 170.404, or both of this subchapter, the actor must comply with all requirements of such conditions for all practices and at all relevant times. We added ‘‘or both’’ into the final language because a health IT developer could be subject to both § 170.402(a)(4) and § 170.404 and in such instances would be covered by this provision. We have removed the second provision detailed above regarding a health care provider that acts as an API Data Provider (see the Proposed Rule at 84 FR 7603) for clarity, as not all of the permitted fees specified in the API Condition of Certification (§ 170.404) are applicable for API Data Providers. Application of the Exception to Individual Practices We stated in the Proposed Rule that the conditions of this exception, including those governing the methodology and criteria by which an actor calculates and distributes its costs, must be satisfied for each and every fee that an actor charges to a customer, requestor, or other person for accessing, exchanging, or using EHI. All applicable conditions of the exception must be met at all relevant times for each practice (84 FR 7541). Comments. We did not receive any comments on this proposed policy. Response. We have finalized this policy as proposed. c. Licensing Exception—When will an actor’s practice to license interoperability elements in order for electronic health information to be accessed, exchanged, or used not be considered information blocking? We proposed in the Proposed Rule in § 171.206 to establish an exception to PO 00000 Frm 00248 Fmt 4701 Sfmt 4700 the information blocking provision that would permit actors to license interoperability elements on reasonable and non-discriminatory (RAND) terms, provided that certain conditions are met. We proposed that the information blocking provision would be implicated if an actor were to refuse to license or allow the disclosure of interoperability elements to persons who require those elements to develop and provide interoperable technologies or services— including those that might complement or compete with the actor’s own technology or services (84 FR 7544). Moreover, we proposed that the information blocking provision would be implicated if the actor licensed such interoperability elements subject to terms or conditions that have the purpose or effect of excluding or discouraging competitors, rivals, or other persons from engaging in these pro-competitive and interoperabilityenhancing activities. Thus, we proposed the Licensing Exception would apply in both vertical and horizontal relationships and provided an example emphasizing that point in the Proposed Rule (see 84 FR 7544). We noted in the Proposed Rule that some licensees do not require interoperability elements to develop products or services that can be interoperable with the actor’s health IT. We explained that there may be firms that simply want to license the actor’s technology for use in developing their own interoperability elements. Their interest would be for access to the technology itself—not for the use of the technology to interoperate with either the actor or its customers to enable the access, exchange, or use of EHI. We emphasized that in such cases, the actor’s licensing of its intellectual property (IP) in such a context would not implicate the information blocking provision (in other words, would not be in scope for information blocking). For a non-exhaustive list of examples of situations that would implicate the information blocking provision, see the Proposed Rule (84 FR 7544–45). In our experience, contractual and IP rights are frequently used to extract unreasonable rents for access to EHI or to prevent competition from developers of interoperable technologies and services. These practices frustrate access, exchange, and use of EHI and stifle competition and innovation in the health IT sector. As a case in point, we noted in the Proposed Rule that even following the enactment of the Cures Act, some health IT developers had been selectively prohibiting—whether expressly or through commercially unreasonable terms—the disclosure or E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations use of technical interoperability information required for third-party applications to access, exchange, and use EHI maintained in EHR systems. We noted that such practices limit health care providers’ use of the EHI maintained on their behalf to the particular capabilities and use cases that their EHR developer happens to support. More than this, by limiting the ability of providers to choose what applications and technologies they can use with their EHR systems, we indicated that these practices close off the market to innovative applications and services that providers and other stakeholders need to deliver greater value and choice to health care purchasers and consumers (84 FR 7545). Despite these serious concerns, we recognized in the Proposed Rule that the definition of information blocking may be broader than necessary and could have unintended consequences. We proposed that it is generally appropriate for actors to license their IP on RAND terms that do not interfere with access, exchange, or use of EHI provided certain conditions were met. We explained that these practices would further the goals of the information blocking provision by allowing actors to protect the value of their innovations and earn returns on the investments made to develop, maintain, and update those innovations. We explained that this would protect future incentives to invest in, develop, and disseminate interoperable technologies and services. Conversely, we explained that if actors cannot (or believe they cannot) protect and commercialize their innovations, they may not engage in these productive activities that improve access, exchange, and use of EHI (84 FR 7545). We proposed that the exception would be subject to strict conditions to ensure, among other things, that actors license interoperability elements on RAND terms and that actors do not impose collateral terms or engage in other practices that would impede the use of the interoperability elements or otherwise undermine the intent of the exception (84 FR 7545). We acknowledged that preventing IP holders from extracting rents for access to EHI may differ from standard IP policy. We proposed that absent specific circumstances, IP holders are generally free to negotiate with prospective licensees to determine the royalty to practice their IP, and this negotiated royalty frequently reflects the value the licensee would obtain from exercising those rights. However, in the context of EHI, we proposed that a limitation on rents is essential due to the likelihood that rents will frustrate access, VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 exchange, and use of EHI, particularly because of the power dynamics that exist in the health IT market (84 FR 7545). We also emphasized that actors are not required to seek the protection under this (or any other) exception. We explained that if an actor does not want to license a particular technology in accordance with the exception, it may choose to comply with the information blocking provision in another way, such as by developing and providing alternative means of accessing, exchanging, and using EHI that are similarly efficient and efficacious (84 FR 7545). Comments. We received many comments in support of this proposed exception. One commenter highlighted the significance of the exception, noting that data is often locked in proprietary software systems, at times preventing providers from being able to connect and exchange information. Some commenters requested additional examples and that ONC issue guidance to assist actors in understanding how they can determine whether a request to license is valid, when this exception would apply, and what steps actors would be required to take to attain coverage under the exception. A couple of commenters suggested that there should be a distinction between requests to license interoperability elements to facilitate a patient’s treatment or individual access versus requests that are simply for the requestor’s own business purposes, such as commercializing a competing product. A couple of commenters requested additional provisions in the final rule to improve transparency regarding licensing of interoperability elements. Commenters recommended that ONC require regulated actors who engage in RAND licensing of interoperability elements to publish either standard licensing rate offers or actual licenses. Response. We thank commenters for their support for this exception as well as the constructive feedback. We may consider developing materials in the future regarding the application of the exceptions should the need arise. However, we believe the final rule clearly describes the conditions actors must meet in order to be covered by each exception, and informational materials are not necessary at this time. We appreciate the comments that recommended that there should be a distinction between requests for licensing of interoperability elements to facilitate a patient’s treatment or individual access versus requests that are simply for the requestor’s own PO 00000 Frm 00249 Fmt 4701 Sfmt 4700 25889 business purposes. We emphasize that we made such a distinction in the Proposed Rule and we reiterate that distinction here in the final rule. In order for an actor to consider licensing its interoperability elements under this exception, the requestor would need to have a claim to the underlying, existing EHI for which the interoperability element would be necessary for access, exchange, or use (see the Privacy Exception discussion in VIII.D.1.b). An actor will not implicate the information blocking provision and does not need to seek coverage under this exception in circumstances where the entity requesting to license or use the interoperability element is not seeking to use the interoperability element to interoperate with either the actor or the actor’s customers in order for EHI to be accessed, exchanged, or used. For instance, an actor would not need to consider licensing its interoperability elements in accordance with this exception to a firm that requested a license solely for that firm’s use in developing its own technologies or business when no EHI is sought to be accessed, exchanged, or used. In other words, if there is no nexus between a requestor’s need to license an interoperability element and existing EHI on one or more patients, an actor does not need to consider licensing the interoperability element requested in accordance with this exception. For example, if a developer of certified health IT included proprietary APIs in its product to support referral management, it would not need to license the interoperability element(s) associated with those referral management APIs simply because a requestor ‘‘knocked on the actor’s door’’ and asked for a license with no EHI involved. The license request from a requestor must always be based on a need to access, exchange, or use EHI at the time the request is made—not on the requestor’s prospective intent to access, exchange, or use EHI at some point in the future. We appreciate the recommendation that ONC should require regulated actors who license interoperability elements to publish either standard licensing rate offers or actual licenses. However, we have decided not to finalize such a requirement because we believe actors should have discretion to decide whether to publish their licensing rates and/or licenses. We believe this exception will still effectively regulate the licensing of interoperability elements even if it does not require the publication of such rates and licenses. Nonetheless, we commend E:\FR\FM\01MYR3.SGM 01MYR3 25890 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations commenters’ desire to enhance transparency in the final rule and will continue to consider steps to further promote transparency regarding our information blocking policies in future rulemakings. We note that we have changed the title of this exception from ‘‘Exception— Licensing of interoperability elements on reasonable and non-discriminatory terms’’ to ‘‘When will an actor’s practice to license interoperability elements in order for electronic health information to be accessed, exchanged, or used not be considered information blocking?’’ Throughout this final rule preamble, we use ‘‘Licensing Exception’’ as a short form of this title, for ease of reference. As stated in Section VIII.D of this final rule preamble, we have changed the titles of all of the exceptions to questions to improve clarity. We have also edited the wording of the introductory text in § 171.303, in comparison to that proposed (84 FR 7602), so that it is consistent with the finalized title in § 171.303. We believe these conforming changes in wording of the introductory text also improve clarity in this section. Comments. We received many comments requesting greater clarity and precision regarding key terms within the proposed exception in order to clarify the scope and application of the exception. Response. We appreciate these comments and agree with commenters that it is essential that our final policies are clear, administrable, and actionable. Accordingly, we have made several updates to this exception as well as to terms and concepts that apply broadly throughout the information blocking section. Notably, we have: (1) Revised the definition of interoperability element (see section VIII.C.3.b); (2) clarified the process and timeframe for negotiating a license (see the discussion later in this section of the preamble); (3) removed the ‘‘RAND’’ framework, which commenters noted was confusing (see the discussion later in this section of the preamble); and (4) clarified the relationship between this exception and the Fees Exception (see § 171.302 and the discussion later in this section of the preamble). Comments. A few commenters requested clarification regarding whether the information blocking provision, and particularly this exception, applies to all licensing agreements already in effect; only licensing agreements that were entered into following the effective date of the Cures Act; or only those licensing agreements entered into after the effective date of ONC’s final rule. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 Commenters recommended that licensing agreements that were entered into prior to the effective date of the final rule should be considered valid and effective. Commenters also recommended that all negotiations and licensing agreements entered into after the effective date of ONC’s final rule should comply with the requirements of the final rule. Commenters requested that if ONC plans to enforce provisions of the final rule retroactively, ONC should allow actors to review and renegotiate licensing agreements for compliance with the terms at the request of the licensee. Response. We thank commenters for these comments. We emphasize that actors are expected to be in full compliance with the information blocking provision when this rule becomes effective. We note that the information blocking section of this final rule (part 171) will not become effective until 6 months after the publication date of the final rule. We believe this delayed compliance date will provide actors with adequate time to assess their existing licensing contracts or agreements and make appropriate changes and amendments to comply with this final rule. OIG and ONC are coordinating timing of the compliance date of the information blocking section of this final rule (45 CFR part 171) and the start of information blocking enforcement. We are providing the following information on timing for actors. Enforcement of information blocking CMPs in section 3022(b)(2)(A) of the PHSA will not begin until established by future notice and comment rulemaking by OIG. As a result, actors would not be subject to penalties until CMP rules are final. At a minimum, the timeframe for enforcement would not begin sooner than the compliance date of this final rule and will depend on when the CMP rules are final. Discretion will be exercised such that conduct that occurs before that time will not be subject to information blocking CMPs. We are aware that some actors may currently have in place licensing agreements that contravene the information blocking provision and do not meet the requisite conditions for this exception. We expect actors in these situations to take immediate steps to come into compliance with the information blocking provision by amending their contracts or agreements to eliminate or void any clauses that contravene the information blocking provision. We emphasize that an existing license is no excuse or justification for information blocking. One of the ways we have heard that PO 00000 Frm 00250 Fmt 4701 Sfmt 4700 actors interfere with the access, exchange, and use of EHI is through formal restrictions, such as discriminatory licensing agreements, and this final rule, as well as this exception, seek to address those very circumstances and situations. Comments. One commenter expressed concern about this exception on privacy and security grounds. The commenter noted that a proliferation of EHI to a multitude of entities who have not and cannot be vetted is likely to increase the risks to the privacy and security of such data and create secondary and tertiary markets for such data without clear regulation and oversight. Response. We appreciate this comment and understand that the secondary use of data creates privacy and security challenges in the health care industry and beyond. We refer readers to section VIII.C.6 of this preamble for a detailed discussion of how we are addressing this issue in this rule. i. Responding to Requests We proposed that, upon receiving a request to license or use interoperability elements, an actor would be required to respond to the requestor within 10 business days from receipt of the request. We noted that the request could be made to ‘‘license’’ or ‘‘use’’ the interoperability elements because a requestor may not always know that ‘‘license’’ is the legal mechanism for ‘‘use’’ when making the request (84 FR 7546). In order to meet this condition, we proposed that the actor would be required to respond to the requestor within 10 business days from the receipt of the request by: (1) Negotiating with the requestor in a RAND fashion to identify the interoperability elements that are needed; and (2) offering an appropriate license with RAND terms, consistent with its other obligations under the exception. We emphasized that, in order to qualify for the proposed exception, the actor would only be required to negotiate with the requestor in a RAND fashion and to offer a license with RAND terms. We proposed that the actor would not be required to grant a license in all instances. We did not propose a set timeframe for when the negotiations must be resolved (84 FR 7546). We requested comment on whether 10 business days is an appropriate amount of time for the actor to respond to the requestor. We noted that we considered proposing response timeframes ranging from 5 business days to 15 business days. We also considered proposing two separate timeframes for: (1) Negotiating E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations with the requestor; and (2) offering the license. We stated that if commenters prefer a different response timeframe or approach than proposed, we requested that commenters explain their rationale with as much detail as possible. In addition, we requested comment on whether we should create set limits for: (1) The amount of time the requestor has to accept the actor’s initial offer or make a counteroffer; (2) if the requestor makes a counteroffer, the amount of time the actor has to accept the requestor’s counteroffer or make its own counteroffer; and (3) an allowable number of counteroffers in negotiations (84 FR 7546). Comments. We received many comments regarding the proposed framework and timeframe for responding to requests to license or use interoperability elements. Some commenters were supportive of our proposal and stated that 10 business days is an appropriate amount of time for the actor to respond to the requestor. Other commenters disagreed with the proposed timeframe, explaining that 10 business days is insufficient time to begin a license negotiation. Commenters suggested various alternate timeframes ranging from 20 to 90 business days. One commenter requested that ONC consider differentiating the timeline expected for making an offer predicated on an interoperability element being available as an existing capability, as opposed to an interoperability element requiring new formal licensure or requiring one off ‘‘custom’’ or ‘‘spec’’ development. Another commenter recommended that the process be divided into a series of steps with a requirement that a request for information be acknowledged and negotiations begin within 10 business days and completed within 20 business days. One commenter recommended that the 10-day timeframe be for beginning negotiations with the intent to furnish a quotation for a license. Some commenters stated that timeframes should not be set, as the license negotiation process is highly variable based on the specific requestor and circumstances. One commenter expressed concern that the proposed exception would increase the administrative burden on covered entities, particularly regarding the response timeframe and the actor’s inability to review and/or vet the appropriateness of a request before responding. Response. We thank commenters for these thoughtful comments. To be responsive to comments, we have updated the response and license negotiation framework and timeframe. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 The finalized provision in § 171.303(a) states that, upon receiving a request to license an interoperability element for the access, exchange, or use of EHI, the actor must: (1) Begin license negotiations with the requestor within 10 business days from receipt of the request (§ 171.303(a)(1)); and (2) negotiate a license with the requestor, subject to the licensing conditions in paragraph (b) of the exception, within 30 business days from receipt of the request (§ 171.303(a)(2)). We note that the expectation in (2) above is that the actor will negotiate with the requestor in good faith. If it is determined that the negotiation is not in good faith, the actor would not qualify for this exception. These provisions create a clear and administrable timeline for actors to follow that is informed by stakeholder comments and will reduce potential burden on actors. Further, it provides actors with appropriate flexibility for negotiating a good faith license, taking into consideration the potential complexity and variability associated with negotiations for licensing interoperability elements. In instances when an actor is unable to negotiate a good faith license subject to the requirements in § 171.303(a)(2), the actor may not meet the conditions of this exception. As part of an information blocking investigation, ONC and OIG may consider documentation or other writings maintained by the actor around the time of the request that indicate why the actor was unable to meet the conditions. This would not permit the actor to be covered by this exception, but discretion in determining whether to enforce the information blocking provision may be exercised. We note that we have revised paragraph § 171.303(a) by changing ‘‘a request to license or use’’ to ‘‘a request to license’’ for clarity. We emphasize, however, that this change does not alter the meaning or application of the provision. We reiterate, as we proposed, that the request could be made to ‘‘license’’ or ‘‘use’’ the interoperability elements because a requestor may not always know that ‘‘license’’ is the legal mechanism for ‘‘use’’ when making the request (see 84 FR 7546). We believe it is unnecessary to include ‘‘or use’’ in the regulation text because actors should know that a request to ‘‘use’’ would be synonymous with a request to ‘‘license’’ and would thus be covered by this exception. Further, the inclusion of ‘‘or use’’ could be confusing since ‘‘use’’ is a defined term in the context of ‘‘access, exchange, or use’’ of EHI, but would carry different meaning in the context of ‘‘using’’ an interoperability element, as opposed to ‘‘using’’ EHI. PO 00000 Frm 00251 Fmt 4701 Sfmt 4700 25891 ii. Licensing Conditions We proposed to require, as a condition of this exception, that any terms upon which an actor licenses interoperability elements must be reasonable and non-discriminatory (RAND). We recognized in the Proposed Rule that strong legal protections for IP rights can promote competition and innovation. Nevertheless, IP rights can also be abused in ways that undermine these goals. We explained that we believe this potential for abuse is heightened when the IP rights pertain to functional aspects of technology that are essential to enabling interoperability. We emphasized that to the extent that the interoperability elements are essential to enable the efficient access, exchange, or use of EHI by particular persons or for particular purposes, any practice by the actor that could impede the use of the interoperability elements for that purpose—or that could unnecessarily increase the cost or other burden of using the elements for that purpose—would give rise to an obvious risk of interference with access, exchange, or use of EHI under the information blocking provision (84 FR 7546). We explained that our goal was to balance the need for IP protections with the need to ensure that this proposed exception does not permit actors to abuse their IP or other proprietary rights in inappropriate ways that would block the development, adoption, or use of interoperable technologies and services. The abuse of IP rights in such ways is incompatible with the information blocking provision, which protects the investments that taxpayers and the health care industry have made to adopt technologies that will enable the efficient sharing of EHI to benefit consumers and the health care system. We emphasized that while actors are entitled to protect and exercise their IP rights, to benefit from the exception to the information blocking provision they must do so on terms that do not undermine these efforts and prevent the appropriate flow of EHI. We proposed that these requirements would apply to both price terms (such as royalties and license fees) and other terms, such as conditions or limitations on access to interoperability elements or the purposes for which they can be used (see 84 FR 7546). Comments. Several health IT developers strongly disagreed with the framework and conditions of this exception. These commenters stated that compulsory licensing of health IT on RAND terms is inconsistent with the usual use of RAND with regards to E:\FR\FM\01MYR3.SGM 01MYR3 25892 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations standards development. The commenters opined that the proposed exception is a significant overstep that exceeds Congressional intent in the Cures Act and would have a detrimental effect on innovation in the industry. Commenters stated that IP rights would not be adequately protected under the exception, as the exception would allow unprecedented access to IP, and requested that ONC better protect IP rights in the final rule. One commenter recommended that ONC make clear that there are other ways for actors to be in compliance with the information blocking provision besides licensing interoperability elements to all. Response. We appreciate these comments. Responsive to these comments, we have removed all references to ‘‘RAND.’’ However, we have finalized the majority of the substantive conditions for the licensing of interoperability elements under this exception (§ 171.303(b)) as proposed (i.e., the sections on scope of rights, reasonable royalty, non-discriminatory terms, collateral terms, and nondisclosure agreement), with slight modifications discussed below. In response to comments regarding compulsory licensing, we emphasize that we do not view this exception as constituting compulsory licensing. Each exception is voluntary and actors may choose whether or not they want to seek coverage under an exception. The exceptions operate to the benefit of actors and are intended to provide actors with certainty that certain practices that would normally constitute information blocking will not be considered information blocking, provided the actor’s practice meets the conditions of the exception. The fact that a practice to license interoperability elements does not meet the conditions of an exception does not mean that the practice would necessarily constitute information blocking. As a result, practices that do not meet the exception will have to be reviewed on a case-bycase basis in order to assess the specific facts and circumstances and to determine, for example, the actor’s intent and whether the practice rises to the level of an interference. In addition, under the Content and Manner Exception (§ 171.301), we establish that an actor is not required to respond to a request to access, exchange, or use EHI in the manner requested if the actor would be required to license IP and cannot reach agreeable terms for the license with the requestor (§ 171.301(b)(1)(ii)). This provision allows actors who do not want to license their IP to respond in an alternative manner that does not require VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 the licensing of proprietary IP. Further, if the actor chooses to respond in the manner requested, and such manner requires the licensing of an interoperability element(s), the actor could license the interoperability elements(s) with whatever terms the actor chooses, so long as the actor is able to reach agreeable terms with the requestor. We refer readers to the discussion in the Content and Manner Exception in VIII.D.2.a, which highlights how the Content and Manner Exception supports an actor’s ability to protect their IP. We understand and appreciate that health IT developers and other entities have invested significant resources to innovate and our policies aim to support these innovations and advancements regarding the access, exchange, and use of EHI. We stress that this exception was drafted with innovation in mind and operates to benefit health IT developers and other actors by allowing them to obtain remuneration for their IP. The Cures Act did not create a specific carve out to the information blocking provision for IP rights, but did provide HHS with the authority to establish reasonable and necessary exceptions that do not constitute information blocking. We interpret the definition of information blocking in the Cures Act (section 3022(a) of the PHSA) to encompass any fee that materially discourages or otherwise inhibits the access, exchange, or use of EHI, so long as the actor has the requisite intent in the statute. Thus, without clarifying this exception, an actor could implicate the information blocking provision whenever it charged any royalty to license its interoperability elements. We believe this broad interpretation of the information blocking provision would have a detrimental effect of innovation, competition, and consumer welfare. As such, we established this exception to provide assurances to actors that licensing of interoperability elements for access, exchange, or use will not be considered information blocking, so long as the actor’s practice meets all conditions in the exception. We reiterate that the actor would also need to have the requisite intent, as set forth in the statute. We emphasize that actors are able to make reasonable profits from the licensing of interoperability elements, so long as such profits comply with the ‘‘reasonable royalty’’ provision in this exception in § 171.303(b)(2). We also note that the non-disclosure agreement provision in § 171.303(b)(5) establishes additional IP protections. We emphasize that, in the context of information blocking, control of PO 00000 Frm 00252 Fmt 4701 Sfmt 4700 interoperability elements is often a proxy for control of access, exchange and use of EHI. For example, where EHI is stored in a proprietary format, the EHI cannot be accessed or used if information about the proprietary format does not accompany the EHI. Similarly, when EHI is stored electronically, a technological solution must exist to make the EHI available for use by others. We clarify that health IT developers are not required to license all of their IP. As discussed earlier in this section, an actor would not need to seek coverage under this exception if the actor’s practice is not likely to interfere with the access, exchange, or use of actual EHI. Thus, an essential element of the information blocking provision is that there is actual EHI at stake. Further, as discussed above, there would also need to be a nexus between a requestor’s need to license an interoperability element and the existing EHI. If there is not such a nexus, the actor would not need to seek coverage under this exception (see the Privacy Exception discussion in VIII.D.1.b). We clarify that, if an actor licenses an interoperability element to one requestor, the actor must license that same interoperability element to future similarly situated requestors with the same terms. Once an actor has granted a license for a particular interoperability element, an actor cannot choose to license an interoperability element to one requestor and then refuse or use different terms to license the same interoperability element to a second similarly situated requestor, even if the actor offers to provide the EHI via an alternative manner in accordance with the Content and Manner Exception in § 171.301. In other words, an actor cannot pick and choose who can license a given interoperability element or who gets favorable license terms based on the actor’s relationship with the requestor. Comments. A couple of commenters noted that there is a wide-spectrum of perspectives among stakeholders of common license agreement terms such as limitations on liability and indemnification, which may make reasonableness and non-discriminatory aspects challenging to interpret. Response. We appreciate these concerns and understand that there is the potential for significant variability in the terms included in license agreements, particularly for licensing interoperability elements. We believe the conditions adopted in this final exception are clear, equitable, and implementable. We emphasize that each information blocking case will turn on its own unique facts and circumstances. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations This fact-based approach is appropriate for this exception particularly due to the potential variability in interoperability elements and licensing terms noted by the commenters. Scope of Rights To qualify for the proposed exception, we proposed that the actor must license the requested interoperability elements with all rights necessary to access and use the interoperability elements for the following purposes, as applicable: • All rights necessary to access and use the interoperability elements for the purpose of developing products or services that are interoperable with the actor’s health IT or with health IT under the actor’s control and/or any third party who currently uses the actor’s interoperability elements to interoperate with the actor’s health IT or health IT under the actor’s control. These rights would include the right to incorporate and use the interoperability elements in the licensee’s own technology to the extent necessary to accomplish this purpose. • All rights necessary to market, offer, and distribute the interoperable products and services described above to potential customers and users, including the right to copy or disclose the interoperability elements as necessary to accomplish this purpose. • All rights necessary to enable the use of the interoperable products or services in production environments, including using the interoperability elements to access and enable the exchange and use of EHI (84 FR 7546 and 7547). We requested comment on whether these rights are sufficiently inclusive to support licensees in developing interoperable technologies, bringing them to market, and deploying them for use in production environments. We also requested comment on the breadth of these required rights and if they should be subject to any limitations that would not interfere with the uses we have described above (84 FR 7547). Comments. We received a couple of comments regarding the scope of rights under this exception. One commenter recommended that ONC specify that actors can require that licensees of the proprietary IP embodied in an interoperability element use that IP only for the licensed purpose, or ONC should allow actors to decline to license that IP at all. One commenter suggested that we broaden the scope of rights regarding the development of products or services that are interoperable so that interoperability does not need to be tied to the actor’s health IT, health IT under the actor’s control, or any third party VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 who currently uses the actor’s interoperability elements to interoperate with the actor’s health IT or health IT under the actor’s control. Response. We thank commenters for these thoughtful comments. We have streamlined the ‘‘scope of rights’’ section of this exception for clarity and to align with the overarching goal throughout the information blocking section of enabling the access, exchange, and use of EHI. The finalized ‘‘scope of rights’’ section in § 171.303(c)(1) states that the license must provide all rights necessary to: (1) Enable the access, exchange, or use of EHI; and (2) achieve the intended access, exchange, or use of EHI via the interoperability element(s). These rights replaced the rights we proposed in the ‘‘scope of rights’’ section (see proposed § 171.206(b)(1)(i)– (iii) and 84 FR 7546 and 7547) because they more clearly and succinctly explain the scope of rights we were trying to convey in the Proposed Rule. The proposed scope of rights included examples that are not necessary in the regulatory text. Regarding the comment that we should specify that actors can require that licensees of the proprietary IP embodied in an interoperability element use that IP only for the licensed purpose, or ONC should allow actors to decline to license that IP at all, we clarify that actors may require that licensees of the proprietary IP embodied in an interoperability element only use that IP for the licensed purpose, so long as such limits are in compliance with all the conditions in § 171.303, including the scope of rights provisions in § 171.303(c)(1). For instance, an actor could place a limitation in the license that the license only covers a one-time use of the interoperability element for accessing and exchanging certain EHI. In this scenario, this limitation could be allowed under the exception if: (1) Despite the limitation, the licensee’s request for access, exchange, or use of EHI is met; and (2) the limitation complies with the conditions in § 171.303. Similarly, if an app developer requests to license a health IT developer’s interoperability element in order to enable the exchange of EHI by integrating the app developer’s CDS software into Provider A’s EHR, the health IT developer could scope the rights in the license to restrict the app developer from using the license to complete the same integration for Provider B, so long as the license complies with the conditions in § 171.303. We also emphasize that under the Content and Manner Exception (§ 171.301), actors are decline to license their proprietary IP so long as PO 00000 Frm 00253 Fmt 4701 Sfmt 4700 25893 they are able to respond to the request to access, exchange, or use EHI through an alternative manner specified in § 171.301(b)(2)(ii)(A)–(C). We have decided not to broaden the scope of rights regarding the development of products or services that are interoperable as suggested by the commenter because we believe this provision, as proposed, is appropriately tailored to addresses information blocking and should be focused on health IT under the actor’s control or any third party who currently uses the actor’s interoperability elements to interoperate with health IT under the actor’s control. Reasonable Royalty As a condition of this exception, we proposed that if an actor charges a royalty for the use of interoperability elements, the royalty base and rate must be reasonable. Importantly, we proposed that the reasonableness of any royalties would be assessed solely on the basis of the independent value of the actor’s technology to the licensee’s product, not on any strategic value stemming from the actor’s control over essential means of accessing, exchanging, or using EHI (84 FR 7547). In evaluating the actor’s assertions and evidence that the royalty was reasonable, we proposed that ONC may consider the following factors: • The royalties received by the actor for the licensing of the proprietary elements in other circumstances comparable to RAND-licensing circumstances. • The rates paid by the licensee for the use of other comparable proprietary elements. • The nature and scope of the license. • The effect of the proprietary elements in promoting sales of other products of the licensee and the licensor, taking into account only the contribution of the elements themselves and not of the enhanced interoperability that they enable. • The utility and advantages of the actor’s interoperability element over the existing technology, if any, that had been used to achieve a similar level of access, exchange, or use of EHI. • The contribution of the elements to the technical capabilities of the licensee’s products, taking into account only the value of the elements themselves and not the enhanced interoperability that they enable. • The portion of the profit or of the selling price that may be customary in the particular business or in comparable businesses to allow for the use of the proprietary elements or analogous E:\FR\FM\01MYR3.SGM 01MYR3 25894 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations elements that are also covered by RAND commitments. • The portion of the realizable profit that should be credited to the proprietary elements as distinguished from non-proprietary elements, the manufacturing process, business risks, significant features or improvements added by the licensee, or the strategic value resulting from the network effects, switching costs, or other effects of the adoption of the actor’s technology. • The opinion testimony of qualified experts. • The amount that a licensor and a licensee would have agreed upon (at the time the licensee began using the elements) if both were considering the RAND obligation under the exception and its purposes, and had been reasonably and voluntarily trying to reach an agreement (84 FR 7547). We noted that these factors mirror those used by courts that have examined the reasonableness of royalties charged pursuant to a commitment to a standards developing organization to license standard-essential technologies on RAND terms (see Microsoft Corp. v. Motorola, Inc.; 187 In re Innovatio IP Ventures, LLC Patent Litig.; 188 and Realtek Semiconductor Corp. v. LSI Corp. 189 ). We noted, however, that we adapted the factors to the information blocking context (84 FR 7547). We proposed that the RAND inquiry should focus on whether the royalty demanded by the actor represents the independent value of the actor’s proprietary technology. We proposed that if the actor has licensed the interoperability element through a standards developing organization in accordance with such organization’s policies regarding the licensing of standards-essential technologies on RAND terms, the actor may charge a royalty that is consistent with such policies. We proposed that we would ask whether the actor is charging a royalty that is not based on the value of its technology (embodied in the interoperability elements) but rather includes the strategic value stemming from the adoption of that technology by customers or users. We proposed that we would consider the technical contribution of the actor’s interoperability elements to the licensee’s products—such as any proprietary capabilities or features that the licensee uses in its product—but would screen out any functional aspects 187 Case No. 10–cv–1823 JLR, 2013 WL 2111217 (W.D.Wash. Apr. 25, 2013). 188 MDL 2303, 2013 WL 5593609 (N.D.Ill. Oct. 3, 2013). 189 Case No. 5:12–cv–03451–RMW, 2014 WL 46997 (N.D.Cal. Jan. 6, 2014). VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 of the actor’s technology that are used only to establish interoperability and enable EHI to be accessed, exchanged, and used. Additionally, we proposed that to address the potential risk of royalty stacking, we would need to consider the aggregate royalties that would apply if owners of other essential interoperability elements made royalty demands of the implementer. Specifically, we proposed that, to qualify for the exception, the actor must grant licenses on terms that are objectively commercially reasonable taking into account the overall licensing situation, including the cost to the licensee of obtaining other interoperability elements that are important for the viability of the products for which it is seeking to license interoperability elements from the actor (84 FR 7547 and 7548). We clarified that this condition would not preclude an actor from licensing its interoperability elements pursuant to an existing RAND commitment to a standards developing organization. We also noted that, in addition to complying with the requirements described above, to meet this proposed condition, any royalties charged must meet the condition, proposed separately below, that any license terms be nondiscriminatory (84 FR 7548). We requested comment on these aspects of the proposed exception. We encouraged commenters to consider, in particular, whether the factors and approach we described will be administrable and appropriately balance the unreasonable blocking by actors of the use of essential interoperability elements with the need to provide adequate assurance to investors and innovators that they will be able to earn a reasonable return on their investments in interoperable technologies. Further, we noted that if our proposed approach did not adequately balance these concerns or would not achieve our stated policy goals, we asked that commenters suggest revisions or alternative approaches. We asked that such comments be as detailed as possible and provide rigorous economic justifications for any suggested revisions or alternative approaches (84 FR 7548). Comments. We received many comments regarding reasonable royalties and the ability of actors to make a profit. Some commenters supported the proposed framework. A couple of commenters recommended that we not allow any royalty for licensing interoperability elements. One of those commenters suggested we require ‘‘RAND-Zero’’ licensing, by which the copyright holder may still impose non-discriminatory licensing PO 00000 Frm 00254 Fmt 4701 Sfmt 4700 terms on the licensee but may not charge a royalty. The commenter also expressed concern that the overlap between this exception and the exception for recovering costs reasonably incurred creates the potential for actors to earn a double recovery. The commenter explained that licensing of IP is intended to recoup the costs of development of that IP, so where the IP is an interoperability element, the costs reasonably incurred for its development should be incorporated into the royalty rate. The commenter recommended that we be clearer that in these circumstances, only a single recovery is permitted. Provider and registry organizations were concerned that the ability to charge reasonable royalties to license interoperability elements may present an opening for health IT developers to charge unreasonably high fees for exchanging information with provider groups and registries. As such, the commenters recommended that ONC require actors to disclose the methodology behind their fees. Alternatively, other commenters, consisting primarily of health IT developers, expressed concern that the proposals regarding reasonable royalties were too restrictive. Commenters were concerned that the exception, as proposed, would have a detrimental effect on innovation in the industry as it provides disincentives for established companies to develop new, forwardleaning solutions. A few commenters recommended that the value of the actor’s technology must be constructed on a ‘‘fair market’’ basis. Commenters stated that ONC should not set or determine the reasonableness of royalties. However, if ONC decided to set or define the reasonableness of royalties, the primary factor for such a determination should be the willingness of licensees to agree to a given royalty rate. A couple of commenters requested clarification regarding ONC’s approach for calculating reasonable royalties and ONC’s basis for determining whether a royalty is ‘‘reasonable.’’ Response. We thank commenters for these thoughtful comments. First, we note, as discussed previously in this section, we have removed all references to ‘‘RAND.’’ However, we have finalized this reasonable royalty provision (§ 171.303(c)(2)) as proposed, with a slight modification for consistency and the addition of a paragraph in § 171.303(c)(2)(iv). The slight modification was made to § 171.303(c)(2)(iii), in which we deleted ‘‘on reasonable and non-discriminatory terms’’ in order to align with the overall approach of removing ‘‘RAND’’ E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations throughout the exception. In response to comment, we added a paragraph in § 171.303(c)(2)(iv) to address the potential for double recovery in this exception and the Fees Exception (§ 171.302). The new paragraph states that an actor may not charge a royalty for IP if the actor recovered any development costs pursuant to § 171.302 that led to the creation of the IP. In response to the commenters who expressed concern that our approach for allowing reasonable royalties is too restrictive and could slow innovation, we emphasize that our regulatory approach to implementing the information blocking provision of the Cures Act is informed by years of research and stakeholder engagement indicating that information blocking undermines public and private sector investments in the nation’s health IT infrastructure and frustrates efforts to use modern technologies to improve health care quality and efficiency, accelerate research and innovation, and provide greater value and choice to health care consumers. In our experience, contractual and IP rights are frequently used to extract rents for access to EHI or to prevent competition from health IT developers of interoperable technologies and services. These practices frustrate access, exchange, and use of EHI and stifle competition and innovation in the health IT sector. We believe the general claim that the limits on licensing royalties within this exception would inhibit innovation misstates the experiences many stakeholders face today. Our experience in the health IT industry has highlighted that innovation has struggled under current market practices, in which there is no limit on fees and royalties for access and use of interoperability elements. In fact, the ability of large entities with significant market power to prevent access and use of essential interoperability elements has prevented and continues to prevent large amounts of potential investment in innovative solutions for the United States health care market. We also refer readers to the Content and Manner Exception (§ 171.301), where we further address commenter concerns regarding protections for their proprietary IP. We also appreciate the comments that suggested we not allow any royalty for licensing interoperability elements because allowing a royalty could create an opening for actors to continue to charge unreasonably high fees for the exchange of EHI. We have decided to allow reasonable royalties that must meet certain requirements (see VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 § 171.303(b)(2)) because the allowance of such royalties will promote competition, consumer welfare, and investment in innovation. The conditions we have finalized in § 171.303(b)(2) are specifically tailored to address the type of abuse about which commenters expressed concern. Under the finalized reasonable royalty provision, it would generally be appropriate for actors to license their IP on terms that are non-discriminatory and do not interfere with the access, exchange, or use of EHI so long as the actor meets all of the conditions in § 171.303. We emphasize that actors are able to make reasonable profits from the licensing of interoperability elements, so long as such profits comply with § 171.303(b)(2). These licensing practices will further the goals of the information blocking provision by allowing actors to protect the value of their innovations and earn returns on the investments they have made to develop, maintain, and update those innovations. This approach will also protect future incentives to invest in, develop, and disseminate interoperable technologies and services that could improve the lives and safety of patients nationwide. We acknowledge that limiting the royalties IP holders can charge for access, exchange, or use of EHI departs from IP policy. Absent specific circumstances, IP holders are generally free to negotiate with prospective licensees to determine the royalty to practice their IP, and this negotiated royalty frequently reflects the value the licensee would obtain from exercising those rights. However, in the context of EHI, a limitation on royalties is essential due to the likelihood that unreasonable royalties would frustrate access, exchange, and use of the EHI, particularly because of the imbalanced power dynamics that currently exist in the health IT market. In response to commenters who requested clarification regarding ONC’s approach for calculating reasonable royalties, we emphasize that each case of potential information blocking, as well as the ‘‘reasonableness’’ of a royalty, will hinge on the specific facts and circumstances of the case. We explained in the Proposed Rule that the actor would need to show that the royalty base was reasonable and that the royalty was within a reasonable range for the interoperability elements at issue. Importantly, we explained that the reasonableness of any royalties would be assessed solely on the basis of the independent value of the actor’s technology to the licensee’s product, not on any strategic value stemming from PO 00000 Frm 00255 Fmt 4701 Sfmt 4700 25895 the actor’s control over essential means of accessing, exchanging, or using EHI (84 FR 7547 and 7548). For additional clarification regarding the specific factors to be considered in evaluating an actor’s assertion and evidence that a royalty was reasonable, we refer reader to the discussion above and the discussion in the Proposed Rule regarding reasonable royalties (see 84 FR 7547 and 7548). Non-Discriminatory Terms We proposed that for the exception to apply, the terms on which an actor licenses and otherwise provides interoperability elements must be nondiscriminatory. We explained that this condition would apply to both price and non-price terms, and thus would apply to the royalty terms discussed immediately above as well as other types of terms that may be included in licensing agreements or other agreements related to the provision or use of interoperability elements (84 FR 7548). We proposed that to comply with this condition, the terms on which the actor licensed the interoperability elements must be based on criteria that the actor applied uniformly for all substantially similar or similarly situated classes of persons and requests. In order to be considered non-discriminatory, such criteria would have to be objective and verifiable, not based on the actor’s subjective judgment or discretion. We emphasized that this proposal does not mean that the actor must apply the same terms for all persons or classes of persons requesting a license. However, any differences in terms would have to be based on actual differences in the costs that the actor incurred or other reasonable and non-discriminatory criteria. Moreover, we proposed that any criteria upon which an actor varies its terms or conditions would have to be both competitively neutral—meaning that the criteria are not based in any part on whether the requestor or other person is a competitor, potential competitor, or will be using EHI obtained via the interoperability elements in a way that facilitates competition with the actor—and neutral as to the revenue or other value that the requestor may derive from access, exchange, or use of the EHI obtained via the interoperability elements, including any secondary use of such EHI (84 FR 7548). For a detailed example regarding this proposed condition, see the Proposed Rule (84 FR 7548). We noted that the foregoing conditions were not intended to limit an actor’s flexibility to set different terms based on legitimate differences in the E:\FR\FM\01MYR3.SGM 01MYR3 25896 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations costs to different classes of persons or in response to different classes of requests, so long as any such classification was in fact based on neutral criteria (in the sense described above) that are objectively verifiable and were applied in a consistent manner for persons and/ or requests within each class. For instance, the proposed condition would not preclude an actor from pursuing strategic partnerships, joint ventures, co-marketing agreements, crosslicensing agreements, and other similar types of commercial arrangements under which it provides more favorable terms than for other persons with whom it has a more arms-length relationship. We explained that in these instances, the actor should have no difficulty identifying substantial and verifiable efficiencies that demonstrate that any variations in its terms and conditions were based on objective and neutral criteria (84 FR 7548). We proposed that a health IT developer of certified health IT who is an ‘‘API Technology Supplier’’ under the Condition of Certification proposed in § 170.404 would not be permitted to offer different terms in connection with the APIs required by that Condition of Certification. We proposed that API Technology Suppliers are required to make these APIs available on terms that are no less favorable than provided to their own customers, suppliers, partners, and other persons with whom they have a business relationship (84 FR 7548 and 7549). We requested comments on the foregoing conditions (84 FR 7549). Comments. One commenter disagreed with the proposal that the terms must not be based in any part on revenue or other value the requestor may derive from access, exchange, or use of EHI obtained via the interoperability elements, including the secondary use of such EHI. The commenter stated that such information should be considered. Response. We thank the commenter for this feedback, but have decided to finalize this provision as proposed, with slight modification. We continue to believe that license terms for licensing interoperability elements required for the access, exchange, or use of EHI should not be based in any part of the revenue or other value the requestor may derive from access, exchange, or use of EHI obtained via the interoperability elements, including the subsequent use of such EHI. The allowance of such terms could enable the type of opportunistic pricing and anti-competitive behavior that this exception seeks to address. We note that we have removed the proposed example about ‘‘secondary use’’ from the VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 regulation text because such an example is not necessary in the regulation text (see 84 FR 7604). We emphasize, however, that we continue to maintain that the terms must not be based on revenue or other value derived from the subsequent use of EHI. Our policy on this point has not changed from the Proposed Rule. The terms and conditions could vary based on neutral, objectively verifiable, and uniformly applied criteria. These might include, for example, significantly greater resources consumed by certain types of apps, such as those that export large volumes of data on a continuous basis, or the heightened risks associated with apps designed to ‘‘write’’ data to the EHR database or to run natively within the EHR’s user interface. We emphasize that health IT developers that license interoperability elements in order for EHI to be accessed, exchanged, or used could not vary the license terms and conditions based on subjective criteria, such as whether it thinks an app will be ‘‘popular’’ or is a ‘‘good fit’’ for its ecosystem. Nor could developers offer different terms or conditions on the basis of objective criteria that are not competitively neutral, such as whether an app ‘‘connects to’’ other technologies or services, provides capabilities that the EHR developer plans to incorporate in a future release of its technology, or enables an efficient means for customers to export data for use in other databases or technologies that compete directly with the EHR developer. Similarly, the EHR developer could not set different terms or conditions based on how much revenue or other value the app might generate from the information it collects through the APIs, such as by introducing a revenue-sharing requirement for apps that use data for secondary purposes that are very lucrative and for which the EHR developer would like a ‘‘piece of the pie.’’ Such practices would disqualify the actor from this exception and would implicate the information blocking provision. We note that we made a slight modification to § 171.303(c)(3)(i) in that we removed ‘‘substantially similar.’’ We believe ‘‘similarly situated,’’ without ‘‘substantially similar’’ is clearer, maintains the intended effect, and is consistent with language used in other exceptions. Collateral Terms We proposed five additional conditions that would reinforce the requirements of the proposed exception. We explained that these additional conditions would provide bright-line PO 00000 Frm 00256 Fmt 4701 Sfmt 4700 prohibitions for certain types of collateral terms or agreements that we believe are inherently likely to interfere with access, exchange, or use of EHI. We proposed that any attempt to require a licensee or its agents or contractors to do or agree to do any of the following would disqualify the actor from the exception and would be suspect under the information blocking provision (84 FR 7549). First, we proposed that the actor must not require the licensee or its agents or contractors to not compete with the actor in any product, service, or market, including markets for goods and services, technologies, and research and development. We explained that we are aware that such agreements have been used to either directly exclude suppliers of interoperable technologies and services from the market or to create exclusivity that reduces the range of technologies and options available to health care providers and other health IT customers and users (84 FR 7549). Second, we proposed that the actor must not require the licensee or its agents or contractors to deal exclusively with the actor in any product, service, or market, including markets for goods and services, technologies, and research and development (84 FR 7549). Third, we proposed that the actor must not require the licensee or its agents or contractors to obtain additional licenses, products, or services that are not related to or can be unbundled from the requested interoperability elements. We explained that without this condition, we believe that an actor could require a licensee to take a license to additional interoperability elements that the licensee does not need or want, which could enable the actor to extract royalties that are inconsistent with its RAND obligations under this exception. We clarified that this condition would not preclude an actor and a willing licensee from agreeing to such an arrangement, so long as the arrangement was not required (84 FR 7549). Fourth, we proposed that the actor must not condition the use of interoperability elements on a requirement or agreement to license, grant, assign, or transfer the licensee’s own IP to the actor. We explained that it would raise information blocking concerns for an actor to use its control over interoperability elements as leverage to obtain a ‘‘grant back’’ of IP rights or other consideration whose value may exceed that of a reasonable royalty. We proposed that, consistent with our approach under other conditions of this exception, this condition would not preclude an actor E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations and a willing licensee from agreeing to a cross-licensing, co-marketing, or other agreement if they so choose. However, the actor could not require the licensee to enter into such an agreement. We proposed that the actor must offer the option of licensing the interoperability elements without a promise to provide consideration beyond a reasonable royalty (84 FR 7549). Finally, we proposed that the actor must not condition the use of interoperability elements on a requirement or agreement to pay a fee of any kind whatsoever unless the fee meets either the narrowly crafted condition to this exception for a reasonable royalty, or, alternatively, the fee satisfies the separate exception in § 171.302, which permits the recovery of certain costs reasonably incurred (84 FR 7549). We requested comment on these categorical exclusions. In particular, we encouraged commenters to weigh in on our assumption that these practices are inherently likely to interfere with access, exchange, or use of EHI. We also encouraged commenters to suggest any conceivable benefits that these practices might offer for interoperability or for competition and consumers that we might have overlooked. Again, we asked that to the extent possible commenters provide detailed economic rationale in support of their comments (84 FR 7549). Comments. One commenter noted that situations exist where licensors do not have the ability to lawfully confer rights or licenses to information or products without the agreement of a third party. The commenter recommended that we add ‘‘except as required by law’’ to the collateral terms provisions in order to clarify that the expectation is not that an actor must obtain such rights on behalf of the requestor. Response. We appreciate this comment, but have decided not to make the suggested edit because we do not believe such an addition is necessary. The collateral terms provisions do not address whether an actor is expected to obtain rights from a third party to lawfully confer rights or licenses to interoperability elements. Instead, the collateral terms provisions describe conditions that the actors must not require of the licensee or its agents or contractors to do because such conditions are inherently likely to interfere with access, exchange, or use of EHI. We note that we have revised the definition of ‘‘interoperability element’’ (see § 171.102) to clarify that in order to meet the definition, the element must be ‘‘controlled by the actor,’’ which addresses the commenter’s concern. We VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 have also defined ‘‘controlled by the actor’’ in § 171.102 in the context of the interoperability element definition for clarity. If the actor could not lawfully confer a right or authorization, the actor would not have the requisite ‘‘control’’ under the ‘‘interoperability element.’’ Last, we emphasize that in situations when an actor does not have the ability to lawfully confer rights or licenses to enable the access, exchange, or use of EHI, the actor could seek coverage under the Infeasibility Exception (see § 171.204(a)(3)) or the Content and Manner Exception (see § 171.301(b)). Comments. We did not receive any other comments regarding the proposed collateral terms proposals except those noted in the comment summary above. Response. We have finalized the collateral terms as proposed. Non-Disclosure Agreement We proposed that an actor would be permitted under this exception to require a licensee to agree to a confidentiality or non-disclosure agreement (NDA) to protect the actor’s trade secrets, provided that the NDA is no broader than necessary to prevent the unauthorized disclosure of the actor’s trade secrets. Further, we proposed that the actor would have to identify (in the NDA) the specific information that it claims as trade secrets, and that such information would have to meet the definition of a trade secret under applicable law. We noted that if the actor is a health IT developer of certified health IT, it may be subject to the Condition of Certification that prohibits certain health IT developer prohibitions and restrictions on communications about a health IT developer’s technology and business practices. We emphasized that the exception would not in any way abrogate the developer’s obligations to comply with that condition. We encouraged comment on this condition of the proposed exception (84 FR 7549). Comments. We received a couple of comments regarding the proposed NDA provision. One commenter recommended that we state in the final rule that interoperability elements themselves may not be protected as trade secrets. Another commenter expressed concern that this exception acts to require NDAs in certain circumstances. The commenter also suggested edits to preamble language that would allow the actor to ‘‘generally’’ identify the information that it claims as trade secrets, as opposed to the proposed language of identifying the ‘‘specific’’ information that it claims as trade secrets. Response. We thank commenters for these thoughtful comments. We clarify PO 00000 Frm 00257 Fmt 4701 Sfmt 4700 25897 that interoperability elements may be protected as trade secrets. Trade secrets are a type of IP that consist of information and can include a formula, pattern, compilation, program, device, method, technique or process,190 and could fall within the definition of ‘‘interoperability element’’ (see § 171.102). We note, as discussed in more detail in VIII.C.5.b, that we have leveraged the definition of ‘‘health information technology’’ from section 3000(5) of the PHSA for the definition of ‘‘interoperability element’’ in § 171.102, and that IP is included in that definition of ‘‘health information technology.’’ The PHSA defines ‘‘health information technology’’ as ‘‘hardware, software, integrated technologies or related licenses, intellectual property, upgrades, or packaged solutions sold as services that are designed for or support the use by health care entities or patients for the electronic creation, maintenance, access, or exchange of health information.’’ In response to the commenter that expressed concern that this exception acts to require NDAs in certain circumstances, we emphasize that we are not requiring NDAs. We included this provision in order to help actors protect their IP and actors may draft the NDA in a manner that best suits their needs so long as the NDA meets the requisite conditions in § 171.303(b)(5). We have decided not to allow actors to ‘‘generally’’ identify the information that they claim as trade secrets because such a change could enable actors to make broad assertions of trade secret protection that exceed the actual trade secrets. The safeguards we have finalized in the NDA provision (e.g., that the agreement is no broader than necessary to prevent unauthorized disclosure of the actor’s trade secrets and the agreement states with particularity all information the actor claims as trade secrets) are necessary to ensure that the NDA is not used to impose restrictions or burdensome requirements that are not actually necessary to protect the actor’s trade secrets and that impede the use of the interoperability elements. We emphasize that the use of an NDA for such purposes would preclude an actor from qualifying for this exception and would implicate the information blocking provision. 190 USPTO, Trade Secret Policy, https:// www.uspto.gov/patents-getting-started/ international-protection/trade-secrets-policy. E:\FR\FM\01MYR3.SGM 01MYR3 25898 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations iii. Additional Requirements Relating to the Provision of Interoperability Elements We proposed that an actor’s practice would need to comply with additional conditions that ensure that actors who license interoperability elements on RAND terms do not engage in separate practices that impede the use of those elements or otherwise undermine the intent of this exception. We explained that these conditions are analogous to the conditions described in our proposal concerning collateral terms but address a broader range of practices that may not be effected through the license agreements themselves or that occur separately from the licensing negotiations and other dealings between the actor and the licensee. Specifically, we proposed that an actor would not qualify for this exception if it engaged in a practice that had the purpose or effect of impeding the efficient use of the interoperability elements to access, exchange, or use EHI for any permissible purpose; or the efficient development, distribution, deployment, or use of an interoperable product or service for which there is actual or potential demand. We explained that the exception would not apply if the developer licensed its proprietary APIs for use by third-party apps but then prevented or delayed the use of those apps in production environments by, for example, restricting or discouraging customers from enabling the use of the apps, or engaging in ‘‘gate keeping’’ practices, such as requiring apps to go through a vetting process and then applying that process in a discriminatory or unreasonable manner. Finally, to ensure the actor’s commitments under this exception are durable, we proposed one additional safeguard: An actor could not avail itself of this exception if, having licensed the interoperability elements, the actor makes changes to the elements or its technology that ‘‘break’’ compatibility or otherwise degrade the performance or interoperability of the licensee’s products or services (84 FR 7549 and 7550). We emphasized that this proposed condition would in no way prevent an actor from making improvements to its technology or responding to the needs of its own customers or users. However, to benefit from the exception, the actor’s practice would need to be necessary to accomplish these purposes and the actor must have afforded the licensee a reasonable opportunity under the circumstances to update its technology to maintain interoperability (84 FR 7550). VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 Comments. One commenter stated that the proposed restriction regarding breaking compatibility or otherwise degrading the performance or interoperability of the licensee’s products or services is too broad. The commenter suggested that ONC add procedural safeguards to avoid misuse and unpredictable enforcement. Specifically, the commenter recommended that ONC: (1) Institute a grace period for licensors to provide fixes where interoperability elements are inadvertently unavailable due to software changes; (2) permit health IT developers to maintain their existing processes to notify customers about upgraded standards on a reasonable timeframe; (3) allow, with a year’s notice, retirement of functionality in future versions of the software; (4) acknowledge that the use of interoperability elements will always require some initial work and ongoing upkeep by the licensee, such as testing and continuous work to deploy technology at health systems with different workflows; and (5) the ONCadministered advisory opinion process should account for review of RAND licensing terms to provide clarity to the regulated actors. Response. We agree with the commenter that it is critical that the final exceptions are transparent and cannot be misused. Each exception should clearly explain what conduct would be covered by the exception and what conduct falls outside the scope of the exception. In response to the commenter, we note that we have not prevented health IT developers from maintaining their existing processes to notify customers about upgraded standards on a reasonable timeframe, nor have we instituted any new policies regarding the retirement of functionality in future versions of software. Further, we acknowledge that the use of interoperability elements may require some initial work and ongoing upkeep by the licensee, such as testing and continuous work to deploy technology in health systems with different workflows. However, we emphasize that such initial work, ongoing upkeep, or any additional burden on licensees must meet all the conditions of this exception as all relevant times. We have decided not to institute a grace period for licensors to provide fixes where interoperability elements are inadvertently unavailable due to software changes because we do not believe such a grace period is necessary. Having consulted with OIG, we note that OIG generally does not pursue civil monetary penalties for actors who make innocent mistakes or for accidental PO 00000 Frm 00258 Fmt 4701 Sfmt 4700 conduct. Future notice and comment rulemaking by OIG will provide more additional detail regarding information blocking enforcement. We may consider developing materials in the future regarding the application of the exceptions should the need arise. However, we believe the final rule clearly describes the conditions actors must meet in order to be covered by each exception, and informational materials are not necessary at this time. iv. Compliance With Conditions of Certification As a final condition of the proposed exception, we proposed that health IT developers of certified health IT who are subject to the Conditions of Certification proposed in §§ 170.402, 170.403, and 170.404 must comply with all requirements of those Conditions of Certification for all practices and at all relevant times (84 FR 7550). Comments. We did not receive any comments on this proposed condition. Response. We have removed this proposed condition from the final rule for consistency with other exceptions and for clarity, as the condition is not necessary. E. Additional Exceptions—Request for Information 1. Exception for Complying With Common Agreement for Trusted Exchange In the Proposed Rule, we included a request for information (RFI) regarding whether we should propose, in a future rulemaking, a narrow exception to the information blocking provision for practices that are necessary to comply with the requirements of the Common Agreement (84 FR 7552). The most recent draft Trusted Exchange Framework and Common Agreement was released for public comment on April 19, 2019.191 Comments. We received over 40 comment submissions on this RFI expressing various viewpoints on the purpose, need, and structure of a TEFCA exception. Response. We thank commenters for their feedback. As noted in the Proposed Rule, we may use this feedback to inform a future rulemaking. 2. New Exceptions In the Proposed Rule, we included an RFI regarding any potential new exceptions we should consider for future rulemaking (84 FR 7552). 191 ONC, Draft 2 Trusted Exchange Framework and Common Agreement, https://www.healthit.gov/ sites/default/files/page/2019-04/FINALTEFCAQTF 41719508version.pdf. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations Comments. We received a number of requests for a new exception to cover sensitive and/or privileged information. A health IT developer suggested a new exception to allow actors to withhold sensitive information. The commenter expressed concern that EHI at a certain data class or data element level will require health care providers to exert substantial manual effort to mediate disclosure. Health care providers and provider organizations suggested an exception that would exempt actors from the information blocking provision if they are protecting privileged information. One commenter expressed concern about providing access, exchange, or use of quality program and reporting data. A hospital suggested that requiring providers to waive privilege in order to avoid information blocking would have a detrimental effect on peer reviews and safety assessments that help providers resolve adverse events. Response. We thank commenters for these suggestions. We first note that the health information must fall within the EHI definition, which aligns with the ePHI definition contained in the HIPAA Rules. We note that actors faced with a request to access, exchange, We note that actors faced with a request to access, exchange, or use sensitive and/ or privileged information can seek coverage under the exceptions for preventing harm (§ 171.201), promoting the privacy of EHI (§ 171.202), promoting the security of EHI (§ 171.203), or infeasibility (§ 171.204), depending on the specific information at issue and the circumstances of the case. We refer readers to those exceptions, as well as the preamble discussions at sections VIII.D.1 (Preventing Harm Exception), VIII.D.2 (Privacy Exception), VIII.D.3 (Security Exception), and VIII.D.4 (Infeasibility Exception). We also note that an actor would not be required to share EHI if the interference with access, exchange, or use of the EHI is explicitly required by State or Federal law (see the discussion regarding ‘‘required by law’’ at section VIII.C.1 of this preamble). We emphasize that this final rule does not require actors to waive privilege provided by law. Comments. Some commenters expressed concern about the effect of the information blocking provision on research. Public health organizations proposed an exception to exclude research (as defined by 45 CFR 164.501) and non-direct clinical care conducted by public health authorities, from implicating the information blocking provision. A hospital requested that we establish a new sub-exception under the exception for preventing harm that VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 would allow health care providers who conduct research at their institutions to require that other providers who request EHI are also collaborators in that research. One commenter suggested an exception for health care providers who cannot send data to a public health registry when the public health agency is not ready to onboard the provider due factors outside of the provider’s control (e.g., lack of resources or a backup in the onboarding queue). Response. We thank commenters for these suggestions. We note that actors faced with a request to access, exchange, or use EHI related to research can seek coverage under the exceptions for promoting the privacy of EHI (§ 171.202) or infeasibility (§ 171.204), depending on the specific research being conducted and EHI at issue. We refer readers to those exceptions, as well as the preamble discussions at sections VIII.D.2 (Privacy Exception) and VIII.D.4 (Infeasibility Exception). We also note that an actor would not be required to share EHI if the interference with access, exchange, or use of the EHI is explicitly required by State or Federal law (see the discussion regarding ‘‘required by law’’ at section VIII.C.1 of this preamble). Comments. Some commenters requested a new exception to protect actors who seek independent opinions from external validators regarding their business practices, in case one of those practices falls within the definition of information blocking. Response. We appreciate this suggestion. With regard to private ‘‘external validators,’’ we note that we are not restricting an actor’s ability to hire private companies to assess its business practices. Comments. A commenter recommended an exception for standard business practices. The commenter explained that examples of such conduct include suspending the access of any health IT developer or eprescribing application that is not compliant with State laws or uses the provider’s technology platform for reasons that compromises the integrity of the provider’s network (e.g., using the network for commercial messaging). Response. We appreciate this suggestion. While we would need more facts to properly assess these scenarios, we believe that such situations could likely be covered by either the exception for promoting the privacy of EHI (§ 171.202) or the exception for promoting the security of EHI (§ 171.203). We refer readers to those exceptions, as well as the preamble discussions at sections VIII.D.2 (Privacy Exception) and VIII.D.3 (Security PO 00000 Frm 00259 Fmt 4701 Sfmt 4700 25899 Exception). We also note that the actor would not be required to share EHI if the interference with access, exchange, or use of the EHI is explicitly required by State or Federal law (see the discussion regarding ‘‘required by law’’ at section VIII.C.1 of this preamble). F. Complaint Process We explained in the Proposed Rule that section 3022(d)(3)(A) of the PHSA directs the National Coordinator to implement a standardized process for the public to submit reports on claims of information blocking (84 FR 7552). Section 3022(d)(3)(B) further requires that the complaint process provide for the collection of such information as the originating institution, location, type of transaction, system and version, timestamp, terminating institution, locations, system and version, failure notice, and other related information. In the Proposed Rule, we stated that we intend to implement and evolve the complaint process by building on existing mechanisms, including the process for providing feedback and expressing concerns about health IT that is currently available at https:// www.healthit.gov/healthit-feedback (84 FR 7553). We requested comment on this approach and any alternative approaches that would best effectuate this aspect of the Cures Act. In addition to any other comments that the public may have wished to submit, we specifically requested comment on several specific questions. The scope of these questions was specific to the information blocking complaint submission process and the information collection necessary to enable effective investigations and safeguard the confidentiality of information submitted through the complaint process. Comments. We received over 25 comment submissions that included suggestions for the information blocking complaint process. A few commenters responded to one or more of the specific questions in the Proposed Rule, offering suggestions for specific data elements that complainants should be able to enter as part of a complaint. Some commenters suggested specific features such as: A dedicated secure online portal for entry of information blocking complaints and any supporting documents; a dedicated email box or toll-free phone number for submission of information blocking complaints; the ability to batch multiple instances of potential information blocking activity by the same actor into one complaint submission; and a user interface of picklists to help submitters more easily categorize their concerns and/or mark specific portions of or attachments to E:\FR\FM\01MYR3.SGM 01MYR3 25900 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations their complaints according to their level of sensitivity or requested confidentiality. Numerous commenters expressed support for the existence of a publicly available, user-friendly complaint process and recommended that the development and publication of the complaint process include robust educational and informational materials. A few commenters requested an opportunity for public comment on the complaint process’s operational details prior to it going live. Response. We note that the complaint process is not required by statute to be established through rulemaking and we did not intend to give an impression that it would by including the request for information about the complaint process in the Proposed Rule. Rather, as was the intended outcome, we have received thoughtful suggestions that have informed our initial rollout of the information blocking complaint process as well as have provided considerations for further evolution of the process. We have identified several themes and specific suggestions in the comments that we will address below for the purposes of transparency and to inform stakeholders. We have developed a dedicated complaint process that is based upon and informed by our experience with our current health IT feedback process and the comments received on the Proposed Rule. We also plan to publish informational materials to accompany the rollout of this dedicated information blocking complaint process so that potential complainants across the affected stakeholder categories can successfully use it to submit complaints where they believe they have experienced or observed conduct that constitutes information blocking. While we do not anticipate publishing potential operational details of the complaint process and submission mechanism in advance of its rollout, we would like to amplify a point we noted in the Proposed Rule, which is that we intend to implement and evolve the complaint process. After we launch the information blocking complaint process, we anticipate using our own experience and users’ feedback about the information blocking complaint process to identify opportunities to further evolve and enhance all aspects of the information blocking complaint process, including but not limited to its associated informational materials. Comments. Several commenters requested that all information blocking complaints be publicly posted and available. Conversely, many commenters were in strong support of ONC ensuring adequate confidentiality VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 for those who submit information blocking complaints. Response. Section 3022(d)(2) of the PHSA exempts from public disclosure ‘‘any information that is received by the National Coordinator in connection with a claim or suggestion of possible information blocking and that could reasonably be expected to facilitate identification of the source of the information’’ except as may be necessary to carry out the purpose of PHSA section 3022. We believe the publishing of complaints could lead to the identification of the source of the information or reasonably facilitate identification of the source; therefore, we do not intend to make complaints publicly available. In specific reference to health IT developers of certified health IT, however, we note that we publish in the Certified Health IT Product List (CHPL) information about non-conformities with Program requirements, which would include any non-conformities with the Information Blocking Condition of Certification requirement. We also note that the information blocking complaint process offers the option for users to submit anonymously, explaining in multiple places types of submission information to exclude for those who would like to maintain confidentiality. Comments. Several commenters requested that complainants be required to submit sufficient evidence of intentional information blocking in the complaint submission process. Another commenter suggested complainants be required to meet particular qualifications in order to submit a formal complaint. Response. We thank commenters for their input. However, we do not believe requiring a complaint submission to include more than the minimum information necessary to understand the complainant’s concern would best serve the purpose of the complaint process. We believe that requiring that a complainant meet a proof, evidentiary, or qualification standard as a prerequisite to them submitting a complaint would inappropriately discourage or prevent many individuals and organizations who are subjected to conduct that may meet the definition of information blocking from sharing their concerns with us. G. Disincentives for Health Care Providers—Request for Information Section 3022(b)(2)(B) of the PHSA provides that any health care provider determined by OIG to have committed information blocking shall be referred to the appropriate agency to be subject to appropriate disincentives using PO 00000 Frm 00260 Fmt 4701 Sfmt 4700 authorities under applicable Federal law, as the Secretary sets forth through notice and comment rulemaking. We requested comment on potential disincentives and whether modifying disincentives already available under existing Department programs and regulations would provide for more effective deterrents (84 FR 7553). We also sought information on the implementation of section 3022(d)(4) of the PHSA, which provides that in carrying out section 3022(d) of the PHSA, the Secretary shall, to the extent possible, not duplicate penalty structures that would otherwise apply with respect to information blocking and the type of individual or entity involved as of the day before December 13, 2016—enactment of the Cures Act. Comments. We received over 40 submissions on this RFI. We have organized and summarized the comments by topic below. Need for Disincentives Views on the need for additional disincentives generally diverged based on stakeholder type. Health care providers were generally opposed to additional disincentives. Provider organizations were opposed to any new disincentives. Nearly all these organizations stated that any additional disincentives would be duplicative of disincentives for information blocking put in place through the QPP and Promoting Interoperability Programs. In particular, hospitals noted concerns that they are already subject to a 75 percent negative adjustment to their market basket increase if they are unable to make the Medicare Access and CHIP Reauthorization Act of 2015 (MACRA)mandated attestation that they have not engaged in information blocking. However, a few provider organizations noted that any new disincentives would only be duplicative for providers that are eligible for these specific CMSadministered programs, recognizing that the existing disincentives under Medicare would not reach providers that do not participate in QPP or PI Programs. Multiple provider organizations stated that additional disincentives would be duplicative of fines for HIPAA Rules violations and mentioned that the Office for Civil Rights (OCR) has expressed an intent to increase HIPAA Rules enforcement on providers. A patient-facing app developer commented that the HIPAA Rule’s disincentives, attestation, and public reporting are not enough to discourage information blocking. Several health IT developers were neutral on the topic, stating that it was E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations unclear if additional disincentives would duplicate disincentives in other programs. One payer, one patient advocacy organization, and one HIN were supportive of additional provider disincentives. The HITAC recommended that ONC work with CMS to build information blocking disincentives into a broad range of CMS programs, and that ONC work with other Federal departments and agencies that contract with providers (e.g., Veterans Health Administration, Department of Defense Military Health System, Indian Health Service, Centers for Disease Control and Prevention) to similarly build information blocking disincentives into contracting and other programs. The HITAC also recommended that providers be required to attest to compliance with requirements to avoid information blocking as part of Conditions of Participation, Conditions for Coverage, contracts, and other similar relationships, covering fee-forservice (FFS), value-based care, and direct payment relationships. The HITAC noted that such an attestation requirement could potentially allow for pursuit of serious penalties should OIG find the provider engaged in information blocking. Magnitude of Penalties While health care providers were generally opposed to disincentives, some did offer recommendations for keeping penalties to a minimum. About half of the provider organizations commenting stated that any fines for providers should not be at the same level as those levied against health IT developers, HINs, and HIEs. Other provider organizations had more specific recommendations, including a tiered approach to penalties. One provider organization recommended a two-tiered approach, with more significant financial penalties for large hospitals and health systems and public reporting or QPP score reductions for physicians. Another provider organization recommended a tiered approach that mimics the approach used under HIPAA (as modified by HITECH), in which penalties increase based on the nature and extent of the violation and resulting harm. Another provider organization recommended that organizations found to engage in information blocking be disqualified from the PI category in QPP. Some health IT developers recommended significant penalties for providers. Several health IT developers recommended that ONC work with CMS to utilize and enhance existing VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 disincentive mechanisms, with one developer specifically recommending utilization of the Conditions of Participation, Conditions for Coverage, and Requirements for Participation. One app developer recommended that fines for information blocking be substantial and per record blocked. The HITAC stated that fines should be significant enough to discourage problematic behavior, encourage compliance, and incent providers to address and remediate problematic behavior. A payer commented that fines should be consistent with those levied against developers, HINs, and HIEs. Enforcement Most health care providers and provider organizations recommended that providers be given the opportunity to become compliant before being subject to any fines, except in instances of clear, egregious violations. Some provider organizations recommended that there be an appeals process for disincentives or findings that health care providers had violated the information blocking provision, with one organization noting that an appeals process is especially needed for small and rural practices. Response. We have shared all the comments received with the appropriate agencies and offices within the Department for consideration in subsequent rulemaking to implement section 3022(b)(2)(B) and (d) of the PHSA. IX. Registries Request for Information In the Proposed Rule, we included a Request for Information (RFI) on how health IT solutions and the proposals in the Proposed Rule could aid bidirectional exchange with registries for a wide range of public health, quality reporting, and clinical quality improvement initiatives (84 FR 7553). We received 75 comments in response to this RFI. We thank commenters for their input and we may consider including this information in a future rulemaking. X. Patient Matching Request for Information Patient matching is a critical component to interoperability and the nation’s health IT infrastructure. In the Proposed Rule, we included a Request for Information (RFI) on additional opportunities that may exist in the patient matching space and ways that ONC can lead and contribute to coordination efforts with respect to patient matching (84 FR 7554). We received 128 comments in response to this RFI. We appreciate the input PO 00000 Frm 00261 Fmt 4701 Sfmt 4700 25901 provided by commenters and may use this information to inform future rulemaking. XI. Incorporation by Reference The Office of the Federal Register has established requirements for materials (e.g., standards and implementation specifications) that agencies incorporate by reference in the Code of Federal Regulations (79 FR 66267; 1 CFR 51.5). Specifically, § 51.5(b) requires agencies to discuss, in the preamble of a final rule, the ways that the materials they incorporate by reference are reasonably available to interested parties and how interested parties can obtain the materials, and to summarize, in the preamble of the final rule, the material they incorporate by reference. To make the materials we intend to incorporate by reference reasonably available, we provide a uniform resource locator (URL) for the standards and implementation specifications. In many cases, these standards and implementation specifications are directly accessible through the URLs provided. In instances where they are not directly available, we note the steps and requirements necessary to gain access to the standard or implementation specification. In most of these instances, access to the standard or implementation specification can be gained through no-cost (non-monetary) participation, subscription, or membership with the adopted standards developing organization (SDO) or custodial organization. In certain instances, where noted, access requires a fee or paid membership. As an alternative, a copy of the standards may be viewed for free at the U.S. Department of Health and Human Services, Office of the National Coordinator for Health Information Technology, 330 C Street SW, Washington, DC 20201. Please call (202) 690–7171 in advance to arrange inspection. The National Technology Transfer and Advancement Act (NTTAA) of 1995 (15 U.S.C. 3701 et seq.) and the Office of Management and Budget (OMB) Circular A–119 require the use of, wherever practical, technical standards that are developed or adopted by voluntary consensus standards bodies to carry out policy objectives or activities, with certain exceptions. The NTTAA and OMB Circular A–119 provide exceptions to selecting only standards developed or adopted by voluntary consensus standards bodies, namely when doing so would be inconsistent with applicable law or otherwise impractical. As discussed in section IV of this preamble, we have followed the E:\FR\FM\01MYR3.SGM 01MYR3 25902 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations NTTAA and OMB Circular A–119 in adopting standards and implementation specifications for adoption, including describing any exceptions in the adoption of standards and implementation specifications. Over the years of adopting standards and implementation specifications for certification, we have worked with SDOs, such as HL7, to make the standards we adopt and incorporate by reference in the Federal Register available to interested stakeholders. As described above, this includes making the standards and implementation specifications available through no-cost memberships and no-cost subscriptions. As required by 1 CFR 51.5(b), we provide summaries of the standards we have adopted and incorporate by reference in the Code of Federal Regulations (CFR). We also provide relevant information about these standards and implementation specifications throughout the preamble. We have organized the standards and implementation specifications that we have adopted through this rulemaking according to the sections of the Code of Federal Regulation (CFR) in which they will be codified and cross-referenced for associated certification criteria and requirements that we have adopted. Content Exchange Standards and Implementation Specifications for Exchanging Electronic Health Information—45 CFR 170.205 • CMS Implementation Guide for Quality Reporting Document Architecture Category I Hospital Quality Reporting Implementation Guide for 2019, May 4, 2018 URL: https://ecqi.healthit.gov/system/ files/QRDA_HQR_2019_CMS_IG_final_ 508.pdf. This is a direct access link. Summary: This guide is a CMS Quality Reporting Document Architecture Category I (QRDA I) implementation guide to the HL7 Implementation Guide for CDA Release 2: Quality Reporting Document Architecture Category I, Release 1, STU Release 5 (published December 2017), and referred to as the HL7 QRDA IG STU R5 in this guide. This guide describes additional conformance statements and constraints for electronic health record (EHR) data submissions that are required for reporting information to the Centers for Medicare & Medicaid Services (CMS) for the Hospital Inpatient Quality Reporting Program 2019 Reporting Period. The purpose of this guide is to serve as a companion to the base HL7 QRDA I STU R5 for entities such as Eligible VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 Hospitals (EH), Critical Access Hospitals (CAH), and developers to submit QRDA I data for consumption by CMS systems including for Hospital Quality Reporting (HQR). • CMS Implementation Guide for Quality Reporting Document Architecture Category III Eligible Clinicians and Eligible Professionals Programs Implementation Guide for 2019, October 8, 2018 URL: https://ecqi.healthit.gov/system/ files/2019_CMS_QRDA_III_Eligible_ Clinicians_and_EP_IG-508.pdf. This is a direct access link. Summary: The Health Level Seven International (HL7) Quality Reporting Document Architecture (QRDA) defines constraints on the HL7 Clinical Document Architecture Release 2 (CDA R2). QRDA is a standard document format for the exchange of electronic clinical quality measure (eCQM) data. QRDA reports contain data extracted from EHRs and other information technology systems. The reports are used for the exchange of eCQM data between systems for quality measurement and reporting programs. This QRDA guide contains the CMS supplemental implementation guide to the HL7 Implementation Guide for CDA Release 2: Quality Reporting Document Architecture, Category III, STU Release 2.1 (June, 2017) for the 2019 performance period. This HL7 base standard is referred to as the HL7 QRDA–III STU R2.1. • Health Level 7 (HL7®) CDA R2 Implementation Guide: C–CDA Templates for Clinical Notes R2.1 Companion Guide, Release 2–US Realm, October 2019 URL: https://www.hl7.org/implement/ standards/product_brief.cfm?product_ id=447. Access requires a ‘‘user account’’ and a license agreement. There is no monetary cost for a user account and license agreement. Summary: The Companion Guide to Consolidated Clinical Document Architecture (C–CDA) R2, provides essential implementer guidance to continuously expand interoperability for clinical information shared via structured clinical notes. The guidance supplements specifications established in the Health Level Seven (HL7) CDA® R2.1 IG: C–CDA Templates for Clinical Notes. This additional guidance is intended to make implementers aware of emerging expectations and best practices for C–CDA document exchange. The objective is to increase consistency and expand interoperability across the community of data sharing PO 00000 Frm 00262 Fmt 4701 Sfmt 4700 partners who utilize C–CDA for information exchange. • National Council for Prescription Drug Programs (NCPDP), SCRIPT Standard Implementation Guide, Version 2017071 (Approval Date for ANSI: July 28, 2017) URL: https://www.ncpdp.org/ Standards/Standards-Info. Access requires registration, a membership fee, a user account, and a license agreement to obtain a copy of the standard. Summary: NCPDP SCRIPT standards are developed for transmitting prescription information electronically between prescribers, pharmacies, payers, and other entities for new prescriptions, changes of prescriptions, prescription refill requests, prescription fill status notifications, cancellation notifications, relaying of medication history, transactions for long-term care, electronic prior authorization and other transactions. New transactions in this update include Prescription drug administration message, New prescription requests, New prescription response denials, Prescription transfer message, Prescription fill indicator change, Prescription recertification, Risk Evaluation and Mitigation Strategy (REMS) initiation request, REMS initiation response, REMS request, and REMS response. Standards for Health Information Technology To Protect Electronic Health Information Created, Maintained, and Exchanged—45 CFR 170.210 • ASTM E2147–18 Standard Specification for Audit and Disclosure Logs for Use in Health Information Systems, approved May 1, 2018 URL: https://www.astm.org/ Standards/E2147.htm. This is a direct access link. However, a fee is required to obtain a copy of the standard. Summary: This specification describes the security requirements involved in the development and implementation of audit and disclosure logs used in health information systems. It specifies how to design an access audit log to record all access to patient identifiable information maintained in computer systems, and includes principles for developing policies, procedures, and functions of health information logs to document all disclosure of confidential health care information to external users for use in manual and computer systems. This specification has two main purposes, namely: To define the nature, role, and function of system access audit logs and E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations their use in health information systems as a technical and procedural tool to help provide security oversight; and to identify principles for establishing a permanent record of disclosure of health information to external users and the data to be recorded in maintaining such record of disclosure. United States Core Data for Interoperability—45 CFR 170.213 • United States Core Data for Interoperability (USCDI), February 2020, Version 1 (v1) URL: https://www.healthit.gov/ USCDI. This is a direct access link. Summary: The United States Core Data for Interoperability (USCDI) establishes a minimum set of data classes that are required to be interoperable nationwide and is designed to be expanded in an iterative and predictable way over time. Data classes listed in the USCDI are represented in a technically agnostic manner. Application Programming Interface Standards—45 CFR 170.215 • HL7 FHIR® US Core Implementation Guide STU 3.1.0, November 6, 2019 URL: https://hl7.org/fhir/us/core/ STU3.1/. This is a direct access link. Summary: The US Core Implementation Guide STU 3.1.0 is based on FHIR Version R4 and defines the minimum conformance requirements for accessing patient data. The Argonaut pilot implementations, ONC 2015 Edition Common Clinical Data Set (CCDS), and the latest ONC United States Core Data for Interoperability (USCDI) provided the requirements for this guide. The prior Argonaut search and vocabulary requirements, based on FHIR DSTU2, are updated in this guide to support FHIR Version R4. • Health Level 7 (HL7) Version 4.0.1 Fast Healthcare Interoperability Resources Specification (FHIR) Release 4, October 30, 2019 URL: https://hl7.org/fhir/R4/. This is a direct access link. Summary: The HL7 Version 4.0.1 Fast Healthcare Interoperability Resources (FHIR) Release 4, which also includes technical corrections to R4, provides the first set of normative FHIR resources. This normative designation means that the future changes will be backward compatible for the first time. These resources define the content and structure of core health data which can be used by developers to build VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 standardized applications. Release 4 provides new standard operation on how to obtain data from multiple patients via FHIR. API services that focus on multiple patients would enable health care providers to manage various internal patient populations as well as external services a health care provider may contract for to support quality improvement, population health management, and cost accountability vis-a`-vis the provider’s partners (e.g., health plans). • HL7 FHIR Bulk Data Access (Flat FHIR) (v1.0.0: STU 1), August 22, 2019 URL: https://hl7.org/fhir/uv/bulkdata/. This is a direct access link. Summary: This implementation specification defines a standardized, HL7 FHIR-based approach for exporting health information for multiple patients from a server compliant with the HL7 FHIR standard. This implementation specification is intended to be used by apps to request information on multiple patients. The implementation specification includes OperationDefinitions, which define how the multiple patient export operations are invoked by clients, and the SMART Backend Services: Authorization Guide, which describes how a client can register with and obtain an access token from a server compliant with the implementation specification. • HL7 FHIR SMART Application Launch Framework Implementation Guide Release 1.0.0, November 13, 2018 URL: https://hl7.org/fhir/smart-applaunch/. This is a direct access link. Summary: SMART on FHIR provides reliable, secure authorization for a variety of app architectures through the use of the OAuth 2.0 standard. This Authorization Guide supports the four use cases defined for Phase 1 of the Argonaut Project. This profile is intended to be used by developers of apps that need to access FHIR resources by requesting access tokens from OAuth 2.0 compliant authorization servers. The profile defines a method through which an app requests authorization to access a FHIR resource, and then uses that authorization to retrieve the resource. Other security mechanisms required by the HIPAA Security Rule, such as enduser authentication, session time-out, security auditing, and accounting of disclosures, are outside the scope of this profile. PO 00000 Frm 00263 Fmt 4701 Sfmt 4700 25903 • OpenID Connect Core 1.0 Incorporating Errata Set 1, November 8, 2014 URL: https://openid.net/specs/openidconnect-core-1_0.html. This is a direct access link. Summary: OpenID Connect 1.0 is a simple identity layer on top of the OAuth 2.0 protocol. It enables clients to verify the identity of the end user based on the authentication performed by an authorization server, as well as to obtain basic profile information about the end user in an interoperable and REST-like manner. This specification defines the core OpenID Connect functionality: Authentication built on top of OAuth 2.0 and the use of claims to communicate information about the end user. It also describes the security and privacy considerations for using OpenID Connect. Incorporation by Reference—45 CFR 170.599 • ISO/IEC 17025:2017(E)—General Requirements for the Competence of Testing and Calibration Laboratories, (Third Edition), November 2017 URL: https://www.iso.org/standard/ 66912.html. This is a direct access link. However, a fee is required to obtain a copy of the standard. Summary: This document has been developed with the objective of promoting confidence in the operation of laboratories. This document contains requirements for laboratories to enable them to demonstrate they operate competently and are able to generate valid results. Laboratories that conform to this document will also operate generally in accordance with the principles of ISO 9001. This document requires the laboratory to plan and implement actions to address risks and opportunities. Addressing both risks and opportunities establishes a basis for increasing the effectiveness of the management system, achieving improved results, and preventing negative effects. The laboratory is responsible for deciding which risks and opportunities need to be addressed. This third edition cancels and replaces the second edition (ISO/IEC 17025:2005), which has been technically revised. • ISO/IEC 17065:2012 (E)—Conformity Assessment—Requirements for Bodies Certifying Products, Processes and Services (First Edition), September 2012 URL: https://www.iso.org/standard/ 46568.html. E:\FR\FM\01MYR3.SGM 01MYR3 25904 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations This is a direct access link. However, a fee is required to obtain a copy of the standard. Summary: This International Standard specifies requirements, the observance of which is intended to ensure that certification bodies operate certification schemes in a competent, consistent and impartial manner, thereby facilitating the recognition of such bodies and the acceptance of certified products, processes, and services on a national and international basis and so furthering international trade. XII. Collection of Information Requirements Under the Paperwork Reduction Act of 1995 (PRA), codified as amended at 44 U.S.C. 3501 et seq., agencies are required to provide a 60-day notice in the Federal Register and solicit public comment on a proposed collection of information before it is submitted to the Office of Management and Budget for review and approval. In order to fairly evaluate whether an information collection should be approved by the OMB, the PRA requires that we solicit comment on the following issues: 1. Whether the information collection is necessary and useful to carry out the proper functions of the agency; 2. The accuracy of the agency’s estimate of the information collection burden; 3. The quality, utility, and clarity of the information to be collected; and 4. Recommendations to minimize the information collection burden on the affected public, including automated collection techniques. Under the PRA, the time, effort, and financial resources necessary to meet the information collection requirements referenced in this section are to be considered. We solicited comment on these issues in the Proposed Rule (84 FR 7558 and 7559) for the matters discussed in detail below. A. ONC–ACBs In the Proposed Rule, we proposed to add new ONC—Authorized Certification Bodies (ONC–ACB) collection and reporting requirements for the certification of health IT to the updated 2015 Edition (and any subsequent VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 edition certification) in § 170.523(p), (q), (t), and § 170.550(1). As stated in the Proposed Rule per § 170.550(l), ONC–ACBs would not be able to certify health IT until they review and verify health IT developers’ attestations confirming that the developers are compliant with Conditions and Maintenance of Certification requirements. ONC–ACBs would also submit the health IT developer attestations to ONC per § 170.523(q). As stated in the Proposed Rule for § 170.523(p)(3), ONC–ACBs would be required to collect and report certain information to ONC related to real world testing plans and results. ONC– ACBs would be required to verify that the health IT developer submits an annual, publicly available real world testing plan and perform a completeness check for both real world testing plans and results. In the Proposed Rule, we stated for § 170.523(t), ONC–ACBs would ensure health IT developers opting to take advantage of the Standard Version Advancement Process flexibility per § 170.405(b) provide timely advance written notice to the ONC–ACB and all affected customers. ONC–ACBs would maintain a record of the date of issuance and the content of developers’ notices, and timely post content of each notice received publicly on the CHPL attributed to the certified Health IT Module(s) to which it applies. In the 2015 Edition proposed rule (80 FR 16894), we estimated fewer than ten annual respondents for all of the regulatory ‘‘collection of information’’ requirements that applied to the ONC– ACBs, including those previously approved by OMB. In the 2015 Edition final rule (80 FR 62733), we concluded that the regulatory ‘‘collection of information’’ requirements for the ONC– ACBs were not subject to the PRA under 5 CFR 1320.3(c). Comments. We did not receive any comments specific to the new ONC– ACB collection and reporting requirements for the certification of health IT to the 2015 Edition (and any subsequent edition certification) in § 170.523(p), (q), (t), and § 170.550(1). Response. We continue to maintain our past determinations in that we PO 00000 Frm 00264 Fmt 4701 Sfmt 4700 estimate less than ten annual respondents for all of the regulatory ‘‘collection of information’’ requirements for ONC–ACBs under part 170 of title 45, including those previously approved by OMB and in this final rule, and that the regulatory ‘‘collection of information’’ requirements under the Program described in this section are not subject to the PRA under 5 CFR 1320.3(c). For the cost estimates of these new regulatory requirements, we refer readers to section XIII (Regulatory Impact Analysis) of this final rule. B. Health IT Developers We proposed two separate collections from health IT developers in the Proposed Rule. First, we proposed in 45 CFR 170.580(a)(2)(iii) that ONC may take action against a health IT developer for failure to comply with Conditions and Maintenance of Certification requirements. As stated in the Proposed Rule, we proposed to generally use the same processes previously codified in regulation (§§ 170.580 and 170.581) to take administrative enforcement action. These processes would require health IT developers to submit information to ONC to facilitate and conclude ONC’s review. The PRA, however, exempts these information collections. We explained in the Proposed Rule that, specifically, 44 U.S.C. 3518(c)(1)(B)(ii) excludes collection activities during the conduct of administrative actions or investigations involving the agency against specific individuals or entities. Secondly, we proposed in 45 CFR 170.402(b)(1) that a health IT developer must, for a period of 10 years beginning from the date each of a developer’s health IT is first certified under the Program, retain all records and information necessary to demonstrate initial and ongoing compliance with the requirements of the Program for each health IT product. We stated in the Proposed Rule that it would take approximately two hours per week, on average, to comply with our proposed record retention requirement. We welcomed comments on whether more or less time should be included in our estimate. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations 25905 TABLE 4—ESTIMATED ANNUALIZED TOTAL BURDEN HOURS FOR HEALTH IT DEVELOPERS TO COMPLY WITH RECORDS AND INFORMATION RETENTION REQUIREMENTS Number of health IT developers Code of Federal Regulations section Average burden hours Total 45 CFR 170.402(b)(1) ................................................................................................................. 458 104 47,632 Total Burden Hours .............................................................................................................. ........................ ........................ 47,632 Comments. We did not receive any comments specific to either collection of information from health IT developers or our corresponding PRA determinations. Response. For the first information collection, we continue to maintain that information collected pursuant to an administrative enforcement action is not subject to the PRA under 44 U.S.C. 3518(c)(1)(B)(ii), which excludes collection activities during the conduct of administrative actions or investigations involving the agency against specific individuals or entities. For the second information collection, we continue to believe it will take approximately two hours per week on average to comply with our records and information retention requirements as reflected in Table 4. We refer readers to section XIII (Regulatory Impact Analysis) of this final rule for the cost estimates of the second information collection. XIII. Regulatory Impact Analysis A. Statement of Need This final rule is necessary to meet our statutory responsibilities under the 21st Century Cures Act (Cures Act) and to advance HHS policy goals to promote interoperability and mitigate burden for stakeholders. The provisions finalized in this rule that could result in monetary costs for stakeholders include the: (1) Updates to the 2015 Edition health IT certification criteria; (2) Conditions and Maintenance of Certification requirements for a health IT developer; (3) oversight for the Conditions and Maintenance of Certification requirements; and (4) information blocking. While much of the costs of this final rule will fall on health IT developers that seek to certify health IT under the ONC Health IT Certification Program (Program), we believe the implementation and use of health IT certified to the 2015 Edition (including the new and updated criteria in this final rule), compliance with the Conditions and Maintenance of Certification requirements, and the limited exceptions to information blocking would ultimately result in VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 significant benefits for health care providers and patients. We outline some of these benefits below. We emphasize in this regulatory impact analysis (RIA) that we believe this final rule will create opportunities for health IT innovation through new market entrants and remove barriers to interoperability and electronic health information exchange. These efforts would greatly benefit health care providers and patients by increasing access to important health information and new technologies resulting in improvements in health care delivery and patient outcomes. The provisions in this final rule seek to advance an interoperable health system that empowers individuals to use their electronic health information (EHI) to the fullest extent and enable health care providers and communities to deliver smarter, safer, and more efficient care. Given this goal, there will be instances where the benefits and costs are multifaceted and unquantifiable. We note in this RIA when we had difficulty quantifying benefits and costs due to lack of applicable research or data. Additionally, there are ongoing regulatory and policy activities outside of this final rule that might influence the rule’s impact in an unquantifiable manner. When possible, we acknowledge these complexities as well. Unquantifiable costs and benefits identified in this rule are summarized in Table 31. B. Alternatives Considered In the Proposed Rule, we noted that we were unable to identify alternatives to our proposals that would appropriately implement our responsibilities under the Cures Act and support interoperability. At the time, we assessed whether there were alternatives to our proposals, specifically our proposals concerning EHI export, application programming interfaces (APIs), and real world testing. We concluded that our proposals took the necessary steps to fulfill the mandates specified in the Public Health Service Act (PHSA), as amended by the Health Information Technology for Economic and Clinical Health (HITECH) Act and PO 00000 Frm 00265 Fmt 4701 Sfmt 4700 the Cures Act, in the least burdensome way. We welcomed comments on our assessment and any alternatives that we should consider. Comments. We received comments suggesting alternatives to our proposals. Specifically, some commenters stated that we should consider an alternative approach to the EHI export (§ 170.315(b)(10)) certification criterion’s scope to align with other regulations and data standards, such as the USCDI. Other commenters requested we reconsider the adoption of the consent management for APIs (§ 170.315(g)(11)) certification criterion or use a different platform because the consent2share (C2S) platform was not mature enough. We also received comments requesting we consider alternative definitions for various information blocking terms and reconsider our approach to certain information blocking exceptions. Commenters recommended that we consider these alternatives in order to provide clarity to and reduce potential burden for the regulated community. Response. Based on comments received, we considered and adopted revisions to our proposals that will substantially reduce real and perceived burden. For the certification criteria, we revised and narrowed the scope of the EHI export certification criterion so that it is more manageable and less administratively burdensome for health IT developers. The criterion will link the data exported to the focused definition of EHI as finalized (see section IV.B.6.c). We also reevaluated and determined, consistent with commenter input, that there is continued work to be done to ballot and field test the C2S platform and the Consent Implementation Guide and, therefore, did not adopt the consent management for APIs (§ 170.315(g)(11)) certification criterion in this final rule (see section IV.B.9.b). Within the information blocking section, we have focused the scope of many terms to address commenter concerns and reduce potential burden on actors. We have focused the definition of EHI (§ 171.102) (see VIII.C.3). We have also focused the E:\FR\FM\01MYR3.SGM 01MYR3 25906 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations Health Information Network (HIN) definition in consideration of comments in four ways. First, we combined the definitions of HIN and Health Information Exchange (HIE) to create one functional definition that applies to both statutory terms in order to clarify the types of individuals and entities that would be covered. Second, we limited the types of actions that would be necessary for an actor to meet the definition of HIN or HIE. Third, we have revised the definition to specify that to be a HIN or HIE there must be exchange among more than two unaffiliated individuals or entities besides the HIN/ HIE that are enabled to exchange with each other. Fourth, we focused the definition on treatment, payment, and health care operations, as each are defined in the HIPAA Rules (45 CFR 164.501) (see VIII.C.2.c). We have also clarified the scope of the ‘‘access,’’ ‘‘exchange,’’ and ‘‘use’’ definitions and refer readers to the discussion of those changes in section VIII.C.5.a. We have also considered and finalized alternatives relating to the information blocking exceptions. Of note, we have finalized the new Content and Manner Exception (see § 171.301 and the preamble discussion in section VIII.D.2.a), which will significantly reduce burden on actors. First, the content condition (§ 171.301(a)) establishes that, in order to satisfy the exception, for up to May 2, 2022, an actor must respond to a request to access, exchange, or use EHI with, at a minimum, the EHI identified by the data elements represented in the USCDI standard adopted in § 170.213. Second, the manner condition (§ 171.301(b)) explains acceptable alternative manners for fulfilling a request to access, exchange, or use EHI when an actor is technically unable to fulfill a request in any manner requested or cannot reach agreeable terms with the requestor to fulfill the request in any manner requested. This exception creates a transparent and flexible framework for actors to fulfill requests for access, exchange, or use of EHI. We refer readers to the discussion of the Content and Manner Exception in section VIII.D.2.a, as well as the broader discussion within the information blocking section where we discuss various other changes we have made in response to comments that will reduce burden (see section VIII.D). C. Overall Impact We have examined the impact of this final rule as required by Executive Order 12866 on Regulatory Planning and Review (September 30, 1993), Executive Order 13563 on Improving VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 Regulation and Regulatory Review (January 18, 2011), Executive Order 13771 on Reducing Regulation and Controlling Regulatory Costs (January 30, 2017), the Regulatory Flexibility Act (5 U.S.C. 601 et seq.), section 202 of the Unfunded Mandates Reform Act of 1995 (2 U.S.C. 1532), and Executive Order 13132 on Federalism (August 4, 1999). 1. Executive Order 13771—Reducing Regulation and Controlling Regulatory Costs Executive Order 13771 on Reducing Regulation and Controlling Regulatory Costs was issued on January 30, 2017 and directs agencies to repeal two existing regulations for each new regulation issued in fiscal year (FY) 2017 and thereafter. It further directs agencies, via guidance issued by the Office of Management and Budget (OMB), that the total incremental costs of all regulations should be no greater than zero in FY 2018. The analysis required by Executive Order 13771, as supplemented by Executive Order 13777, adds additional requirements for analysis of regulatory actions. The new requirements under Executive Orders 13771 and 13777 do not change or reduce existing requirements under Executive Orders 12866 or 13563. This final rule is an E.O. 13771 regulatory action. We estimate this rule generates $0.84 billion in annualized costs in 2016 dollars, discounted at 7 percent relative to year 2016 over a perpetual time horizon. 2. Executive Orders 12866 and 13563— Regulatory Planning and Review Analysis Executive Orders 12866 on Regulatory Planning and Review and 13563 on Improving Regulation and Regulatory Review direct agencies to assess all costs and benefits of available regulatory alternatives and, if regulation is necessary, to select regulatory approaches that maximize net benefits (including potential economic, environmental, public health and safety effects, distributive impacts, and equity). A regulatory impact analysis (RIA) must be prepared for major rules with economically significant effects ($100 million or more in any one year). Pursuant to the Congressional Review Act (5 U.S.C. 801 et seq.), the Office of Information and Regulatory Affairs designated this rule as a ‘major rule’ as defined by 5 U.S.C. 804(2). OIRA has also determined that this final rule is an economically significant rule as we have estimated the costs to implement this final rule may be greater than $100 million per year. Accordingly, we have prepared an RIA that to the best of our PO 00000 Frm 00266 Fmt 4701 Sfmt 4700 ability presents the costs and benefits of this final rule. a. Costs and Benefits We have estimated the monetary costs and benefits of this final rule for health IT developers, health care providers, patients, ONC—Authorized Certification Bodies (ONC–ACBs), ONC—Authorized Testing Laboratories (ONC–ATLs), and the Federal Government (i.e., ONC), and have broken those costs and benefits out into the following categories: (1) Deregulatory actions (no associated costs); (2) updates to the 2015 Edition health IT certification criteria; (3) Conditions and Maintenance of Certification requirements for a health IT developer; (4) oversight for the Conditions and Maintenance of Certification requirements; and (5) information blocking. In accordance with Executive Order 12866, we have included the RIA summary table as Table 30. In addition, we have included a summary to meet the regulatory reform analysis requirements under Executive Order 13771. Cost and benefit calculations were performed in 2017 dollars, as this year was the most recent data available to address all cost and benefit estimates consistently. For summary tables 29 through 31, all estimates are rounded to the nearest dollar and expressed in 2016 dollars to meet regulatory reform analysis requirements under Executive Order 13771. We note that estimates presented in the following ‘‘Employee Assumptions and Hourly Wage,’’ ‘‘Quantifying the Estimated Number of Health IT Developers and Products,’’ and ‘‘Number of End Users that Might Be Impacted by ONC’s Final Rule’’ sections are used throughout this RIA. In this final rule, we used a number of methods to quantify direct and indirect benefits of our provisions. For provisions where no such research was available, we developed estimates based on a reasonable proxy. Interoperability, for example, can positively impact patient safety, care coordination, and improve health care processes and health outcomes.192 However, achieving interoperability is a function of several factors, not just the capability of the technology used by health care providers. Therefore, to assess some of the benefits of this final rule, we used regression analysis to assess their 192 https://www.qualityforum.org/Publications/ 2017/09/Interoperability_2016-2017_Final_ Report.aspx. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations respective effects on interoperability holding other factors constant. One example of this approach is the methodology used to quantify the benefits of our real world testing and API provisions on interoperability. We used regression analysis to calculate the impact of our real world testing and API provisions on interoperability. We assumed that the real world testing and API provisions would collectively have the same impact on interoperability as upgrading health IT certified to the 2014 Edition. Therefore, we estimated linear probability models that identified the impact of 2014 Edition certified health IT on hospitals’ interoperability.193 We used data from the 2014 and 2015 American Hospital Association (AHA) Annual Survey Information Technology Supplement (IT Supplement), which consists of an analytic sample of 4,866 observations of non-Federal acute care hospitals that responded to the IT Supplement.194 We controlled for additional factors such as participation in a health information exchange organization, hospital characteristics, and urban/rural status. More specifically, we used the following explanatory variables: We found a statistically significant marginal effect of using 2014 Edition certified health IT associated with a five percentage point increase in interoperability.195 While we acknowledge that there might be shared benefits across provisions, we have taken steps to ensure that the benefits attributed to each provision is unique to the provision referenced. For example, in the case of assessing the impact of our real world testing and API provisions on interoperability, we assumed that the marginal effect is true and distributed the five percentage point benefit across our provisions at (0.1–1) to (1–4) percentage points respectively. Given data limitations, we believe this approach allowed us to estimate the benefits of our final provisions without double counting the impact each provision might have on interoperability. Employee Assumptions and Hourly Wage Edition = 1 if a hospital adopted 2014 Edition EHR, 0 otherwise RHIO = 1 if a hospital participates in health information exchange organization, 0 otherwise Government = 1 if a hospital is publicly owned, 0 otherwise Alt_teaching = 1 if a hospital is teaching, 0 otherwise Nonprofit = 1 if a hospital is not for profit, 0 otherwise Largebed = 1 if a hospital has more than 399 beds, 0 otherwise Medbed = 1 if a hospital’s number of beds is between 100 and 399, 0 otherwise Urban_rural = 1 if a hospital is urban, 0 otherwise CAH = 1 if a hospital is critical access, 0 otherwise Year = year of the data (2014 and 2015) S = state fixed effects We have made employee assumptions about the level of expertise needed to complete the requirements in this section of the final rule. For wage calculations for Federal employees and ONC–ACBs, we have correlated the employee’s expertise with the corresponding grade and step of an employee classified under the General Schedule (GS) Federal Salary Classification, relying on the associated employee hourly rates for the Washington, DC locality pay area as published by the Office of Personnel Management for 2017.196 We have assumed that overhead costs (including benefits) are equal to 100 percent of pretax wages. Therefore, we have doubled the employee’s hourly wage to account for overhead costs. We have concluded that a 100 percent expenditure on overhead costs which includes benefits is an appropriate estimate based on research conducted by HHS.197 193 The interoperability dependent variable is a binary indicator for whether a hospital routinely sends, receives, and integrates summary of care records electronically outside of its system and finds any health information electronically outside of its system. 194 American Hospital Association Health IT Supplement Survey, https://www.ahadata.com/ahahealthcare-database/. 195 Results were similar when we used logit or Probit specifications. Note, the percentage point refers to the arithmetic difference between two percentages. 196 https://www.opm.gov/policy-data-oversight/ pay-leave/salaries-wages/salary-tables/pdf/2017/ DCB_h.pdf. 197 See U.S. Department of Health and Human Services, Office of the Assistant Secretary for VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 PO 00000 Frm 00267 Fmt 4701 Sfmt 4700 25907 We have used Bureau of Labor Statistics (BLS) data to calculate private sector employee wage estimates (e.g., health IT developers, health care providers, health information networks (HINs), attorneys, etc.), as we believe BLS provides the most accurate and comprehensive wage data for private sector positions. Just as with the General Schedule Federal Salary Classification calculations, we have assumed that overhead costs (including benefits) are equal to 100 percent of pre-tax wages. We estimated using 2016 dollars in the Proposed Rule. However, we stated in the Proposed Rule that we would consider using 2017 and even 2018 dollars, if available, for our cost and benefit estimates in the final rule. Therefore, in this final rule, we updated our estimates using 2017 dollars for the GS Federal Salary Classification and the BLS data. Quantifying the Estimated Number of Health IT Developers and Products We derived our estimates for the potential impact of the new 2015 criteria on the number of certified products in the health IT market. This analysis is based on the number of certified health IT products (i.e., Health IT Modules), product capability, and the number of health IT developers that left, merged, and/or entered the ONC Health IT Certification Program between the 2011 Edition health IT certification criteria (2011 Edition) and the implementation of the 2014 Edition health IT certification criteria (2014 Edition).198 In Table 5, we quantify the extent to which the certified health IT market consolidated between the 2011 Edition and 2014 Edition. We found that the number of health IT developers certifying products between the 2011 Edition and 2014 Edition decreased by 22.1 percent and the number of products available decreased by 23.2 percent. Planning and Evaluation (ASPE), Guidelines for Regulatory Impact Analysis, at 28–30 (2016), available at https://aspe.hhs.gov/system/files/pdf/ 242926/HHS_RIAGuidance.pdf. 198 Availability of 2014 CEHRT for Meaningful Users Providers, Health IT Policy Committee Data Update (Sept. 9, 2015), available at https:// www.healthit.gov/FACAS/sites/faca/files/HITPC_ Data_Update_Presentation_Final_2015-09-09.pdf. E:\FR\FM\01MYR3.SGM 01MYR3 25908 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations TABLE 5—CERTIFIED HEALTH IT MARKET CONSOLIDATION FROM THE 2011 EDITION TO THE 2014 EDITION 2011 Edition Health IT Developers ................................................................................................................... Products Available ....................................................................................................................... 1,017 1,408 2014 Edition 792 1,081 Market consolidation (%) ¥22.1 ¥23.2 A For the purposes of these market consolidation calculations, we included the total number of active or suspended health IT products and their developers. Withdrawn products and their developers were excluded from this total. Using the rates identified in Table 5, we then applied our estimate for market consolidation to estimate the number 2015 Edition certified health IT products and health IT developers that would be impacted by our policies in this final rule. Specifically, to estimate the number of 2015 Edition products and health IT developers in the market, we assumed: • Products capable of recording EHI will include new certification criteria. We assume that products capable of recording patient health data will be the types of products most likely to be impacted by and include the new certification criteria. • Products capable of recording EHI data available in 2015 equal the number of products available in 2014. In 2014, there were 710 products by 588 developers capable of recording EHI. Since the new criteria involve the access to and movement and exchange of EHI, we used only products that record EHI as a basis for our estimates. We believe the 2014 totals reflect a realistic estimate of the currently available products and their developers that could include the new 2015 certification criteria. • Market consolidation rates denoted in Table 5 hold constant. We assume that the rate of market consolidation for products (–23.2 percent) and health IT developers (–22.1 percent) from the 2011 Edition to the 2014 Edition holds constant for the 2015 Edition. Although we are using this number to estimate product availability, we are unable to assess how market consolidation might impact other production costs such as the supply and demand for personnel over time. As shown in Table 6, based on the assumptions, we have estimated the total number of 2015 products (545) and their developers (458). TABLE 6—TOTAL NUMBER OF HEALTH IT DEVELOPERS AND PRODUCTS BY SCENARIO Estimated number of health IT developers Scenario 2015 Edition Projection—All Products ..................................................................................................................... 2015 Edition Projection—Products Capable of Recording EHI .............................................................................. Number of End Users That Might Be Impacted by ONC’s Final Rule For the purpose of this analysis, the population of end users differs according to the regulatory action finalized. In many cases, the end-user population impacted is the number of hospitals and health care providers that possess certified health IT. Due to data limitations, our analysis regarding the number of hospitals and health care providers impacted by the regulatory action is based on the number of hospitals and health care providers that have historically participated in the Centers for Medicare & Medicaid Services (CMS) EHR Incentive Programs (now Promoting Interoperability (PI) Programs). One limitation of this approach is that we are unable to account for the impact of our provisions on users of health IT that were ineligible or did not participate in the CMS EHR Incentive Programs. For example, in 2017, 78 percent of home health agencies and 66 percent of skilled nursing facilities VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 reported adopting an EHR.199 Nearly half of these facilities reported engaging aspects of health information exchange. However, we are unable to quantify, specifically the use of certified health IT products, among these provider types. Despite these limitations, participants in the CMS EHR Incentive Programs represent an adequate sample on which to base our estimates.200 There were 439,187 health care providers 201 in 199 Henry, J., Pylypchuck, Y., & Patel, V. (November 2018) Electronic Health Record Adoption and Interoperability among U.S. Skilled Nursing Facilities in 2017. ONC Data Brief, no. 41. Office of the National Coordinator for Health Information Technology: Washington, DC. 200 See Office of the National Coordinator for Health Information Technology, Office-based Health Care Professionals Participating in the CMS EHR Incentive Programs (Aug. 2017), dashboard.healthit.gov/quickstats/pages/FIGHealth-Care-Professionals-EHR-IncentivePrograms.php; Office of the National Coordinator for Health Information Technology, Hospitals Participating in the CMS EHR Incentive Programs (Aug. 2017), dashboard.healthit.gov/quickstats/ pages/FIG-Hospitals-EHR-Incentive-Programs.php. 201 This estimate is the total number of eligible providers that ever participated in the CMS Medicare and Medicaid Electronic Health Record Incentive Program. PO 00000 Frm 00268 Fmt 4701 Sfmt 4700 617 458 Estimated number of products 830 545 95,470 clinical practices 202 and 4,519 hospitals 203 that participated in the CMS EHR Incentive Program. We estimate that these entities will be impacted by our rule. General Comments on the RIA Comments. Several commenters expressed concern that the estimated costs and developer hours in the proposed rule were significantly underestimated. One commenter stated that the cost estimates did not accurately reflect provider implementations costs, including those related to ensuring compliance with the HIPAA Rules, 42 CFR part 2 and other Federal and State privacy laws. Some commenters were concerned about the impact of the requirements, as proposed in the Proposed Rule, on existing small health IT developers and their ability to 202 This number was estimated based on the deduplicated number of practices that had at least one clinician participate in the CMS Medicare Electronic Health Record Incentive Program. 203 This estimate is the total number of eligible hospitals that ever participated in the CMS Medicare Electronic Health Record Incentive Program. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations compete with large developers, as well as the impact on potential new market entrants. One commenter stated that this environment will result in only a small number of health IT developers surviving while also limiting market entry. One commenter expressed concern that the Proposed Rule will provide unfettered access to the intellectual property of health IT developers while increasing their compliance costs, which will limit their potential investment returns and create barriers to market entry. A few commenters expressed concern that the costs incurred by health IT developers to improve interoperability and comply with other aspects of the rule as proposed will be passed on to providers and patients. Response. We thank commenters for their input regarding our estimated costs and developer hours in the Proposed Rule. We considered and adopted revisions to our proposals based on comments that would substantially reduce any real or perceived burden. We reanalyzed our approach and made adjustments for this final rule. For instance, we have included additional developer hours for the additional data elements we finalized in this final rule. We have also included additional costs for the bulk data standard support and API support. Lastly, with regards to the comment that the cost estimates did not accurately reflect implementation costs to providers, when possible ONC has quantified provider costs associated with the deployment of new certified health IT functionalities and the optional acquisition of emerging API technologies. Costs that are not quantifiable are noted in Table 31. However, costs related to ensuring compliance with the HIPAA Rules, 42 CFR part 2 and other Federal and State privacy laws, are beyond the scope of the certification criteria and are not included in the final rule. We understand commenters’ concerns about the impact of the provisions as proposed on small health IT developers and the potential impact on new market entrants. However, we continue to believe that while much of the costs of the final rule will fall on health IT developers seeking to certify health IT under the Program, the implementation and use of health IT certified to the 2015 Edition (including the updated and new criteria in this final rule), compliance with the Conditions and Maintenance of Certification requirements, and the limited exceptions to information blocking would ultimately result in significant benefits for health care providers and patients. We also emphasize that we believe the final rule VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 will create opportunities for new market entrants and will remove barriers to interoperability and electronic health information exchange, which will greatly benefit health care providers and patients as well. (1) Deregulatory Actions Costs We do not expect incurred costs to be associated with the deregulatory actions in this final rule, but rather cost savings as detailed further in this Regulatory Impact Analysis. Benefits We expect the deregulatory actions of the rulemaking to result in benefits for health IT developers, providers, ONC– ACBs, ONC–ATLs, and ONC. (i) Removal of the Randomized Surveillance Minimum Threshold Requirements In this final rule, we have revised § 170.556(c) to specify that ONC–ACBs may conduct in-the-field, randomized surveillance. We have removed § 170.556(c)(2), which specifies that ONC–ACBs must conduct randomized surveillance for a minimum of two percent of certified health IT products per year. Additionally, we have removed the requirement that ONC– ACBs make a good faith effort to complete randomized surveillance and the circumstances permitted for exclusion from the requirement found in § 170.556(c)(5). In the 2015 Edition final rule, we did not independently estimate the costs for randomized surveillance. Rather, we relied on prior regulatory cost estimates for all surveillance actions. One of our four ONC–ACBs charges a $3,000 annual fee per product for surveillance due to the new randomized surveillance requirements and to help normalize their revenue stream during down cycles between certification editions. Using this fee as a cost basis and assuming it would apply to all certified health IT (as opposed to the marketadjusted universe of health IT that is used in other calculations in this RIA), we estimated that the removal of the randomized surveillance ‘‘two percent minimum threshold’’ requirements will result in cost savings between $6.8 and $13.7 million for all stakeholders. To arrive at this estimate, we multiplied the $3000 annual fee per product for surveillance by the total number of products certified to the 2014 Edition which was 4,559 products at the time ($3,000*4,559 = $13.7 million). We anticipate the number of products certified for 2014 to decrease to a little as half of the original count over time. PO 00000 Frm 00269 Fmt 4701 Sfmt 4700 25909 Therefore, we estimated the low end to be half of the $13.7 million (0.5*$13.7 million = $6.8 million). This estimate is based on feedback we received from our ONC–ATLs and ONC–ACBs. ONC– ACBs performed randomized surveillance an average of 22 times the first year the requirement was in effect. The following year surveillance was performed an average of two times. We cannot predict how many randomized surveillance events the ONC–ACBs will perform now that we are not enforcing the requirement. It will be completely at the discretion of the ONC–ACBs. In the Proposed Rule, we noted that we considered other potential benefits that we were unable to quantify. For instance, we considered that health care provider burden may decrease from the elimination of the two percent minimum threshold requirements because a provider would previously aid the ONC–ACB in software demonstrations. We welcomed comments on potential means, methods, and relevant comparative studies and data that we could use to better quantify these benefits. Comments. We did not receive any comments specific to the calculation of benefits of the elimination of the two percent minimum threshold requirements. Response. We have maintained our approach in calculating the benefits of this provision in this final rule. We believe the removal of the randomized surveillance minimum threshold requirements will reduce the burden on health care providers by reducing their exposure to randomized in-the-field surveillance of their health IT products. Health care providers previously expressed concern about the time commitment to support ONC–ACB randomized surveillance of health IT products, particularly if no nonconformities with certified health IT were found. Providers have generally stated that reactive surveillance (e.g., complaint-based surveillance) is a more logical and economical approach to surveillance of health IT products implemented in a health care setting. We also believe the removal of these requirements will provide health IT developers more time to focus on interoperability, and will provide ONC– ACBs more time to respond to reactive surveillance, including health care provider complaints about certified health IT. (ii) Removal of the 2014 Edition From the Code of Federal Regulations We estimate that health IT developers would realize monetary savings from no E:\FR\FM\01MYR3.SGM 01MYR3 25910 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations longer supporting the 2014 Edition certification criteria due to a reduction in activities related to maintaining certification and surveillance. We are aware that one of our ONC–ACBs charges an inherited certified status (ICS) fee of $1,000. This fee has been applied over the last calendar year. Over that time period, the number of new, unique 2014 Edition products has been declining (24 products, and no new products in the last four months) compared to the number of ICS certifications (569). Just assuming the cost of continued ICS certification, health IT developers would be paying approximately $569,000 each year to keep their 2014 Edition products up to date. Based on recent analysis of the number of unique 2014 Edition products, our assumptions hold true. We are not aware of comparable fees charged by ONC–ATLs; however, based on our experience with the Program, we expect health IT developers would realize similar cost savings associated with ONC–ATL maintenance of the testing component associated with ICS. Thus, we estimate an additional $569,000 cost savings for health IT developers due to the reduced testing requirements. We also attempted to identify a potential reduction in maintenance and administrative costs as a result of removing 2014 Edition certification criteria. We could not obtain data to conduct a full quantitative analysis specific to the reduction of health IT developer and health care provider costs related to supporting and maintaining the 2014 Edition. However, we invited comments on methods to quantify potential costs for maintaining and supporting products to previous editions. We did conduct a review of academic literature and qualitative analysis regarding potential savings from no longer supporting the 2014 Edition. We looked at data in IT industry systems as whole, which showed that upgrading outdated legacy systems saves resources otherwise spent on maintaining compatibilities to multiple systems and also increases quality and efficiency.204 Furthermore, as technology evolves, newer software and products allow for smoother updates compared to their predecessors. Newer products provide better security features that can address both new and existing issues. In addition, older software has an increased risk of failure, which, in the 204 James Crotty and Ivan Horrocks, Managing legacy system costs: A case study of a metaassessment model to identify solutions in a large financial services company, Applied Computing and Informatics (2017), at 1–9. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 health IT industry, increases risk to patient safety. From the implementer’s perspective, the research indicated that retaining legacy systems tends to inhibit scalability and growth for businesses. The perpetuity of outdated legacy systems increases connection and system integration costs and limits the ability to realize increased efficiency through IT implementation. Newer products are developed to current specifications and updated standards, which decreases barriers and marginal cost of ancillary product implementation and increases the accessibility of data in ancillary systems—including via mobile devices and the latest applications. Finally, office staff in a health care setting would no longer need to be trained to accommodate differing data access needs or workarounds required to integrate to the legacy product.205 The research also indicates that retaining legacy software would not be beneficial or profitable to the health IT market. Prolonging backwards compatibility of newer products to legacy systems encourages market fragmentation.206 We intend to encourage the health IT market to keep progressing with a baseline expectation of functionalities that evolve over time. This requires limiting fragmentation by no longer supporting outdated or obsolete legacy software.207 We also estimate that additional savings could be realized by reducing regulatory complexity and burden caused by having two certification editions. We observed that the task of managing two different editions within different rules increases complexity and burden for ONC staff, contractors, ONC– ACBs, CMS programs referencing the certification criteria, and other stakeholders, as compared to removing the 2014 Edition certification criteria. However, we were unable to estimate these benefits because we have no means for quantifying the benefits gained from only using the 2015 Edition. We also expect that health care providers would benefit from removing the 2014 Edition certification criteria because such action would likely motivate health IT developers to certify health IT products to the 2015 Edition, thus enabling providers to use the most 205 Id. 206 Il-Horn Hann, Byungwan Koh, and Marius F. Niculescu, The Double-Edged Sword of Backward Compatibility: The Adoption of Multigenerational Platforms in the Presence of Intergenerational Services, Inform. Systems Res. (2016), at 112–30. 207 Id. PO 00000 Frm 00270 Fmt 4701 Sfmt 4700 up-to-date and supported systems to care for patients. Comments. We did not receive comments specific to our methods for quantifying the potential costs for maintaining and supporting products to previous editions. Response. We have maintained our approach for quantifying costs for health IT developers maintaining and supporting products to the previous 2014 Edition. We have also emphasized again that the research indicates that retaining legacy software would not be beneficial or profitable to the health IT market. (iii) Removal of the ONC-Approved Accreditor From the ONC Health IT Certification Program We expect ONC to realize monetary cost savings from removing the ONCApproved Accreditor (ONC–AA) from the Program. We expect ONC to realize costs savings from no longer: (1) Developing and publishing a Federal Register Notice and listserv; (2) monitoring the open application period and reviewing and making decisions regarding applications; and (3) oversight and enforcement of the ONC–AA. We have calculated the estimated annual cost savings for removing the ONC–AA from the Program, taking into consideration that the ONC–AA renewed its status every three years. For our calculations, we used the estimated hours for collaborating with and informing an ONC–AA in 2017 (using 2017 wage estimates). We estimated that ONC spent approximately 110 hours collaborating with the ONC–AA in 2017, which includes (all at the GS–13, Step 1 level): Annual assessments; providing appropriate guidance; implementing new requirements and initiatives; and consultations as necessary. The hourly wage with benefits for a GS–13, Step 1 employee located in Washington, DC is approximately $91. Therefore, we estimated the annual cost savings to be $3,337. We estimate that ONC would commit approximately eight hours of staff time to develop the Federal Register Notice, which would include approximately: Four hours for drafting and review by an analyst at the GS–13, Step 1 level; two hours for review and analysis by senior certification staff at the GS–14, Step 1 level; and two hours for review and submittal for publication by Immediate Office staff at the GS–15, Step 1 level. The hourly wage with benefits for a GS– 13, Step 1 employee located in Washington, DC is approximately $91. The hourly wage with benefits for a GS– 14, Step 1 employee located in E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations Washington, DC is approximately $107. The hourly wage with benefits for a GS– 15, Step 1 employee located in Washington, DC is approximately $126. Therefore, we estimate the annual cost savings to be $277. Additionally, we estimate a cost of $477 to publish each page in the Federal Register, which includes operational costs. The Federal Register Notice for ONC–AAs requires, on average, one page in the Federal Register (every three years), so we estimated an additional annual cost savings of $159. We estimated that ONC will commit approximately two hours of staff time by an analyst at the GS–13, Step 1 level to draft, review, and publish the listserv to announce the Federal Register Notice. The hourly wage with benefits for a GS– 13, Step 1 employee located in Washington, DC is approximately $91. Therefore, we estimate the annual cost savings to be $61. We estimated that ONC would commit approximately 25 hours of staff time to manage the open application process, review applications and reach application decisions, which would include approximately: 20 hours by an analyst at the GS–13, Step 1 level; three hours by senior certification staff at the GS–14, Step 1 level; and two hours for review and approval by Immediate Office staff at the GS–15, Step 1 level. The hourly wage with benefits for a GS– 13, Step 1 employee located in Washington, DC is approximately $91. The hourly wage with benefits for a GS– 14, Step 1 employee located in Washington, DC is approximately $107. The hourly wage with benefits for a GS– 15, Step 1 employee located in Washington, DC is approximately $126. Therefore, we estimated the annual cost savings to be $798. Taking all of these potential costs savings into consideration, we estimated the overall annual costs savings for removing the ONC–AA from the Program to be $4,632. (iv) Removal of Certain 2015 Edition Certification Criteria In section III.B.4 of this final rule, we removed the following certification criteria from the 2015 Edition: § 170.315(b)(4) ‘‘Common Clinical Data Set summary—create;’’ (b)(5) ‘‘Common Clinical Data Set summary—receive’’ and § 170.315(a)(11) ‘‘Smoking status.’’ We did not finalize the proposal to remove of § 170.315(a)(10) ‘‘Drug formulary and preferred drug list checks,’’ § 170.315(a)(13) ‘‘Patientspecific education resources’’ and § 170.315(e)(2) ‘‘Secure messaging’’ but rather will only permit ONC–ACBs to issue certificates for these criteria until VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 January 1, 2022 to align with requirements of the CMS Medicaid PI Program. For determining calculations for the majority of the 2015 Edition certification criteria we removed, we used the following assumptions. (For the removal of § 170.315(b)(4) Common Clinical Data Set summary—create and (b)(5) Common Clinical Data Set summary—receive, we outlined the slightly different approach used). In the 2015 Edition final rule, we estimated the costs for developing and preparing health IT to meet the 2015 Edition certification criteria. The development and preparation costs we estimated were derived through a health IT developer per criterion cost. We estimated the development and preparation costs over a four-year period, and we projected the costs would be unevenly distributed. In figuring out the cost savings for the deregulatory actions, we initially used the distribution from the 2015 Edition, but then adjusted the percentages of development and preparation costs due to current empirical and anecdotal evidence. The distribution was reevaluated to account for 2019 and we estimated the actual development and preparation distribution for 2018 to be 35 percent and for 2019 to be 15 percent. We took the average development and preparation cost estimates (low and high) per criterion from Table 14 of the 2015 Edition final rule (80 FR 62737). We then used our new distribution to identify the cost per year for years 2018 and 2019. We took the total estimated costs for 2018 and 2019 and divided that by 12 to determine the cost savings per month and took a range of 6 to 12 months. Based on analysis of recent data, our assumptions continue to hold true. To determine the testing costs of the deregulatory actions, we took the number of health IT developers who develop products for certification for the identified criteria from the 2015 Edition final rule and then figured out the average cost per criterion. Based on the costs that one of the ONC–ATLs charges for testing, we estimated the average cost for testing per criterion and determined subsequent cost savings. In 2017, only about five to ten percent of products have been tested and certified compared to the number of certified 2014 Edition products. Therefore, up to 90 to 95 percent of products remain to be tested and certified to the 2015 Edition. Based on analysis of recent data, our assumptions continue to hold true. We estimated the total cost savings by multiplying the number of health IT PO 00000 Frm 00271 Fmt 4701 Sfmt 4700 25911 developers who developed products for certification to a certain criterion by the estimated cost per criterion, $475. We then took five percent of that number to identify the high end for the cost savings. We then took 10 percent to identify the low end. The five percent was derived from looking at the number of unique developers who have at least one active 2014 Edition product and the number of unique developers who have at least one active 2015 Edition. The denominator is the number of unique developers who have at least one active 2014 Edition product, which is 793. The numerator is the number of unique developers who have at least one active 2015 Edition product and one active 2014 edition product, which is 41. (41/ 793 = 0.0517024 or 5 percent). (A) Common Clinical Data Set Summary Record Criteria In this final rule, we removed the Common Clinical Data Set summary— create (§ 170.315(b)(4)) and Common Clinical Data Set summary—receive (§ 170.315 (b)(5)) criteria. Our expectation was for ONC to realize cost savings associated with internal infrastructure support and maintenance, which would include actions such as: (1) Developing and maintaining information regarding these criteria on the ONC website; (2) creating documents related to these criteria and making those documents 508 compliant; (3) updating, revising, and supporting Certification Companion Guides, test procedures, and test tools; and (4) responding to inquiries concerning these criteria. Based on ONC data on the number of inquiries received since early 2016, we estimated approximately 12 annual inquiries about § 170.315(b)(4) and (5) respectively, (24 total inquiries for two criteria). We estimate it will take an analyst at the GS–13, Step 1 level an average of two hours to conduct all tasks associated with each inquiry. The hourly wage with benefits for a GS–13, Step 1 employee located in Washington, DC is approximately $91. Based on analysis of recent data, our assumptions continue to hold true. Therefore, we estimated the annual cost savings to be $4,360. We do not expect cost savings associated with software maintenance because both criteria incorporate the Common Clinical Data Set and essentially the same data input and validation requirements as the transitions of care criterion (§ 170.315(b)(1)). The removal of these two criteria would not affect the test data and software maintenance costs, as the same test data and software validation elements remain in E:\FR\FM\01MYR3.SGM 01MYR3 25912 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations § 170.315(b)(1) and the Common Clinical Data Set used in other criteria. ONC–ACBs could realize minimal savings, as they would need to conduct slightly less surveillance based on the two products that are currently certified to these criteria. We estimated the overall annual costs savings for removing the Common Clinical Data Set summary record certification criteria from the 2015 Edition to be $4,368. Comments. We did not receive comments specific to the removal of the Common Clinical Data Set summary— create (§ 170.315(b)(4)) and Common Clinical Data Set summary—receive (§ 170.315 (b)(5)) criteria. Response. We maintained our approach and estimates for removing the Common Clinical Data Set summary record certification criteria from the 2015 Edition. However, we did update estimates to 2017 dollars. (B) Smoking Status In this final rule, we removed the 2015 Edition ‘‘smoking status’’ criterion (§ 170.315(a)(11)), which would include removing it from the 2015 Edition Base EHR definition. To calculate the cost savings for removing this criterion, we used the 2015 Edition estimated costs of developing and preparing the criterion to the 2015 Edition, between $15,750 and $31,500 and estimated that 35 percent of developers would be newly certified in 2018 and 15 percent in 2019. We estimated the cost of development and preparation costs to be between $5,512.50 and $11,025 for 2018 and $2,362.50 and $4,725 for 2019. We calculated the cost per month for years 2018 and 2019 and using the high point estimates, estimated the development and preparation costs over a 6 to 12 month period between August 2018 and August 2019. We estimated the costs to be between $4,068.75 at six months and $6,825 at 12 months. Based on analysis of recent data, our assumptions continue to hold true. To calculate the cost for testing for this criterion, five developers were estimated in the 2015 Edition to develop products to this criterion. We multiplied the five developers by our estimated cost to test per criterion of $475. This estimated cost per criterion was based on what one ONC–ATL charged for testing and averaged per criterion. To be conservative, we reduced the number by ten percent and five percent respectively resulting in $2,137.50 and $2,256.25. Taking these estimated costs into account we expect the cost savings for removing the 2015 Edition ‘‘smoking status’’ criterion to be between $8,962.50 and $9,081.25. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 Comments. We did not receive comments specific to the removal of the 2015 Edition ‘‘smoking status’’ criterion (§ 170.315(a)(11)). Response. We maintain our approach and estimates for removing the 2015 Edition ‘‘smoking status’’ criterion (§ 170.315(a)(11)) from the 2015 Edition. However, we did update estimates to 2017 dollars. (v) Removal of Certain Certification Requirements In this final rule, we removed § 170.523(k)(1)(iii)(B), which requires ONC–ACBs to ensure that certified health IT includes a detailed description of all known material information concerning limitations that a user may encounter in the course of implementing and using the certified health IT, whether to meet ‘‘meaningful use’’ objectives and measures or to achieve any other use within the scope of the health IT’s certification. We also removed § 170.523(k)(1)(iv)(B) and (C), which state that the types of information required to be disclosed include, but are not limited to: (B) Limitations, whether by contract or otherwise, on the use of any capability to which technology is certified for any purpose within the scope of the technology’s certification; or in connection with any data generated in the course of using any capability to which health IT is certified; (C) limitations, including, but not limited to, technical or practical limitations of technology or its capabilities, that could prevent or impair the successful implementation, configuration, customization, maintenance, support, or use of any capabilities to which technology is certified; or that could prevent or limit the use, exchange, or portability of any data generated in the course of using any capability to which technology is certified. To calculate the savings related to removing these two disclosure requirements, we estimated 830 products certified to the 2015 Edition. We did so by applying the market consolidation rate of ¥23.2 percent which was the rate observed between 2011 and 2014 Editions. If an ONC–ACB spends 1 hour on average reviewing costs, limitations and mandatory disclosures, we estimated the time saved by no longer having to review the limitations to be two-thirds of an hour. The hourly wage with benefits for a GS– 13, Step 1 employee located in Washington, DC is approximately $91 and we assume this to be the hourly rate for an ONC–ACB reviewer. We multiplied 830, the projected number of certified products, by two-thirds of an PO 00000 Frm 00272 Fmt 4701 Sfmt 4700 hour and the assumed hourly rate and calculated the cost savings to be $50,353. (2) Updates to the 2015 Edition Certification Criteria The following section details the costs and benefits for updates to the 2015 Edition health IT certification criteria, which includes costs and benefits to update certain 2015 Edition criteria to due to the adoption of the United States Core Data for Interoperability (USCDI) as a standard, and costs for new or revised 2015 Edition criteria for: EHI export, API, privacy and security transparency attestations, and security tags. (i) United States Core Data for Interoperability In order to advance interoperability by ensuring compliance with new structured data and code sets that support the data, we have replaced the ‘‘Common Clinical Data Set’’ (CCDS) definition and its references with the ‘‘United States Core Data for Interoperability’’ (USCDI) standard, naming Version 1 (v1) in § 170.213 and incorporated it by reference in § 170.299. The USCDI will replace the CCDS 24 months after the publication date of this final rule. The USCDI v1 establishes a minimum set of data classes (including structured data) that are required for health IT to be interoperable nationwide and is designed to be expanded in an iterative and predictable way over time. The USCDI v1 adds three new data classes, ‘‘Allergies and Intolerances,’’ ‘‘Clinical Notes,’’ and ‘‘Provenance;’’ and adds to ‘‘Patient Demographics’’ the data elements ‘‘Previous Address,’’ ‘‘Phone Number,’’ ‘‘Phone Number Type,’’ and ‘‘Email Address’’ that were not defined in the CCDS. This requires updates to the Consolidated Clinical Document Architecture (C–CDA) standard and updates to the following certification criteria: § 170.315(b)(1) (transitions of care); (e)(1) (view, download, and transmit to 3rd party); (g)(6) (Consolidated CDA creation performance); (f)(5) (transmission to public health agencies—electronic case reporting); and (g)(9) (application access—all data request). From our analysis of the C–CDA standard, we concluded that the requirements of the ‘‘Provenance’’ data class are already met by the existing C–CDA standard and will not require any new development. Therefore, we have estimated the cost to health IT developers to add support for ‘‘Allergies and Intolerances’’ and ‘‘Clinical Notes’’ data classes and ‘‘Previous Address,’’ ‘‘Phone Number,’’ E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations ‘‘Phone Number Type,’’ and ‘‘Email Address’’ data elements in C–CDA, and the necessary updates to the affected certification criteria. These estimates are detailed in Table 7 and are based on the following assumptions: • Health IT developers will use the same labor costs and data models. Table 7 shows the estimated labor costs per product for a health IT developer to develop support for the additional USCDI data element in the C–CDA standard and affected certification criteria. We recognize that health IT developer costs will vary; however, our estimates in this section assume all health IT developers will incur the costs noted in Table 7. • A proxy is needed to project the number of 2015 Edition certified health IT products. As the 2015 Edition certification is ongoing, using the current count of developers and products would underestimate the overall costs and benefits, so we therefore use a proxy. We estimate that 545 products from 458 developers will be affected. Our proxy is based on the number of 2014 Edition certified health IT products that are capable of recording 25913 patient data.208 There were 710 products by 588 developers with at least one 2014 Edition product capable of recording patient data. We then multiplied these numbers by our certified health IT market consolidation estimates of ¥22.1 percent and ¥23.2 percent to project the number of 2015 developers and products, respectively. • According to the May 2017 BLS occupational employment statistics, the mean hourly wage for a ‘‘Software Developer’’ is $53.74.209 TABLE 7—COSTS TO HEALTH IT DEVELOPERS TO DEVELOP SUPPORT FOR THE ADDITIONAL USCDI DATA ELEMENT IN C– CDA STANDARD AND AFFECTED CERTIFICATION CRITERIA [2017 Dollars] Lower bound hours Upper bound hours Tasks Details Update C–CDA creation ................. New development to support ‘‘Allergies and Intolerances,’’ ‘‘Clinical Notes,’’ ‘‘Previous Address,’’ ‘‘Phone Number,’’ ‘‘Phone Number Type,’’ and ‘‘Email Address’’ for C–CDA and C–CDA 2.1 Companion Guide. 1,200 2,400 § 170.315(b)(1) (transitions of care) New development to support ‘‘Allergies and Intolerances,’’ ‘‘Clinical Notes,’’ ‘‘Previous Address,’’ ‘‘Phone Number,’’ ‘‘Phone Number Type,’’ and ‘‘Email Address’’ for C–CDA and C–CDA 2.1 Companion Guide. New development to support ‘‘Allergies and Intolerances,’’ ‘‘Clinical Notes,’’ ‘‘Previous Address,’’ ‘‘Phone Number,’’ ‘‘Phone Number Type,’’ and ‘‘Email Address’’ for C–CDA and C–CDA 2.1 Companion Guide. New development to support ‘‘Allergies and Intolerances,’’ ‘‘Clinical Notes,’’ ‘‘Previous Address,’’ ‘‘Phone Number,’’ ‘‘Phone Number Type,’’ and ‘‘Email Address’’ for C–CDA and C–CDA 2.1 Companion Guide. 200 600 400 1,000 Necessary updates to health IT to support the new data class to meet the criteria requirements. 200 600 § 170.315(b)(1) and § 170.315(g)(6) are related and may be developed together. Total Hours .............................. ........................................................ 2,000 4,600 Hourly Rate ............................. ........................................................ $107 ........................ Cost per Product ..................... ........................................................ $214,000 $492,200 Total Cost (545 products) ....... ........................................................ $116.6 million $268.2 million § 170.315(e)(1) (view, download, and transmit to 3rd party). § 170.315(g)(6) (Consolidated CDA creation performance). Remarks (1) Lower bound assumes health IT already has developed C– CDA R2.1 into their system and only needs to be updated for new data elements. (2) Upper bound estimates effort for organizations that are on older versions of C–CDA standard, for example C–CDA R1.1. Necessary updates to health IT to support the new data class to meet the criteria requirements. We estimated that the cost to a health IT developer to develop support for the additional USCDI data elements would range $214,000 to $492,200. Therefore, assuming 545 products, we estimate that the total annual cost to all health IT developers would, on average, range from $116.6 million to $268.2 million. This would be a one-time cost to developers per product that is certified to the specified certification criteria and would not be perpetual. We believe this would benefit health care providers, patients, and the industry as a whole. Clinical notes and provenance were included in the draft USCDI v1 based on significant feedback from the industry, which highly 208 We defined ‘‘products capable of recording patient data’’ as any 2014 Edition health IT product that was certified for at least one of the following criteria: Demographics ((a)(5)), Medication List ((a)(7)), Medication Allergy List ((a)(8)), Problem List ((a)(6)), and Family Health History ((a)(12)). 209 See ‘‘software developer, systems software’’— https://www.bls.gov/oes/2017/may/oes151133.htm. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 PO 00000 Frm 00273 Fmt 4701 Sfmt 4700 E:\FR\FM\01MYR3.SGM 01MYR3 25914 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations regarded their desirability as part of interoperable exchanges. The free text portion of the clinical notes was most often relayed by clinicians as the data they sought, but were often missing during electronic health information exchange. Similarly, the provenance of data was also referenced by stakeholders as a fundamental need to improve the trustworthiness and reliability of the data being exchanged. We expect improvements to interoperable exchange of information and data provenance to significantly benefit providers and patients. For example, in 2018, among individuals who had viewed their online medical record within the past year (representing 30 percent nationally), about half indicated that clinical notes were included in their online medical record.210 Additionally, seven percent of individuals who viewed their online medical record requested a correction of inaccurate information. Thus, enabling patients to have access to their clinical notes might assist in reducing medical coding errors. Patient matching is a barrier to interoperability. In 2017, 36 percent of non-Federal acute care hospitals reported difficulty matching or identifying the correct patient between systems.211 The data elements ‘‘Previous Address,’’ ‘‘Phone Number,’’ ‘‘Phone Number Type,’’ and ‘‘Email Address’’ were included in the USCDI v1 based on feedback from industry, for their usage in accurate patient matching. However, we are not aware of an approach for quantifying these benefits and we welcomed comments on potential approaches to quantifying these benefits in the Proposed Rule. 210 Patel V & Johnson C. (May 2019). Trends in Individuals’ Access and Use of Online Medical Records and Technology for Health Needs: 2017– 2018. ONC Data Brief, no.48 Office of the National Coordinator for Health Information Technology: Washington DC. 211 Pylypchuk Y., Johnson C., Henry J. & Ciricean D. (November 2018). Variation in Interoperability among U.S. Non-Federal Acute Care Hospitals in 2017. ONC Data Brief, no.42. Office of the National Coordinator for Health Information Technology: Washington DC. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 Comments. We did not receive comments regarding an approach to quantify benefits. However, we did receive comment regarding estimation of the time and effort on behalf of health IT developers to update to the USCDI. Commenters stated that we have underestimated the number of hours necessary for health IT developers, suggesting that it is triple our estimates. Response. We thank commenters for their input. We maintain the approach we proposed in the Proposed Rule in regard to our estimates for updating the USCDI. This final rule constrains ‘‘provenance’’ to only the scope of data for which the health IT developer is the owner/steward. Hence, the scope is fairly limited and therefore, we believe our estimates to be accurate. We note the removal of ‘‘data export’’ (§ 170.315(b)(6)) from the cost estimate in Table 6, in alignment with our final policy decisions and no longer updating the criterion to USCDI. We did, however, increase the hour per developer based on additional data elements included in this final rule. (ii) Electronic Health Information Export In this final rule, we adopted a modified version of the ‘‘EHI export’’ criterion in § 170.315(b)(10). Notably, we have defined and further constrained the criterion’s scope of data for export as EHI, as defined in § 171.102, that can be stored at the time of certification by the product, of which the Health IT Module is a part. The final criterion provides a focused set of data from a scope perspective and clarifies what a product with a certified Health IT Module must be capable of exporting. The intent of this criterion aims to provide Health IT Module users the functionality to efficiently export or direct the export of EHI for a single patient or a patient population in a computable, electronic format. (A) Costs To Develop and Maintain EHI Export Criterion This section describes the estimated costs of the ‘‘EHI export’’ criterion. The cost estimates are based on the following assumptions: PO 00000 Frm 00274 Fmt 4701 Sfmt 4700 • Health IT developers will use the same labor costs and data models. Table 8 shows the estimated labor costs per product for a health IT developer to develop and maintain the EHI export functionality. We recognize that health IT developer costs will vary; however, our estimates in this section assume all health IT developers will incur the costs noted in Table 8. • A proxy is needed to project the number of 2015 Edition certified health IT products containing the ‘‘EHI export’’ criterion. We estimated that 545 products from 458 developers will contain the ‘‘EHI export’’ criterion. To develop these estimates, we first identified a proxy for the number of health IT developers that may create a 2015 Edition certified health IT product containing the ‘‘EHI export’’ criterion. Our proxy is based on the number of 2014 Edition certified health IT products that are capable of recording patient data.212 We based our estimates on these products because data must be captured to be exported under the adopted criterion. There were 710 products by 588 developers with at least one 2014 Edition product capable of recording patient data. We then multiplied these numbers by our certified health IT market consolidation estimates of ¥22.1 percent and ¥23.2 percent to project the number of 2015 developers and products, respectively. • Wages are determined using BLS estimates. According to the May 2017 BLS occupational employment statistics, the mean hourly wage for a ‘‘Software Developer’’ is $53.74.213 As noted previously, we have assumed that overhead costs (including benefits) are equal to 100 percent of pre-tax wages, so the hourly wage including overhead costs is $107. 212 We defined ‘‘products capable of recording patient data’’ as any 2014 Edition product that was certified for at least one of the following criteria: Demographics ((a)(5)), Medication List ((a)(7)), Medication Allergy List ((a)(8)), Problem List ((a)(6)), and Family Health History ((a)(12)). 213 https://www.bls.gov/oes/2017/may/ oes151133.htm. E:\FR\FM\01MYR3.SGM 01MYR3 25915 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations TABLE 8—ESTIMATED LABOR COSTS TO DEVELOP AND MAINTAIN THE EHI EXPORT CRITERION PER PRODUCT Lower bound hours Activity Upper bound hours Task 1: Developing the Data Dictionary software capability to export EHI in a developer format (per product). 160 1,600 Task 2: Updating the Data Dictionary and publishing the updated format (per product). 80 500 Task 3: Updating the software that performs EHI Export (per product). 80 500 Total Labor Hours ..................... 320 2,600 Remarks This is the effort to document all the data exported by the product for a single patient and for all patients. The lower bound assumes that the health IT developer already has a standard format in which they are exporting the data for either case (e.g., C–CDA for single patient, CSV file or database dump for all data) and the effort is merely to publish it to the users. On the other hand, the upper bound reflects the case where the health IT has to develop the export capability de novo into their product and document the data output. This still assumes that the developer will be able to use the format of their choice. This is the maintenance cost to update the data dictionary published by the product to ensure that the data dictionary is compatible with newer releases of the product. The lower bound estimate assumes the effort when there are only minor changes to the formats of the data stored by the product. The upper bound estimate assumes the effort when the product makes substantial changes to the formats of the data. This is the maintenance cost to upgrade the software that would generate the EHI export files. The lower bound estimates the cost to maintain the software when there are only minor changes to the product, including updates to underlying software (e.g., database versions, operating systems, etc.). The upper bound estimate accounts for substantial reworking of the export software program to export in new formats or based on substantial changes made to the underlying storage system. TABLE 9—EXAMPLE CALCULATION FOR THE LOWER BOUND ESTIMATED COST TO HEALTH IT DEVELOPERS TO PERFORM TASK 1 FOR THE EHI EXPORT CRITERION [2016 Dollars] Activity Estimated labor hours lower bound Developer salary Projected products Task 1 .......................................................................................................................................... 160 hours $107 per hour 545 products Example Calculation 160 hours * $107 * 545 products = $9,330,400 TABLE 10—TOTAL COST TO DEVELOP AND MAINTAIN THE EHI EXPORT CRITERION [2017 Dollars] Estimated cost Activity Lower bound Upper bound Task 1 (545 products) ............................................................................................................................................. Task 2 (545 products) ............................................................................................................................................. Task 3 (545 products) ............................................................................................................................................. $9,330,400 4,665,200 4,665,200 $93,304,000 29,157,500 29,157,500 Total (545 products) ......................................................................................................................................... 18,660,800 151,619,000 (B) Costs To Implement and Support the EHI Export Criterion The cost estimates are based on the following assumptions: • Health care providers will use the same costs and data models. Table 11 shows the estimated costs to implement and support the EHI Export criterion. The cost estimates used in this calculation were published by the VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 Agency for Healthcare Research and Quality and were based on the average cost to implement an EHR for a clinical practice.214 This publication was based on the implementation of an entire EHR 214 Fleming, N., Impact of Health Information Technology on Primary Care Workflow and Financial Measures AHRQ Publication No. 11– 0081–4–EF, October 2011 https://digital.ahrq.gov/ sites/default/files/docs/page/Fleming_SS_508_ 20111021_d.pdf. PO 00000 Frm 00275 Fmt 4701 Sfmt 4700 system. We assume that all stakeholders impacted by this rule will already have a base EHR system implemented, therefore we discounted these estimates by a factor of 10 to better reflect the cost to implement an EHI Export module only. We did not have cost estimates for hospitals. Therefore, to estimate the cost for a hospital to implement an EHR system, we multiplied the estimate to E:\FR\FM\01MYR3.SGM 01MYR3 25916 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations compared to a clinical practice. We recognize that costs health care providers incur will vary; our estimates in this section assume health care providers incur the costs noted in Table 11. implement an EHR for a clinical practice by a factor of 10. We believe this will better reflect the increased magnitude and complexity of implementing and supporting a new health IT module in a hospital • Hospitals and clinical practices that have participated in the CMS EHR Incentive Program will be impacted. We estimate that 95,470 clinical practices 215 and 4,519 hospitals 216 will be impacted by our rule. TABLE 11—ESTIMATED COST TO HOSPITALS AND CLINICAL PRACTICES TO IMPLEMENT AND SUPPORT THE EHI EXPORT CRITERION [2017 Dollars] Task Number of entities Entity type Task 1: Implementation and Support. Task 2: Staff Training Cost per entity Remarks Lower bound Upper bound Clinical Practices ...... 95,470 $2,000 $4,000 Hospitals ................... Clinical Practices ...... 4,519 95,470 20,000 500 40,000 1,000 Hospitals ................... 4,519 5,000 10,000 This task would involve costs associated with staff support during implementation, workflow mapping and redesign, content development and customization, project management, and other technical deployment including networking. This task would involve staff training for implementation teams and staff end users. TABLE 12—TOTAL COST TO IMPLEMENT AND SUPPORT THE EHI EXPORT CRITERION [2017 Dollars] Task Lower bound Task 1: Implementation and Support ..................... Task 2: Staff Training ............................................. Total Cost ........................................................ Upper bound Clinical Practices .................................................... Hospitals ................................................................. Clinical Practices .................................................... Hospitals ................................................................. $190,940,000 90,380,000 47,735,000 22,595,000 $381,880,000 180,760,000 95,470,000 45,190,000 ................................................................................. 351,650,000 703,300,000 Health care providers may choose to change their EHRs for a number of reasons. However, the steps and costs associated with switching one’s EHR are complex. Market forces, such as health IT developers’ business incentives, make it difficult and costly for EHR users to transfer system data from one developer to another. Data transfer costs vary depending on how contracts are structured.217 Specifically, contracts might include high data-transfer fees or do not include conditions for data transfer. Providers may also pay fees for consultants or technical staff to help with the data-transfer process given differences in how data may be mapped from one developer to another. Hence, health care providers will experience benefits associated with the standardization proposed in the EHI export functionality. Because of the EHI export functionality, providers will no longer incur the costs associated with mapping data from their health IT database into standard terms or exporting said data using a standardized format when switching EHRs. In our analysis, we calculated the benefits in terms of the reduced costs to providers as a result of our rule eliminating these two tasks. The benefit calculations below are based on the following assumptions: • On average, five percent of providers and hospitals switch their health IT annually. Using CMS Medicare EHR Incentive Program data from years 2013–2016, we estimate the rate of providers (hospitals and eligible professionals) that changed their health IT developer. We believe that the EHI export functionality would help alleviate the burden of switching between health IT systems by increasing portability of EHI that can be stored at the time of certification by the product, of which the Health IT Module is a part. Thus, the benefit calculations are based on assumptions regarding the number of clinical practices (n = 4,774) and hospitals (n = 226) that are projected to switch products in a year. 215 This number was estimated based on the deduplicated number of practices that had at least one clinician participate in the CMS Medicare Electronic Health Record Incentive Program. 216 This estimate is the total number of eligible hospitals that ever participated in the CMS Medicare Electronic Health Record Incentive Program. 217 Pratt, Mary, The True Cost of Switching EHRs, Medical Economics, May 30, 2018, Volume: 96 Issue: 10. Based on the stated assumptions and costs outlined in Tables 8 and 10, the total estimated cost for health IT developers to develop products to the ‘‘EHI export’’ criterion will range from $18.7 million to $151.6 million. Assuming 458 health IT developers, there would be an average cost per health IT developer ranging from $40,744 to $331,045. We note that the development costs, which equal half of the total, would be a one-time cost and would not be perpetual. The total estimated cost for hospitals and clinical practices to implement and support the EHI Export will range from $351.7 million to $703.3 million. The midpoint of ranges stated is used as the primary estimate of costs. (C) Benefits VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 PO 00000 Frm 00276 Fmt 4701 Sfmt 4700 E:\FR\FM\01MYR3.SGM 01MYR3 25917 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations • Health IT consultants 218 will use the same labor costs and data models. Table 13 shows the estimated labor costs per product for a hospital or health care provider to hire a health IT consultant to perform data export of EHI, as defined in 45 CFR 171.102, without the EHI export functionality. We recognize that these costs will vary based on the size of the hospital or clinical practice. • Wages are determined using BLS estimates. According to the May 2017 BLS occupational employment statistics, the mean hourly wage for a ‘‘Software Developer’’ is $53.74.219 As noted previously, we have assumed that overhead costs (including benefits) are equal to 100 percent of pre-tax wages, so the hourly wage including overhead costs is $107. TABLE 13—COST PER PROVIDER TO PERFORM DATA EXPORT WITHOUT EHI EXPORT FUNCTIONALITY WHEN SWITCHING HEALTH IT PRODUCTS [2017 Dollars] Estimated cost per health IT switch (lower bound) (hours) Estimated cost per health IT switch (upper bound) (hours) Task 1: Understanding and mapping the data in health IT database into standard terms. 320 3,200 Task 2: Exporting the data from the health IT into a format that can be subsequently used to import. 160 1,600 Total Labor Hours ................................................. 480 4,800 Activity Remarks The lower bound is an estimate for a small provider practice using the standard instance of a certified health IT product with no customization and use of nationally recognized content standards. The upper bound estimates a medium to large practice with substantial local customization of content. The lower bound assumes that the certified health IT product is capable of exporting most of the data into standard output format such as C–CDA. The upper bound estimates the case where a large amount of data is not easily exported by the certified health IT product and therefore substantial one-off software needs to be written to export the data into a custom (de novo) format developed for the transition. Table 14 provides an example calculation for how we calculated our total costs presented in Table 15. TABLE 14—EXAMPLE CALCULATION FOR THE LOWER BOUND ESTIMATED COST TO PROVIDERS TO HIRE A HEALTH IT CONSULTANT TO PERFORM TASK 1 WITHOUT THE EHI EXPORT CRITERION [2017 Dollars] Activity Estimated labor hours lower bound Developer salary Estimated annual number of health IT switches Task 1 ........................................................................................................................ 320 hours $107 per hour 5,000 switches Example Calculation: 320 hours * $107 * 5000 switches = $171,200,000. TABLE 15—TOTAL COST TO PROVIDERS TO PERFORM DATA EXPORT WITHOUT THE EHI EXPORT CRITERION WHEN SWITCHING HEALTH IT PRODUCTS [2017 Dollars] Estimated cost Activity Lower bound Upper bound Task 1 .......................................................................................................................................................... Task 2 .......................................................................................................................................................... $171,200,000 85,600,000 $1,712,000,000 856,000,000 Total Cost Savings (5,000 switches) .................................................................................................... 256,800,000 2,568,000,000 218 ‘‘Health IT consultant’’ refers to a technical expert that a hospital or provider will hire to VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 migrate their data from a legacy system to a new EHR. PO 00000 Frm 00277 Fmt 4701 Sfmt 4700 219 https://www.bls.gov/oes/2017/may/ oes151133.htm. E:\FR\FM\01MYR3.SGM 01MYR3 25918 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations We multiplied the costs to switch health IT by the estimated number of hospitals and clinical practices affected. Thus the estimated annual benefit, in terms of cost savings to hospitals and clinical practices, would range from $256.8 million to $2.6 billion. (iii) Application Programming Interfaces The API requirements in this final rule reflect the full depth and scope of what we believe is necessary to implement the API Condition of Certification requirement described in section 4002 of the Cures Act. We have adopted new standards, new implementation specifications, a new certification criterion, and detailed Conditions and Maintenance of Certification requirements in §§ 170.213 and 170.215, 170.315, and 170.404, respectively. We also modified the Base EHR definition in § 170.201. (A) Costs To Develop and Maintain Certified API Technology This section describes the potential costs of the API certification criterion. The cost estimates below are based on the following assumptions: • Health IT developers will use labor costs and data models based on whether they have adopted aspects of the API certification criterion. Tables 16 A and 16 B show the estimated labor costs per product for a health IT developer to develop and maintain an API. We recognize that health IT developer costs will vary based on whether they have already implemented aspects of the API certification criterion; including adopting the Fast Healthcare Interoperability Resources (FHIR®) API. To account for this variation, we have estimated two cost tables. Table 16 A reflects the range of costs incurred for new products or those developers that have not previously certified to the API certification criteria. Table 16 B shows the cost for developers that have already implemented the API criteria. We have assumed in our calculations that all health IT developers will incur costs noted in either Table 16 A or Table 16 B. • A proxy is needed to project the number of 2015 Edition certified health IT products containing the API certification criterion. We estimated that 459 products from 394 developers will contain the API criterion. We used a proxy to determine the number of health IT developers that may develop an API for the certification to the 2015 Edition. There were 598 products and 506 developers with at least one 2014 Edition certified health IT product that could perform transitions of care. We then multiplied this number by our certified health IT market consolidation estimates of ¥22.1 percent and ¥23.2 percent to project the number of 2015 developers and products, respectively. Some developers and products are already leveraging aspects of the API certification criterion. This could reduce their cost to implement the criterion. To determine the number of developers and products applicable to cost Table 16 A or 16 B, we calculated the proportion of products and developers that have already certified to API certification criterion. We then applied this estimate to the projected number of 2015 Edition certified health IT products. Specifically, we estimate that 50 percent of products (230) and 55 percent of developers (217) will incur costs reflected in Table 16 A because they have no prior experience with certifying to the API criteria. We believe this estimate serves as a reasonable proxy for products’ capability to send patient data and the cost of implementation. The API functionality required by the 2015 Edition achieves a similar end by allowing providers to retrieve patient data from secure data servers hosted by other developers, as well as providing patients access to their medical records through third-party applications connected to these same secure servers. • Wages are determined using BLS estimates. According to the May 2017 BLS occupational employment statistics, the mean hourly wage for a ‘‘Software Developer’’ is $53.74.220 TABLE 16 A—ESTIMATED LABOR HOURS TO DEVELOP AND MAINTAIN API—NEW PRODUCTS Estimated labor hours Activity Details Remarks Lower bound Upper bound Task 1: Implementing security via SMART App Launch Framework IG (per product). (1) New development to support OpenID Connect. (2) Implementation of the Smart Guide with support for refresh tokens and the core capabilities specified in the rule. (3) New development to respond to request for access token verification. 1000 1500 Task 2: Develop support for Fast Healthcare Interoperability Resources (FHIR®) API and associated IGs (per product). (1) New development to support FHIR R4 (2) Implementation to the FHIR US Core IG. 2000 6000 (1) Lower bound assumes health IT has already implemented security via SMART App Launch Framework IG and need to be updated to account for additional requirements in the rule including Support for additional ‘‘core’’ capabilities required by rule and Token Introspection. (2) Upper bound assumes new development for implementation of SMART App Launch Framework IG, and additional requirements in the rule including Token Introspection. (1) Lower bound assumes health IT already has developed FHIR DSTU2 2015 Edition for data classes that were specified in prior rule and only needs to be updated to R4 and new data classes specified in the rule (2) Upper bound assumes new development of FHIR API for all resources 220 https://www.bls.gov/oes/2017/may/ oes151133.htm. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 PO 00000 Frm 00278 Fmt 4701 Sfmt 4700 E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations 25919 TABLE 16 A—ESTIMATED LABOR HOURS TO DEVELOP AND MAINTAIN API—NEW PRODUCTS—Continued Estimated labor hours Activity Details Remarks Lower bound Upper bound Task 3: Develop API for Population Level Services (per product). Note: One-time cost .. (1) New development to support FHIR Bulk Data Access IG. 2000 4500 Task 4: Development of App registration Server and Portal (per developer). (1) New registration server development (or updates to existing server) to support registration timeliness and publication of FHIR endpoints. (2) Development of portal and managing the application registration system. 1000 2500 Task 5: Update Application Registration Server and Portal (per developer). (1) Yearly updates and maintenance to keep the portal running. We do not anticipate any major changes to the standard and will be primarily driven by usage and developer interest. (1) Develop capability to identify apps authorized by registered users. (2) Provide capability to remove access at patient direction. 400 1300 250 1500 (1) Server costs for application registration, sandbox, bulk data storage, and costs associated with making documentation publicly available. (2) Software costs (e.g., databases, application servers, portal technology). $7,500 $30,000 Task 6: Develop support for patients to revoke access to authorized app (per product).. Note: One-time cost .. Other costs (50% per product, 50% per developer) (2017 Dollars). Note: One-time cost .. (1) Lower bound assumes health IT already has an existing API for population level services; and need to migrate to the standardized API specified in the rule. (2) Upper bound assumes new development of FHIR Bulk Data Access IG. (1) Lower bound assumes that the developer already has existing application registration infrastructure in place, and only needs to update it to support the API Maintenance of Certification requirements. (2) Upper bound is new development of an application registration service and portal. (1) Lower bound estimates hours to keep it running with junior staff. (2) Upper bound estimates small updates. (1) Lower bound assumes that the developer already has a portal used by patients for managing their preferences and new development will be needed to provide patients with ability to view and revoke access to their authorized apps. (2) Upper bound assumes that developer’s current capability of managing registered patients need to be significantly enhanced to support enabling patients to revoke access to the authorized apps. (1) Estimated as monetized costs and not as hours; most of the costs would be one-time procurement costs plus yearly maintenance. TABLE 16 B—ESTIMATED LABOR HOURS TO DEVELOP AND MAINTAIN API—CURRENTLY CERTIFIED PRODUCTS Estimated labor hours Activity Details Remarks Lower bound Upper bound Task 1: Implementing security via SMART App Launch Framework IG (per product). (1) Development to support OpenID Connect. (2) Implementation of the Smart Guide with support for refresh tokens and the core capabilities specified in the rule. (3) Development to respond to request for access token verification. 800 1000 Task 2: Develop support for Fast Healthcare Interoperability Resources (FHIR®) API and associated IGs (per product). (1) Development to support FHIR R4 ...... (2) Implementation to the FHIR US Core IG. 1600 2000 VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 PO 00000 Frm 00279 Fmt 4701 Sfmt 4700 (1) Lower bound assumes health IT has already implemented security via SMART App Launch Framework IG and need to be updated to account for additional requirements in the rule. (2) Upper bound assumes additional development for implementation of SMART App Launch Framework IG, and additional requirements in the rule. (1) Lower bound assumes health IT already has developed FHIR R4 for data classes that were specified in prior rule and only needs to be updated to new data classes specified in the rule. (2) Upper bound assumes health IT was originally developed for FHIR DSTU2 and needs additional development of FHIR API to support upgrading to FHIR R4 and new data classes. E:\FR\FM\01MYR3.SGM 01MYR3 25920 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations TABLE 16 B—ESTIMATED LABOR HOURS TO DEVELOP AND MAINTAIN API—CURRENTLY CERTIFIED PRODUCTS— Continued Estimated labor hours Activity Details Remarks Lower bound Upper bound Task 3: Develop API for Population Level Services (per product). Note: One-time cost .. (1) New development to support FHIR Bulk Data Access IG. 2000 4500 Task 4: Development of App registration Server and Portal (per developer). (1) New registration server development (or updates to existing server) to support registration timeliness and publication of FHIR endpoints. (2) Development of portal and managing the application registration system. 800 1000 Task 5: Update Application Registration Server and Portal (per developer). (1) Yearly updates and maintenance to keep the portal running. We do not anticipate any major changes to the standard and will be primarily driven by usage and developer interest. (1) Develop capability to identify apps authorized by registered users. (2) Provide capability to remove access at patient direction. 320 400 150 250 (1) Server costs for application registration, sandbox, bulk data storage, and costs associated with making documentation publicly available. (2) Software costs (e.g., databases, application servers, portal technology). $6000 $7,500 Task 6: Develop support for patients to revoke access to authorized app (per product). Note: One-time cost .. Other costs (50% per product, 50% per developer) (2017 Dollars). Note: One-time cost .. Table 17 provides an example calculation for how we calculated our (1) Lower bound assumes health IT already has an existing API for population level services; and need to migrate to the standardized API specified in the rule. (2) Upper bound assumes new development of FHIR Bulk Data Access IG. (1) Lower bound assumes that the developer already has existing application registration infrastructure in place, and only needs to update it to support the API Maintenance of Certification requirements. (2) Upper bound assumes additional development to support requirements in rule. (1) Lower bound estimates hours to keep it running with junior staff. (2) Upper bound estimates small updates. (1) Lower bound assumes the developer provides this functionality based on 2015 ONC Edition and needs to perform minimum verification. (2) Upper bound assumes that the developer already has a portal used by patients for managing their preferences and new development will be needed to provide patients with ability to view and revoke access to their authorized apps. (1) Estimated as monetized costs and not as hours; most of the costs would be one-time procurement costs plus yearly maintenance. total costs presented in Tables 18 A and 18 B. TABLE 17—EXAMPLE CALCULATION FOR THE LOWER BOUND ESTIMATED COST TO NEW PRODUCTS TO PERFORM TASK 1 IN TABLE 13 A TO DEVELOP API [2017 Dollars] Estimated labor hours Activity Developer salary Projected products Lower bound Task 1 .............................................................................. 1,000 hours ....................... $107 per hour .................... 230 products. Example Calculation: 1,000 hours * $107 * 230 products = $24,610,000. TABLE 18 A—TOTAL COST TO DEVELOP AND MAINTAIN API—NEW PRODUCTS [2017 Dollars] Estimated lost Activity Lower bound Task 1 (230 products) ............................................................................................................................................. Task 2 (230 products) ............................................................................................................................................. Task 3 (230 products) ............................................................................................................................................. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 PO 00000 Frm 00280 Fmt 4701 Sfmt 4700 E:\FR\FM\01MYR3.SGM 01MYR3 $24,556,500 49,113,000 49,113,000 Upper bound $36,834,750 147,339,000 110,504,250 25921 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations TABLE 18 A—TOTAL COST TO DEVELOP AND MAINTAIN API—NEW PRODUCTS—Continued [2017 Dollars] Estimated lost Activity Lower bound Task 4 (217 Task 5 (217 Task 6 (230 Other Costs Other Costs Upper bound developers) .......................................................................................................................................... developers) .......................................................................................................................................... products) ............................................................................................................................................. (230 products) ..................................................................................................................................... (217 developers) ................................................................................................................................. 23,186,900 9,274,760 6,152,500 860,625 812,625 57,967,250 30,142,970 36,915,000 3,442,500 3,250,500 Total (230 products and 217 developers) ........................................................................................................ 163,069,910 426,396,220 TABLE 18 B—TOTAL COST TO DEVELOP AND MAINTAIN API—CURRENTLY CERTIFIED PRODUCTS [2017 Dollars] Estimated cost Activity Lower bound Task 1 (229 Task 2 (229 Task 3 (229 Task 4 (177 Task 5 (177 Task 6 (229 Other Costs Other Costs Upper bound products) ............................................................................................................................................. products) ............................................................................................................................................. products) ............................................................................................................................................. developers) .......................................................................................................................................... developers) .......................................................................................................................................... products) ............................................................................................................................................. (229 developers) ................................................................................................................................. (177 products) ..................................................................................................................................... $19,645,200 39,290,400 49,113,000 15,176,880 6,070,752 3,675,450 688,500 531,900 $24,556,500 49,113,000 110,504,250 18,971,100 7,588,440 6,125,750 860,625 664,875 Total (229 products and 177 developers) ........................................................................................................ 134,192,082 218,384,540 We note that we have adopted in § 170.404(b)(3) a specific requirement that an API Technology Supplier must support the publication of Service Base URLs for all of its customers that are centrally managed by the Certified API Developer, and make such information publicly available (in a computable format) at no charge. Thus, we are placing the responsibility of publishing the URLs on health IT developers and those costs are captured in the registration portal cost estimation in this RIA. Based on the stated assumptions and costs outlined in Tables 16 A and 16 B, the total estimated costs for health IT developers to develop and maintain a product to the API criterion would range from $297.3 million to $644.8 million with an average cost per developer ranging from $0.75 million to $1.64 million. We note that the ‘‘other costs’’ and costs associated with tasks 3 and 6, which account for $110.9 million to $272.3 million of this total, are onetime costs and are not perpetual. (B) Optional Cost To Acquire and Use Applications That Interact With Certified API Technology We believe the API certification criterion and associated Condition and Maintenance of Certification requirements finalized in this rule will create an environment that promotes innovation for software developers to connect new tools and services that create efficiencies for health care providers throughout their course of care delivery. Software applications that connect to APIs is an emerging market that we believe will be further enhanced by the standards, transparency, and procompetitive requirements finalized in this rule. As of October 25, 2018, researchers identified nearly 300 software applications being marketed on EHR vendors’ app stores. The majority of these applications are designed for health care providers to help support use cases for population health analytics, clinical decision support, patient education, as well as to conduct administrative and financial tasks.221 Although not required under this rule, this section describes the potential costs of health care providers to acquire and use new software applications that interact with certified API technology. The cost estimates are based on the following assumptions: • Health care providers will use the same costs and data models. Table 19 shows the estimated costs to acquire and use software applications that interact with certified API technology. We recognize that costs health care providers incur will vary based on several factors including, but not limited to, size of the health care entity, application usage, and complexity of deployment and maintenance. However, our estimates in this section assume health care providers incur the costs noted in Table 19. • Hospitals and clinical practices that have participated in the CMS EHR Incentive Program will be impacted. We estimate that 95,470 clinical practices 222 and 4,519 hospitals 223 will be impacted by our rule. 221 Dullabh P, Hovey L, Heaney-Huls K, Rajendron N, Wright A, Sittig D. Application Programming Interfaces in Health Care: Findings from a Current-State Sociotechnical Assessment. Applied Clinical Informatics. 2020; 11(01): 059– 069. 222 This number was estimated based on the deduplicated number of practices that had at least one clinician participate in the CMS Medicare Electronic Health Record Incentive Program. 223 This estimate is the total number of eligible hospitals that ever participated in the CMS Medicare Electronic Health Record Incentive Program. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 PO 00000 Frm 00281 Fmt 4701 Sfmt 4700 E:\FR\FM\01MYR3.SGM 01MYR3 25922 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations TABLE 19—ESTIMATED COST TO HOSPITALS AND CLINICAL PRACTICES TO ACQUIRE AND USE SOFTWARE APPLICATIONS THAT ENGAGE WITH CERTIFIED API TECHNOLOGY [2017 Dollars] Cost per entity Number of entities Entity type Lower bound Total cost Upper bound Lower bound Upper bound Clinical Practices .................................................................. Hospitals .............................................................................. 95,470 4,519 $1,000 10,000 $5,000 100,000 $95,470,000 45,190,000 $477,350,000 451,900,000 Total .............................................................................. ........................ ........................ ........................ 140,660,000 929,250,000 The total cost to health care providers to acquire and use software applications that engage with certified API technology would range from $140.6 million to $929.3 million. The midpoint of ranges stated is used as the primary estimate of costs. (C) Benefits The Medicare Access and CHIP Reauthorization Act (MACRA), (Pub. L. 114–10), tasks ONC with measuring interoperability in the health IT industry.224 The measurement concepts developed include a multi-part approach analyzing not only adoption of health IT functionalities supporting information exchange but the downstream impact of these technologies on data completeness, data integration, and supports for core functions of patient care. The benefits of our API proposal are similarly multifaceted. Our API proposal will increase interoperability by ensuring that more data is available and shared between EHR users. The proposal will also make data more widely available to software developers outside of those specializing in EHR development. As a result, this data will lead to greater innovation in the app market resulting in new technologies for health care providers and patients alike. In the analysis, we quantify benefits in the following three areas: First, provider time saved as a result of new efficiencies in care delivery due to new technologies, such as provider facing apps. Second, the effects of interoperability on costsavings associated with reductions in duplicate lab tests, readmissions, emergency room (ER) visits, and adverse drug events. We focused on these outcomes for two reasons: Evidence in literature indicates that health information exchange impacts the chosen measures; and cost of care 224 Health IT Buzz Blog, Measuring Interoperability: Listening and Learning, https:// www.healthit.gov/buzz-blog/electronic-health-andmedical-records/interoperability-electronic-healthand-medical-records/measuring-interoperabilitylistening-learning/. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 associated with these measures is high and the impact of health information exchange is likely to result in significant benefits in the form of a cost reduction.225 Finally, we quantify an increase in the number of individuals with access to their health information through a mechanism of their choice such as apps. The benefit calculations are based on the following assumptions: • Benefits noted in academic literature are assumed accurate. Estimates of the benefits are based on estimates obtained from peer reviewed academic literature. ONC reviewed academic articles for validity; however, models were not replicated. • Hospitals and eligible professionals that have participated in the CMS EHR Incentive Programs will be impacted: Estimates assume that 439,187 health care providers and/or 4,519 hospitals would be affected by this regulatory action. (D) Benefits: Provider Time Saved as a Result of New Efficiencies in Care Delivery Due to the Optional Purchase of New Technologies, Such as Provider Facing Apps Improvements in technology result in benefits for consumers and producers through increased production efficiencies (Stoneman 2018).226 The introduction of EHRs into the health care industry is an example of this. Sinsky (2016) found physicians spend 27 percent of their total time on direct clinical face time with patients, and 49.2 percent of their time on EHR and desk work.227 Outside of office hours, physicians spend another one to two hours of personal time each night doing 225 Analyzing the Public Benefit Attributable to Interoperable Health Information Exchange https:// aspe.hhs.gov/pdf-report/analyzing-public-benefitattributable-interoperable-health-informationexchange. 226 Stoneman P, Bartoloni E., Baussola M. The Microeconomics of Product Innovation. Oxford, United Kingdom: Oxford University Press, 2018. 227 Christine Sinsky et al., Allocation of Physician Time in Ambulatory Practice: A Time and Motion Study in 4 Specialties, Ann Intern Med. (Dec. 6, 2016), at 753–60. PO 00000 Frm 00282 Fmt 4701 Sfmt 4700 additional computer and other clerical work. Despite the number of hours providers spend in their EHR, there is evidence that the introduction of EHRs is associated with time saved. AdlerMilstein (2013) found that EHR use compared to non-EHR use resulted in a 5.3 percent increase in work relative value units per clinician work day.228 Improved efficiencies are not limited to the installation of an EHR. Providers also benefit from the use of emerging technologies. Amusan (2008) found that EHR and computerized provider order entry (CPOE) implementation was associated with 3.69 minutes of time saved five months post implementation.229 Similarly, Helmons (2015) found that the impact of suppressing clinically irrelevant alerts and adding clinical-decision support to EHRs saved providers about two percent of their time. To measure the benefits of the API provision on providers’ time as a result of new technologies, we examined the literature on the impact of IT on productivity across various industries. As explained in Bartel (2007), improvements in IT could affect productivity through multiple mechanisms that are not necessarily associated with the underlying intention of that technology.230 When examining the effect of IT in manufacturing, researchers found that adoption of IT affected production plants’ composition of products, reduced time of production processes, and increased hiring of skilled workers. We adopt the same logic here. Specifically, we assume that the impact of the data made available under our API provisions will not be 228 Julia Adler-Milstein and Robert S. Huckman, The Impact of Electronic Health Record Use on Physician Productivity, Am J Manag Care (Nov. 19, 2013). 229 Amusan, Tongen, Speedie, and Mellin, A time-motion study to evaluate the impact of EMR and CPOE implementation on physician efficiency, J. Healthcare Inf. Manag. (Fall 2008), at 31–7. 230 Bartel, Ann & Ichniowski, Casey & Shaw, Kathryn. (2007). How Does Information Technology Affect Productivity? Plant-Level Comparisons of Product Innovation, Process Improvement, and Worker Skills. The Quarterly Journal of Economics. 122. 1721–1758. 10.1162/qjec.2007.122.4.1721. E:\FR\FM\01MYR3.SGM 01MYR3 25923 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations through a single mechanism, such as an EHR, but will have multiple spillover effects. For example, data made available through an API could be used by a software developer to create tools to improve patient scheduling and billing processes. Use of this tool could result in improvements in the providers’ workflow. Thus, is important to quantify the impacts of data made available through APIs on the future health IT market. Table 20 provides a summary of the results of the literature review used to quantify this benefit. TABLE 20—FINDINGS FROM LITERATURE ON THE IMPACT OF INFORMATION TECHNOLOGY ON PRODUCTIVITY Findings: (%) Study Description Bartel et al (2007) ..................... Identify impact in improvements in information technology on production time of valve manufacturing. IT is defined as adoption of separated information system that enable various automations. Identified impact of IT capital on hospital productivity where IT capital is defined as hospital expenditure on IT. Identifies impact of IT expense on productivity of fortune 500 firms ........................................... Identifies the impact of the introduction of the EHR on providers’ time compared to non-EHR users. Identifies impact of suppressing clinically irrelevant alerts and adding clinical-decision support to EHRs on time saved. Identifies impact of clinical-decision support on time saved among primary care providers ...... Lee et al (2013) ........................ Shao and Lin (2002) ................. Adler-Milstein et al (2013) ........ Helmons et al (2015) ................ Wagholikar KB, et al (2015) ..... 4–8 3–6 2–7 5 2 1 Sources: a Jinhyung Lee Jeffrey S. McCullough Robert J. Town. The impact of health information technology on hospital productivity. The RAND Journal of Economics 44(3):545. b Shao, W. Lin, Technical efficiency analysis of information technology investments: a two-stage empirical investigation, Information and Management 39, 2002, pp. 391–401. c Adler-Milstein, J. and Huckman, R, The Impact of Electronic Health Record Use on Physician Productivity, AM J Manage Care, Nov. 19, 2013. d Helmons PJ1, Suijkerbuijk BO2, Nannan Panday PV3, Kosterink JG4. Drug-drug interaction checking assisted by clinical decision support: a return on investment analysis. J Am Med Inform Assoc. 2015 Jul; 22(4):764–72. doi: 10.1093/jamia/ocu010. Epub 2015 Feb 10. e Wagholikar KB1, Hankey RA2, Decker LK2, Cha SS2, Greenes RA3, Liu H2, Chaudhry R2. Evaluation of the effect of decision support on the efficiency of primary care providers in the outpatient practice. J Prim Care Community Health. 2015 Jan;6(1):54–60. doi: 10.1177/ 2150131914546325. Epub 2014 Aug 25. As illustrated in the Table 20, the incremental effects of improvements in IT on productivity range from one percent to eight percent. Based on these findings, we assume the impact of the API provision on providers’ time ranges between one percent and five percent. The lower bound estimate of one percent assumes that, at a minimum, providers will use one new app created as a result of the data made available under the API provision. We assume that this app will save providers time equivalent to the introduction of clinical decision support tools found in Wagholikar (2015). The upper bound estimate of five percent assume that, at a maximum, providers will use multiple apps created such that the combination will result in an increase in productivity. Furthermore, we assume that the API provision will affect only providers with certified EHRs and those that participated in the CMS EHR Incentive Program (439,187). Given that an average provider spends six hours with an EHR per day,231 earns $97.85 per hour, and works 260 days per year, physicians’ time saved attributed to API technology range from $670 million to $3.4 billion per year. (E) Benefits: Reduced Costs Associated With the Impact of Interoperability on Health Outcomes To identify the impact of the API proposal on interoperability and therefore identified health outcomes, we used regression analysis. Specifically, we estimated linear probability models that identified the impact of 2014 Edition certified EHR on hospitals’ interoperability (whether a hospital sends, receives, finds, and integrates summary of care records). Using data from the American Hospital Association (AHA) 232 from years 2014 to 2015 in the model, we controlled for hospital size, profit status, participation in a health information organization, and state and year fixed effects. The marginal effect of using a 2014 Edition certified health IT equated to a five percent increase in interoperability. This is an upper bound estimate. For the purpose of this analysis, we assume that one to four percentage points would be a reasonable range for API’s marginal impact on interoperability. As noted previously, there might be shared benefits across certain provisions, and we have taken steps to ensure that the benefits attributed to each provision are unique to the specific provision. We assumed that the collective impact of real world testing and API proposals on interoperability would not exceed the impact of 2014 Edition certified health IT (estimated at five percent). We distributed the five percent benefit across our real world testing and API proposals at (0.1–1 percent) to (1–4 percent) respectively. Moreover, the number of providers impacted is specific to each provision. Thus, to finalize our calculations of the reduced costs related to reductions in duplicate lab tests, readmissions, emergency room (ER) visits, and adverse drug events due to increased interoperability, we leveraged evidence from the literature that found an association between providers’ rates of interoperability and applied the estimated marginal effect of each proposal on interoperability. Given data limitations, we believe this approach allows us to estimate the benefits of our final rule without double counting the impact each provision might have on interoperability. 231 Christine Sinsky et al., Allocation of Physician Time in Ambulatory Practice: A Time and Motion Study in 4 Specialties, Ann Intern Med. (Dec. 6, 2016), at 753–60. 232 American Hospital Association Health IT Supplement Survey, https://www.ahadata.com/ahahealthcare-database/. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 PO 00000 Frm 00283 Fmt 4701 Sfmt 4700 E:\FR\FM\01MYR3.SGM 01MYR3 25924 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations TABLE 21—BENEFIT OF API ON HEALTH CARE OUTCOMES [2017 dollars] Number affected Benefit type Duplicate testing ........................................................ Avoidable hospitalizations and readmissions ............ ER visits ..................................................................... Adverse drug events .................................................. Overall interop impact (marginal effect) Impact of API Percentage of total cost impacted Total cost Min Max 439,187 providers. 4,519 hospitals .. 0.09 b billion c ......................... 0.01 0.04 $200 ...... 100 0.09 b ......................... 0.01 0.04 $41 billion d ........ 100 131 million visits e. 20 of events affected. 0.03 b ......................... 0.01 0.04 0.01 0.04 $1,233 per ER visit. $30 billion g ........ 100 22 f ............................. 20 Total benefit a Min $185 million per year. $38 million per year. $50 million per year. $14 million per year. Max $742 million per year. $152 million per year. $200 million per year. $54 million per year. a Total benefit is a product of total cost, percent of total cost impacted, overall impact of interoperability, and impact of API, adjusted for inflation (1.03). b Stephen E. Ross, Tiffany A. Radcliff, William G. Leblanc, L. Miriam Dickinson, Anne M. Libby, and Donald E. Nease Jr., Effects of health information exchange adoption on ambulatory testing rates, J. Am. Med. Inform. Assoc. (2013), at 1137–1142; Bridget A. Stewart, Susan Fernandes, Elizabeth Rodriguez-Huertas, and Michael Landzberg, A preliminary look at duplicate testing associated with lack of electronic health record interoperability for transferred patients, J. of the Am. Med. Informatics Assoc. (2010), at 341–344; Sezgin Ayabakan, Indranil R. Bardhan, Zhiqiang (Eric) Zheng, and Kirk Kirksey Value of health information sharing in reducing healthcare waste: An analysis of duplicate testing across hospitals, MIS Quarterly (Jan. 1, 2017); Eric J. Lammers, Julia Adler-Milstein, and Keith E. Kocher, Does health information exchange reduce redundant imaging? Evidence from emergency departments, Med Care (Mar. 2014), at 227–34. c National Academy of Medicine. (2016), https://money.cnn.com/2017/05/20/news/economy/medical-tests/. d Agency for Healthcare Research and Quality (AHRQ) Statistical Brief #199 (Dec. 2015), https://www.hcup-us.ahrq.gov/reports/statbriefs/sb199-Readmissions-Payer-Age.pdf; AHRQ Statistical Brief #72, Nationwide Frequency and Costs of Potentially Preventable Hospitalizations (Apr. 2009), https://www.hcup-us.ahrq.gov/reports/statbriefs/sb72.pdf. e National Center for Health Statistics (NCHS) Data Brief No. 252 (June 2016), https://www.cdc.gov/nchs/data/databriefs/db252.pdf; Nolan Caldwell, Tanja Srebotnjak, Tiffany Wang, and Renee Hsia, ‘‘How Much Will I Get Charged for This?’’ Patient Charges for Top Ten Diagnoses in the Emergency Department (2013), https://doi.org/10.1371/journal.pone.0055491. f M.F. Furukawa, W.D. Spector, M.R. Limcangco, and W.E. Encinosa, Meaningful use of health information technology and declines in in-hospital adverse drug events, J. of the Am. Med. Informatics Assoc. (2017). g Janet Sultana, Paola Cutroneo, and Gianluca Trifiro ` , Clinical and economic burden of adverse drug reactions. Based on this analysis, the benefits of the API provision on reduced costs on health outcomes range from $287 million to $1.1 billion. (F) Benefits: Increase in Percent of Individuals With Access to Their Health Information This provision will also provide individuals with better access to their data. APIs make it easier for patients to transmit data to smartphone health applications. According to the Health Information National Trends Survey,233 nearly 20 percent of Americans were offered access and viewed their online medical record using smartphone health applications in 2019. The proportion of individuals accessing their online medical records using smartphone health applications is expected to grow as APIs become more widespread. This will result in cost savings to patients. Specifically, patients who use new applications to access copies of their medical record instead of contacting their provider will have cost savings. Under the HIPAA Privacy Rule, individuals have the right to access their Protected Health Information (PHI) (45 CFR 164.524), and 45 CFR 164.524(c)(4) sets forth implementation specifications for fees that covered entities may charge individuals for access to their PHI. Under 45 CFR 164.524(c)(4), a covered entity may impose a reasonable, costbased fee (consistent with the conditions in § 164.524(c)(4)(i) through (iv)). For purposes of this analysis, we assume covered entities can charge a flat fee not to exceed $6.50 (inclusive of all labor, supplies, and any applicable postage). The API Condition and Maintenance of Certification requirements finalized in § 170.404 do not allow for a ‘‘Certified API Developer’’ (as defined in § 170.404(c)) to charge patients for connecting to an API to access, exchange, or use their EHI. A Certified API Developer is permitted to charge fees to an API Information Source related to the use of certified API technology. The fees must be limited to the recovery of incremental costs reasonably incurred by the Certified API Developer when it hosts certified API technology on behalf of the API Information Source (§ 170.404). Thus, patients would ultimately see cost savings by accessing their online medical record using a smartphone health application instead of contacting their provider for an electronic copy. To identify the potential cost savings this rule will have for patients, we used data from the Health Information National Trends Survey to estimate the proportion of individuals who reported having to bring a test result to a doctor’s appointment at least once in the past year. In 2018, approximately 81 percent of Americans reported that they saw a doctor in the past year and about 19 percent of these individuals reporting having to bring a test result to an appointment. Therefore, using Census data from December 31, 2017, we conducted the following calculation (total U.S. population 325.9M) * (81 percent of individuals saw a doctor in the past year) * (19 percent of individuals who had to bring a test result to an appointment). This resulted in an estimate of 50.2 million Americans who bring test results to a doctor’s appointment each year. We recognize that not all of these individuals will have the capability to access an online medical record using a smartphone health application. Therefore, we discounted this estimate based on the proportion of individuals who currently access their online medical records using a smartphone health applications (14 percent), as our lower bound. Our upper bound is the proportion of individuals who reported being offered access to an online medical record by a health care provider or insurer (58 percent). These calculations are in Table 22. 233 These estimates were derived from Health Information National Trends Survey 5, Cycle 1 (2017). VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 PO 00000 Frm 00284 Fmt 4701 Sfmt 4700 E:\FR\FM\01MYR3.SGM 01MYR3 25925 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations TABLE 22—BENEFIT OF API ON PATIENTS HAVING ACCESS TO THEIR HEALTH INFORMATION [2017 Dollars] Benefit type Number affected Cost savings to patients for requesting an electronic copy of their medical record. 50,156,010 a patients. Proportion of individuals impacted Min Max 14% b .... 58% b .... Total benefit Total cost savings Min $6.50 c per patient $45.8 million per year. Max $189.8 million per year. a This represents the number of individuals who had to bring a medical test result to an appointment with a health care provider in the past year. Calculation: US Population on December 31, 2017 (325.9M)*81 percent who saw a doctor in the past year*19 percent who had to bring a test result to an appointment. Sources: (1) https://www.census.gov/popclock/; (2) https://dashboard.healthit.gov/quickstats/pages/consumersgaps-in-information-exchange.php. b Lower bound represents the proportion of individuals nationwide who were offered access to their online medical record by a health care provider or insurer. Upper bound represents the proportion of individuals nationwide who were offered access and subsequently viewed their online medical record using a smartphone health app. Source: Johnson C. & Patel V. The Current State of Patients’ Access and Using their Electronic Health Information. Presented at the ONC Annual Meeting on January 27, 2020. c We assume that providers charge individuals a flat fee for all requests for electronic copies of PHI maintained electronically, provided the fee does not exceed $6.50, inclusive of all labor, supplies, and any applicable postage. Based on the above calculations, we estimated the annual benefit to health care providers for the use of these API capabilities would, on average, range from $6.7 million to $140 million. We estimated the annual benefit due to improved health outcomes would, on average, range from $287 million to $1.1 billion. We estimated the annual benefit to patients having access to their online medical record would, on average, range from $45.8 million and $189.8 million. Therefore, we estimated the total annual benefit of APIs, on average, to range from $0.34 billion to $1.43 billion. Comments. We did not receive comments specific to our approach to estimating the benefits of API support. Response. We have maintained our overall approach for the costs and benefits associated with the API provisions of this rule. As discussed in section IV.B.7 of this final rule preamble, we have added a new requirement in the finalized § 170.315(g)(10) that gives patients the capability to revoke access to an authorized application. Cost estimates for this new requirement were added to cost tables 16 A and 16 B as task six. The task of meeting this additional finalized requirement increased the overall cost estimate for the API provisions by $9.8 million to $43 million. Due to this increase in cost, we re-evaluated our benefits estimates associated with increasing patients’ access to their health information. In the Proposed Rule, we qualitatively discussed benefits of patients having increased access to their health information. However, upon further consideration, and additional data sources, we were able to estimate cost savings to patients for requesting electronic copies of their medical record. These estimates are reflected in Table 22. We provided additional VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 rationale to substantiate our approach and we updated estimates to 2017 dollars. (iv) New Privacy and Security Certification Criteria As specified in section IV.C.3 of this final rule, we have adopted two new privacy and security transparency attestation certification criteria in § 170.315(d)(12) and (13) that are part of the 2015 Edition privacy and security certification framework. The criteria will serve to identify whether certified health IT supports encrypting authentication credentials and/or multifactor authentication (MFA). They do not require new development or implementation to take place in order to be met. However, certification to these criteria will provide increased transparency and, perhaps, motivate the small percentage of health IT developers that do neither to encrypt authentication credentials and/or support multi-factor authentication, which will help prevent exposure to unauthorized persons/ entities. (A) Costs Comments. We did not receive any comment specific to any method we could use to quantify the costs of the new privacy and security certification criteria, encrypt authentication credentials (§ 170.315(d)(12)) and multifactor authentication (MFA) (§ 170.315 (d)(13)), and requiring health IT developers to assess their Health IT Modules’ capabilities and attest ‘‘yes’’ or ‘‘no’’ to the certification criteria. Response. We have maintained our estimates of the costs of this provision in the final rule. (B) Benefits As stated previously, we have not required health IT developers to encrypt PO 00000 Frm 00285 Fmt 4701 Sfmt 4700 authentication credentials or support multi-factor authentication (MFA). Instead, we have required that they attest to whether or not they support the certification criteria. By requiring an attestation, we are promoting transparency, which might motivate some health IT developers that do not currently encrypt authentication credentials or support MFA to do so. If health IT developers are motivated by these criteria and ultimately do encrypt authentication credentials and/or support MFA, we acknowledge that there would be costs to do so; however, we assume that the benefits will substantially exceed the costs. Such encryption and adopting MFA would reduce the likelihood that authentication credentials would be compromised and would eliminate an unnecessary use of IT resources. Encrypting authentication credentials and adopting MFA could directly reduce providers’ operating and support costs, which will reduce their administrative and financial burden. Encrypting authentication credentials will also help decrease costs and burdens by reducing the number of password resets due to possible phishing or other vulnerabilities. According to Verizon’s 2017 Data Breach Investigations Report, 81 percent of hacking-related breaches leveraged either stolen and/or weak passwords.234 The Verizon report encourages customers to vary their passwords and use two-factor authentication. Also, National Institute of Standards and Technology (NIST) Special Publication 800–63B: Digital Identity Guidelines, Authentication and Lifecycle 234 https://enterprise.verizon.com/resources/ reports/2017_dbir.pdf. E:\FR\FM\01MYR3.SGM 01MYR3 25926 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations Management,235 recommends the use of, and provides the requirements for multi-factor authenticators. Based on these reports and other anecdotal evidence, we believe encrypting authentication credentials and supporting MFA are established best practices among industry developers, including health IT developers. As described above, in this final rule, we required health IT developers to attest to whether they encrypt authentication credentials. We do not have access to published literature that details how health IT developers are already encrypting authentication credentials and supporting MFA industry-wide, but we believe most health IT developers, or around 80 percent, are taking such actions. We assume that building this functionality is in the future project plans for the remaining 20 percent because, as noted previously, adopting these capabilities is an industry best practice. Health IT developers that have not yet adopted these capabilities are likely already making financial investments to get up to speed with industry standards. We believe the adoption of these criteria will motivate these health IT developers to speed their implementation process, but we have not attributed a monetary estimate to this potential benefit because our rule is not a direct cause of health IT developers adopting these capabilities. We anticipate that when we release this final rule, many more, or perhaps all, health IT developers will likely already be encrypting authentication credentials and supporting MFA. We welcomed comments on this expectation and any means or methods we could use to quantify these benefits. Comments. We did not receive any comment specific to any means or methods we could use to quantify the costs and benefits of having the new privacy and security transparency attestation certification criteria, encrypt authentication credentials (§ 170.315(d)(12)) and multi-factor authentication (MFA) (§ 170.315(d)(13)), and requiring health IT developers to assess their Health IT Modules’ 234 https://enterprise.verizon.com/resources/ reports/2017_dbir.pdf. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 capabilities and attest ‘‘yes’’ or ‘‘no’’ to the certification criteria. Response. We maintain our estimates of the costs and benefits of this provision in the final rule. We also continue to believe that the adoption of these criteria will motivate these health IT developers to speed their implementation process. (v) Security Tags—Summary of Care— Send and Security Tags—Summary of Care—Receive In this final rule, we updated the 2015 Edition Data Segmentation for Privacy (DS4P) certification criteria in § 170.315(b)(7) and (8) to support a more granular approach to privacy tagging data for health information exchange. We also renamed the criteria to reduce confusion and better align with the criteria, ‘‘Security tags—Summary of Care—send’’ and ‘‘Security tags— Summary of Care—receive.’’ The criteria will remain based on the C–CDA and the HL7 DS4P standard. These criteria will include capabilities for applying the DS4P standard at the document, section, and entry level. In the Proposed Rule, we proposed to adopt a third 2015 Edition DS4P certification criterion, ‘‘consent management for APIs’’ (§ 170.315(g)(11)), that requires health IT to be capable of responding to requests for data through an API in accordance with the Consent Implementation Guide, which we did not finalize. (A) Costs We anticipate these updated criteria will result in up-front costs to health IT developers as health IT would be required to support all three levels— document, section, and entry—as specified in the current DS4P standard. However, we note that these criteria are not being required in any program at this time. As of the beginning of the fourth quarter of the 2019 calendar year, only about 30 products (products with multiple certified versions were counted once) were certified to the current 2015 Edition DS4P certification criteria. We estimated that 10 to 15 products will implement the new DS4P criteria. Developers may need to perform fairly extensive health IT upgrades to support the more complex and granular data PO 00000 Frm 00286 Fmt 4701 Sfmt 4700 tagging requirements under these criteria. We anticipate developers will need approximately 1,500 to 2,500 hours to upgrade databases and/or other backend infrastructure to appropriately apply security tags to data and/or develop access control capabilities. Moreover, developers will likely incur costs to upgrade health IT to generate a security-labeled C–CDA conforming to the DS4P standard. We estimated developers will need 400 to 600 hours per criterion to make these upgrades on systems that had previously certified to the document-level DS4P criteria, or 720 to 1220 hours per criterion for systems that are implementing these criteria for the first time. We believe this work would be performed by a ‘‘Software Developer.’’ According to the May 2017 BLS occupational employment statistics, the mean hourly wage for software developer is $53.74. As noted previously, we have assumed that overhead costs (including benefits) are equal to 100 percent of pre-tax wages, so the hourly wage including overhead costs is $107. Therefore, we estimated the total cost to developers could range from $2,910,400 to $6,933,600. We note that this would be a one-time cost. The midpoint of ranges stated is used as the primary estimate of costs. Additionally, we proposed that the health IT support the capability to respond to requests for patient consent information through an API compatible with FHIR Release 3. However, we did not finalize that proposal. Therefore, we did not include an estimate in this final rule. We have estimated costs using the following assumptions: • For the two Security tags— Summary of Care criteria, we anticipate developers will need approximately 1,500 to 2,500 hours to upgrade databases and/or other backend infrastructure to appropriately apply security tags to data and/or develop access control capabilities. We expect that this would be a one-time cost. • According to the May 2017 BLS occupational employment statistics, the mean hourly wage for a ‘‘Software Developer’’ is $53.74. Our cost estimates are explained in the Table 23. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations 25927 TABLE 23—COSTS RELATED TO SECURITY TAGS—SUMMARY OF CARE CRITERIA [2017 Dollars] Tasks Lower bound Upper bound Remarks Task 1: Enhancements to health IT to upgrade databases and/or other backend infrastructure to appropriately apply security tags to data and/or develop access control capabilities. Total Labor Hours ............................................... 1,500 hours ...... 2,500 hours ...... This is a one-time cost for health IT systems to support data segmentation for discrete data. 1,500 hours ...... 2,500 hours. Hourly Rate ......................................................... Cost per Product ................................................. Total Cost (23 products) ..................................... We believe the voluntary nature of these criteria would significantly mitigate health IT developer costs. We also expect developers to see a return on their investment in developing and preparing their health IT for these certification criteria given the benefits to interoperable exchange. We anticipate potential costs for ONC related to the updated DS4P criteria (Security tags—Summary of Care—send and Security tags—Summary of Care— receive) associated with: (1) Developing and maintaining information regarding these updated criteria on the ONC website; (2) creating documents related to these updated criteria and making those documents 508 compliant; (3) updating, revising, and supporting Certification Companion Guides, test procedures, and test tools; and (4) responding to inquiries concerning these criteria. We estimate an ONC analyst at the GS–13, Step 1 level staff would devote, on average, 200 hours to the above tasks annually. The hourly wage with benefits for a GS–13, Step 1 employee located in Washington, DC is approximately $91. Therefore, we estimate the annual costs to be $18,200. (B) Benefits We believe leveraging the DS4P standard’s ability to allow for both document level and more granular tagging would offer functionality that is more valuable to providers and patients, especially given the complexities of the privacy landscape for multiple care and specialty settings. The updated DS4P criteria (Security tags—Summary of Care—send and Security tags— Summary of Care—receive) would benefit providers, patients, and ONC because it would support more complete records, contribute to patient safety, and enhance care coordination. We believe this will also reduce burden for providers by enabling an automated option, rather relying on case-by-case manual redaction and subsequent workarounds to transmit redacted VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 $107 per hour $160,500 .......... $3,691,500 ....... $267,500. $6,152,500. documents. Implementing security tags enables providers to more effectively share patient records with sensitive information, thereby protecting patient privacy while still delivering actionable clinical content. We emphasize that health care providers already have processes and workflows to address their existing compliance obligations, which could be made more efficient and cost effective through the use of health IT. We expect these benefits for providers, patients, and ONC to be significant; however, we are unable to quantify these benefits at this time because we do not have adequate information to support quantitative estimates. We welcomed comments regarding potential approaches for quantifying these benefits. Comments. Several commenters indicated there would be cost burden associated with our proposal of adopting two new DS4P certification criteria and a consent management for API criterion. Commenters stated that ONC needs to quantify and include the cost of this burden in our impact analysis section. Another commenter conducted their own analysis and indicated a cost of $5–6 billion with a multi-year implementation timeframe. Commenters stated there could be significant upfront costs and ongoing costs for maintenance of the systems necessary to comply with these criteria and one commenter further explained that segmenting data at the document, section, and entry level as opposed to the document level only, would significantly increase costs and could potentially impact system performance. One commenter was specifically concerned that the proposal would broadly impact HIEs both in terms of administration and implementation but did not state specifics. Response. We thank commenters for their input. We did not finalize the consent management for API criterion. For the DS4P-related criteria (Security tags—Summary of Care—send and PO 00000 Frm 00287 Fmt 4701 Sfmt 4700 Security tags—Summary of Care— receive), the developer costs were estimated for supporting DS4P IG enhancements to include tagging the data at the section and entry level when exchanged using the C–CDA. The lower bound estimates include developers who are already supporting the DS4P IG for tagging data at ‘‘document’’ level and estimates additional effort to support tagging at ‘‘section’’ and ‘‘entry’’ level. The criteria do not require the capability to segment the data, only to tag the data. The certification criteria does not make any additional expectations around compliance beyond what the providers are currently expected to do, nor does it add any additional requirements for developers around how they handle the data received with the tags. Therefore, we disagree with the commenters about underestimating the cost. Rather, the commenters may be suggesting implementation costs which are beyond the costs associated with the certification criteria itself. These costs are unquantifiable and are noted in Table 31. (3) Conditions and Maintenance of Certification Requirements (i) Information Blocking For a discussion of the costs and benefits of the exceptions to information blocking, please see section (5) of this RIA. (ii) Assurances In this final rule, we included a provision that requires health IT developers to make certain assurances as Conditions and Maintenance of Certification requirements: (1) Assurances regarding the ‘‘EHI export’’ certification criterion in § 170.315(b)(10) and (2) assurances regarding retaining records and information in 170.402(b)(1)(i)–(ii). E:\FR\FM\01MYR3.SGM 01MYR3 25928 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations (A) Electronic Health Information Export Alongside the criterion revisions in § 170.315(b)(10), we have finalized in § 170.402(a)(4), that a health IT developer of a certified health IT Modules that is part of a health IT product which electronically stores EHI must certify to the certification criterion in § 170.315(b)(10). We have finalized in § 170.402(b)(2) that within 36 months from the final rule’s publication date, a health IT developer that must comply with the requirements of paragraph § 170.402(a)(4) of this section must provide all of its customers of certified health IT with the health IT certified to the certification criterion in § 170.315(b)(10). We also finalized that on and after 36 months from the publication of this final rule, health IT developers that must comply with the requirements of § 170.402(a)(4) must provide all of their customers of certified health IT with health IT certified to § 170.315(b)(10). In addition, a health IT developer must attest accurately in accordance with § 170.402(a)(4) and (b)(2) if the Health IT Module presented for certification is part of a heath IT product which can electronically store EHI. If the product stores such information, the health IT developer must ensure all EHI is available for export in accordance with § 170.315(b)(10). For a detailed discussion of the costs and benefits of the assurances regarding the criterion in § 170.315(b)(10), please see section (2)(ii) (EHI export) of this RIA above. (B) Records and Information Retention As a Maintenance of Certification requirement in § 170.402(b)(1), a health IT developer must, for a period of 10 years beginning from the date of certification, retain all records and information necessary that demonstrate initial and ongoing compliance with the requirements of the ONC Health IT Certification Program. In an effort to reduce administrative burden, we also finalized that in situations where applicable certification criteria are removed from the Code of Federal Regulations before the 10 years have expired, records must only be kept for three years from the date of removal for those certification criteria and related Program provisions unless that timeframe would exceed the overall 10year retention period. This ‘‘three-year from the date of removal’’ records retention period also aligns with the records retention requirements for ONC–ACBs and ONC–ATLs under the Program. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 As stated in the Proposed Rule, currently, there are no existing regulatory requirements regarding record and information retention by health IT developers. We expect there are costs to developers to retain the records and information described above but they may be mitigated due to other factors. For example, we expect that health IT developers are already keeping most of their records and information in an electronic format. We also expect that some developers may already be retaining records and information for extended periods of time due to existing requirements of other programs, including for those programs their customers participate in. For instance, Medicaid managed care companies are required to keep records for 10 years from the effective date of a contract. We estimated that each health IT developer will, on average, spend two hours each week to comply with our proposed record retention requirement. We expect that a health IT developer’s office clerk could complete the record retention responsibilities. According to the May 2017 BLS occupational employment statistics, the mean hourly wage for an office clerk is $16.30.236 As noted previously, we have assumed that overhead costs (including benefits) are equal to 100 percent of pre-tax wages, so the hourly wage including overhead costs is $32. Therefore, we estimated the annual cost per developer on average, would be $3,328 and the total annual cost for all health IT developers (458 health IT developers have products certified to the 2015 Edition that are capable of recording patient health data) on average, would be $1.5 million. We note that this is a perpetual cost. (A) Costs Health IT developers need to notify their customers about the unenforceability of communications and contract provisions that violate the Communications Condition of Certification requirements in § 170.403(a). Generally, health IT developers already have mechanisms in place, whether via online postings, email, mail, or phone, for alerting customers to changes in their policies and procedures. Such alerts should be standard practice. However, we have estimated the potential costs for health IT developers to draft the notice and mail the notice as appropriate. We estimated that a health IT developer’s office clerk will commit (overall) approximately 40 hours to drafting and mailing notices when necessary. According to the May 2017 BLS occupational employment statistics, the mean hourly wage for an office clerk is $16.30.237 As noted previously, we have assumed that overhead costs (including benefits) are equal to 100 percent of pretax wages, so the hourly wage including overhead costs is $32. Therefore, we estimated the annual cost per developer to be $1,280 and the total cost for all health IT developers (792 health IT developers certified to the 2014 Edition) to be $1 million. We note that a developer must notify all customers annually until any contracts contravening the Condition are amended. We also note that mailing is one option for delivery, along with other means such as email. We do not have information concerning how health IT developers will deliver their notices. We have estimated a total cost for all developers to mail the initial notices (including postage) to be $80,000. As noted above, this notice may have to be provided annually, depending on when contracts contravening this provision are amended. In order to meet the Cures Act requirement that health IT developers do not prohibit or restrict communication regarding health IT, some health IT developers will eventually need to amend their contracts to reflect such a change. Many standard form health IT contracts limit the ability of users to voluntarily discuss problems or report usability and safety concerns that they experience when using their health IT. This type of discussion or reporting is typically prohibited through broad confidentiality, nondisclosure, and intellectual property provisions in the developer’s standard form health IT contract. Some standard form health IT contracts may also include nondisparagement clauses that prohibit customers from making statements that could reflect negatively on the health IT developer. These practices are often referred to colloquially in the industry as ‘‘gag clauses.’’ We expect amendments to these clauses to be accomplished in the normal course of business, such as when renegotiating contracts or updating them for HIPAA Rules or other compliance requirements outside of the ONC Health IT Certification Program. As such, we do not estimate any direct or indirect costs 235 https://pages.nist.gov/800-63-3/sp80063b.html. 237 See https://www.bls.gov/oes/2017/may/ oes439061.htm. (iii) Prohibition or Restriction of Communications PO 00000 Frm 00288 Fmt 4701 Sfmt 4700 E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations for health IT developers to amend their contracts to comply with this Condition of Certification requirement. § 170.315(g)(10), please see section (2)(iii) of this RIA. (B) Benefits We expect health care providers to benefit from this provision. There is growing recognition that these practices of prohibiting or restricting communication do not promote health IT safety or good security hygiene and that health IT contracts should support and facilitate the transparent exchange of information relating to patient care. We were unable to estimate these benefits because we do not have adequate information to determine the prevalence of gag clauses and other restrictive practices, nor do we have a means to quantify the value to providers of being able to freely communicate and share information. We welcomed comments on approaches to quantify these benefits. Comments. We did not receive comments specific to our approach of quantifying the benefits of our provision to inform customers regarding the prohibition or restriction of communications. We did receive several comments stating that our notification and contract revision estimates underestimate the volume of agreements for large developers and the cost of compliance. We also received several comments that the burden for revising contracts could be significant and costly, particularly in the timeframe originally proposed, with one comment adding that the cost for revising contracts should be included in the impact analysis. Response. We maintain that we were unable to estimate the benefits of the provision due to inadequate information however, we believe that prohibiting or restricting communication does not promote health IT safety or good security hygiene and that health IT contracts should support and facilitate the transparent exchange of information relating to patient care. We maintain our notification estimates as we believe that large developers would have efficient means of sending notifications i.e. by email. We reiterate that we expect revision of contracts to be accomplished in the normal course of business and do not estimate any direct or indirect costs for health IT developers to amend their contracts to comply. (A) Transparency Requirements for Application Programming Interfaces In this final rule, as part of the Conditions and Maintenance of Certification requirements in § 170.404, we have required that API Technology Suppliers make specific business and technical documentation necessary to interact with the APIs in production freely and publicly accessible. We expect that the API Technology Suppliers will perform the following tasks related to transparency of business and technical documentation and would devote the following number of hours annually to such tasks: (1) Health Level 7’s (HL7®) Fast Healthcare Interoperability Resources (FHIR®) API documentation (the developer would most likely point to the HL7 FHIR standard for API documentation) (estimated eight hours); (2) patient application registration documentation, which will include a development effort to create a website that manages the application registration activity (estimated 40 hours); (3) publication of the FHIR Endpoint—Base URLs for all centrally managed providers (estimated 40 hours); (4) publication of FHIR Endpoints for provider-managed APIs (estimated 160 hours); and (5) API cost information documentation, which will typically be documented as a tiered rate based on usage or some form of monthly rate (estimated 40 hours). We believe each of the above tasks would be performed by a ‘‘Software Developer.’’ According to the May 2017 BLS occupational employment statistics, the mean hourly wage for software developer is $53.74.238 As noted previously, we have assumed that overhead costs (including benefits) are equal to 100 percent of pre-tax wages, so the hourly wage including overhead costs is $107. Therefore, we estimated the cost per developer to be $30,816. As noted in section (2)(iii) of this RIA, we estimated that 459 products from 394 developers will contain the API criterion. Therefore, we estimated the total developer cost would be $12.1 million. We note that this is a one-time cost and would not be perpetual. We did not receive comments on this discussion and have therefore finalized our figures. (iv) Application Programming Interfaces For a discussion of the costs and benefits of the new API criterion in (v) Real World Testing The objective of real world testing in § 170.405 is to verify the extent to which deployed health IT products in operational production settings are demonstrating compliance to certification criteria and functioning with the intended use cases for continued maintenance of certification requirements. Real world testing should ensure certified health IT products have the ability to share electronic health information between systems. Real world testing should assess that the certified health IT is meeting the intended use case(s) of the certification criteria to which it is certified within the workflow, health IT architecture, and care/practice setting in which the health IT is implemented. We note that we expect real world testing would take about three months of the year to perform. (A) Costs This section describes the potential costs of the real world testing requirements in this final rule. The costs estimates are based on the following assumptions: • Health IT developers will use the same labor costs. Table 24 shows the estimated labor costs for a health IT developer to perform real world testing. We recognize that health IT developer costs will vary; however, our estimates in this section assume all developers will incur the costs noted in Table 24. • Proxy needed to project the number of 2015 Edition products impacted by real world testing. We estimated that 523 products from 429 developers will be impacted by real world testing. We used a proxy to determine developers that would be subject to real world testing. There were 681 products and 551 developers with at least one of its 2014 Edition certified products that could perform transitions of care and/or send any type of public health data. We then multiplied these numbers by our estimates for certified health IT market consolidation by ¥22.1 percent and ¥23.2 percent to project the number of 2015 developers and products, respectively. We believe this estimate serves as a reasonable proxy for products impacted by real world testing, as these products primarily focus on interoperability. The tables below describe the various costs to health IT developers to perform real world testing by task. 238 See https://www.bls.gov/oes/2017/may/ oes439061.htm. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 PO 00000 Frm 00289 Fmt 4701 Sfmt 4700 25929 E:\FR\FM\01MYR3.SGM 01MYR3 25930 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations TABLE 24—ESTIMATED COST TO HEALTH IT DEVELOPERS TO PERFORM REAL WORLD TESTING [2017 Dollars] Tasks and labor category Hours Rate Total Task 1: Design Real world Testing Approach and Submit Plan (per developer) ....................... 15–1133 Software Developers, Systems Software .............................................................. 15–1143 Computer Network Architects ............................................................................... 15–1121 Computer Systems Analysts ................................................................................. 15–1199 Computer Occupations, All Other ......................................................................... 27–3042 Technical Writers ................................................................................................... Task 2: Prepare Staff and Environments (per developer) .......................................................... 15–1121 Computer Systems Analysts ................................................................................. 15–1142 Network and Computer Systems Administrators .................................................. 15–1152 Computer Network Support Specialists ................................................................ 15–1199 Computer Occupations, All Other ......................................................................... 15–1122 Information Security Analysts ................................................................................ Task 3: Perform Testing (per product) ........................................................................................ 15–1121 Computer Systems Analysts ................................................................................. 15–1133 Software Developers, Systems Software .............................................................. 15–1199 Computer Occupations, All Other ......................................................................... 15–1142 Network and Computer Systems Administrators .................................................. 15–1141 Database Administrators ....................................................................................... Task 4: Collect Results and Prepare-Submit Report (per developer) ........................................ 15–1199 Computer Occupations, All Other ......................................................................... 15–1121 Computer Systems Analysts ................................................................................. 27–3042 Technical Writers ................................................................................................... ........................ 80 120 80 40 40 ........................ 40 40 40 40 20 ........................ 80 40 160 40 40 ........................ 120 80 40 ........................ 107 104 89 88 72 ........................ 89 83 65 88 96 ........................ 89 107 88 83 86 ........................ 88 89 72 $34,560 8,560 12,480 7,120 3,520 2,880 14,920 3,560 3,320 2,600 3,520 1,920 32,240 7,120 4,280 14,080 3,320 3,440 20,560 10,560 7,120 2,880 Total Labor Hours ................................................................................................................. Other Direct Costs—printing, publishing (per product) ................................................. 1,140 ........................ ........................ 150.00 TABLE 25—REAL WORLD TESTING TOTAL ANNUAL COST [2017 Dollars] Task Calculation Task 1 ........................................................................................................................... Task 2 ........................................................................................................................... Task 3 ........................................................................................................................... Task 4 ........................................................................................................................... Other Direct Costs ........................................................................................................ $34,560 * 429 developers ........................ $14,920 * 429 developers ........................ $32,240 * 523 products ............................ $20,560 * 429 developers ........................ $150 * 523 products ................................. $14,826,240 6,400,680 16,861,520 8,820,240 78,450 Total Cost .............................................................................................................. ................................................................... 46,987,130 Based on the stated assumptions and costs outlined in the above tables, we estimated the total annual cost for real world testing would, on average, be $47 million with an average cost per developer of $109,557. (B) Benefits There are several benefits that can be attributed to real world testing. Real world testing may impact the effective integration of varied health IT systems, including integration of certified health IT with non-certified and ancillary technologies such as picture archiving and communications systems (PACS) or specialty-specific interfaces. This could result in greater interoperability among health IT systems. For providers that are currently dissatisfied with how their health IT is performing, real world testing might also influence the effective implementation of workflows in a clinical setting. In this analysis, we calculated the benefits in the following categories: For providers that have VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 complained about their EHR system, time saved documenting in their EHR due to improved usability; for providers that are dissatisfied with their EHR, increased provider satisfaction resulting in fewer providers incurring the costs of switching products; and benefits related to reductions in duplicate lab tests, readmissions, ER visits, and adverse drug events due to increased interoperability. We focused on these outcomes for two reasons: (i) Evidence in literature indicates that health information exchange impacts the chosen measures; and (ii) cost of care associated with these measures is high and the impact of health information exchange is likely to result in significant benefits in the form of reduced costs. The benefit calculations were based on the following assumptions: • Benefits noted in academic literature are assumed accurate and results were not externally validated. • Hospitals and eligible professionals that participate in the CMS Promoting PO 00000 Frm 00290 Fmt 4701 Sfmt 4700 Total cost Interoperability Programs will be impacted. Estimates were based on the assumption that 439,187 health care providers and/or 4,519 hospitals will be affected by this regulatory action. • Estimates of the impact of real world testing on rates of interoperability (0.1 to 1 percent) are based on ONC analysis. To identify the impact of real world testing on interoperability, we used regression analysis. Specifically, we estimated linear probability models that identified impact of 2014 Edition certified EHR on hospitals’ interoperability (whether a hospital sends, receives, finds, and integrates summary of care records). Using data from the AHA from years 2014 and 2015 in the model, we controlled for hospital size, profit status, participation in a health information organization, and state and year fixed effects. The marginal effect of using a 2014 Edition was a five percentage point increase in interoperability. This is an upper bound estimate. For the purpose of this E:\FR\FM\01MYR3.SGM 01MYR3 25931 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations analysis, we assume 0.1 percent to 1 percent would be a reasonable range for real world testing to impact interoperability. • Impact of real world testing is also based on the estimated number of providers that switch health IT developers (rate = five percent) and are dissatisfied with their current EHR (44 percent). To calculate the number of providers that are likely to switch their EHR due to dissatisfaction with their system, we estimate the rate of switching using CMS Medicare EHR Incentive Program data from years 2013 to 2016. This results in 4,774 clinical practices and 226 hospitals that are projected to switch products in a year. We then leverage results from Stanford Medicine’s research conducted by The Harris Poll which reports that nearly 44 percent of providers are not satisfied with their EHR.239 Based on this research, we assume that approximately 2,195 providers are less likely to switch their EHR with real world testing. • Estimates of the rate of eligible professionals (10 percent) and hospitals (five percent) that will be impacted by real world testing are based on ONC complaint data. We recognize that the benefits of real world testing are limited to those providers that have systems that might be underperforming. Therefore, we estimated that the providers impacted by this rule are limited to the proportion of providers that have issued complaints about their system to ONC. As noted previously in this analysis, we acknowledge that there might be shared benefits across certain provisions and have taken steps to ensure that the benefits attributed to each provision are unique to the provision referenced. Specifically, we used regression analysis to calculate the impact of our real world testing and API provisions on interoperability. We assumed that the real world testing and API provisions would collectively have the same impact on interoperability as use of 2014 Edition certified health IT. Therefore, we estimated linear probability models that identified the impact of 2014 Edition certified health IT on hospitals’ interoperability.240 We controlled for additional factors such as participation in a health information exchange organization, hospital characteristics, and urban/rural status. We found the marginal effect of using 2014 Edition certified health IT was a five percentage point increase in interoperability. We assumed that this marginal effect is true for our provisions and distributed the five percent benefit across our real world testing and API provisions at (0.1 to 1 percent) to (1 to 4 percent) respectively. Moreover, the number of providers impacted is provision specific. Given data limitations, we believe this approach allows us to estimate the benefits of our provisions without double counting the impact each provision might have on interoperability. Table 26 shows the benefits of real world testing for providers. We quantified the monetary benefits of real world testing based on a reduction in the amount of time a provider spends on their EHR by improving its usability or the cost-savings associated with switching from an underperforming EHR system. Note, these benefits are limited to providers who have expressed dissatisfaction with their EHR and only represent a fraction of all health care providers. Table 27 quantifies the benefits associated with improved interoperability for these providers. This is primarily because provider behavior is more directly affected by improvements in interoperability. TABLE 26—BENEFIT OF REAL WORLD TESTING FOR PROVIDERS [2017 Dollars] Benefit type Number affected Hours saved (percent) A B Hourly wage Min Reduction in provider time spent in health IT by improving usability and interoperability. Number of providers switching health IT F. Total Benefit ................ 43,919 providers or 10% D (based on complaint data). 2,195; Cost of Switching. Min = $15,000 Max = $70,000 .......................... Number of working days in a year Hours per day with EHR Max $97.85 1 5 6E ........................ ........................ ........................ ........................ ........................ ........................ ........................ ........................ 260 Total benefit C Min Max $65 million per year. $335 million per year. ........................ $34M per year. $158M per year. ........................ $99M per year. $493M per year. A Julia Adler-Milstein and Robert S. Huckman, The Impact of Electronic Health Record Use on Physician Productivity, Am J Manag Care (Nov. 19, 2013). Tongen, Speedie, and Mellin, A time-motion study to evaluate the impact of EMR and CPOE implementation on physician efficiency, J. Healthcare Inf. Manag. (Fall 2008), at 31–7. C Total benefits for the provider and administrative time spent in health IT by improving usability and interoperability. Total benefits from switching EHR developer is a product of the number providers switching and cost of EHR. D The estimate is based on the number of providers that currently possess products with complaints. This is identified by flagging health IT developers and products about whom/which complaints are logged on ONC’s database. These health IT developers are then matched to physicians using the Meaningful Use database. E Christine Sinsky et al., Allocation of Physician Time in Ambulatory Practice: A Time and Motion Study in 4 Specialties, Ann Intern Med. (Dec. 6, 2016), at 753–60. Physician Practice, Calculating the Right Number of Staff for Your Medical Practice, available at https://www.physicianspractice.com/blog/calculating-right-number-staffyour-medical-practice. F This estimate was obtained from Meaningful Use data from years 2013–2016. ‘‘Switching’’ is defined as an annual change in all health IT developers by providers/ hospitals. B Amusan, 239 How Doctors Feel About Electronic Health Records National Physician Poll by The Harris Poll VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 https://med.stanford.edu/content/dam/sm/ehr/ documents/EHR-Poll-Presentation.pdf. PO 00000 Frm 00291 Fmt 4701 Sfmt 4700 240 American Hospital Association Health IT Supplement Survey, https://www.ahadata.com/ahahealthcare-database. E:\FR\FM\01MYR3.SGM 01MYR3 25932 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations TABLE 27—BENEFIT OF REAL WORLD TESTING FOR PATIENTS AND PAYERS [2017 Dollars] Population affected Benefit type Overall interop impact (marginal effect) Impact of real world testing Total cost Min Max Duplicate testing 35,607 providers B 0.09 0.001 0.01 $200 billion C ..... 10 Avoidable hospitalizations and readmissions. ER visits ............. 5% of hospitals (n = 226). B 0.09 0.001 0.01 $41 billion D ....... 5 5% of visits affected (n = 131 million). 5% of events affected. B 0.03 0.001 0.01 $1,233, Per ER visit E. F 0.22 0.001 0.01 ........................ ........................ ........................ Adverse drug events. Total Benefit ........................... Total benefit A Percentage of total cost impacted Min Max $1.9 million per year. $0.2 million per year. $18.5 million per year. $1.9 million per year. 5 $0.2 million per year. $2.54 million per year. $30 billion G ....... 5 $0.3 million per year. $3.4 million per year. ........................... ........................ $2.6 million ........ $26.3 million. A Total benefit is a product of total cost, percent of total cost impacted, overall impact of interoperability, and impact of real world testing. B Stephen E. Ross, Tiffany A. Radcliff, William G. Leblanc, L. Miriam Dickinson, Anne M. Libby, and Donald E. Nease Jr., Effects of health information exchange adoption on ambulatory testing rates, J. Am. Med. Inform. Assoc. (2013), at 1137–1142; Bridget A. Stewart, Susan Fernandes, Elizabeth Rodriguez-Huertas, and Michael Landzberg, A preliminary look at duplicate testing associated with lack of electronic health record interoperability for transferred patients, J. of the Am. Med. Informatics Assoc. (2010), at 341–344; Sezgin Ayabakan, Indranil R. Bardhan, Zhiqiang (Eric) Zheng, and Kirk Kirksey Value of health information sharing in reducing healthcare waste: An analysis of duplicate testing across hospitals, MIS Quarterly (Jan. 1, 2017); Eric J. Lammers, Julia Adler-Milstein, and Keith E. Kocher, Does health information exchange reduce redundant imaging? Evidence from emergency departments, Med Care (Mar. 2014), at 227–34. C National Academy of Medicine. (2016), https://money.cnn.com/2017/05/20/news/economy/medical-tests/. D Agency for Healthcare Research and Quality (AHRQ) Statistical Brief #199 (Dec. 2015), https://www.hcup-us.ahrq.gov/reports/statbriefs/sb199-ReadmissionsPayer-Age.pdf; AHRQ Statistical Brief #72, Nationwide Frequency and Costs of Potentially Preventable Hospitalizations (Apr. 2009), https://www.hcup-us.ahrq.gov/reports/statbriefs/sb72.pdf. E National Center for Health Statistics (NCHS) Data Brief No. 252 (June 2016), https://www.cdc.gov/nchs/data/databriefs/db252.pdf; Nolan Caldwell, Tanja Srebotnjak, Tiffany Wang, and Renee Hsia, ‘‘How Much Will I Get Charged for This?’’ Patient Charges for Top Ten Diagnoses in the Emergency Department (2013), https://doi.org/10.1371/journal.pone.0055491. F M.F. Furukawa, W.D. Spector, M.R. Limcangco, and W.E. Encinosa, Meaningful use of health information technology and declines in in-hospital adverse drug events, J. of the Am. Med. Informatics Assoc. (2017). G Janet Sultana, Paola Cutroneo, and Gianluca Trifiro ` , Clinical and economic burden of adverse drug reactions (Dec. 2013). Based on the stated assumptions and benefits outlined in Table 26, we estimate the total annual benefit for real world testing to providers would range, on average, from $99 million to $493 million. Based on the stated assumptions and benefits outlined in Table 27, we estimate the total annual benefit for patients and payers would range, on average, from $2.6 million to $26.3 million. Therefore, we estimate the total benefit of real world testing would range, on average, from $101.6 million to $519.3 million. We recognize that health IT developers may deploy their systems in a number of ways, including cloudbased deployments, and requested comment on whether our cost estimates of real world testing should factor in such methods of system deployment. For example, we requested feedback about whether health IT developers would incur reduced real world testing costs through cloud-based deployments as opposed to other deployment methods. We specifically solicited comment on the general ratio of cloudbased to non-cloud-based deployments within the health care ecosystem and specific cost variations in performing real world testing based on the type of deployment. We also requested comment on our assumptions about the burden to providers in time spent assisting health IT developers since we encourage health IT developers to come VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 up with ways to perform real world testing that mitigate provider disruption. Comments. We did not receive comment specific to whether health IT developers would incur reduced real world testing costs through cloud-based deployments as opposed to other deployment methods. We also did not receive comments regarding the ratio of cloud-based to non-cloud based deployments and cost variations regarding different types of deployments. We also did not receive comments regarding the burden to providers in time spent assisting health IT developers. Response. We maintain our assumptions and estimates as proposed regarding real world testing. (C) Real World Testing Maintenance Requirements In this final rule, we revised the Principle of Proper Conduct in § 170.523(m) to require ONC–ACBs to collect, no less than quarterly, all updates successfully made to standards in certified health IT pursuant to the developers having opted to avail themselves of the Standards Version Advancement Process flexibility under the real world testing Condition of Certification requirement. Under § 170.523(p), ONC–ACBs will be responsible for: (1) Reviewing and confirming that applicable health IT PO 00000 Frm 00292 Fmt 4701 Sfmt 4700 developers submit real world testing plans in accordance with § 170.405(b)(1); (2) reviewing and confirming that applicable health IT developers submit real world testing results in accordance with § 170.405(b)(2); and (3) submitting real world testing plans by December 15 and results by March 15 of each calendar year to ONC for public availability. In addition, under § 170.523(t), ONC–ACBs will be required to: (1) Maintain a record of the date of issuance and the content of developers’ notices; and (2) timely post content of each notice on the CHPL. Using the information from the ‘‘Real World Testing Costs’’ section of this RIA, we estimated that 429 developers will be impacted by real world testing. We estimate that, on average, it will take an ONC–ACB employee at the GS–13, Step 1 level approximately 30 minutes to collect all updates made to standards in Health IT Modules in accordance with § 170.523(m). The hourly wage with benefits for a GS–13, Step 1 employee located in Washington, DC is approximately $91. Since the collection must occur no less than quarterly, we assume it occurs, on average, four times per year. Therefore, we estimate the annual cost to ONC–ACBs to comply with the collection requirements under § 170.523(m) to be $78,078. We estimated that, on average, it will take an ONC–ACB employee at the GS– E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations 13, Step 1 level approximately one hour to review and confirm that applicable health IT developers submit real world testing plans in accordance with § 170.405(b)(1). We estimate that, on average, it will take an ONC–ACB employee at the GS–13, Step 1 level approximately 30 minutes to review and confirm that applicable health IT developers submit real world testing results in accordance with § 170.405(b)(2). We estimate that, on average, it will take an ONC–ACB employee at the GS–13, Step 1 level approximately 30 minutes to submit real world testing plans and results to ONC for public availability. The hourly wage with benefits for a GS–13, Step 1 employee located in Washington, DC is approximately $91. Therefore, we estimate the annual cost to ONC–ACBs to comply with the submission and reporting requirements under §§ 170.523(m) and 170.550(l) to be $156,156. Throughout the RIA we have used 830 products as our 2015 Edition projection. We came up with this projection by multiplying a ¥23.2 percent market consolidation rate from the total number of products certified to 2014 Edition. This assumption was based on the market consolidation rate observed between the 2011 and 2014 Editions. We have estimated the number of 2015 Edition products that will certify each criterion included in the real world testing Condition of Certification requirement. We assume that there will be a cost associated with a notice for each certified criterion (even if an individual product were to update the same standard across multiple criteria that use that standard). This estimation was calculated by multiplying the current percent of 2015 Edition products that certify a criterion by the estimated number of total 2015 Edition products (830). For example, we calculated that 43 percent of 2015 Edition products certified 170.315(b)(1); we then multiplied this percentage by 830—the predicted number of 2015 Edition products. Thus, based on this calculation, for 2015 Edition, we predict that 359 products will certify the 170.315(b)(1) criterion. This method was used across all criteria included in the real world testing Condition of Certification requirement. We assume that the amount of time for an ONC–ACB staff person to: (1) Maintain a record of the date of issuance and the content of developers’ notices; and (2) to timely post content of each notice on the CHPL can be anywhere from 30 minutes to one hour. The hourly wage with benefits for a GS–13, Step 1 employee located in VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 Washington, DC is approximately $91. This was the hourly rate we used for this RIA, so it is consistent with prior calculations. This wage is used to determine the ONC–ACB time cost to complete this requirement under § 170.523(t). For this estimate, we take half the hourly rate and multiply it by the number of products predicted to certify each of the applicable criteria. For each criterion, we estimate a lower bound and upper bound prediction. The lower bound assumes that 25 percent of certified products update any of the applicable standards. The upper bound prediction assumes that all certified products update any of the applicable standards. These estimates are calculated for each criterion and then the cumulative sum of all the individual criterion calculations is made. We estimate, at 30 minutes per notice, it will cost $60,606 if 25 percent of certified products update any of the applicable standards across all criteria, and if all products update any of the applicable standards, we estimate it will cost $242,424. Our maximum estimate for time to comply is one hour per notice. Using the same methodology explained above, we estimate, at 60 minutes per notice, it will cost $121,212 if 25 percent of certified products update any of the applicable standards across all criteria, and if all products update any of the applicable standards, we estimate it will cost $484,848. Our lower bound estimate for the cost of this requirement is $60,606. Our upper bound estimate for the cost of this requirement is $484,848. Comments. We received a comment recommending that ONC add accountability to the real world testing process by having ONC–ACBs review a randomly selected percentage of submitted results for potential nonconformity with certification requirements. Response. We thank commenters for their input. It is within ONC–ACBs’ rights and interests to randomly select certified Health IT Modules that have been real world tested as part of their surveillance activities. ONC will be working closely with ONC–ACBs to provide direction on how ONC–ACBs can leverage existing Program and ISO/ IEC 17065 requirements to provide oversight without increasing burden by setting a minimum expectation in regulation. Setting a regulatory quota could potentially create burden as workloads amongst the different ONC– ACBs vary. Additionally, it limits ONC– ACBs to what is adopted in the final rule and prevents future adjustments that may be needed to improve PO 00000 Frm 00293 Fmt 4701 Sfmt 4700 25933 efficiency without additional rulemaking. We have finalized our estimates. (vi) Attestations The Cures Act requires that a health IT developer, as a Condition and Maintenance of Certification requirement under the Program, provide to the Secretary an attestation to all the Conditions and Maintenance of Certification requirements specified in the Cures Act, except for the ‘‘EHR Reporting Program’’ Condition of Certification requirement. It also requires that a health IT developer attest that its health IT allows for health information to be exchanged, accessed, and used in the manner described by the API Condition of Certification requirement. We have finalized our proposal to implement the Cures Act ‘‘attestations’’ requirement in § 170.406 by requiring health IT developers to attest to the aforementioned Conditions. For the purposes of estimating the potential burden of these attestations on health IT developers, ONC–ACBs, and ONC, we estimate that all health IT developers under the Program will submit an attestation biannually. As noted previously in this RIA, there are 792 health IT developers certified to the 2014 Edition. We estimated it would take a health IT developer employee approximately one hour on average to prepare and submit each attestation to the ONC– ACB. According to the May 2017 BLS occupational employment statistics, the mean hourly wage for a software developer is $53.74.241 Therefore, we estimated the annual cost including overhead costs to be $84,744. We have finalized that attestations will be submitted to ONC–ACBs on behalf of ONC and the Secretary. We assume there will be four ONC–ACBs as this is the current number of ONC–ACBs, and we also assume an equal distribution in responsibilities among ONC–ACBs. ONC–ACBs would have two responsibilities related to attestations. One responsibility we finalized in § 170.523(q) is that an ONC–ACB must review attestations for completion and submit the health IT developers’ attestations to ONC. We estimate it will take an ONC–ACB employee at the GS– 13, Step 1 level approximately 30 minutes on average to review and submit each attestation to ONC. The other responsibility we are finalizing in § 170.550(l) is that an ONC–ACB would need to ensure that the health IT developer of the Health IT Module has 241 See https://www.bls.gov/oes/2017/may/ oes439061. E:\FR\FM\01MYR3.SGM 01MYR3 25934 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations met its responsibilities related to the Conditions and Maintenance of Certification requirements as solely evidenced by its attestation. We estimate it will take an ONC–ACB employee at the GS–13, Step 1 level approximately one hour on average to complete this task. The hourly wage with benefits for a GS–13, Step 1 employee located in Washington, DC is approximately $91. Therefore, we estimate the annual cost to ONC–ACBs to be $108,108. We have finalized that we would make the attestations publicly available on the CHPL once they are submitted by the ONC–ACBs. ONC posts information regularly to the CHPL and we estimate the added costs to post the attestation will be de minimis. Comments. We did not receive comment specific to the methods related to the estimates for posting attestations. Response. We maintain our assumptions and estimates as proposed regarding attestations. (4) Oversight for the Conditions and Maintenance of Certification Requirements Our processes for overseeing the Conditions and Maintenance of Certification requirements will, for the most part, mirror our processes for direct review of non-conformities in certified health IT as described in current § 170.580. We may directly review a health IT developer’s actions to determine whether they conform to the Conditions and Maintenance of Certification requirements finalized in this final rule. The estimated costs and benefits for such oversight and review are detailed below. (i) Costs We estimated the potential monetary costs of allowing ONC to directly review a health IT developer’s actions to determine whether the actions conform to the requirements of the Program as follows: (1) Costs for health IT developers to correct non-conforming actions identified by ONC; (2) costs for health IT developers and ONC costs related to ONC review and inquiry into non-conforming actions by the health IT developer; and (3) costs for ONC–ACBs related to the new reporting requirement in the Principles of Proper Conduct in § 170.523(s). (A) Costs for Health IT Developers to Correct Non-Conforming Actions Identified by ONC We do not believe health IT developers face additional direct costs for the ONC direct review of health IT developer actions (see cost estimates for VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 the Conditions and Maintenance of Certification requirements). However, we acknowledge that this final rule may eventually require health IT developers to correct certain actions or nonconformities with their health IT that do not conform to the Conditions and Maintenance of Certification requirements. If we identify a non-conforming action by a health IT developer, the costs incurred by the health IT developer to bring its actions into conformance will be determined on a case-by-case basis. Factors that will be considered include, but are not limited to: (1) The extent of customers and/or business affected; (2) how pervasive the action(s) is across the health IT developer’s business; (3) the period of time that the health IT developer was taking the action(s) in question; and (4) the corrective action required to resolve the issue. We are unable to reliably estimate these costs as we do not have cost estimates for a comparable situation. We requested comment on existing relevant data and methods we could use to estimate these costs. Comments. We did not receive any comments specific to the relevant data and methods used to estimate the costs to correct non-conforming actions identified by ONC. Response. We maintain our approach used to estimate the costs to correcting identified non-conformities. (B) Costs for Health IT Developers and ONC Costs Related to ONC Review and Inquiry Into Health IT Developer Actions In order to calculate the potential costs to health IT developers and ONC related to ONC review and inquiry into health IT developer actions, we have created the following categories for potential costs: (1) ONC review and inquiry prior to the issuance of a notice of non-conformity; (2) ONC review and inquiry following the issuance of a notice of non-conformity and the health IT developer does not contest ONC’s findings (i.e., no appeal); and (3) ONC review and inquiry following the issuance of a notice of non-conformity and the health IT developer contests ONC’s findings (i.e., appeal). (C) ONC Review and Inquiry Prior to the Issuance of a Notice of Nonconformity We anticipate that ONC will receive, on average, between 100 and 200 complaints per year concerning the Conditions and Maintenance of Certification requirements that will warrant review and inquiry by ONC. We estimate that such initial review and inquiry by ONC will require, on average, PO 00000 Frm 00294 Fmt 4701 Sfmt 4700 two to three analysts at the GS–13 level working one to two hours each per complaint. The hourly wage with benefits for a GS–13, Step 1 employee located in Washington, DC is approximately $91. Therefore, we estimate each review and inquiry will cost ONC, on average, between $182 and $546. We estimate the total annual cost to ONC will, on average, range from $18,200 and $109,200. This range takes into account both the low end of reviews that are resolved quickly and the high end in which staff will need to discuss issues with ONC leadership or in some cases, HHS senior leadership including the Office of General Counsel. We have not estimated health IT developer costs associated with ONC review prior to the issuance of a notice of non-conformity because, in most cases, health IT developers are not required to take action prior to the notice of non-conformity. (D) ONC Review and Inquiry Following the Issuance of a Notice of NonConformity and the Health IT Developer Does Not Contest ONC’s Findings This category captures cases that require review and inquiry following ONC’s issuance of a notice of nonconformity, but that do not proceed to the appeals process. Examples of such situations would include, but not be limited to: (1) A health IT developer violates a Condition of Certification requirement and does not contest ONC’s finding that it is in violation of the Condition of Certification requirement; or (2) a health IT developer fails to meet a deadline, such as for its corrective action plan (CAP). We estimate that ONC will, on average, conduct between 12 and 18 of these reviews annually. We estimate that a health IT developer may commit, on average and depending on complexity, between 10 and 40 hours of staff time per case to provide ONC with all requested records and documentation that ONC would use to review and conduct an inquiry into health IT developer actions, and, when necessary, make a certification ban and/ or termination determination. We assumed that the work will be performed by a ‘‘Computer Systems Analyst.’’ According to the May 2017 BLS occupational employment statistics, the mean hourly wage for computer systems analyst is $44.59.242 As noted previously, we have assumed that overhead costs (including benefits) are equal to 100 percent of pre-tax wages, so the hourly wage including overhead costs would be $89. Therefore, 242 https://www.bls.gov/oes/2017/May/ oes151121.htm. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations we estimate the average annual cost for health IT developers would range from $10,680 to $64,080. We note that some health IT developers’ costs are expected to be less and some health IT developers’ costs are expected to be more than this estimated cost range. Further, we note that these costs would be perpetual. We estimate that ONC may commit, on average and depending on complexity, between eight and 80 hours of staff time to complete a review and inquiry into health IT developer actions. We assume that the expertise of a GS– 15, Step 1 Federal employee(s) will be necessary. The hourly wage with benefits for a GS–15, Step 1 employee located in Washington, DC is approximately $126. Therefore, based on the estimate of between 12 and 18 cases each year, we estimate ONC’s annual costs would range, on average, from $12,096 to $181,440. We note that some reviews and inquiries may cost less and some may cost more than this estimated cost range. Further, we note that these costs would be perpetual. We welcomed comments on our estimated costs and any comparable processes and costs that we could use to improve our estimates. Comments. We did not receive any comments specific to the relevant data and methods used to estimate the costs to: (1) ONC review and inquiry prior to the issuance of a notice of nonconformity; (2) ONC review and inquiry following the issuance of a notice of non-conformity and the health IT developer does not contest ONC’s findings (i.e., no appeal); and (3) ONC review and inquiry following the issuance of a notice of non-conformity and the health IT developer contests ONC’s findings (i.e., appeal). Response. We maintain our approach used to estimate the costs to health IT developers and to ONC, related to ONC review and inquiry into health IT developer actions. (E) ONC Review and Inquiry Following the Issuance of a Notice of NonConformity and the Health IT Developer Contests ONC’s Findings As discussed in section VII.C of this preamble, we permit a health IT developer to appeal an ONC determination to issue a certification ban and/or terminate a certification under § 170.580(a)(2)(iii). This category of cost calculations captures cases that require review and inquiry following ONC’s issuance of a notice of nonconformity and where the health IT developer contests ONC’s finding and files an appeal. We estimate that ONC VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 will, on average, conduct between three and five of these reviews annually. We estimated that a ‘‘Computer Systems Analyst’’ for the health IT developer may commit, on average and depending on complexity, between 20 and 80 hours to provide the required information to appeal a certification ban and/or termination under § 170.580(a)(2)(iii) and respond to any requests from the hearing officer. According to the May 2017 BLS occupational employment statistics, the mean hourly wage for a computer systems analyst is $44.59.243 Assuming that overhead costs (including benefits) are equal to 100 percent of pre-tax wages, the hourly wage including overhead costs is $89. Therefore, we estimate the annual cost, including overhead costs, for a health IT developer to appeal a certification ban and/or termination under § 170.580(a)(2)(iii) would, on average, range from $5,340 to $35,600. We note that some health IT developers’ costs are expected to be less and some health IT developers’ costs are expected to be more than this estimated cost range. Further, we note that these costs would be perpetual. We estimated that ONC would commit, on average and depending on complexity, between 40 and 160 hours of staff time to conduct each appeal. This will include the time to represent ONC in the appeal and support the costs for the hearing officer. We assume that the expertise of a GS–15, Step 1 Federal employee(s) would be necessary. The hourly wage with benefits for a GS–15, Step 1 employee located in Washington, DC is approximately $126. Therefore, based on the estimate of between three and five cases each year, we estimate the cost for ONC to conduct an appeal would range, on average, from $15,120 to $100,800. We note that some appeals may cost less and some may cost more than this estimated cost range. Further, we note that these costs would be perpetual. Based on the above estimates, we estimated the total annual costs for health IT developers related to ONC review and inquiry into health IT developer actions would range, on average, from $16,020 to $99,680. We estimated the total annual costs for ONC related to ONC review and inquiry into health IT developer actions would range, on average, from $44,603 to $383,345. Comments. We did not receive any comments specific to the relevant data and methods used to estimate the costs of (1) ONC review and inquiry prior to 243 See https://www.bls.gov/oes/2017/May/ oes151121.htm. PO 00000 Frm 00295 Fmt 4701 Sfmt 4700 25935 the issuance of a notice of nonconformity; (2) ONC review and inquiry following the issuance of a notice of non-conformity and the health IT developer does not contest ONC’s findings (i.e., no appeal); and (3) ONC review and inquiry following the issuance of a notice of non-conformity and the health IT developer contests ONC’s findings (i.e., appeal). Response. We maintain our approach used to estimate the costs to health IT developers and to ONC, related to ONC review and inquiry into health IT developer actions. (F) Costs for ONC–ACBs We also note that ONC–ACBs could realize costs associated with the new reporting requirement in the Principles of Proper Conduct in § 170.523(s) that they report, at a minimum, no later than a week after becoming aware of, any information that could inform whether ONC should exercise direct review under § 170.580(a). We estimate that, on average, it will take an ONC–ACB employee at the GS–13, Step 1 level approximately 30 minutes to prepare the report. The hourly wage with benefits for a GS–13, Step 1 employee located in Washington, DC is approximately $91. Since the collection must occur no less than weekly, we will assume it occurs, on average, 52 times per year. Therefore, given that there are currently three ONC–ACBs, we estimate the annual cost to ONC–ACBs to comply with the reporting requirement under § 170.523(s) would, on average, be $7,098. We did not receive comments regarding our calculations. We have finalized these estimates. (ii) Benefits This final rule’s provisions for ONC direct review of the Conditions and Maintenance of Certification requirements would promote health IT developers’ accountability for their actions and ensure that health IT developers’ actions conform with the requirements of the Cures Act and Conditions and Maintenance of Certification requirements in §§ 170.400–406. Specifically, ONC’s direct review of health IT developer actions will facilitate ONC’s ability to require comprehensive corrective action by health IT developers to address nonconforming actions determined by ONC. If ONC ultimately implements a certification ban and/or terminates a certification(s), such action will serve to protect the integrity of the Program and users of health IT. While we do not have available means to quantify the benefits of ONC direct review of health IT developer actions, we note that ONC E:\FR\FM\01MYR3.SGM 01MYR3 25936 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations direct review supports and enables the National Coordinator to fulfill his responsibilities under the HITECH Act and Cures Act, instills public confidence in the Program, and protects public health and safety. We did not receive comments regarding our calculations. We have finalized these estimates. (5) Information Blocking (i) Costs We expect ONC to incur an annual cost for issuing educational resources related to the information blocking ‘‘reasonable and necessary’’ exceptions. We estimate that ONC issues educational resources each quarter, therefore, four per year. We assume that the educational resources would be provided by ONC staff with the expertise of a GS–15, Step 1 Federal employee(s). The hourly wage with benefits for a GS–15, Step 1 employee located in Washington, DC is approximately $126. We estimate it would take ONC staff between 200 and 400 hours to develop the guidance. Therefore, we estimate the annual cost to ONC would range, on average, from $100,800 to $201,600. Comments. We did not receive any comments regarding the specific costs associated with information blocking. Response. We have adopted our estimates as proposed. We note that we did receive comments regarding ‘‘burden’’ on various stakeholder groups related to our information blocking proposals, and those comments are addressed throughout the information blocking section (section VIII) of this final rule. (ii) Benefits Information blocking not only interferes with effective health information exchange, but also negatively impacts many important aspects of health and health care. For a detailed discussion of the negative impacts of information blocking, we refer readers to section XIV.C.2.a(2) of the Proposed Rule (84 FR 7584). The exceptions to the information blocking definition adopted in this final rule create clear guidelines for industry regarding pro-competitive and other beneficial activities and will enable stakeholders to determine more easily and with greater certainty whether their activities are excepted from the information blocking definition. Overall, the finalized exceptions are accommodating to legitimate industry practices for health IT developers, hospitals, and health care providers and, we believe, will ease the burden and compliance costs for these parties. To estimate the benefits of information blocking, we first examined existing data sources to identify a proxy that will indicate the extent to which information blocking is occurring. According to analysis of data from the American Hospital Association IT Supplement survey, 53 percent of nonFederal acute care hospitals reported that they had challenges with exchanging data across different vendor platforms.244 Moreover, 31 percent reported that they must pay additional costs to exchange information with organizations outside of the system. Nearly one in four hospitals reported that they had to develop customized interfaces to electronically exchange information. To quantify the magnitude of information blocking and the benefits of restricting information blocking, we estimated the following, which gives us the imposed cost of information blocking for each health outcome: [Percent of providers that engage in cross-vendor exchange] * [marginal effect (ME) of information blocking on interoperability] * [ME effect of interoperability on the health outcome] * [total cost of health outcome]. We extracted the ‘‘ME effect of interoperability on the health outcome’’ and ‘‘cost of health outcomes’’ from academic literature (see citations in Table 24). We then determined a proxy for the number of providers that engage in cross-vendor exchange. We did this by leveraging hospital referral data from 2015 to determine the proportion of hospitals that referred patients to a provider outside of their system where the receiving provider used a different EHR vendor. We determined that 82 percent of hospitals engaged in crossvendor exchange. This estimate was used as the proxy for ‘‘providers that engaged in cross-vendor exchange.’’ We estimated the ‘‘ME of information blocking on interoperability’’ through the following research design: Y = b1InforBlock + X’B + e Where y = 1 if a hospital routinely engages in four domains of interoperability—sending, receiving, finding, and integrating data, 0 otherwise. The variable InforBlock is a binary indicator for whether a hospital reported experiencing challenges with exchanging data across different vendor platforms. We assume the impact of reporting this barrier is a proxy for the extent to which vendors hinder a hospital’s interoperability. In the model, we control for the following: Hospital’s primary vendor, participation in health exchange organization, participation in five different networks, system ownership, level of system centralization, bed size, profit status, public status, region, location in urban area. The marginal effect of b is 0.04. We assume that this effect may capture other reasons not related to information blocking, so we use half of this estimate for our benefit calculations—0.02. TABLE 28—BENEFITS OF PROHIBITING AND/OR DETERRING INFORMATION BLOCKING [2017 Dollars] Percent of providers susceptible to information blocking Marginal effect of information blocking (percentage points) 0.09 82 82 0.02 0.02 $295,200,000 60,516,000 0.03 82 0.02 79,469,316 0.22 82 0.02 21,648,000 Overall interop impact (marginal effect) Benefit type Total cost impacted Total cost Duplicate testing .............................. Avoidable hospitalizations and readmissions. ER visits .......................................... 100% .................. 100% .................. 200 billion B ........ $41 billion D ........ C 0.09 131 million visits E. 20% .................... Cost per ER visit $1,233. $30 billion F ........ Adverse drug events ....................... 244 Pylypchuk Y., Johnson C., Henry J. & Ciricean D. (November 2018). Variation in Interoperability VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 among U.S. Non-Federal Acute Care Hospitals in 2017. ONC Data Brief, no.42. Office of the National PO 00000 Frm 00296 Fmt 4701 Sfmt 4700 Benefit benefit A Coordinator for Health Information Technology: Washington DC. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations 25937 TABLE 28—BENEFITS OF PROHIBITING AND/OR DETERRING INFORMATION BLOCKING—Continued [2017 Dollars] Benefit type Total benefit per year ............... Total cost impacted ............................ Total cost Overall interop impact (marginal effect) Percent of providers susceptible to information blocking Marginal effect of information blocking (percentage points) ............................ ........................ ........................ ........................ Benefit benefit A $456,833,316 A Total benefit would be a product of % of total cost impacted, total cost, overall interop impact, percent of providers susceptible to information blocking, and marginal effect of information blocking; however, no reasonable estimate of the marginal effect of information blocking is currently available. B National Academy of Medicine (2016), https://money.cnn.com/2017/05/20/news/economy/medical-tests/. C Stephen E. Ross, Tiffany A. Radcliff, William G. Leblanc, L. Miriam Dickinson, Anne M. Libby, and Donald E. Nease Jr., Effects of health information exchange adoption on ambulatory testing rates, J. Am. Med. Inform. Assoc. (2013), at 1137–1142; Bridget A. Stewart, Susan Fernandes, Elizabeth Rodriguez-Huertas, and Michael Landzberg, A preliminary look at duplicate testing associated with lack of electronic health record interoperability for transferred patients, J. of the Am. Med. Informatics Assoc. (2010), at 341–344; Sezgin Ayabakan, Indranil R. Bardhan, Zhiqiang (Eric) Zheng, and Kirk Kirksey Value of health information sharing in reducing healthcare waste: An analysis of duplicate testing across hospitals, MIS Quarterly (Jan. 1, 2017); Eric J. Lammers, Julia Adler-Milstein, and Keith E. Kocher, Does health information exchange reduce redundant imaging? Evidence from emergency departments, Med Care (Mar. 2014), at 227–34. D Agency for Healthcare Research and Quality (AHRQ) Statistical Brief #199 (Dec. 2015), https://www.hcup-us.ahrq.gov/reports/statbriefs/ sb199-Readmissions-Payer-Age.pdf; AHRQ Statistical Brief #72, Nationwide Frequency and Costs of Potentially Preventable Hospitalizations (Apr. 2009), https://www.hcup-us.ahrq.gov/reports/statbriefs/sb72.pdf. E National Center for Health Statistics (NCHS) Data Brief No. 252 (June 2016), https://www.cdc.gov/nchs/data/databriefs/db252.pdf; Nolan Caldwell, Tanja Srebotnjak, Tiffany Wang, and Renee Hsia, ‘‘How Much Will I Get Charged for This?’’ Patient Charges for Top Ten Diagnoses in the Emergency Department (2013), https://doi.org/10.1371/journal.pone.0055491. F Janet Sultana, Paola Cutroneo, and Gianluca Trifiro ` , Clinical and economic burden of adverse drug reactions. As a result of this calculation, we estimate that the benefit of the information blocking provision is $456 million. Comments. We did not receive any comments regarding our approach to estimating benefits or the specific benefit estimates associated with information blocking. Response. ONC has revised its methodological approach to quantifying the benefits of our information blocking provision. This new methodology is described in the RIA. (6) Total Annual Cost Estimate The total annual cost estimate is expressed in 2016 dollars to meet regulatory reform analysis requirements under Executive Order 13771. We estimated that the total cost for this final rule for the first year after it is finalized (including one-time costs), based on the cost estimates outlined above and throughout this RIA, would range, on average, from $953 million to $2.6 billion with an average annual cost of $1.8 billion. We estimated that the total perpetual cost for this final rule (starting in year two), based on the cost estimates outlined above, would range, on average, from $366 million to $1.3 billion with an average annual cost of $840 million. We also included estimates based on the stakeholder groups affected. We estimated the total costs to health IT developers to be between $483 million and $1.1 billion (including one-time and perpetual costs) with $633,000 in cost savings from deregulatory actions. Assuming that 458 health IT developers will be impacted, VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 the cost per developer will range from $1.1 million to $2.4 million. Based on previous participation in the CMS EHR Incentive Program, we estimated that 439,187 health care providers in 95,470 clinical practices and 4,519 hospitals that participated in the CMS EHR Incentive Program will be impacted by this final rule. We estimated the total cost to health care providers to be between $478 million to $1.6 billion. We did not calculate per entity costs for health care providers. We acknowledged that costs may be passed from health IT developers to their customers (i.e. health care providers) during the licensing of their health IT modules. We estimated the total costs to ONC–ACBs to be between $391,000 and $792,000. We estimated the government costs (through labor hours of ONC staff) to be between $159,000 and $586,000 with $4,497 in cost savings from deregulatory actions. In addition to the abovementioned cost savings that are attributable to specific stakeholder groups, we estimated an additional cost savings of $6.6 million to $13.3 million to all stakeholders affected by this provision. We are unable to attribute these amounts to specific stakeholder groups. We did not receive comment regarding these calculations. We have finalized our estimates. (7) Total Annual Benefit Estimate The total annual benefit estimate is expressed in 2016 dollars to meet regulatory reform analysis requirements under Executive Order 13771. We estimated the total annual benefit for this final rule, based on the benefit PO 00000 Frm 00297 Fmt 4701 Sfmt 4700 estimates outlined above, would range from $1.2 billion to $5.0 billion with primary estimated annual benefit of $3.1 billion. Our estimates include benefits attributed to the entire health care system, including hospitals, clinicians, payers and patients.(8) Total Annualized Net Benefit The total annualized net benefit is expressed in 2016 dollars to meet regulatory reform analysis requirements under Executive Order 13771. We estimate the total annualized net benefit for this final rule, based on the estimates outlined above, would range from $191 million to $2.3 billion with a primary net benefit estimate of $1.3 billion. b. Accounting Statement and Table When a rule is considered an economically significant rule under Executive Order 12866, we are required to develop an accounting statement indicating the classification of the expenditures associated with the provisions of the proposed rule. Monetary annual benefits are presented as discounted flows using three percent and seven percent factors in Table 29. We are not able to explicitly define the universe of all costs, but have provided an average of likely costs of this final rule as well as a high and low range of likely costs. Unquantifiable costs and benefits are noted in Table 31. This final rule requires no Federal transfers, but it might bring about a reduction in fraudulent payments to providers by the E:\FR\FM\01MYR3.SGM 01MYR3 25938 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations Federal Government and other payers.245 TABLE 29—EO 12866 SUMMARY TABLE [In $ millions, 2016 Dollars] Primary (3%) Present Value of Quantified Costs .......... Present Value of Quantified Benefits ...... Present Value of Net Benefits ................. Annualized Quantified Costs ................... Annualized Quantified Benefits ................ Annualized Net Quantified Benefits ......... Lower bound (3%) 6,454 23,411 16,957 852 3,089 2,237 Upper bound (3%) 2,966 8,831 5,865 391 1,165 774 Primary (7%) 9,943 37,991 28,049 1,312 5,013 3,701 4,574 16,552 16,552 854 2,184 1,330 Lower bound (7%) 2,120 6,244 4,124 396 824 428 Upper bound (7%) 7,028 26,859 19,832 1,312 3,544 2,232 TABLE 30—E.O. 12866 SUMMARY TABLE NON-DISCOUNTED FLOWS [2016 Dollars] Costs .................................................................................... Benefits ................................................................................ Costs .................................................................................... Benefits ................................................................................ Year 1 Year 2 Year 3 Year 4 Year 5 942,795,801 3,088,980,583 839,887,346 3,088,980,583 839,887,346 3,088,980,583 839,887,346 3,088,980,583 839,887,346 3,088,980,583 Year 6 Year 7 Year 8 Year 9 Year 10 839,887,346 3,088,980,583 839,887,346 3,088,980,583 839,887,346 3,088,980,583 839,887,346 3,088,980,583 839,887,346 3,088,980,583 TABLE 31—NON-QUANTIFIABLE BENEFITS [2016 Dollars] Present value of 10 years by discount rate (in millions) Benefits 3 Percent Quantified Benefits .......................................................................................... 23,411 7 Percent 16,552 Annualized value over 10 years by discount rate (in millions) 3 Percent 3,089 7 Percent 2,184 Non-quantified Benefits: Impact on users of health IT that were ineligible or did not participate in the CMS EHR Incentive Programs; developer cost savings from no longer supporting the 2014 Edition; provider and patient benefit from implementation of USCDI and Security tags (DS4P) provisions due to improvements in interoperability; benefits associated with communication provision because we do not have adequate information to determine the prevalence of gag clauses and other such restrictive practices nor do we have a means to quantify the value to providers of being able to freely communicate and share information; benefit of ONC oversight on real world testing and non-conformance; external regulatory and policy activities. Costs 3 Percent Quantified Costs .............................................................................................. 7 Percent 6,454 4,574 3 Percent 852 7 Percent 396 Non-quantified Costs: Impact of provisions on health IT production costs such as the supply and demand for personnel over time; costs developers to correct non-conformities; ONC cost to review non-conformities, real-world testing maintenance by ACBs; additional provider implementation activities related to USCDI and DS4P; external regulatory and policy activities. 3. Regulatory Flexibility Act The Regulatory Flexibility Act (RFA) requires agencies to analyze options for regulatory relief of small businesses if a rule has a significant impact on a substantial number of small entities. The Small Business Administration (SBA) establishes the size of small 245 Parente, Stephen T., Karen Mandelbaum, Susan P. Hanson, Bonnie S. Cassidy and Donald W. Simborg. ‘‘Crime and Punishment: Can the NHIN Reduce the Cost of Healthcare Fraud?’’ Journal of VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 businesses for Federal Government programs based on average annual receipts or the average employment of a firm.246 The entities that are likely to be directly affected by the requirements in this final rule are health IT developers. We note that the reasonable and necessary activities that do not constitute information blocking provide flexibilities and relief for health IT developers of certified health IT, health information networks, health information exchanges, and health care providers in relation to the information blocking provision of the Cures Act. These reasonable and necessary activities also take into account the potential burden on small entities to Healthcare Information Management 22(3): 42–51. June 2008. 246 The SBA references that annual receipts means ‘‘total income’’ (or in the case of a sole proprietorship, ‘‘gross income’’) plus ‘‘cost of goods sold’’ as these terms are defined and reported on Internal Revenue Service tax return forms. PO 00000 Frm 00298 Fmt 4701 Sfmt 4700 E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations meet these ‘‘exceptions’’ to information blocking, such as with considering the size and resources of small entities when meeting security requirements to qualify for the ‘‘promoting the security of electronic health information’’ exception. While health IT developers that pursue certification of their health IT under the Program represent a small segment of the overall information technology industry, we believe that many health IT developers impacted by the requirements in this final rule most likely fall under the North American Industry Classification System (NAICS) code 541511 ‘‘Custom Computer Programming Services.’’ 247 The SBA size standard associated with this NAICS code is set at $27.5 million annual receipts or less. There is enough data generally available to establish that between 75 percent and 90 percent of entities that are categorized under the NAICS code 541511 are under the SBA size standard. We also note that with the exception of aggregate business information available through the U.S. Census Bureau and the SBA related to NAICS code 541511, it appears that many health IT developers that pursue certification of their health IT under the Program are privately held or owned and do not regularly, if at all, make their specific annual receipts publicly available. As a result, it is difficult to locate empirical data related to many of these health IT developers to correlate to the SBA size standard. However, although not perfectly correlated to the size standard for NAICS code 541511, we do have information indicating that over 60 percent of health IT developers that have had Complete EHRs and/or Health IT Modules certified to the 2011 Edition had less than 51 employees (80 FR 62741). We estimated that the requirements in this final rule will have effects on health IT developers, some of which may be small entities, that have certified health IT or are likely to pursue certification of their health IT under the Program. We believe, however, that we have finalized the minimum amount of requirements necessary to accomplish our primary policy goal of enhancing interoperability. Further, as discussed in section XIII.B of this RIA above, there are no appropriate regulatory or nonregulatory alternatives that could be developed to lessen the compliance burden associated with this final rule because many of the provisions are derived directly from legislative mandates in the Cures Act. 247 https://www.sba.gov/sites/default/files/files/ Size_Standards_Table_2017.pdf. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 Additionally, we have attempted to offset some of the burden imposed on health IT developers in this final rule with cost saving provisions through deregulatory actions (see section III). Additionally, the Secretary certifies that this final rule will not have a significant impact on a substantial number of small entities. 4. Executive Order 13132—Federalism Executive Order 13132 establishes certain requirements that an agency must meet when it promulgates a final rule that imposes substantial direct requirement costs on State and local governments, preempts State law, or otherwise has federalism implications. Nothing in this final rule imposes substantial direct compliance costs on State and local governments, preempts State law, or otherwise has federalism implications. We are not aware of any State laws or regulations that are contradicted or impeded by any of the provisions in this final rule. 5. Unfunded Mandates Reform Act of 1995 Section 202 of the Unfunded Mandates Reform Act of 1995 requires that agencies assess anticipated costs and benefits before issuing any rule that imposes unfunded mandates on State, local, and tribal governments or the private sector requiring spending in any one year of $100 million in 1995 dollars, updated annually for inflation. The current inflation-adjusted statutory threshold is approximately $150 million. While the estimated potential cost effects of this final rule reach the statutory threshold, we do not believe this final rule imposes unfunded mandates on State, local, and tribal governments or the private sector. OMB reviewed this final rule. List of Subjects 45 CFR Part 171 Computer technology, Electronic health record, Electronic information system, Electronic transactions, Health, Health care, Health care provider, Health information exchange, Health information technology, Health information network, Health insurance, PO 00000 Frm 00299 Fmt 4701 Health records, Hospitals, Privacy, Reporting and recordkeeping requirements, Public health, Security. For the reasons set forth in the preamble, 45 CFR subtitle A, subchapter D, is amended as follows: PART 170—HEALTH INFORMATION TECHNOLOGY STANDARDS, IMPLEMENTATION SPECIFICATIONS, AND CERTIFICATION CRITERIA AND CERTIFICATION PROGRAMS FOR HEALTH INFORMATION TECHNOLOGY 1. The authority citation for part 170 continues to read as follows: ■ Authority: 42 U.S.C. 300jj–11; 42 U.S.C 300jj–14; 5 U.S.C. 553 ■ 2. Revise § 170.101 to read as follows: § 170.101 Applicability. The standards, implementation specifications, and certification criteria adopted in this part apply to Health IT Modules and the testing and certification of such Health IT Modules. ■ 3. Amend § 170.102 by: ■ a. Removing the definitions of ‘‘2014 Edition Base EHR’’ and ‘‘2014 Edition EHR certification criteria’’; ■ b. Revising paragraph (3) in the definition of ‘‘2015 Edition Base EHR’’; ■ c. Revising the definition of ‘‘Common Clinical Data Set’’; ■ d. Removing the definition of ‘‘Complete EHR, 2014 Edition’’; and ■ e. Adding in alphabetical order definitions for ‘‘Electronic Health Information’’, ‘‘Fee’’, ‘‘Health information technology’’, ‘‘Interoperability’’, and ‘‘Interoperability element’’. The revisions and additions read as follows: § 170.102 Definitions. * 45 CFR Part 170 Computer technology, Electronic health record, Electronic information system, Electronic transactions, Health, Health care, Health information technology, Health insurance, Health records, Hospitals, Incorporation by reference, Laboratories, Medicaid, Medicare, Privacy, Reporting and recordkeeping requirements, Public health, Security. Sfmt 4700 25939 * * * * 2015 Edition Base EHR * * * (3) Has been certified to the certification criteria adopted by the Secretary in— (i) Section 170.315(a)(1), (2), or (3); (a)(5), (a)(9), (a)(14), (b)(1), (c)(1), (g)(7) and (9), and (h)(1) or (2); (ii) Section 170.315(g)(8) or (10) until May 2, 2022; and (iii) Section 170.315(g)(10) on and after May 2, 2022. * * * * * Common Clinical Data Set means the following data expressed, where indicated, according to the specified standard(s): (1) Patient name. (2) Sex: The standard specified in § 170.207(n)(1). (3) Date of birth. E:\FR\FM\01MYR3.SGM 01MYR3 25940 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations (4) Race: (i) The standard specified in § 170.207(f)(2); and (ii) The standard specified in § 170.207(f)(1) for each race identified in accordance § 170.207(f)(2). (5) Ethnicity: (i) The standard specified in § 170.207(f)(2); and (ii) The standard specified in § 170.207(f)(1) for each ethnicity identified in accordance § 170.207(f)(2). (6) Preferred language: The standard specified in § 170.207(g)(2). (7) Smoking status. (8) Problems: At a minimum, the standard specified in § 170.207(a)(4). (9) Medications: At a minimum, the standard specified in § 170.207(d)(3). (10) Medication allergies: At a minimum, the standard specified in § 170.207(d)(3). (11) Laboratory test(s): At a minimum, the standard specified in § 170.207(c)(3). (12) Laboratory value(s)/result(s). (13) Vital signs: (i) The patient’s diastolic blood pressure, systolic blood pressure, body height, body weight, heart rate, respiratory rate, body temperature, pulse oximetry, and inhaled oxygen concentration must be exchanged in numerical values only; and (ii) In accordance with the standard specified in § 170.207(c)(3) and with the associated applicable unit of measure for the vital sign measurement in the standard specified in § 170.207(m)(1). (iii) Optional: The patient’s BMI percentile per age and sex for youth 2– 20 years of age, weight for age per length and sex for children less than 3 years of age, and head occipital-frontal circumference for children less than 3 years of age must be recorded in numerical values only in accordance with the standard specified in § 170.207(c)(3) and with the associated applicable unit of measure for the vital sign measurement in the standard specified in § 170.207(m)(1). For BMI percentile per age and sex for youth 2– 20 years of age and weight for age per length and sex for children less than 3 years of age, the reference range/scale or growth curve should be included as appropriate. (14) Procedures: (i) At a minimum, the version of the standard specified in § 170.207(a)(4) or § 170.207(b)(2); or (ii) For technology primarily developed to record dental procedures, the standard specified in § 170.207(b)(3). (iii) Optional: The standard specified in § 170.207(b)(4). (15) Care team member(s). VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 (16) Immunizations: In accordance with, at a minimum, the standards specified in § 170.207(e)(3) and (4). (17) Unique device identifier(s) for a patient’s implantable device(s): In accordance with the ‘‘Product Instance’’ in the ‘‘Procedure Activity Procedure Section’’ of the standard specified in § 170.205(a)(4). (18) Assessment and plan of treatment: (i) In accordance with the ‘‘Assessment and Plan Section (V2)’’ of the standard specified in § 170.205(a)(4); or (ii) In accordance with the ‘‘Assessment Section (V2)’’ and ‘‘Plan of Treatment Section (V2)’’ of the standard specified in § 170.205(a)(4). (19) Goals: In accordance with the ‘‘Goals Section’’ of the standard specified in § 170.205(a)(4). (20) Health concerns: In accordance with the ‘‘Health Concerns Section’’ of the standard specified in § 170.205(a)(4). * * * * * Electronic health information (EHI) is defined as it is in § 171.102. Fee is defined as it is in § 171.102 of this subchapter. * * * * * Health information technology means hardware, software, integrated technologies or related licenses, IP, upgrades, or packaged solutions sold as services that are designed for or support the use by health care entities or patients for the electronic creation, maintenance, access, or exchange of health information. * * * * * Interoperability is, with respect to health information technology, such health information technology that— (1) Enables the secure exchange of electronic health information with, and use of electronic health information from, other health information technology without special effort on the part of the user; (2) Allows for complete access, exchange, and use of all electronically accessible health information for authorized use under applicable State or Federal law; and (3) Does not constitute information blocking as defined in § 171.103 of this subchapter. Interoperability element is defined as it is in § 171.102 of this subchapter. * * * * * § 170.200 [Amended] 4. Amend § 170.200 by removing the phrase ‘‘Complete EHRs and’’. ■ § 170.202 [Amended] 5. Amend § 170.202 by removing and reserving paragraph (a)(1). ■ PO 00000 Frm 00300 Fmt 4701 Sfmt 4700 § 170.204 [Amended] 6. Amend § 170.204 by removing and reserving paragraphs (b)(1) and (2) and removing paragraph (c). ■ 7. Amend § 170.205 by: ■ a. Removing and reserving paragraphs (a)(1) and (2); ■ b. Adding paragraphs (a)(5) and (b)(1); ■ c. Removing and reserving paragraphs (d)(3), (e)(3), and (h)(1); ■ d. Adding paragraph (h)(3); ■ e. Removing and reserving paragraphs (i)(1) and (j); and ■ f. Adding paragraph (k)(3). The additions read as follows: ■ § 170.205 Content exchange standards and implementation specifications for exchanging electronic health information. (a) * * * (5) Standard. HL7 CDA® R2 Implementation Guide: C–CDA Templates for Clinical Notes R2.1 Companion Guide, Release 2 (incorporated by reference in § 170.299). * * * * * (b) * * * (1) Standard. National Council for Prescription Drug Programs (NCPDP): SCRIPT Standard Implementation Guide; Version 2017071 (incorporated by reference in § 170.299). * * * * * (h) * * * (3) Standard. CMS Implementation Guide for Quality Reporting Document Architecture: Category I; Hospital Quality Reporting; Implementation Guide for 2019 (incorporated by reference in § 170.299). * * * * * (k) * * * (3) Standard. CMS Implementation Guide for Quality Reporting Document Architecture: Category III; Eligible Clinicians and Eligible Professionals Programs; Implementation Guide for 2019 (incorporated by reference in § 170.299). * * * * * § 170.207 [Amended] 8. Amend § 170.207 by removing and reserving paragraphs (d)(2), (e)(2), (g)(1), (h), and (j). ■ § 170.210 [Amended] 9. Amend § 170.210: a. By removing and reserving paragraphs (a)(1) and (c)(1); ■ b. In paragraph (e)(1)(i), by removing the words ‘‘7.2 through 7.4, 7.6, and 7.7’’ and adding in their place ‘‘7.1.1 through 7.1.3 and 7.1.6 through 7.1.9’’; and ■ c. In paragraph (h), by removing the words ‘‘ASTM E2147–01 (Reapproved 2013)’’ and adding in their place ‘‘ASTM E2147–18’’. ■ ■ E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations ■ 10. Add § 170.213 to read as follows: § 170.213 United States Core Data for Interoperability Standard. United States Core Data for Interoperability (USCDI), Version 1 (v1) (incorporated by reference in § 170.299). ■ 11. Add § 170.215 to read as follows: § 170.215 Application Programming Interface Standards. The Secretary adopts the following application programming interface (API) standards and associated implementation specifications: (a)(1) Standard. HL7® Fast Healthcare Interoperability Resources (FHIR ®) Release 4.0.1 (incorporated by reference in § 170.299). (2) Implementation specification. HL7 FHIR US Core Implementation Guide STU 3.1.0. (incorporated by reference in § 170.299). (3) Implementation specification. HL7 SMART Application Launch Framework Implementation Guide Release 1.0.0, including mandatory support for the ‘‘SMART Core Capabilities’’ (incorporated by reference in § 170.299). (4) Implementation specification. FHIR Bulk Data Access (Flat FHIR) (v1.0.0: STU 1), including mandatory support for the ‘‘group-export’’ ‘‘OperationDefinition’’ (incorporated by reference in § 170.299). (b) Standard. OpenID Connect Core 1.0, incorporating errata set 1 (incorporated by reference in § 170.299). ■ 12. Amend § 170.299 by: ■ a. Revising paragraph (c)(1); ■ b. Removing and reserving paragraphs (c)(2) and (3) and (d)(2), (7), and (8); ■ c. Adding paragraphs (e)(4) and (5); ■ d. Removing and reserving paragraphs (f)(3), (6), (7), (10), and (11); ■ e. Adding paragraphs (f)(30) through (34); ■ f. Removing and reserving paragraphs (h)(1) and (j)(1); ■ g. Adding paragraph (k)(3); ■ h. Removing and reserving paragraph (l)(3); ■ i. Adding paragraph (m)(5); ■ j. Redesignating paragraphs (n) through (r) as paragraphs (o) through (s), respectively; ■ k. Adding new paragraph (n); and ■ l. Removing and reserving newly redesignated paragraphs (r)(4) and (5). The revision and additions read as follows: § 170.299 Incorporation by reference. * * * * * (c) * * * (1) ASTM E2147–18 Standard Specification for Audit and Disclosure Logs for Use in Health Information VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 Systems, approved May 1, 2018, IBR approved for § 170.210(h). * * * * * (e) * * * (4) CMS Implementation Guide for Quality Reporting Document Architecture Category I Hospital Quality Reporting Implementation Guide for 2019; published May 4, 2018, IBR approved for § 170.205(h). (5) CMS Implementation Guide for Quality Reporting Document Architecture Category III Eligible Clinicians and Eligible Professionals Programs Implementation Guide for 2019; published October 8, 2018, IBR approved for § 170.205(k). (f) * * * (30) HL7® CDA® R2 Implementation Guide: C–CDA Templates for Clinical Notes R2.1 Companion Guide, Release 2–US Realm, October 2019, IBR approved for § 170.205(a). (31) HL7 FHIR® Bulk Data Access (Flat FHIR®) (v1.0.0: STU 1), August 22, 2019, IBR approved for § 170.215(a). (32) HL7 FHIR SMART Application Launch Framework Implementation Guide Release 1.0.0, November 13, 2018, IBR approved for § 170.215(a). (33) HL7 Fast Healthcare Interoperability Resources Specification (FHIR®) Release 4, Version 4.0.1: R4, October 30, 2019, including Technical Correction #1, November 1, 2019, IBR approved for § 170.215(a). (34) HL7 FHIR® US Core Implementation Guide STU3 Release 3.1.0, November 06, 2019, IBR approved for § 170.215(a). * * * * * (k) * * * (3) SCRIPT Standard, Implementation Guide, Version 2017071 (Approval Date for ANSI: July 28, 2017), IBR approved for § 170.205(b). * * * * * (m) * * * (5) United States Core Data for Interoperability (USCDI), Version 1, February 2020, IBR approved for § 170.213; available at https:// www.healthit.gov/USCDI. * * * * * (n) OpenID Foundation, 2400 Camino Ramon, Suite 375, San Ramon, CA 94583, Telephone +1 925–275–6639, https://openid.net/. (1) OpenID Connect Core 1.0 Incorporating errata set 1, November 8, 2014, IBR approved for § 170.215(b). (2) [Reserved] * * * * * § 170.300 13. Amend § 170.300 in paragraphs (a) and (c) by removing the phrase ‘‘Complete EHRs and’’. Frm 00301 Fmt 4701 [Removed and Reserved] 14. Remove and reserve § 170.314. 15. Amend § 170.315: a. By removing and reserving paragraphs (a)(6) through (8); ■ b. In paragraph (a)(9)(ii)(B)(1)(iii) by removing ‘‘medication allergy’’ and adding in its place ‘‘allergy and intolerance’’; ■ c. In paragraph (a)(9)(ii)(B)(2) by removing ‘‘medication allergies’’ and adding in its place ‘‘allergies and intolerance’’; ■ d. By removing and reserving paragraph (a)(11); ■ e. In paragraphs (b)(1)(ii)(A) introductory text, (b)(1)(ii)(A)(2) and (3), (b)(1)(ii)(B), and (b)(1)(ii)(C) introductory text, by removing the reference ‘‘§ 170.205(a)(3) and § 170.205(a)(4)’’ and adding in its place the reference ‘‘§ 170.205(a)(3), (4), and (5)’’; ■ f. In paragraph (b)(1)(iii) introductory text, by removing the reference ‘‘§ 170.205(a)(4)’’ and adding in its place the reference ‘‘§ 170.205(a)(3), (4), and (5)’’; ■ g. By revising paragraphs (b)(1)(iii)(A) and (b)(2) and (3); ■ h. By removing and reserving paragraphs (b)(4) and (5); ■ i. By revising paragraphs (b)(7) through (9); ■ j. By adding paragraph (b)(10); ■ k. By revising paragraph (c)(3); ■ l. By adding paragraphs (d)(12) and (13); ■ m. By revising paragraphs (e)(1)(i)(A)(1) through (5); ■ n. By adding paragraphs (e)(1)(i)(A)(6) and (7) ■ o. In paragraph (e)(1)(i)(B)(1)(ii) and (e)(1)(i)(B)(2) introductory text, by removing the reference ‘‘§ 170.205(a)(4)’’ and adding in its place the reference ‘‘§ 170.205(a)(4) and (5)’’; ■ p. By removing and reserving paragraph (e)(1)(ii)(B); ■ q. By revising paragraphs (f)(5)(iii)(B)(1) through (4), ■ r. By adding paragraph (f)(5)(iii)(B)(5); ■ s. By revising paragraphs (g)(1) and (2), (g)(3)(i), and (g)(6) ■ t. By removing paragraphs (g)(7)(ii)(A)(3) and (g)(8)(ii)(A)(3); ■ u. By revising paragraph (g)(9)(i)(A); ■ v. By removing paragraph (g)(9)(ii)(A)(3); and ■ w. By adding paragraph (g)(10). The revisions and additions read as follows: ■ ■ ■ § 170.315 2015 Edition health IT certification criteria. [Amended] ■ PO 00000 § 170.314 Sfmt 4700 25941 * * * (b) * * * (1) * * * E:\FR\FM\01MYR3.SGM 01MYR3 * * 25942 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations (iii) * * * (A)(1) The data classes expressed in the standard in § 170.213 and in accordance with § 170.205(a)(4), (5), and paragraphs (b)(1)(iii)(A)(3)(i) through (iii) of this section, or (2) The Common Clinical Data Set in accordance with § 170.205(a)(4) and paragraph (b)(1)(iii)(A)(3)(i) through (iv) of this section for the period until May 2, 2022, and (3) The following data classes: (i) Assessment and plan of treatment. In accordance with the ‘‘Assessment and Plan Section (V2)’’ of the standard specified in § 170.205(a)(4); or in accordance with the ‘‘Assessment Section (V2)’’ and ‘‘Plan of Treatment Section (V2)’’ of the standard specified in § 170.205(a)(4). (ii) Goals. In accordance with the ‘‘Goals Section’’ of the standard specified in § 170.205(a)(4). (iii) Health concerns. In accordance with the ‘‘Health Concerns Section’’ of the standard specified in § 170.205(a)(4). (iv) Unique device identifier(s) for a patient’s implantable device(s). In accordance with the ‘‘Product Instance’’ in the ‘‘Procedure Activity Procedure Section’’ of the standard specified in § 170.205(a)(4). (2) Clinical information reconciliation and incorporation—(i) General requirements. Paragraphs (b)(2)(ii) and (iii) of this section must be completed based on the receipt of a transition of care/referral summary formatted in accordance with the standards adopted in § 170.205(a)(3) through (5) using the Continuity of Care Document, Referral Note, and (inpatient setting only) Discharge Summary document templates on and after May 2, 2022. (ii) Correct patient. Upon receipt of a transition of care/referral summary formatted according to the standards adopted § 170.205(a)(3) through (5), technology must be able to demonstrate that the transition of care/referral summary received can be properly matched to the correct patient. (iii) Reconciliation. Enable a user to reconcile the data that represent a patient’s active medication list, allergies and intolerance list, and problem list as follows. For each list type: (A) Simultaneously display (i.e., in a single view) the data from at least two sources in a manner that allows a user to view the data and their attributes, which must include, at a minimum, the source and last modification date. (B) Enable a user to create a single reconciled list of each of the following: Medications; Allergies and Intolerances; and problems. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 (C) Enable a user to review and validate the accuracy of a final set of data. (D) Upon a user’s confirmation, automatically update the list, and incorporate the following data expressed according to the specified standard(s) on and after May 2, 2022: (1) Medications. At a minimum, the version of the standard specified in § 170.213; (2) Allergies and intolerance. At a minimum, the version of the standard specified in § 170.213; and (3) Problems. At a minimum, the version of the standard specified in § 170.213. (iv) System verification. Based on the data reconciled and incorporated, the technology must be able to create a file formatted according to the standard specified in § 170.205(a)(4) using the Continuity of Care Document template and the standard specified in § 170.205(a)(5) on and after May 2, 2022. (3) Electronic prescribing. (i) For technology certified prior to May 2, 2022, subject to the real world testing provisions at § 170.405(b)(5), (A) Enable a user to perform the following prescription-related electronic transactions in accordance with, at a minimum, the version of the standard specified in § 170.207(d)(3) as follows: (1) Create new prescriptions (NEWRX). (2) Change prescriptions (RXCHG, CHGRES). (3) Cancel prescriptions (CANRX, CANRES). (4) Refill prescriptions (REFREQ, REFRES). (5) Receive fill status notifications (RXFILL). (6) Request and receive medication history information (RXHREQ, RXHRES). (B) For each transaction listed in paragraph (b)(3)(i)(A) of this section, the technology must be able to receive and transmit the reason for the prescription using the diagnosis elements in the DRU Segment. (C) Optional: For each transaction listed in paragraph (b)(3)(i)(A) of this section, the technology must be able to receive and transmit the reason for prescription using the indication elements in the SIG Segment. (D) Limit a user’s ability to prescribe all oral liquid medications in only metric standard units of mL (i.e., not cc). (E) Always insert leading zeroes before the decimal point for amounts less than one and must not allow trailing zeroes after a decimal point when a user prescribes medications. (ii) For technology certified subsequent to June 30, 2020: PO 00000 Frm 00302 Fmt 4701 Sfmt 4700 (A) Enable a user to perform the following prescription-related electronic transactions in accordance with the standard specified in § 170.205(b)(1) and, at a minimum, the version of the standard specified in § 170.207(d)(3) as follows: (1) Create new prescriptions (NewRx). (2) Request and respond to change prescriptions (RxChangeRequest, RxChangeResponse). (3) Request and respond to cancel prescriptions (CancelRx, CancelRxResponse). (4) Request and respond to renew prescriptions (RxRenewalRequest, RxRenewalResponse). (5) Receive fill status notifications (RxFill). (6) Request and receive medication history (RxHistoryRequest, RxHistoryResponse). (7) Relay acceptance of a transaction back to the sender (Status). (8) Respond that there was a problem with the transaction (Error). (9) Respond that a transaction requesting a return receipt has been received (Verify). (B) Optionally, enable a user to perform the following prescriptionrelated electronic transactions in accordance with the standard specified in § 170.205(b)(1) and, at a minimum, the version of the standard specified in § 170.207(d)(3) as follows: (1) Create and respond to new prescriptions (NewRxRequest, NewRxResponseDenied). (2) Receive fill status notifications (RxFillIndicator). (3) Ask the Mailbox if there are any transactions (GetMessage). (4) Request to send an additional supply of medication (Resupply). (5) Communicate drug administration events (DrugAdministration). (6) Request and respond to transfer one or more prescriptions between pharmacies (RxTransferRequest, RxTransferResponse, RxTransferConfirm). (7) Recertify the continued administration of a medication order (Recertification). (8) Complete Risk Evaluation and Mitigation Strategy (REMS) transactions (REMSInitiationRequest, REMSInitiationResponse, REMSRequest, and REMSResponse). (9) Electronic prior authorization transactions (PAInitiationRequest, PAInitiationResponse, PARequest, PAResponse, PAAppealRequest, PAAppealResponse, PACancelRequest, and PACancelResponse). (C) For the following prescriptionrelated transactions, the technology must be able to receive and transmit the E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations reason for prescription using the diagnosis elements: <Diagnosis> <Primary> or <Secondary>: (1) Required transactions: (i) Create new prescriptions (NewRx). (ii) Request and respond to change prescriptions (RxChangeRequest, RxChangeResponse). (iii) Cancel prescriptions (CancelRx). (iv) Request and respond to renew prescriptions (RxRenewalRequest, RxRenewalResponse). (v) Receive fill status notifications (RxFill). (vi) Receive medication history (RxHistoryResponse). (2) Optional transactions: (i) Request to send an additional supply of medication (Resupply) (ii) Request and respond to transfer one or more prescriptions between pharmacies (RxTransferRequest, RxTransferResponse) (iii) Complete Risk Evaluation and Mitigation Strategy (REMS) transactions (REMSInitiationRequest, REMSInitiationResponse, REMSRequest, and REMSResponse). (iv) Electronic prior authorization (ePA) transactions (PAInitiationRequest, PAInitiationResponse, PARequest, PAResponse, PAAppealRequest, PAAppealResponse and PACancelRequest, PACancelResponse). (D) Optional: For each transaction listed in paragraph (b)(3)(ii)(C) of this section, the technology must be able to receive and transmit reason for prescription using the <IndicationforUse> element in the SIG segment. (E) Limit a user’s ability to prescribe all oral liquid medications in only metric standard units of mL (i.e., not cc). (F) Always insert leading zeroes before the decimal point for amounts less than one and must not allow trailing zeroes after a decimal point when a user prescribes medications. * * * * * (7) Security tags—summary of care— send. Enable a user to create a summary record formatted in accordance with the standard adopted in § 170.205(a)(4) that is tagged as restricted and subject to restrictions on re-disclosure according to the standard adopted in § 170.205(o)(1) at the: (i) Document, section, and entry (data element) level; or (ii) Document level for the period until May 2, 2022. (8) Security tags—summary of care— receive. (i) Enable a user to receive a summary record that is formatted in accordance with the standard adopted in § 170.205(a)(4) that is tagged as restricted and subject to restrictions on VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 re-disclosure according to the standard adopted in § 170.205(o)(1) at the: (A) Document, section, and entry (data element) level; or (B) Document level for the period until May 2, 2022; and (ii) Preserve privacy markings to ensure fidelity to the tagging based on consent and with respect to sharing and re-disclosure restrictions. (9) Care plan. Enable a user to record, change, access, create, and receive care plan information in accordance with: (i) The Care Plan document template, including the Health Status Evaluations and Outcomes Section and Interventions Section (V2), in the standard specified in § 170.205(a)(4); and (ii) The standard in § 170.205(a)(5)) on and after May 2, 2022. (10) Electronic Health Information export—(i) Single patient electronic health information export. (A) Enable a user to timely create an export file(s) with all of a single patient’s electronic health information that can be stored at the time of certification by the product, of which the Health IT Module is a part. (B) A user must be able to execute this capability at any time the user chooses and without subsequent developer assistance to operate. (C) Limit the ability of users who can create export file(s) in at least one of these two ways: (1) To a specific set of identified users (2) As a system administrative function. (D) The export file(s) created must be electronic and in a computable format. (E) The publicly accessible hyperlink of the export’s format must be included with the exported file(s). (ii) Patient population electronic health information export. Create an export of all the electronic health information that can be stored at the time of certification by the product, of which the Health IT Module is a part. (A) The export created must be electronic and in a computable format. (B) The publicly accessible hyperlink of the export’s format must be included with the exported file(s). (iii) Documentation. The export format(s) used to support paragraphs (b)(10)(i) and (ii) of this section must be kept up-to-date. (c) * * * (3) Clinical quality measures—report. Enable a user to electronically create a data file for transmission of clinical quality measurement data in accordance with the applicable implementation specifications specified by the CMS implementation guides for Quality Reporting Document Architecture (QRDA), category I, for inpatient PO 00000 Frm 00303 Fmt 4701 Sfmt 4700 25943 measures in § 170.205(h)(3) and CMS implementation guide for QRDA, category III for ambulatory measures in § 170.205 (k)(3). * * * * * (d) * * * (12) Encrypt authentication credentials. Health IT developers must make one of the following attestations and may provide the specified accompanying information, where applicable: (i) Yes—the Health IT Module encrypts stored authentication credentials in accordance with standards adopted in § 170.210(a)(2). (ii) No—the Health IT Module does not encrypt stored authentication credentials. When attesting ‘‘no,’’ the health IT developer may explain why the Health IT Module does not support encrypting stored authentication credentials. (13) Multi-factor authentication. Health IT developers must make one of the following attestations and, as applicable, provide the specified accompanying information: (i) Yes—the Health IT Module supports the authentication, through multiple elements, of the user’s identity with the use of industry-recognized standards. When attesting ‘‘yes,’’ the health IT developer must describe the use cases supported. (ii) No—the Health IT Module does not support authentication, through multiple elements, of the user’s identity with the use of industry-recognized standards. When attesting ‘‘no,’’ the health IT developer may explain why the Health IT Module does not support authentication, through multiple elements, of the user’s identify with the use of industry-recognized standards. (e) * * * (1) * * * (i) * * * (A) * * * (1) The data classes expressed in the standards in § 170.213 (which should be in their English (i.e., non-coded) representation if they associate with a vocabulary/code set), and in accordance with § 170.205(a)(4) and (a)(5), and paragraphs (e)(1)(i)(A)(3)(i) through (iii) of this section, or (2) The Common Clinical Data Set in accordance with § 170.205(a)(4) and paragraphs (e)(1)(i)(A)(3)(i) through (iv) of this section for the period until May 2, 2022. (3) The following data classes: (i) Assessment and plan of treatment. In accordance with the ‘‘Assessment and Plan Section (V2)’’ of the standard specified in § 170.205(a)(4); or in accordance with the ‘‘Assessment E:\FR\FM\01MYR3.SGM 01MYR3 25944 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations Section (V2)’’ and ‘‘Plan of Treatment Section (V2)’’ of the standard specified in § 170.205(a)(4). (ii) Goals. In accordance with the ‘‘Goals Section’’ of the standard specified in § 170.205(a)(4). (iii) Health concerns. In accordance with the ‘‘Health Concerns Section’’ of the standard specified in § 170.205(a)(4). (iv) Unique device identifier(s) for a patient’s implantable device(s). In accordance with the ‘‘Product Instance’’ in the ‘‘Procedure Activity Procedure Section’’ of the standards specified in § 170.205(a)(4). (4) Ambulatory setting only. Provider’s name and office contact information. (5) Inpatient setting only. Admission and discharge dates and locations; discharge instructions; and reason(s) for hospitalization. (6) Laboratory test report(s). Laboratory test report(s), including: (i) The information for a test report as specified all the data specified in 42 CFR 493.1291(c)(1) through (7); (ii) The information related to reference intervals or normal values as specified in 42 CFR 493.1291(d); and (iii) The information for corrected reports as specified in 42 CFR 493.1291(k)(2). (7) Diagnostic image report(s). * * * * * (f) * * * (5) * * * (iii) * * * (B) * * * (1) The data classes expressed in the standards in § 170.213, and in accordance with § 170.205(a)(4) and (5), or (2) The Common Clinical Data Set in accordance with § 170.205(a)(4) for the period until May 2, 2022. (3) Encounter diagnoses. Formatted according to at least one of the following standards: (i) The standard specified in § 170.207(i). (ii) At a minimum, the version of the standard specified in § 170.207(a)(4). (4) The provider’s name, office contact information, and reason for visit. (5) An identifier representing the row and version of the trigger table that triggered the case report. * * * * * (g) Design and performance—(1) Automated numerator recording. For each Promoting Interoperability Programs percentage-based measure, technology must be able to create a report or file that enables a user to review the patients or actions that would make the patient or action VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 eligible to be included in the measure’s numerator. The information in the report or file created must be of sufficient detail such that it enables a user to match those patients or actions to meet the measure’s denominator limitations when necessary to generate an accurate percentage. (2) Automated measure calculation. For each Promoting Interoperability Programs percentage-based measure that is supported by a capability included in a technology, record the numerator and denominator and create a report including the numerator, denominator, and resulting percentage associated with each applicable measure. (3) * * * (i) User-centered design processes must be applied to each capability technology includes that is specified in the following certification criteria: Paragraphs (a)(1) through (5), (9), and (14), and (b)(2) and (3). * * * * * (6) Consolidated CDA creation performance. The following technical and performance outcomes must be demonstrated related to Consolidated CDA creation. The capabilities required under paragraphs (g)(6)(i) through (v) of this section can be demonstrated in tandem and do not need to be individually addressed in isolation or sequentially. (i) This certification criterion’s scope includes: (A) The data classes expressed in the standard in § 170.213, and in accordance with § 170.205(a)(4) and (5) and paragraphs (g)(6)(i)(C)(1) through (3) of this section; or (B) The Common Clinical Data Set in accordance with § 170.205(a)(4) and paragraphs (g)(6)(i)(C)(1) through (4) of this section for the period until May 2, 2022. (C) The following data classes: (1) Assessment and plan of treatment. In accordance with the ‘‘Assessment and Plan Section (V2)’’ of the standard specified in § 170.205(a)(4); or in accordance with the ‘‘Assessment Section (V2)’’ and ‘‘Plan of Treatment Section (V2)’’ of the standard specified in § 170.205(a)(4). (2) Goals. In accordance with the ‘‘Goals Section’’ of the standard specified in § 170.205(a)(4). (3) Health concerns. In accordance with the ‘‘Health Concerns Section’’ of the standard specified in § 170.205(a)(4). (4) Unique device identifier(s) for a patient’s implantable device(s). In accordance with the ‘‘Product Instance’’ in the ‘‘Procedure Activity Procedure Section’’ of the standard specified in § 170.205(a)(4). PO 00000 Frm 00304 Fmt 4701 Sfmt 4700 (ii) Reference C–CDA match. (A) For health IT certified to (g)(6)(i)(A) of this section, create a data file formatted in accordance with the standard adopted in § 170.205(a)(4) and (5) that matches a gold-standard, reference data file. (B) For health IT certified to (g)(6)(i)(B) of this section, create a data file formatted in accordance with the standard adopted in § 170.205(a)(4) that matches a gold-standard, reference data file. (iii) Document-template conformance. (A) For health IT certified to (g)(6)(i)(A) of this section, create a data file formatted in accordance with the standard adopted in § 170.205(a)(4) and (5) that demonstrates a valid implementation of each document template applicable to the certification criterion or criteria within the scope of the certificate sought. (B) For health IT certified to (g)(6)(i)(B) of this section, create a data file formatted in accordance with the standard adopted in § 170.205(a)(4) that demonstrates a valid implementation of each document template applicable to the certification criterion or criteria within the scope of the certificate sought. (iv) Vocabulary conformance. (A) For health IT certified to (g)(6)(i)(A) of this section, create a data file formatted in accordance with the standard adopted in § 170.205(a)(4) and (5) that demonstrates the required vocabulary standards (and value sets) are properly implemented. (B) For health IT certified to (g)(6)(i)(B) of this section, create a data file formatted in accordance with the standard adopted in § 170.205(a)(4) that demonstrates the required vocabulary standards (and value sets) are properly implemented. (v) Completeness verification. Create a data file for each of the applicable document templates referenced in paragraph (g)(6)(iii) of this section without the omission of any of the data included in either paragraph (g)(6)(i)(A) or (B) of this section, as applicable. * * * * * (9) * * * (i) * * * (A)(1) Respond to requests for patient data (based on an ID or other token) for all of the data classes expressed in the standards in § 170.213 at one time and return such data (according to the specified standards, where applicable) in a summary record formatted in accordance with § 170.205(a)(4) and (5) following the CCD document template, and as specified in paragraphs (g)(9)(i)(A)(3)(i) through (iii) of this section, or E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations (2) The Common Clinical Data Set in accordance with paragraphs (g)(9)(i)(A)(3)(i) through (iv) of this section for the period until May 2, 2022, and (3) The following data classes: (i) Assessment and plan of treatment. In accordance with the ‘‘Assessment and Plan Section (V2)’’ of the standards specified in § 170.205(a)(4); or in accordance with the ‘‘Assessment Section (V2)’’ and ‘‘Plan of Treatment Section (V2)’’ of the standards specified in § 170.205(a)(4). (ii) Goals. In accordance with the ‘‘Goals Section’’ of the standards specified in § 170.205(a)(4). (iii) Health concerns. In accordance with the ‘‘Health Concerns Section’’ of the standards specified in § 170.205(a)(4). (iv) Unique device identifier(s) for a patient’s implantable device(s). In accordance with the ‘‘Product Instance’’ in the ‘‘Procedure Activity Procedure Section’’ of the standards specified in § 170.205(a)(4). * * * * * (10) Standardized API for patient and population services. The following technical outcomes and conditions must be met through the demonstration of application programming interface technology. (i) Data response. (A) Respond to requests for a single patient’s data according to the standard adopted in § 170.215(a)(1) and implementation specification adopted in § 170.215(a)(2), including the mandatory capabilities described in ‘‘US Core Server CapabilityStatement,’’ for each of the data included in the standard adopted in § 170.213. All data elements indicated as ‘‘mandatory’’ and ‘‘must support’’ by the standards and implementation specifications must be supported. (B) Respond to requests for multiple patients’ data as a group according to the standard adopted in § 170.215(a)(1), and implementation specifications adopted in § 170.215(a)(2) and (4), for each of the data included in the standard adopted in § 170.213. All data elements indicated as ‘‘mandatory’’ and ‘‘must support’’ by the standards and implementation specifications must be supported. (ii) Supported search operations. (A) Respond to search requests for a single patient’s data consistent with the search criteria included in the implementation specification adopted in § 170.215(a)(2), specifically the mandatory capabilities described in ‘‘US Core Server CapabilityStatement.’’ (B) Respond to search requests for multiple patients’ data consistent with VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 the search criteria included in the implementation specification adopted in § 170.215(a)(4). (iii) Application registration. Enable an application to register with the Health IT Module’s ‘‘authorization server.’’ (iv) Secure connection. (A) Establish a secure and trusted connection with an application that requests data for patient and user scopes in accordance with the implementation specifications adopted in § 170.215(a)(2) and (3). (B) Establish a secure and trusted connection with an application that requests data for system scopes in accordance with the implementation specification adopted in § 170.215(a)(4). (v) Authentication and authorization—(A) Authentication and authorization for patient and user scopes—(1) First time connections—(i) Authentication and authorization must occur during the process of granting access to patient data in accordance with the implementation specification adopted in § 170.215(a)(3) and standard adopted in § 170.215(b). (ii) An application capable of storing a client secret must be issued a refresh token valid for a period of no less than three months. (2) Subsequent connections. (i) Access must be granted to patient data in accordance with the implementation specification adopted in § 170.215(a)(3) without requiring re-authorization and re-authentication when a valid refresh token is supplied by the application. (ii) An application capable of storing a client secret must be issued a new refresh token valid for a new period of no less than three months. (B) Authentication and authorization for system scopes. Authentication and authorization must occur during the process of granting an application access to patient data in accordance with the ‘‘SMART Backend Services: Authorization Guide’’ section of the implementation specification adopted in § 170.215(a)(4) and the application must be issued a valid access token. (vi) Patient authorization revocation. A Health IT Module’s authorization server must be able to revoke an authorized application’s access at a patient’s direction. (vii) Token introspection. A Health IT Module’s authorization server must be able to receive and validate tokens it has issued. (viii) Documentation. (A) The API(s) must include complete accompanying documentation that contains, at a minimum: (1) API syntax, function names, required and optional parameters supported and their data types, return PO 00000 Frm 00305 Fmt 4701 Sfmt 4700 25945 variables and their types/structures, exceptions and exception handling methods and their returns. (2) The software components and configurations that would be necessary for an application to implement in order to be able to successfully interact with the API and process its response(s). (3) All applicable technical requirements and attributes necessary for an application to be registered with a Health IT Module’s authorization server. (B) The documentation used to meet paragraph (g)(10)(viii)(A) of this section must be available via a publicly accessible hyperlink without any preconditions or additional steps. * * * * * ■ 16. Add subpart D to part 170 to read as follows: Subpart D—Conditions and Maintenance of Certification Requirements for Health IT Developers Sec. 170.400 Basis and scope. 170.401 Information blocking. 170.402 Assurances. 170.403 Communications. 170.404 Application programming interfaces. 170.405 Real world testing. 170.406 Attestations. Subpart D—Conditions and Maintenance of Certification Requirements for Health IT Developers § 170.400 Basis and scope. This subpart implements section 3001(c)(5)(D) of the Public Health Service Act by setting forth certain Conditions and Maintenance of Certification requirements for health IT developers participating in the ONC Health IT Certification Program. § 170.401 Information blocking. (a) Condition of Certification requirement. A health IT developer must not take any action that constitutes information blocking as defined in 42 U.S.C. 300jj–52 and § 171.103 on or after November 2, 2020. (b) [Reserved] § 170.402 Assurances. (a) Condition of Certification requirement. (1) A health IT developer must provide assurances satisfactory to the Secretary that the health IT developer will not take any action that constitutes information blocking as defined in 42 U.S.C. 300jj–52 and § 171.103 on and after November 2, 2020, unless for legitimate purposes as specified by the Secretary; or any other action that may inhibit the appropriate exchange, access, and use of electronic health information. E:\FR\FM\01MYR3.SGM 01MYR3 25946 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations (2) A health IT developer must ensure that its health IT certified under the ONC Health IT Certification Program conforms to the full scope of the certification criteria. (3) A health IT developer must not take any action that could interfere with a user’s ability to access or use certified capabilities for any purpose within the full scope of the technology’s certification. (4) A health IT developer of a certified Health IT Module that is part of a heath IT product which electronically stores EHI must certify to the certification criterion in § 170.315(b)(10). (b) Maintenance of Certification requirements. (1) A health IT developer must retain all records and information necessary to demonstrate initial and ongoing compliance with the requirements of the ONC Health IT Certification Program for: (i) A period of 10 years beginning from the date a developer’s Health IT Module(s) is first certified under the Program; or (ii) If for a shorter period of time, a period of 3 years from the effective date that removes all of the certification criteria to which the developer’s health IT is certified from the Code of Federal Regulations. (2)(i) Within 36 months of May 1, 2020, a health IT developer that must comply with the requirements of paragraph (a)(4) of this section must provide all of its customers of certified health IT with the health IT certified to the certification criterion in § 170.315(b)(10). (ii) On and after 36 months from May 1, 2020, a health IT developer that must comply with the requirements of paragraph (a)(4) of this section must provide all of its customers of certified health IT with the health IT certified to the certification criterion in § 170.315(b)(10). § 170.403 Communications. (a) Condition of Certification requirements. (1) A health IT developer may not prohibit or restrict any communication regarding— (i) The usability of its health IT; (ii) The interoperability of its health IT; (iii) The security of its health IT; (iv) Relevant information regarding users’ experiences when using its health IT; (v) The business practices of developers of health IT related to exchanging electronic health information; and (vi) The manner in which a user of the health IT has used such technology. (2) A health IT developer must not engage in any practice that prohibits or VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 restricts a communication regarding the subject matters enumerated in paragraph (a)(1) of this section, unless the practice is specifically permitted by this paragraph and complies with all applicable requirements of this paragraph. (i) Unqualified protection for certain communications. A health IT developer must not prohibit or restrict any person or entity from communicating any information whatsoever (including proprietary information, confidential information, and intellectual property) when the communication is about one or more of the subject matters enumerated in paragraph (a)(1) of this section and is made for any of the following purposes: (A) Making a disclosure required by law; (B) Communicating information about adverse events, hazards, and other unsafe conditions to government agencies, health care accreditation organizations, and patient safety organizations; (C) Communicating information about cybersecurity threats and incidents to government agencies; (D) Communicating information about information blocking and other unlawful practices to government agencies; or (E) Communicating information about a health IT developer’s failure to comply with a Condition of Certification requirement, or with any other requirement of this part, to ONC or an ONC–ACB. (ii) Permitted prohibitions and restrictions. For communications about one or more of the subject matters enumerated in paragraph (a)(1) of this section that is not entitled to unqualified protection under paragraph (a)(2)(i) of this section, a health IT developer may prohibit or restrict communications only as expressly permitted by paragraphs (a)(2)(ii)(A) through (E) of this section. (A) Developer employees and contractors. (1) A health IT developer may prohibit or restrict the communications of the developer’s employees or contractors. (2) A self-developer must not prohibit or restrict communications of users of their health IT who are also employees or contractors. (B) Non-user-facing aspects of health IT. A health IT developer may prohibit or restrict communications that disclose information about non-user-facing aspects of the developer’s health IT. (C) Intellectual property. A health IT developer may prohibit or restrict communications that involve the use or disclosure of intellectual property PO 00000 Frm 00306 Fmt 4701 Sfmt 4700 existing in the developer’s health IT (including third-party intellectual property), provided that any prohibition or restriction imposed by a developer must be no broader than necessary to protect the developer’s legitimate intellectual property interests and consistent with all other requirements of paragraph (a)(2)(ii) of this section. A restriction or prohibition is deemed broader than necessary and inconsistent with the requirements of paragraph (a)(2)(ii) of this section if it would restrict or preclude a public display of a portion of a work subject to copyright protection (without regard to whether the copyright is registered) that would reasonably constitute a ‘‘fair use’’ of that work. (D) Screenshots and video. A health IT developer may require persons who communicate screenshots or video to— (1) Not alter the screenshots or video, except to annotate the screenshots or video or resize the screenshots or video; (2) Limit the sharing of screenshots to the relevant number of screenshots needed to communicate about the health IT regarding one or more of the six subject areas in paragraph (a)(1) of this section; and (3) Limit the sharing of video to: (i) The relevant amount of video needed to communicate about the health IT regarding one or more of the six subject areas in paragraph (a)(1) of this section; and (ii) Only videos that address temporal matters that cannot be communicated through screenshots or other forms of communication. (E) Pre-market testing and development. A health IT developer may prohibit or restrict communications that disclose information or knowledge solely acquired in the course of participating in pre-market product development and testing activities carried out for the benefit of the developer or for the joint benefit of the developer and communicator. A developer must not, once the subject health IT is released or marketed for purposes other than product development and testing, and subject to the permitted prohibitions and restrictions described in paragraph (a)(2)(ii) of this section, prohibit or restrict communications about matters enumerated in paragraph (a)(1) of this section. (b) Maintenance of Certification requirements—(1) Notice. Health IT developers must issue a written notice to all customers and those with which it has contracts or agreements containing provisions that contravene paragraph (a) of this section annually, beginning in calendar year 2020, until E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations paragraph (b)(2)(ii) of this section is fulfilled, stating that any communication or contract provision that contravenes paragraph (a) of this section will not be enforced by the health IT developer. (2) Contracts and agreements. (i) A health IT developer must not establish, renew, or enforce any contract or agreement that contravenes paragraph (a) of this section. (ii) If a health IT developer has a contract or agreement in existence as of November 2, 2020, that contravenes paragraph (a) of this section, then the developer must amend the contract or agreement to remove or void the contractual provision that contravenes paragraph (a) of this section whenever the contract is next modified for other reasons or renewed. (c) Communication, defined. ‘‘Communication’’ as used in this section means any communication, irrespective of the form or medium. The term includes visual communications, such as screenshots and video. § 170.404 Application programming interfaces. The following Condition and Maintenance of Certification requirements apply to developers of Health IT Modules certified to any of the certification criteria adopted in § 170.315(g)(7) through (10). (a) Condition of certification requirements—(1) General. A Certified API Developer must publish APIs and allow electronic health information from such technology to be accessed, exchanged, and used without special effort through the use of APIs or successor technology or standards, as provided for under applicable law, including providing access to all data elements of a patient’s electronic health record to the extent permissible under applicable privacy laws. (2) Transparency conditions—(i) Complete business and technical documentation. A Certified API Developer must publish complete business and technical documentation, including the documentation described in paragraph (a)(2)(ii) of this section, via a publicly accessible hyperlink that allows any person to directly access the information without any preconditions or additional steps. (ii) Terms and conditions—(A) Material information. A Certified API Developer must publish all terms and conditions for its certified API technology, including any fees, restrictions, limitations, obligations, registration process requirements, or other similar requirements that would be: VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 (1) Needed to develop software applications to interact with the certified API technology; (2) Needed to distribute, deploy, and enable the use of software applications in production environments that use the certified API technology; (3) Needed to use software applications, including to access, exchange, and use electronic health information by means of the certified API technology; (4) Needed to use any electronic health information obtained by means of the certified API technology; (5) Used to verify the authenticity of API Users; and (6) Used to register software applications. (B) API fees. Any and all fees charged by a Certified API Developer for the use of its certified API technology must be described in detailed, plain language. The description of the fees must include all material information, including but not limited to: (1) The persons or classes of persons to whom the fee applies; (2) The circumstances in which the fee applies; and (3) The amount of the fee, which for variable fees must include the specific variable(s) and methodology(ies) that will be used to calculate the fee. (3) Fees conditions—(i) General conditions—(A) All fees. All fees related to certified API technology not otherwise permitted by this section are prohibited from being imposed by a Certified API Developer. The permitted fees in paragraphs (a)(3)(ii) and (iv) of this section may include fees that result in a reasonable profit margin in accordance with § 171.302. (B) Permitted fees requirements. For all permitted fees, a Certified API Developer must: (1) Ensure that such fees are based on objective and verifiable criteria that are uniformly applied to all similarly situated API Information Sources and API Users; (2) Ensure that such fees imposed on API Information Sources are reasonably related to the Certified API Developer’s costs to supply certified API technology to, and if applicable, support certified API technology for, API Information Sources; (3) Ensure that such fees to supply and, if applicable, support certified API technology are reasonably allocated among all similarly situated API Information Sources; and (4) Ensure that such fees are not based on whether API Information Sources or API Users are competitors, potential competitors, or will be using the certified API technology in a way that PO 00000 Frm 00307 Fmt 4701 Sfmt 4700 25947 facilitates competition with the Certified API Developer. (C) Prohibited fees. A Certified API Developer is prohibited from charging fees for the following: (1) Costs associated with intangible assets other than actual development or acquisition costs of such assets; (2) Opportunity costs unrelated to the access, exchange, or use of electronic health information; and (3) The permitted fees in this section cannot include any costs that led to the creation of intellectual property if the actor charged a royalty for that intellectual property pursuant to § 171.303 and that royalty included the development costs for the creation of the intellectual property. (D) Record-keeping requirements. A Certified API Developer must keep for inspection detailed records of any fees charged with respect to the certified API technology, the methodology(ies) used to calculate such fees, and the specific costs to which such fees are attributed. (ii) Permitted fee—development, deployment, and upgrades. A Certified API Developer is permitted to charge fees to an API Information Source to recover the costs reasonably incurred by the Certified API Developer to develop, deploy, and upgrade certified API technology. (iii) Permitted fee—recovering API usage costs. A Certified API Developer is permitted to charge fees to an API Information Source related to the use of certified API technology. The fees must be limited to the recovery of incremental costs reasonably incurred by the Certified API Developer when it hosts certified API technology on behalf of the API Information Source. (iv) Permitted fee—value-added services. A Certified API Developer is permitted to charge fees to an API User for value-added services related to certified API technology, so long as such services are not necessary to efficiently and effectively develop and deploy production-ready software that interacts with certified API technology. (4) Openness and pro-competitive conditions; general condition. A Certified API Developer must grant an API Information Source the independent ability to permit an API User to interact with the certified API technology deployed by the API Information Source. (i) Non-discrimination. (A) A Certified API Developer must provide certified API technology to an API Information Source on terms that are no less favorable than it provides to itself and its own customers, suppliers, partners, and other persons with whom it has a business relationship. E:\FR\FM\01MYR3.SGM 01MYR3 25948 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations (B) The terms on which a Certified API Developer provides certified API technology must be based on objective and verifiable criteria that are uniformly applied to all substantially similar or similarly situated classes of persons and requests. (C) A Certified API Developer must not offer different terms or services based on: (1) Whether a competitive relationship exists or would be created; (2) The revenue or other value that another party may receive from using the API technology. (ii) Rights to access and use certified API technology—(A) Rights that must be granted. A Certified API Developer must have and, upon request, must grant to API Information Sources and API Users all rights that may be reasonably necessary to: (1) Access and use the Certified API Developer’s certified API technology in a production environment; (2) Develop products and services that are designed to interact with the Certified API Developer’s certified API technology; and (3) Market, offer, and distribute products and services associated with the Certified API Developer’s certified API technology. (B) Prohibited conduct. A Certified API Developer is prohibited from conditioning the receipt of the rights described in paragraph (a)(4)(ii)(A) of this section on: (1) Receiving a fee, including but not limited to a license fee, royalty, or revenue-sharing arrangement; (2) Agreeing to not compete with the Certified API Developer in any product, service, or market; (3) Agreeing to deal exclusively with the Certified API Developer in any product, service, or market; (4) Obtaining additional licenses, products, or services that are not related to or can be unbundled from the certified API technology; (5) Licensing, granting, assigning, or transferring any intellectual property to the Certified API Developer; (6) Meeting any Certified API Developer-specific testing or certification requirements; and. (7) Providing the Certified API Developer or its technology with reciprocal access to application data. (iii) Service and support obligations. A Certified API Developer must provide all support and other services reasonably necessary to enable the effective development, deployment, and use of certified API technology by API Information Sources and API Users in production environments. (A) Changes and updates to certified API technology. A Certified API VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 Developer must make reasonable efforts to maintain the compatibility of its certified API technology and to otherwise avoid disrupting the use of certified API technology in production environments. (B) Changes to terms and conditions. Except as exigent circumstances require, prior to making changes to its certified API technology or to the terms and conditions thereof, a Certified API Developer must provide notice and a reasonable opportunity for API Information Sources and API Users to update their applications to preserve compatibility with certified API technology and to comply with applicable terms and conditions. (b) Maintenance of certification requirements—(1) Authenticity verification and registration for production use. The following apply to a Certified API Developer with a Health IT Module certified to the certification criterion adopted in § 170.315(g)(10): (i) Authenticity verification. A Certified API Developer is permitted to institute a process to verify the authenticity of API Users so long as such process is objective and the same for all API Users and completed within ten business days of receipt of an API User’s request to register their software application for use with the Certified API Developer’s Health IT Module certified to § 170.315(g)(10). (ii) Registration for production use. A Certified API Developer must register and enable all applications for production use within five business days of completing its verification of an API User’s authenticity, pursuant to paragraph (b)(1)(i) of this section. (2) Service base URL publication. A Certified API Developer must publish the service base URLs for all Health IT Modules certified to § 170.315(g)(10) that can be used by patients to access their electronic health information. The Certified API Developer must publicly publish the service base URLs: (i) For all of its customers regardless of whether the Health IT Modules certified to § 170.315(g)(10) are centrally managed by the Certified API Developer or locally deployed by an API Information Source; and (ii) In a machine-readable format at no charge. (3) Rollout of (g)(10)-certified APIs. A Certified API Developer with certified API technology previously certified to the certification criterion in § 170.315(g)(8) must provide all API Information Sources with such certified API technology deployed with certified API technology certified to the certification criterion in § 170.315(g)(10) by no later than May 2, 2022. PO 00000 Frm 00308 Fmt 4701 Sfmt 4700 (4) Compliance for existing certified API technology. By no later than November 2, 2020, a Certified API Developer with Health IT Module(s) certified to the certification criteria in § 170.315(g)(7), (8), or (9) must comply with paragraph (a) of this section, including revisions to their existing business and technical API documentation and make such documentation available via a publicly accessible hyperlink that allows any person to directly access the information without any preconditions or additional steps. (c) Definitions. The following definitions apply to this section: API Information Source means an organization that deploys certified API technology created by a ‘‘Certified API Developer;’’ API User means a person or entity that creates or uses software applications that interact with the ‘‘certified API technology’’ developed by a ‘‘Certified API Developer’’ and deployed by an ‘‘API Information Source;’’ Certified API Developer means a health IT developer that creates the ‘‘certified API technology’’ that is certified to any of the certification criteria adopted in § 170.315(g)(7) through (10); and Certified API technology means the capabilities of Health IT Modules that are certified to any of the API-focused certification criteria adopted in § 170.315(g)(7) through (10). § 170.405 Real world testing. (a) Condition of Certification requirement. A health IT developer with Health IT Module(s) certified to any one or more 2015 Edition certification criteria in § 170.315(b), (c)(1) through (3), (e)(1), (f), (g)(7) through (10), and (h) must successfully test the real world use of those Health IT Module(s) for interoperability (as defined in 42 U.S.C.300jj(9) and § 170.102) in the type of setting in which such Health IT Module(s) would be/is marketed. (b) Maintenance of Certification requirements—(1) Real world testing plan submission. A health IT developer with Health IT Module(s) certified to any one or more of the criteria referenced in paragraph (a) of this section must submit to its ONC–ACB an annual real world testing plan addressing each of those certified Health IT Modules by a date determined by the ONC–ACB that enables the ONC–ACB to publish a publicly available hyperlink to the plan on CHPL no later than December 15 of each calendar year. (i) The plan must be approved by a health IT developer authorized representative capable of binding the E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations health IT developer for execution of the plan and include the representative’s contact information. (ii) The plan must include all health IT certified to any one or more of the criteria referenced in paragraph (a) of this section as of August 31 of the year in which the plan is submitted, and address the real world testing to be conducted in the calendar year immediately following plan submission. (iii) The plan must address the following for each of the certification criteria identified in paragraph (a) of this section that are included in each Health IT Module’s scope of certification: (A) The testing method(s)/ methodology(ies) that will be used to demonstrate real world interoperability and conformance to the full scope of the certification criterion’s requirements, including scenario- and use casefocused testing; (B) The care setting(s) that will be tested for real world interoperability and an explanation for the health IT developer’s choice of care setting(s) to test; (C) For any standards and implementation specifications referenced by the criterion that the developer has chosen to certify to National Coordinator-approved newer versions pursuant to paragraph (b)(8) or (9) of this section, a description of how the developer will test and demonstrate conformance to all requirements of the criterion using all versions of the adopted standards to which each Health IT Module was certified as of August 31 of the year in which the real world testing plan is due. (D) A schedule of key real world testing milestones; (E) A description of the expected outcomes of real world testing; (F) At least one measurement/metric associated with the real world testing; and (G) A justification for the health IT developer’s real world testing approach. (2) Real world testing results reporting. (i) If in the course of conducting real world testing the developer discovers one or more nonconformities with the full scope of any certification criterion under the Program, the developer must report that non-conformity to the ONC–ACB within 30 days. (ii) For real world testing activities conducted during the immediately preceding calendar year, a health IT developer must submit to its ONC–ACB an annual real world testing results report addressing each of its certified Health IT Modules that include certification criteria referenced in VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 paragraph (a) of this section by a date determined by the ONC–ACB that enables the ONC–ACB to publish a publicly available hyperlink to the results report on CHPL no later than March 15 of each calendar year. The real world testing results must report the following for each of the certification criteria identified in paragraph (a) of this section that are included in the Health IT Module’s scope of certification: (A) The method(s) that was used to demonstrate real world interoperability; (B) The care setting(s) that was tested for real world interoperability; (C) The voluntary updates to standards and implementation specifications that the National Coordinator has approved through the Standards Version Advancement Process; (D) A list of the key milestones met during real world testing; (E) The outcomes of real world testing including a description of any challenges encountered during real world testing; and (F) At least one measurement/metric associated with the real world testing. (3) USCDI Updates for C–CDA. A health IT developer with health IT certified to § 170.315(b)(1), (b)(2), (e)(1), (g)(6), (f)(5), and/or (g)(9) on May 1, 2020, must: (i) Update their certified health IT to be compliant with the revised versions of these criteria adopted in this final rule; and (ii) Provide its customers of the previously certified health IT with certified health IT that meets paragraph (b)(3)(i) of this section by May 2, 2022. (4) C–CDA Companion Guide Updates. A health IT developer with health IT certified to § 170.315(b)(1), (b)(2), (b)(9), (e)(1), (g)(6), and/or (g)(9) prior to May 1, 2020, must: (i) Update their certified health IT to be compliant with the revised versions of the Program criteria in the 2015 Edition; and (ii) Provide its customers of the previously certified health IT with certified health IT that meets paragraph (b)(4)(i) of this section by May 2, 2022. (5) Electronic prescribing. A health IT developer with health IT certified to § 170.315(b)(3) prior to November 2, 2020, must: (i) Update their certified health IT to be compliant with the revised versions of this criteria adopted in § 170.315(b)(3)(ii); and (ii) Provide its customers of the previously certified health IT with certified health IT that meets paragraph (b)(5)(i) of this section by May 2, 2022 (6) Security tags. A health IT developer with health IT certified to PO 00000 Frm 00309 Fmt 4701 Sfmt 4700 25949 § 170.315(b)(7) and/or § 170.315(b)(8) prior to May 1, 2020, must: (i) Update their certified health IT to be compliant with the revised versions of the criteria adopted in § 170.315(b)(7) and/or the revised versions of the criteria adopted in § 170.315(b)(8); and (ii) Provide its customers of the previously certified health IT with certified health IT that meets paragraph (b)(6)(i) of this section by May 2, 2022. (7) ASTM updates. A health IT developer with health IT certified to § 170.315(d)(2), (3), and/or (d)(10) prior to May 1, 2020, must: (i) Update their certified health IT to be compliant with § 170.210(e)(1) and the standard specified in § 170.210(h); and (ii) Provide its customers of the previously certified health IT with certified health IT that meets paragraph (b)(7)(i) of this section by May 2, 2022. (8) Standards Version Advancement Process—voluntary updates of certified health IT to newer versions of standards and implementation specifications. A health IT developer subject to this paragraph (b) is permitted to update Health IT Module(s) certified to any one or more of the certification criteria referenced in paragraph (a) of this section to a newer version of any adopted standard or implementation specification included in the criterion, provided that newer version is approved by the National Coordinator for use in certifications issued under the ONC Health IT Certification Program. A developer that pursues such updates to its certified Health IT Module(s) must: (i) Provide advance notice to all affected customers and its ONC–ACB— (A) Expressing its intent to update the certified Health IT Module(s) to the National Coordinator-approved advanced version of the standard implementation specification; (B) The developer’s expectations for how the update(s) will affect real world interoperability for the Health IT Module(s); (C) Whether the developer intends to continue to support the certificate(s) for the existing certified Health IT Module(s) version(s) for some period of time and how long or if the existing certified Health IT Module(s) version(s) will be deprecated; and (ii) Successfully demonstrate conformance with approved more recent versions of the standard(s) or implementation specification(s) included in each certification criterion under which the developer chooses to update its certified Health IT Module(s). (iii) Maintain the updated certified Health IT Module(s) in full conformance E:\FR\FM\01MYR3.SGM 01MYR3 25950 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations with all applicable Program requirements. (9) Standards Version Advancement Process—voluntary certification to newer versions of standards and implementation specifications. A Health IT developer is permitted to seek certification for its Health IT Module(s) to any one or more of the certification criteria referenced in paragraph (a) of this section using a newer version of any adopted standard(s) or implementation specification(s) included in the criterion without first obtaining certification to the version of that adopted standard or implementation specification that is incorporated by reference in § 170.299, provided that the newer version is approved by the National Coordinator for use in certifications issued under the ONC Health IT Certification Program. Developers may, for each standard and implementation specification included in each criterion, choose on an itemized basis whether to seek certification to the version incorporated by reference in § 170.299, or to one or more newer version(s) approved by the National Coordinator for use in Health IT Module certifications issued pursuant to section 3001(c)(5) of the Public Health Service Act, or to both. § 170.406 Attestations. (a) Condition of Certification requirement. A health IT developer, or its authorized representative that is capable of binding the health IT developer, must provide the Secretary an attestation of compliance with the following Conditions and Maintenance of Certification requirements: (1) Section 170.401; (2) Section 170.402, but only for § 170.402(a)(4) and (b)(2) if the health IT developer certified a Health IT Module(s) that is part of a health IT product which can store electronic health information; (3) Section 170.403; (4) Section 170.404 if the health IT developer has a Health IT Module(s) certified to any of the certification criteria adopted in § 170.315(g)(7) through (10); and such health IT developer must also ensure that health IT allows for health information to be exchanged, accessed, and used, in the manner described in § 170.404; and (5) Section 170.405 if a health IT developer has a Health IT Module(s) certified to any one or more 2015 Edition certification criteria in § 170.315(b), (c)(1) through (3), (e)(1), (f), (g)(7) through (10), and (h). (b) Maintenance of Certification requirement. (1) A health IT developer, or its authorized representative that is VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 capable of binding the health IT developer, must provide the attestation specified in paragraph (a) of this section semiannually for any Health IT Modules that have or have had an active certification at any time under the ONC Health IT Certification Program during the prior six months. (2) [Reserved]. Subpart E—ONC Health IT Certification Program § 170.501 [Amended] 17. Amend § 170.501: a. In paragraph (a), by removing the phrase ‘‘Complete EHRs,’’; ■ b. In paragraph (b), by removing the phrase ‘‘Complete EHRs and’’; and ■ c. By removing and reserving paragraph (c). ■ ■ § 170.502 [Amended] 18. Amend § 170.502: a. In the definition of ‘‘Deployment site’’, by removing the phrase ‘‘Complete EHR,’’; ■ b. In the definition of ‘‘Development site’’, by removing the phrase ‘‘Complete EHR,’’; ■ c. In the introductory text to the definition of ‘‘Gap certification’’, by removing the phrase ‘‘Complete EHR or’’; ■ d. By removing the definition of ‘‘ONC-Approved Accreditor or ONC– AA’’; ■ e. In the definition of ‘‘ONCAuthorized Certification Body or ONC– ACB’’, by removing the phrase ‘‘Complete EHRs,’’; and ■ f. In the definition of ‘‘ONCAuthorized Testing Lab or ONC–ATL,’’ by removing the phrase ‘‘Complete EHRs and’’. ■ ■ §§ 170.503 and 170.504 Reserved] [Removed and 19. Remove and reserve §§ 170.503 and 170.504. ■ 20. Revise § 170.505 to read as follows: ■ § 170.505 Correspondence. (a) Correspondence and communication with ONC or the National Coordinator shall be conducted by email, unless otherwise necessary or specified. (1) Consideration for providing notice beyond email, such as by regular, express, or certified mail, will be based on, but not limited to, whether: The party requests use of correspondence beyond email; the party has responded via email to our communications; we have sufficient information from the party to ensure appropriate delivery of any other method of notice; and the PO 00000 Frm 00310 Fmt 4701 Sfmt 4700 matter involves an alleged violation within ONC’s purview under § 170.580 that indicates a serious violation under the ONC Health IT Certification Program with potential consequences of suspension, certification termination, or a certification ban. (2) The official date of receipt of any email between ONC or the National Coordinator and an applicant for ONC– ACB status, an applicant for ONC–ATL status, an ONC–ACB, an ONC–ATL, health IT developer, or a party to any proceeding under this subpart is the date on which the email was sent. (b) In circumstances where it is necessary for an applicant for ONC– ACB status, an applicant for ONC–ATL status, an ONC–ACB, an ONC–ATL, health IT developer, or a party to any proceeding under this subpart to correspond or communicate with ONC or the National Coordinator by regular, express, or certified mail, the official date of receipt for all parties will be the date of the delivery confirmation to the address on record. § 170.510 [Amended] 21. Amend § 170.510 by removing paragraph (a) and redesignating paragraphs (b) and (c) as paragraphs (a) and (b). ■ 22. Amend § 170.520 by revising paragraph (a)(3) to read as follows: ■ § 170.520 Application. (a) * * * (3) Documentation that confirms that the applicant has been accredited to ISO/IEC 17065 (for availability, see § 170.599), with an appropriate scope, by any accreditation body that is a signatory to the Multilateral Recognition Arrangement (MLA) with the International Accreditation Forum (IAF). * * * * * ■ 23. Amend § 170.523: ■ a. By revising paragraph (a); ■ b. By adding subject headings to paragraphs (b), (c), (d) introductory text, and (e); ■ c. In paragraph (f) introductory text, by adding a subject heading and removing the phrase, ‘‘Complete EHRs,’’ and; ■ d. By removing and reserving paragraph (f)(2); ■ e. Revising paragraphs (g) and (h); ■ f. Adding subject headings to paragraphs (i) introductory text and (j) introductory text; ■ g. In paragraph (k) introductory text, by adding a subject heading and removing the phrase ‘‘Complete EHRs and’’; ■ h. In paragraph (k)(1), by removing the phrase ‘‘Complete EHR or’’; E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations i. By revising paragraphs (k)(1)(ii) and (iii); ■ j. By removing and reserving paragraphs (k)(1)(iv)(B) and (C) and (k)(2) and (3); ■ k. By revising paragraph (k)(4); ■ l. By adding a subject heading to paragraph (l); ■ m. By revising paragraph (m); ■ n. In paragraph (o), by adding a subject heading and removing the phrase ‘‘Complete EHR or’’; and ■ o. By adding paragraphs (p) through (t). The revisions and additions read as follows: ■ § 170.523 Principles of proper conduct for ONC–ACBs. * * * * * (a) Accreditation. Maintain its accreditation in good standing to ISO/ IEC 17065 (incorporated by reference in § 170.599). (b) Mandatory training. * * * * * * * * (c) Training program. * * * * * * * * (d) Reporting. * * * * * * * * (e) Onsite observation. * * * (f) Certified product listing. * * * * * * * * (g) Records retention. (1) Retain all records related to the certification of Complete EHRs and Health IT Modules to an edition of certification criteria beginning with the codification of an edition of certification criteria in the Code of Federal Regulations through a minimum of 3 years from the effective date that removes the applicable edition from the Code of Federal Regulations; and (2) Make the records available to HHS upon request during the retention period described in paragraph (g)(1) of this section; (h) Certification decision. Only certify Health IT Modules that have been: (1) Tested, using test tools and test procedures approved by the National Coordinator, by an: (i) ONC–ATL; (ii) ONC–ATL, National Voluntary Laboratory Accreditation Programaccredited testing laboratory under the ONC Health IT Certification Program, and/or an ONC–ATCB for the purposes of performing gap certification; or (2) Evaluated by it for compliance with a conformance method approved by the National Coordinator. (i) Surveillance. * * * * * * * * (j) Refunds. * * * * * * * * (k) Disclosures. * * * VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 (1) * * * (ii) For a Health IT Module certified to the 2015 Edition health IT certification criteria, the information specified by paragraphs (f)(1)(i), (vi) through (viii), (xv), and (xvi) of this section as applicable for the specific Health IT Module. (iii) In plain language, a detailed description of all known material information concerning additional types of costs or fees that a user may be required to pay to implement or use the Health IT Module’s capabilities, whether to meet provisions of HHS programs requiring the use of certified health IT or to achieve any other use within the scope of the health IT’s certification. The additional types of costs or fees required to be disclosed include but are not limited to costs or fees (whether fixed, recurring, transaction-based, or otherwise) imposed by a health IT developer (or any third party from whom the developer purchases, licenses, or obtains any technology, products, or services in connection with its certified health IT) to purchase, license, implement, maintain, upgrade, use, or otherwise enable and support the use of capabilities to which health IT is certified; or in connection with any data generated in the course of using any capability to which health IT is certified. * * * * * (4) A certification issued to a Health IT Module based solely on the applicable certification criteria adopted by the ONC Health IT Certification Program must be separate and distinct from any other certification(s) based on other criteria or requirements. (l) Certification and Design Mark. * * * (m) Adaptations and updates. On a quarterly basis each calendar year, obtain a record of: (1) All adaptations of certified Health IT Modules; (2) All updates made to certified Health IT Modules affecting the capabilities in certification criteria to which the ‘‘safety-enhanced design’’ criteria apply; (3) All uses cases for § 170.315(d)(13); (4) All updates made to certified Health IT Modules in compliance with § 170.405(b)(3); and (5) All updates to certified Health IT Modules and all certifications of Health IT Modules issued including voluntary use of newer standards versions per § 170.405(b)(8) or (9). Record of these updates may be obtained by aggregation of ONC–ACB documentation of certification activity. * * * * * PO 00000 Frm 00311 Fmt 4701 Sfmt 4700 25951 (o) Scope reduction. * * * (p) Real world testing. (1) Review and confirm that applicable health IT developers submit real world testing plans in accordance with § 170.405(b)(1). (2) Review and confirm that applicable health IT developers submit real world testing results in accordance with § 170.405(b)(2). (3) Submit real world testing plans by December 15 of each calendar year and results by March 15 of each calendar year to ONC for public availability. (q) Attestations. Review and submit health IT developer Conditions and Maintenance of Certification requirements attestations made in accordance with § 170.406 to ONC for public availability. (r) Test results from ONC–ATLs. Accept test results from any ONC–ATL that is: (1) In good standing under the ONC Health IT Certification Program, and (2) Compliant with its ISO/IEC 17025 accreditation requirements as required by 170.524(a). (s) Information for direct review. Report to ONC, no later than a week after becoming aware of, any information that could inform whether ONC should exercise direct review under § 170.580(a). (t) Health IT Module voluntary standards and implementation specifications updates notices. Ensure health IT developers opting to take advantage of the flexibility for voluntary updates of standards and implementation specifications in certified Health IT Modules per § 170.405(b)(8) provide timely advance written notice to the ONC–ACB and all affected customers. (1) Maintain a record of the date of issuance and the content of developers’ § 170.405(b)(8) notices; and (2) Timely post content or make publicly accessible via the CHPL each § 170.405(b)(8) notice received, publicly on the CHPL attributed to the certified Health IT Module(s) to which it applies. ■ 24. Amend § 170.524: ■ a. By adding subject headings to paragraphs (a) through (c), (d) introductory text, and (e); ■ b. By revising paragraph (f); ■ c. By adding a subject heading to paragraph (g) and paragraph (h) introductory text; and ■ d. In paragraph (h)(3), by removing the phrase ‘‘Complete EHRs and/or’’. The additions and revisions read as follows: § 170.524 Principles of proper conduct for ONC–ATLs. * E:\FR\FM\01MYR3.SGM * * 01MYR3 * * 25952 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations (a) Accreditation. * * * (b) Mandatory training. * * * (c) Training program. * * * (d) Reporting. * * * * * * * * (e) Onsite observation. * * * (f) Records retention. (1) Retain all records related to the testing of Complete EHRs and/or Health IT Modules to an edition of certification criteria beginning with the codification of an edition of certification criteria in the Code of Federal Regulations through a minimum of three years from the effective date that removes the applicable edition from the Code of Federal Regulations; and (2) Make the records available to HHS upon request during the retention period described in paragraph (f)(1) of this section; (g) Approved testing methods. * * * (h) Refunds. * * * * * * * * § 170.545 [Removed and Reserved] 25. Remove and reserve § 170.545. 26. Amend § 170.550 by: a. Adding subject headings to paragraphs (a),(b), and (d), and adding paragraph (e); ■ b. Removing and reserving paragraph (f); ■ c. Adding a subject heading to paragraph (g) introductory text and adding paragraph (g)(5); ■ d. Revising paragraph (h); and ■ e. Adding paragraphs (l) and (m). The additions and revisions read as follows: ■ ■ ■ § 170.550 Health IT Module certification. (a) Certification scope. * * * (b) Health IT product scope options. * * * * * * * * (d) Upgrades and enhancements. * * * (e) Standards updates. ONC–ACBs must provide an option for certification of Health IT Modules consistent with § 171.405(b)(7) or (8) to any one or more of the criteria referenced in § 170.405(a) based on newer versions of standards included in the criteria which have been approved by the National Coordinator for use in certification. * * * * * (g) Health IT module dependent criteria. * * * (5) Section 170.315(b)(10) when a health IT developer presents a Health IT Module for certification that can store electronic health information at the time of certification by the product, of which the Health IT Module is a part. (h) Privacy and security certification framework—(1) General rule. When VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 certifying a Health IT Module to the 2015 Edition health IT certification criteria, an ONC–ACB can only issue a certification to a Health IT Module if the privacy and security certification criteria in paragraphs (h)(3)(i) through (ix) of this section have also been met (and are included within the scope of the certification). (2) Testing. In order to be issued a certification, a Health IT Module would only need to be tested once to each applicable privacy and security criterion in paragraphs (h)(3)(i) through (ix) of this section so long as the health IT developer attests that such privacy and security capabilities apply to the full scope of capabilities included in the requested certification, except for the following: (i) A Health IT Module presented for certification to § 170.315(e)(1) must be separately tested to § 170.315(d)(9); and (ii) A Health IT Module presented for certification to § 170.315(e)(2) must be separately tested to § 170.315(d)(9). (3) Applicability. (i) Section 170.315(a)(1) through (3), (5), (12), (14), and (15) are also certified to the certification criteria specified in § 170.315(d)(1) through (7), (d)(12), and (13). (ii) Section 170.315(a)(4), (9), (10), and (13) are also certified to the certification criteria specified in § 170.315(d)(1) through (3), and (d)(5) through (7), (d)(12), and (13). (iii) Section 170.315(b)(1) through (3) and (6) through (9) are also certified to the certification criteria specified in § 170.315(d)(1) through (3) and (d)(5) through (8), (12), and (13); (iv) Section 170.315(c) is also certified to the certification criteria specified in § 170.315(d)(1), (d)(2)(i)(A), (B), (d)(2)(ii) through (v), (d)(3), (5), (12), and (13); (v) Section 170.315(e)(1) is also certified to the certification criteria specified in § 170.315(d)(1) through (3), (5), (7), (9), (12), and (13); (vi) Section 170.315(e)(2) and (3) is also certified to the certification criteria specified in § 170.315(d)(1), (d)(2)(i)(A) and (B), (d)(2)(ii) through (v), (d)(3), (5), (9), (12), and (13); (vii) Section 170.315(f) is also certified to the certification criteria specified in § 170.315(d)(1) through (3), (7), (12), and (13); (viii) Section 170.315(g)(7) through (10) is also certified to the certification criteria specified in § 170.315(d)(1), (9), (12), and (13); and (d)(2)(i)(A) and (B), (d)(2)(ii) through (v), or (d)(10); (ix) Section 170.315(h) is also certified to the certification criteria specified in § 170.315(d)(1), (d)(2)(i)(A) PO 00000 Frm 00312 Fmt 4701 Sfmt 4700 and (B), (d)(2)(ii) through (v), (d)(3), (12), and (13); and * * * * * (l) Conditions of certification attestations. Ensure that the health IT developer of the Health IT Module has met its responsibilities under subpart D of this part. (m) Time-limited certification and certification status for certain 2015 Edition certification criteria. An ONC– ACB may only issue a certification to a Health IT Module and permit continued certified status for: (1) Section 170.315(a)(10) and (13) and § 170.315(e)(2) until January 1, 2022. (2) Section 170.315(b)(6) until May 1, 2023. (3) Section 170.315(g)(8) until May 2, 2022. ■ 27. Amend § 170.555: ■ a. In paragraph (a) by removing the words ‘‘Complete EHRs and/or’’; and ■ b. By revising paragraph (b)(1). The revision reads as follows: § 170.555 Certification to newer versions of certain standards. * * * * * (b) * * * (1) ONC–ACBs are not required to certify Health IT Module(s) according to newer versions of standards adopted and named in subpart B of this part, unless: (i) The National Coordinator approves a newer version for use in certification and a health IT developer voluntarily elects to seek certification of its health IT in accordance with § 170.405(b)(9) or update its certified health IT to the newer version in accordance with § 170.405(b)(8); or (ii) The new version is incorporated by reference in § 170.299. * * * * * ■ 28. Amend § 170.556: ■ a. By removing the phrases ‘‘certified Complete EHR or’’ and ‘‘Complete EHR or’’, wherever they occur; ■ b. By revising paragraph (a) introductory text and paragraph (c) introductory text; ■ c. By removing and reserving paragraph (c)(2); ■ d. In paragraph (c)(3), by removing the phrase ‘‘certified Complete EHRs’’; and ■ e. By removing paragraphs (c)(5) and (6). The revisions read as follows: § 170.556 In-the-field surveillance and maintenance of certification for Health IT. (a) In-the-field surveillance. Consistent with its accreditation under 170.523(a) to ISO/IEC 17065 and the requirements of this subpart, an ONC– E:\FR\FM\01MYR3.SGM 01MYR3 25953 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations ACB must initiate surveillance ‘‘in the field’’ as necessary to assess whether a certified Health IT Module continues to conform to the requirements in subparts A, B, C and E of this part once the certified Health IT Module has been implemented and is in use in a production environment. * * * * * (c) Randomized surveillance. During each calendar year surveillance period, an ONC–ACB may conduct in-the-field surveillance for certain randomly selected Health IT Modules to which it has issued a certification. * * * * * Section § 170.560 § 170.565 § 170.565 § 170.570 § 170.575 29. In the table below, for each section and paragraph indicated in the first two columns, remove the phrase indicated in the third column: ■ Paragraphs .......... .......... .......... .......... Remove (a)(2) ................................................................................................................................................ (d)(1)(ii) and (iii) ............................................................................................................................... (h)(2)(iii) ........................................................................................................................................... (a), (b)(2), (c) introductory text, and (c)(1) and (2) ......................................................................... [Removed and Reserved] 30. Remove and reserve § 170.575. ■ 31. Amend § 170.580: ■ a. By revising paragraph (a)(1) and the subject headings to paragraphs (a)(2)(i) and(ii); ■ b. By adding paragraph (a)(2)(iii); ■ c. By revising paragraphs (a)(3)(i), (iv), and (v); ■ d. By adding paragraph (a)(4); ■ e. By revising paragraphs (b)(1)(i) and (b)(1)(iii)(D), (b)(2)(i), and (b)(3)(i) and (ii); ■ f. By adding paragraphs (b)(3)(iii) and (iv); ■ g. By revising paragraph (c)(1); ■ h. In paragraphs (d)(1), (d)(2)(i)(C), and (d)(4), by removing the phrase ‘‘Complete EHR or’’; ■ i. In paragraph (d)(5), by removing the phrase ‘‘Complete EHRs or’’; ■ j. By revising paragraphs (e)(1) introductory text and (f)(1); ■ k. In paragraph (f)(2)(i)(C), by removing the phrase ‘‘Complete EHR or’’; and ■ l. Revising paragraphs (g)(1) introductory text, (g)(1)(i), (g)(2), (g)(3)(i), (g)(4), (g)(5)(i), and (g)(6)(v). The revisions and additions read as follows: ■ § 170.580 ONC review of certified health IT or a health IT developer’s actions. (a) * * * (1) Purpose. ONC may directly review certified health IT or a health IT developer’s actions or practices to determine whether either conform to the requirements of the ONC Health IT Certification Program. (2) * * * (i) Certified health IT causing or contributing to unsafe conditions. * * * (ii) Impediments to ONC–ACB oversight of certified health IT. * * * (iii) Noncompliance with a Condition and Maintenance of Certification requirement. ONC may initiate direct review under this section if it has a reasonable belief that a health IT VerDate Sep<11>2014 §§ 170.560, 170.565, and 170.570 [Amended] 09:23 May 01, 2020 Jkt 250001 developer has not complied with a Condition or Maintenance of Certification requirement under subpart D of this part. (3) * * * (i) ONC’s review of certified health IT or a health IT developer’s actions or practices is independent of, and may be in addition to, any surveillance of certified health IT conducted by an ONC–ACB. * * * * * (iv) An ONC–ACB and ONC–ATL shall provide ONC with any available information that ONC deems relevant to its review of certified health IT or a health IT developer’s actions or practices. (v) ONC may end all or any part of its review of certified health IT or a health IT developer’s actions or practices under this section at any time and refer the applicable part of the review to the relevant ONC–ACB(s) if ONC determines that doing so would serve the effective administration or oversight of the ONC Health IT Certification Program. (4) Coordination with the Office of Inspector General. (i) ONC may coordinate its review of a claim of information blocking with the Office of Inspector General or defer to the Office of Inspector General to lead a review of a claim of information blocking. (ii) ONC may rely on Office of Inspector General findings to form the basis of a direct review action. (b) * * * (1) * * * (i) Circumstances that may trigger notice of potential non-conformity. At any time during its review of certified health IT or a health IT developer’s actions or practices under paragraph (a) of this section, ONC may send a notice of potential non-conformity if it has a reasonable belief that certified health IT or a health IT developer’s actions or practices may not conform to the PO 00000 Frm 00313 Fmt 4701 Sfmt 4700 ‘‘Complete ‘‘Complete ‘‘Complete ‘‘Complete EHRs EHRs EHRs EHRs and/or’’ or’’ and’’ and/or’’ requirements of the ONC Health IT Certification Program. * * * * * (iii) * * * (D) Issue a notice of proposed termination if the health IT is under review in accordance with paragraph (a)(2)(i) or (ii) of this section. (2) * * * (i) Circumstances that may trigger notice of non-conformity. At any time during its review of certified health IT or a health IT developer’s actions or practices under paragraph (a) of this section, ONC may send a notice of nonconformity to the health IT developer if it determines that certified health IT or a health IT developer’s actions or practices does not conform to the requirements of the ONC Health IT Certification Program. * * * * * (3) * * * (i) All records related to the development, testing, certification, implementation, maintenance and use of its certified health IT; (ii) Any complaint records related to the certified health IT; (iii) All records related to the Condition(s) and Maintenance of Certification requirements, including marketing and distribution records, communications, and contracts; and (iv) Any other relevant information. (c) * * * (1) Applicability. If ONC determines that certified health IT or a health IT developer’s action or practice does not conform to requirements of the ONC Health IT Certification Program, ONC shall notify the health IT developer of its determination and require the health IT developer to submit a proposed corrective action plan. * * * * * (e) * * * (1) Applicability. Excluding situations of noncompliance with a Condition or Maintenance of Certification E:\FR\FM\01MYR3.SGM 01MYR3 25954 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations requirement under subpart D of this part, ONC may propose to terminate a certification issued to a Health IT Module if: * * * * * (f) * * * (1) Applicability. The National Coordinator may terminate a certification if: (i) A determination is made that termination is appropriate after considering the information provided by the health IT developer in response to the proposed termination notice; (ii) The health IT developer does not respond in writing to a proposed termination notice within the timeframe specified in paragraph (e)(3) of this section; or (iii) A determination is made that the health IT developer is noncompliant with a Condition or Maintenance of Certification requirement under subpart D of this part or for the following circumstances when ONC exercises direct review under paragraph (a)(2)(iii) of this section: (A) The health IT developer fails to timely respond to any communication from ONC, including, but not limited to: (1) Fact-finding; (2) A notice of potential nonconformity within the timeframe established in accordance with paragraph (b)(1)(ii)(A)(3) of this section; or (3) A notice of non-conformity within the timeframe established in accordance with paragraph (b)(2)(ii)(A)(3) of this section. (B) The information or access provided by the health IT developer in response to any ONC communication, including, but not limited to: Factfinding, a notice of potential nonconformity, or a notice of nonconformity is insufficient or incomplete; (C) The health IT developer fails to cooperate with ONC and/or a third party acting on behalf of ONC; (D) The health IT developer fails to timely submit in writing a proposed corrective action plan; (E) The health IT developer fails to timely submit a corrective action plan that adequately addresses the elements required by ONC as described in paragraph (c) of this section; (F) The health IT developer does not fulfill its obligations under the corrective action plan developed in accordance with paragraph (c) of this section; or (G) ONC concludes that the nonconformity(ies) cannot be cured. * * * * * (g) * * * (1) Basis for appeal. A health IT developer may appeal an ONC VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 determination to suspend or terminate a certification issued to a Health IT Module and/or an ONC determination to issue a certification ban under § 170.581(a)(2) if the health IT developer asserts: (i) ONC incorrectly applied ONC Health IT Certification Program requirements for a: (A) Suspension; (B) Termination; or (C) Certification ban under § 170.581(a)(2). * * * * * (2) Method and place for filing an appeal. A statement of intent to appeal followed by a request for appeal must be submitted to ONC in writing by an authorized representative of the health IT developer subject to the determination being appealed. The statement of intent to appeal and request for appeal must be filed in accordance with the requirements specified in the notice of: (i) Termination; (ii) Suspension; or (iii) Certification ban under § 170.581(a)(2). (3) * * * (i) A statement of intent to appeal must be filed within 10 days of a health IT developer’s receipt of the notice of: (A) Suspension; (B) Termination; or (C) Certification ban under § 170.581(a)(2). * * * * * (4) Effect of appeal. (i) A request for appeal stays the termination of a certification issued to a Health IT Module, but the Health IT Module is prohibited from being marketed, licensed, or sold as ‘‘certified’’ during the stay. (ii) A request for appeal does not stay the suspension of a Health IT Module. (iii) A request for appeal stays a certification ban issued under § 170.581(a)(2). (5) * * * (i) The hearing officer may not review an appeal in which he or she participated in the initial suspension, termination, or certification ban determination or has a conflict of interest in the pending matter. * * * * * (6) * * * (v) ONC will have an opportunity to provide the hearing officer with a written statement and supporting documentation on its behalf that clarifies, as necessary, its determination to suspend or terminate the certification or issue a certification ban. * * * * * ■ 32. Revise § 170.581 to read as follows: PO 00000 Frm 00314 Fmt 4701 Sfmt 4700 § 170.581 Certification ban. (a) Circumstances that may trigger a certification ban. The certification of any of a health IT developer’s health IT is prohibited when: (1) The certification of one or more of the health IT developer’s Health IT Modules is: (i) Terminated by ONC under the ONC Health IT Certification Program; (ii) Withdrawn from the ONC Health IT Certification Program by an ONC– ACB because the health IT developer requested it to be withdrawn (for reasons other than to comply with Program requirements) when the health IT developer’s health IT was the subject of a potential non-conformity or nonconformity as determined by ONC; (iii) Withdrawn by an ONC–ACB because of a non-conformity with any of the certification criteria adopted by the Secretary under subpart C of this part; (iv) Withdrawn by an ONC–ACB because the health IT developer requested it to be withdrawn (for reasons other than to comply with Program requirements) when the health IT developer’s health IT was the subject of surveillance for a certification criterion or criteria adopted by the Secretary under subpart C of this part, including notice of pending surveillance; or (2) ONC determines a certification ban is appropriate per its review under § 170.580(a)(2)(iii). (b) Notice of certification ban. When ONC decides to issue a certification ban to a health IT developer, ONC will notify the health IT developer of the certification ban through a notice of certification ban. The notice of certification ban will include, but may not be limited to: (1) An explanation of the certification ban; (2) Information supporting the certification ban; (3) Instructions for appealing the certification ban if banned in accordance with paragraph (a)(2) of this section; and (4) Instructions for requesting reinstatement into the ONC Health IT Certification Program, which would lift the certification ban. (c) Effective date of certification ban. (1) A certification ban will be effective immediately if banned under paragraph (a)(1) of this section. (2) For certification bans issued under paragraph (a)(2) of this section, the ban will be effective immediately after the following applicable occurrence: (i) The expiration of the 10-day period for filing a statement of intent to appeal in § 170.580(g)(3)(i) if the health IT E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations developer does not file a statement of intent to appeal. (ii) The expiration of the 30-day period for filing an appeal in § 170.580(g)(3)(ii) if the health IT developer files a statement of intent to appeal, but does not file a timely appeal. (iii) A final determination to issue a certification ban per § 170.580(g)(7) if a health IT developer files an appeal timely. (d) Reinstatement. The certification of a health IT developer’s health IT subject to the prohibition in paragraph (a) of this section may commence once the following conditions are met. (1) A health IT developer must request ONC’s permission in writing to participate in the ONC Health IT Certification Program. (2) The request must demonstrate that the customers affected by the certificate termination, certificate withdrawal, or noncompliance with a Condition or Maintenance of Certification requirement have been provided appropriate remediation. (3) For noncompliance with a Condition or Maintenance of Certification requirement, the noncompliance must be resolved. (4) ONC is satisfied with the health IT developer’s demonstration under paragraph (d)(2) of this section that all affected customers have been provided with appropriate remediation and grants reinstatement into the ONC Health IT Certification Program. ■ 33. Amend § 170.599 by: ■ a. Redesignating paragraph (b)(4) as paragraph (b)(5); ■ b. Adding new paragraph (b)(4); and ■ c. Revising newly redesignated paragraph (b)(5). The addition and revision read as follows: § 170.599 Incorporation by Reference * * * * * (b) * * * (4) ISO/IEC 17025:2017(E)—General requirements for the competence of testing and calibration laboratories (Third Edition), 2017–11, ‘‘ISO/IEC 17025,’’ IBR approved for §§ 170.520(b), and 170.524(a). (5) ISO/IEC 17065:2012(E)— Conformity assessment—Requirements for bodies certifying products, processes and services (First Edition), 2012, ‘‘ISO/ IEC 17065,’’ IBR approved for §§ 170.503 and 170.523(a). ■ 34. Add part 171 to read as follows: 171.101 171.102 171.103 Applicability. Definitions. Information blocking. Subpart B—Exceptions That Involve Not Fulfilling Requests to Access, Exchange, or use Electronic Health Information 171.200 Availability and effect of exceptions. 171.201 Preventing harm exception—when will an actor’s practice that is likely to interfere with the access, exchange, or use of electronic health information in order to prevent harm not be considered information blocking? 171.202 Privacy exception—when will an actor’s practice of not fulfilling a request to access, exchange, or use electronic health information in order to protect an individual’s privacy not be considered information blocking? 171.203 Security exception—when will an actor’s practice that is likely to interfere with the access, exchange, or use of electronic health information in order to protect the security of electronic health information not be considered information blocking? 171.204 Infeasibility exception—when will an actor’s practice of not fulfilling a request to access, exchange, or use electronic health information due to the infeasibility of the request not be considered information blocking? 171.205 Health IT performance exception— when will an actor’s practice that is implemented to maintain or improve health IT performance and that is likely to interfere with the access, exchange, or use of electronic health information not be considered information blocking? Subpart C—Exceptions That Involve Procedures for Fulfilling Requests to Access, Exchange, or use Electronic Health Information 171.300 Availability and effect of exceptions. 171.301 Content and manner exception— when will an actor’s practice of limiting the content of its response to or the manner in which it fulfills a request to access, exchange, or use electronic health information not be considered information blocking? 171.302 Fees exception—when will an actor’s practice of charging fees for accessing, exchanging, or using electronic health information not be considered information blocking? 171.303 Licensing exception—when will an actor’s practice to license interoperability elements in order for electronic health information to be accessed, exchanged, or used not be considered information blocking? Authority: 42 U.S.C. 300jj–52; 5 U.S.C. 552. Subpart A—General Provisions PART 171—INFORMATION BLOCKING § 171.100 Subpart A—General Provisions Sec. 171.100 Statutory basis and purpose. (a) Basis. This part implements section 3022 of the Public Health Service Act, 42 U.S.C. 300jj–52. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 PO 00000 Statutory basis and purpose. Frm 00315 Fmt 4701 Sfmt 4700 25955 (b) Purpose. The purpose of this part is to establish exceptions for reasonable and necessary activities that do not constitute information blocking as defined by section 3022(a)(1) of the Public Health Service Act, 42 U.S.C. 300jj–52. § 171.101 Applicability. (a) This part applies to health care providers, health IT developers of certified health IT, health information exchanges, and health information networks, as those terms are defined in § 171.102. (b) Health care providers, health IT developers of certified health IT, health information exchanges, and health information networks must comply with this part on and after November 2, 2020. § 171.102 Definitions. For purposes of this part: Access means the ability or means necessary to make electronic health information available for exchange or use. Actor means a health care provider, health IT developer of certified health IT, health information network or health information exchange. API Information Source is defined as it is in § 170.404(c). API User is defined as it is in § 170.404(c). Certified API Developer is defined as it is in § 170.404(c). Certified API technology is defined as it is in § 170.404(c). Electronic health information (EHI) means electronic protected health information as defined in 45 CFR 160.103 to the extent that it would be included in a designated record set as defined in 45 CFR 164.501, regardless of whether the group of records are used or maintained by or for a covered entity as defined in 45 CFR 160.103, but EHI shall not include: (1) Psychotherapy notes as defined in 45 CFR 164.501; or (2) Information compiled in reasonable anticipation of, or for use in, a civil, criminal, or administrative action or proceeding. Exchange means the ability for electronic health information to be transmitted between and among different technologies, systems, platforms, or networks. Fee means any present or future obligation to pay money or provide any other thing of value. Health care provider has the same meaning as ‘‘health care provider’’ in 42 U.S.C. 300jj. Health information network or health information exchange means an individual or entity that determines, E:\FR\FM\01MYR3.SGM 01MYR3 25956 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations controls, or has the discretion to administer any requirement, policy, or agreement that permits, enables, or requires the use of any technology or services for access, exchange, or use of electronic health information: (1) Among more than two unaffiliated individuals or entities (other than the individual or entity to which this definition might apply) that are enabled to exchange with each other; and (2) That is for a treatment, payment, or health care operations purpose, as such terms are defined in 45 CFR 164.501 regardless of whether such individuals or entities are subject to the requirements of 45 CFR parts 160 and 164. Health IT developer of certified health IT means an individual or entity, other than a health care provider that selfdevelops health IT for its own use, that develops or offers health information technology (as that term is defined in 42 U.S.C. 300jj(5)) and which has, at the time it engages in a practice that is the subject of an information blocking claim, one or more Health IT Modules certified under a program for the voluntary certification of health information technology that is kept or recognized by the National Coordinator pursuant to 42 U.S.C. 300jj–11(c)(5) (ONC Health IT Certification Program). Information blocking is defined as it is in § 171.103. Interfere with or interference means to prevent, materially discourage, or otherwise inhibit. Interoperability element means hardware, software, integrated technologies or related licenses, technical information, privileges, rights, intellectual property, upgrades, or services that: (1) May be necessary to access, exchange, or use electronic health information; and (2) Is/Are controlled by the actor, which includes the ability to confer all rights and authorizations necessary to use the element to enable the access, exchange, or use of electronic health information. Permissible purpose means a purpose for which a person is authorized, permitted, or required to access, exchange, or use electronic health information under applicable law. Person is defined as it is in 45 CFR 160.103. Practice means an act or omission by an actor. Use means the ability for electronic health information, once accessed or exchanged, to be understood and acted upon. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 § 171.103 Information blocking. (a) Information blocking means a practice that— (1) Except as required by law or covered by an exception set forth in subpart B or subpart C of this part, is likely to interfere with access, exchange, or use of electronic health information; and (2) If conducted by a health information technology developer, health information network or health information exchange, such developer, network or exchange knows, or should know, that such practice is likely to interfere with, prevent, or materially discourage access, exchange, or use of electronic health information; or (3) If conducted by a health care provider, such provider knows that such practice is unreasonable and is likely to interfere with, prevent, or materially discourage access, exchange, or use of electronic health information. (b) Until May 2, 2022, electronic health information for purposes of paragraph (a) of this section is limited to the electronic health information identified by the data elements represented in the USCDI standard adopted in § 170.213. Subpart B—Exceptions That Involve Not Fulfilling Requests To Access, Exchange, or Use Electronic Health Information § 171.200 Availability and effect of exceptions. A practice shall not be treated as information blocking if the actor satisfies an exception to the information blocking provision as set forth in this subpart B by meeting all applicable requirements and conditions of the exception at all relevant times. § 171.201 Preventing harm exception— when will an actor’s practice that is likely to interfere with the access, exchange, or use of electronic health information in order to prevent harm not be considered information blocking? An actor’s practice that is likely to interfere with the access, exchange, or use of electronic health information in order to prevent harm will not be considered information blocking when the practice meets the conditions in paragraphs (a) and (b) of this section, satisfies at least one condition from each of paragraphs (c), (d), and (f) of this section, and also meets the condition in paragraph (e) of this section when applicable. (a) Reasonable belief. The actor engaging in the practice must hold a reasonable belief that the practice will substantially reduce a risk of harm to a patient or another natural person that PO 00000 Frm 00316 Fmt 4701 Sfmt 4700 would otherwise arise from the access, exchange, or use of electronic health information affected by the practice. For purposes of this section, ‘‘patient’’ means a natural person who is the subject of the electronic health information affected by the practice. (b) Practice breadth. The practice must be no broader than necessary to substantially reduce the risk of harm that the practice is implemented to reduce. (c) Type of risk. The risk of harm must: (1) Be determined on an individualized basis in the exercise of professional judgment by a licensed health care professional who has a current or prior clinician-patient relationship with the patient whose electronic health information is affected by the determination; or (2) Arise from data that is known or reasonably suspected to be misidentified or mismatched, corrupt due to technical failure, or erroneous for another reason. (d) Type of harm. The type of harm must be one that could serve as grounds for a covered entity (as defined in § 160.103 of this title) to deny access (as the term ‘‘access’’ is used in part 164 of this title) to an individual’s protected health information under: (1) Section 164.524(a)(3)(iii) of this title where the practice is likely to, or in fact does, interfere with access, exchange, or use (as these terms are defined in § 171.102) of the patient’s electronic health information by their legal representative (including but not limited to personal representatives recognized pursuant to 45 CFR 164.502) and the practice is implemented pursuant to an individualized determination of risk of harm consistent with paragraph (c)(1) of this section; (2) Section 164.524(a)(3)(ii) of this title where the practice is likely to, or in fact does, interfere with the patient’s or their legal representative’s access to, use or exchange (as these terms are defined in § 171.102) of information that references another natural person and the practice is implemented pursuant to an individualized determination of risk of harm consistent with paragraph (c)(1) of this section; (3) Section 164.524(a)(3)(i) of this title where the practice is likely to, or in fact does, interfere with the patient’s access, exchange, or use (as these terms are defined in § 171.102) of their own electronic health information, regardless of whether the risk of harm that the practice is implemented to substantially reduce is consistent with paragraph (c)(1) or (2) of this section; or E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations (4) Section 164.524(a)(3)(i) of this title where the practice is likely to, or in fact does, interfere with a legally permissible access, exchange, or use (as these terms are defined in § 171.102) of electronic health information not described in paragraph (d)(1), (2), or (3) of this section, and regardless of whether the risk of harm the practice is implemented to substantially reduce is consistent with paragraph (c)(1) or (2) of this section. (e) Patient right to request review of individualized determination of risk of harm. Where the risk of harm is consistent with paragraph (c)(1) of this section, the actor must implement the practice in a manner consistent with any rights the individual patient whose electronic health information is affected may have under § 164.524(a)(4) of this title, or any Federal, State, or tribal law, to have the determination reviewed and potentially reversed. (f) Practice implemented based on an organizational policy or a determination specific to the facts and circumstances. The practice must be consistent with an organizational policy that meets paragraph (f)(1) of this section or, in the absence of an organizational policy applicable to the practice or to its use in particular circumstances, the practice must be based on a determination that meets paragraph (f)(2) of this section. (1) An organizational policy must: (i) Be in writing; (ii) Be based on relevant clinical, technical, and other appropriate expertise; (iii) Be implemented in a consistent and non-discriminatory manner; and (iv) Conform each practice to the conditions in paragraphs (a) and (b) of this section, as well as the conditions in paragraphs (c) through (e) of this section that are applicable to the practice and its use. (2) A determination must: (i) Be based on facts and circumstances known or reasonably believed by the actor at the time the determination was made and while the practice remains in use; and (ii) Be based on expertise relevant to implementing the practice consistent with the conditions in paragraphs (a) and (b) of this section, as well as the conditions in paragraphs (c) through (e) of this section that are applicable to the practice and its use in particular circumstances. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 § 171.202 Privacy exception—when will an actor’s practice of not fulfilling a request to access, exchange, or use electronic health information in order to protect an individual’s privacy not be considered information blocking? An actor’s practice of not fulfilling a request to access, exchange, or use electronic health information in order to protect an individual’s privacy will not be considered information blocking when the practice meets all of the requirements of at least one of the subexceptions in paragraphs (b) through (e) of this section. (a) Definitions in this section. (1) The term HIPAA Privacy Rule as used in this section means 45 CFR parts 160 and 164. (2) The term individual as used in this section means one or more of the following— (i) An individual as defined by 45 CFR 160.103. (ii) Any other natural person who is the subject of the electronic health information being accessed, exchanged, or used. (iii) A person who legally acts on behalf of a person described in paragraph (a)(1) or (2) of this section in making decisions related to health care as a personal representative, in accordance with 45 CFR 164.502(g). (iv) A person who is a legal representative of and can make health care decisions on behalf of any person described in paragraph (a)(1) or (2) of this section. (v) An executor, administrator, or other person having authority to act on behalf of a deceased person described in paragraph (a)(1) or (2) of this section or the individual’s estate under State or other law. (b) Sub-exception—precondition not satisfied. To qualify for the exception on the basis that State or Federal law requires one or more preconditions for providing access, exchange, or use of electronic health information that have not been satisfied, the following requirements must be met— (1) The actor’s practice is tailored to the applicable precondition not satisfied, is implemented in a consistent and non-discriminatory manner, and either: (i) Conforms to the actor’s organizational policies and procedures that: (A) Are in writing; (B) Specify the criteria to be used by the actor to determine when the precondition would be satisfied and, as applicable, the steps that the actor will take to satisfy the precondition; and (C) Are implemented by the actor, including by providing training on the policies and procedures; or PO 00000 Frm 00317 Fmt 4701 Sfmt 4700 25957 (ii) Are documented by the actor, on a case-by-case basis, identifying the criteria used by the actor to determine when the precondition would be satisfied, any criteria that were not met, and the reason why the criteria were not met. (2) If the precondition relies on the provision of a consent or authorization from an individual and the actor has received a version of such a consent or authorization that does not satisfy all elements of the precondition required under applicable law, the actor must: (i) Use reasonable efforts within its control to provide the individual with a consent or authorization form that satisfies all required elements of the precondition or provide other reasonable assistance to the individual to satisfy all required elements of the precondition; and (ii) Not improperly encourage or induce the individual to withhold the consent or authorization. (3) For purposes of determining whether the actor’s privacy policies and procedures and actions satisfy the requirements of paragraphs (b)(1)(i) and (b)(2) above when the actor’s operations are subject to multiple laws which have inconsistent preconditions, they shall be deemed to satisfy the requirements of the paragraphs if the actor has adopted uniform privacy policies and procedures to address the more restrictive preconditions. (c) Sub-exception—health IT developer of certified health IT not covered by HIPAA. If the actor is a health IT developer of certified health IT that is not required to comply with the HIPAA Privacy Rule, when engaging in a practice that promotes the privacy interests of an individual, the actor’s organizational privacy policies must have been disclosed to the individuals and entities that use the actor’s product or service before they agreed to use them, and must implement the practice according to a process described in the organizational privacy policies. The actor’s organizational privacy policies must: (1) Comply with State and Federal laws, as applicable; (2) Be tailored to the specific privacy risk or interest being addressed; and (3) Be implemented in a consistent and non-discriminatory manner. (d) Sub-exception—denial of an individual’s request for their electronic health information consistent with 45 CFR 164.524(a)(1) and (2). If an individual requests electronic health information under the right of access provision under 45 CFR 164.524(a)(1) from an actor that must comply with 45 CFR 164.524(a)(1), the actor’s practice E:\FR\FM\01MYR3.SGM 01MYR3 25958 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations must be consistent with 45 CFR 164.524(a)(2). (e) Sub-exception—respecting an individual’s request not to share information. Unless otherwise required by law, an actor may elect not to provide access, exchange, or use of an individual’s electronic health information if the following requirements are met— (1) The individual requests that the actor not provide such access, exchange, or use of electronic health information without any improper encouragement or inducement of the request by the actor; (2) The actor documents the request within a reasonable time period; (3) The actor’s practice is implemented in a consistent and nondiscriminatory manner; and (4) An actor may terminate an individual’s request for a restriction to not provide such access, exchange, or use of the individual’s electronic health information only if: (i) The individual agrees to the termination in writing or requests the termination in writing; (ii) The individual orally agrees to the termination and the oral agreement is documented by the actor; or (iii) The actor informs the individual that it is terminating its agreement to not provide such access, exchange, or use of the individual’s electronic health information except that such termination is: (A) Not effective to the extent prohibited by applicable Federal or State law; and (B) Only applicable to electronic health information created or received after the actor has so informed the individual of the termination. § 171.203 Security exception—when will an actor’s practice that is likely to interfere with the access, exchange, or use of electronic health information in order to protect the security of electronic health information not be considered information blocking? An actor’s practice that is likely to interfere with the access, exchange, or use of electronic health information in order to protect the security of electronic health information will not be considered information blocking when the practice meets the conditions in paragraphs (a), (b), and (c) of this section, and in addition meets either the condition in paragraph (d) of this section or the condition in paragraph (e) of this section. (a) The practice must be directly related to safeguarding the confidentiality, integrity, and availability of electronic health information. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 (b) The practice must be tailored to the specific security risk being addressed. (c) The practice must be implemented in a consistent and non-discriminatory manner. (d) If the practice implements an organizational security policy, the policy must— (1) Be in writing; (2) Have been prepared on the basis of, and be directly responsive to, security risks identified and assessed by or on behalf of the actor; (3) Align with one or more applicable consensus-based standards or best practice guidance; and (4) Provide objective timeframes and other parameters for identifying, responding to, and addressing security incidents. (e) If the practice does not implement an organizational security policy, the actor must have made a determination in each case, based on the particularized facts and circumstances, that: (1) The practice is necessary to mitigate the security risk to electronic health information; and (2) There are no reasonable and appropriate alternatives to the practice that address the security risk that are less likely to interfere with, prevent, or materially discourage access, exchange or use of electronic health information. § 171.204 Infeasibility exception—when will an actor’s practice of not fulfilling a request to access, exchange, or use electronic health information due to the infeasibility of the request not be considered information blocking? An actor’s practice of not fulfilling a request to access, exchange, or use electronic health information due to the infeasibility of the request will not be considered information blocking when the practice meets one of the conditions in paragraph (a) of this section and meets the requirements in paragraph (b) of this section. (a) Conditions—(1) Uncontrollable events. The actor cannot fulfill the request for access, exchange, or use of electronic health information due to a natural or human-made disaster, public health emergency, public safety incident, war, terrorist attack, civil insurrection, strike or other labor unrest, telecommunication or internet service interruption, or act of military, civil or regulatory authority. (2) Segmentation. The actor cannot fulfill the request for access, exchange, or use of electronic health information because the actor cannot unambiguously segment the requested electronic health information from electronic health information that: PO 00000 Frm 00318 Fmt 4701 Sfmt 4700 (i) Cannot be made available due to an individual’s preference or because the electronic health information cannot be made available by law; or (ii) May be withheld in accordance with § 171.201. (3) Infeasible under the circumstances. (i) The actor demonstrates, prior to responding to the request pursuant to paragraph (b) of this section, through a contemporaneous written record or other documentation its consistent and non-discriminatory consideration of the following factors that led to its determination that complying with the request would be infeasible under the circumstances: (A) The type of electronic health information and the purposes for which it may be needed; (B) The cost to the actor of complying with the request in the manner requested; (C) The financial and technical resources available to the actor; (D) Whether the actor’s practice is non-discriminatory and the actor provides the same access, exchange, or use of electronic health information to its companies or to its customers, suppliers, partners, and other persons with whom it has a business relationship; (E) Whether the actor owns or has control over a predominant technology, platform, health information exchange, or health information network through which electronic health information is accessed or exchanged; and (F) Why the actor was unable to provide access, exchange, or use of electronic health information consistent with the exception in § 171.301. (ii) In determining whether the circumstances were infeasible under paragraph (a)(3)(i) of this section, it shall not be considered whether the manner requested would have: (A) Facilitated competition with the actor. (B) Prevented the actor from charging a fee or resulted in a reduced fee. (b) Responding to requests. If an actor does not fulfill a request for access, exchange, or use of electronic health information for any of the reasons provided in paragraph (a) of this section, the actor must, within ten business days of receipt of the request, provide to the requestor in writing the reason(s) why the request is infeasible. E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations § 171.205 Health IT performance exception—when will an actor’s practice that is implemented to maintain or improve health IT performance and that is likely to interfere with the access, exchange, or use of electronic health information not be considered information blocking? An actor’s practice that is implemented to maintain or improve health IT performance and that is likely to interfere with the access, exchange, or use of electronic health information will not be considered information blocking when the practice meets a condition in paragraph (a), (b), (c), or (d) of this section, as applicable to the particular practice and the reason for its implementation. (a) Maintenance and improvements to health IT. When an actor implements a practice that makes health IT under that actor’s control temporarily unavailable, or temporarily degrades the performance of health IT, in order to perform maintenance or improvements to the health IT, the actor’s practice must be— (1) Implemented for a period of time no longer than necessary to complete the maintenance or improvements for which the health IT was made unavailable or the health IT’s performance degraded; (2) Implemented in a consistent and non-discriminatory manner; and (3) If the unavailability or degradation is initiated by a health IT developer of certified health IT, health information exchange, or health information network: (i) Planned. Consistent with existing service level agreements between the individual or entity to whom the health IT developer of certified health IT, health information exchange, or health information network supplied the health IT; or (ii) Unplanned. Consistent with existing service level agreements between the individual or entity; or agreed to by the individual or entity to whom the health IT developer of certified health IT, health information exchange, or health information network supplied the health IT. (b) Assured level of performance. An actor may take action against a thirdparty application that is negatively impacting the health IT’s performance, provided that the practice is— (1) For a period of time no longer than necessary to resolve any negative impacts; (2) Implemented in a consistent and non-discriminatory manner; and (3) Consistent with existing service level agreements, where applicable. (c) Practices that prevent harm. If the unavailability of health IT for VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 maintenance or improvements is initiated by an actor in response to a risk of harm to a patient or another person, the actor does not need to satisfy the requirements of this section, but must comply with all requirements of § 171.201 at all relevant times to qualify for an exception. (d) Security-related practices. If the unavailability of health IT for maintenance or improvements is initiated by an actor in response to a security risk to electronic health information, the actor does not need to satisfy the requirements of this section, but must comply with all requirements of § 171.203 at all relevant times to qualify for an exception. Subpart C—Exceptions That Involve Procedures for Fulfilling Requests To Access, Exchange, or Use Electronic Health Information § 171.300 Availability and effect of exceptions. A practice shall not be treated as information blocking if the actor satisfies an exception to the information blocking provision as set forth in this subpart C by meeting all applicable requirements and conditions of the exception at all relevant times. § 171.301 Content and manner exception— when will an actor’s practice of limiting the content of its response to or the manner in which it fulfills a request to access, exchange, or use electronic health information not be considered information blocking? An actor’s practice of limiting the content of its response to or the manner in which it fulfills a request to access, exchange, or use electronic health information will not be considered information blocking when the practice meets all of the following conditions. (a) Content condition—electronic health information. An actor must respond to a request to access, exchange, or use electronic health information with— (1) USCDI. For up to May 2, 2022, at a minimum, the electronic health information identified by the data elements represented in the USCDI standard adopted in § 170.213. (2) All electronic health information. On and after May 2, 2022, electronic health information as defined in § 171.102. (b) Manner condition—(1) Manner requested. (i) An actor must fulfill a request described in paragraph (a) of this section in any manner requested, unless the actor is technically unable to fulfill the request or cannot reach agreeable terms with the requestor to fulfill the request. PO 00000 Frm 00319 Fmt 4701 Sfmt 4700 25959 (ii) If an actor fulfills a request described in paragraph (a) of this section in any manner requested: (A) Any fees charged by the actor in relation to fulfilling the response are not required to satisfy the exception in § 171.302; and (B) Any license of interoperability elements granted by the actor in relation to fulfilling the request is not required to satisfy the exception in § 171.303. (2) Alternative manner. If an actor does not fulfill a request described in paragraph (a) of this section in any manner requested because it is technically unable to fulfill the request or cannot reach agreeable terms with the requestor to fulfill the request, the actor must fulfill the request in an alternative manner, as follows: (i) The actor must fulfill the request without unnecessary delay in the following order of priority, starting with paragraph (b)(2)(i)(A) of this section and only proceeding to the next consecutive paragraph if the actor is technically unable to fulfill the request in the manner identified in a paragraph. (A) Using technology certified to standard(s) adopted in part 170 that is specified by the requestor. (B) Using content and transport standards specified by the requestor and published by: (1) The Federal Government; or (2) A standards developing organization accredited by the American National Standards Institute. (C) Using an alternative machinereadable format, including the means to interpret the electronic health information, agreed upon with the requestor. (ii) Any fees charged by the actor in relation to fulfilling the request are required to satisfy the exception in § 171.302. (iii) Any license of interoperability elements granted by the actor in relation to fulfilling the request is required to satisfy the exception in § 171.303. § 171.302 Fees exception—when will an actor’s practice of charging fees for accessing, exchanging, or using electronic health information not be considered information blocking? An actor’s practice of charging fees, including fees that result in a reasonable profit margin, for accessing, exchanging, or using electronic health information will not be considered information blocking when the practice meets the conditions in paragraph (a) of this section, does not include any of the excluded fees in paragraph (b) of this section, and, as applicable, meets the condition in paragraph (c) of this section. E:\FR\FM\01MYR3.SGM 01MYR3 25960 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations (a) Basis for fees condition. (1) The fees an actor charges must be— (i) Based on objective and verifiable criteria that are uniformly applied for all similarly situated classes of persons or entities and requests; (ii) Reasonably related to the actor’s costs of providing the type of access, exchange, or use of electronic health information to, or at the request of, the person or entity to whom the fee is charged; (iii) Reasonably allocated among all similarly situated persons or entities to whom the technology or service is supplied, or for whom the technology is supported; and (iv) Based on costs not otherwise recovered for the same instance of service to a provider and third party. (2) The fees an actor charges must not be based on— (i) Whether the requestor or other person is a competitor, potential competitor, or will be using the electronic health information in a way that facilitates competition with the actor; (ii) Sales, profit, revenue, or other value that the requestor or other persons derive or may derive from the access, exchange, or use of the electronic health information; (iii) Costs the actor incurred due to the health IT being designed or implemented in a non-standard way, unless the requestor agreed to the fee associated with the non-standard design or implementation to access, exchange, or use the electronic health information; (iv) Costs associated with intangible assets other than the actual development or acquisition costs of such assets; (v) Opportunity costs unrelated to the access, exchange, or use of electronic health information; or (vi) Any costs that led to the creation of intellectual property, if the actor charged a royalty for that intellectual property pursuant to § 171.303 and that royalty included the development costs for the creation of the intellectual property. (b) Excluded fees condition. This exception does not apply to— (1) A fee prohibited by 45 CFR 164.524(c)(4); (2) A fee based in any part on the electronic access of an individual’s EHI by the individual, their personal representative, or another person or entity designated by the individual; (3) A fee to perform an export of electronic health information via the capability of health IT certified to § 170.315(b)(10) of this subchapter for the purposes of switching health IT or VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 to provide patients their electronic health information; and (4) A fee to export or convert data from an EHR technology that was not agreed to in writing at the time the technology was acquired. (c) Compliance with the Conditions of Certification condition. Notwithstanding any other provision of this exception, if the actor is a health IT developer subject to the Conditions of Certification in § 170.402(a)(4), § 170.404, or both of this subchapter, the actor must comply with all requirements of such conditions for all practices and at all relevant times. (d) Definition of Electronic access. The following definition applies to this section: Electronic access means an internetbased method that makes electronic health information available at the time the electronic health information is requested and where no manual effort is required to fulfill the request. § 171.303 Licensing exception—when will an actor’s practice to license interoperability elements in order for electronic health information to be accessed, exchanged, or used not be considered information blocking? An actor’s practice to license interoperability elements for electronic health information to be accessed, exchanged, or used will not be considered information blocking when the practice meets all of the following conditions. (a) Negotiating a license conditions. Upon receiving a request to license an interoperability element for the access, exchange, or use of electronic health information, the actor must— (1) Begin license negotiations with the requestor within 10 business days from receipt of the request; and (2) Negotiate a license with the requestor, subject to the licensing conditions in paragraph (b) of this section, within 30 business days from receipt of the request. (b) Licensing conditions. The license provided for the interoperability element(s) needed to access, exchange, or use electronic health information must meet the following conditions: (1) Scope of rights. The license must provide all rights necessary to: (i) Enable the access, exchange, or use of electronic health information; and (ii) Achieve the intended access, exchange, or use of electronic health information via the interoperability element(s). (2) Reasonable royalty. If the actor charges a royalty for the use of the interoperability elements described in paragraph (a) of this section, the royalty PO 00000 Frm 00320 Fmt 4701 Sfmt 4700 must be reasonable and comply with the following requirements: (i) The royalty must be nondiscriminatory, consistent with paragraph (c)(3) of this section. (ii) The royalty must be based solely on the independent value of the actor’s technology to the licensee’s products, not on any strategic value stemming from the actor’s control over essential means of accessing, exchanging, or using electronic health information. (iii) If the actor has licensed the interoperability element through a standards developing organization in accordance with such organization’s policies regarding the licensing of standards-essential technologies on terms consistent with those in this exception, the actor may charge a royalty that is consistent with such policies. (iv) An actor may not charge a royalty for intellectual property if the actor recovered any development costs pursuant to § 171.302 that led to the creation of the intellectual property. (3) Non-discriminatory terms. The terms (including royalty terms) on which the actor licenses and otherwise provides the interoperability elements must be non-discriminatory and comply with the following requirements: (i) The terms must be based on objective and verifiable criteria that are uniformly applied for all similarly situated classes of persons and requests. (ii) The terms must not be based in any part on— (A) Whether the requestor or other person is a competitor, potential competitor, or will be using electronic health information obtained via the interoperability elements in a way that facilitates competition with the actor; or (B) The revenue or other value the requestor may derive from access, exchange, or use of electronic health information obtained via the interoperability elements. (4) Collateral terms. The actor must not require the licensee or its agents or contractors to do, or to agree to do, any of the following— (i) Not compete with the actor in any product, service, or market. (ii) Deal exclusively with the actor in any product, service, or market. (iii) Obtain additional licenses, products, or services that are not related to or can be unbundled from the requested interoperability elements. (iv) License, grant, assign, or transfer to the actor any intellectual property of the licensee. (v) Pay a fee of any kind whatsoever, except as described in paragraph (b)(2) of this section, unless the practice meets E:\FR\FM\01MYR3.SGM 01MYR3 Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and Regulations the requirements of the exception in § 171.302. (5) Non-disclosure agreement. The actor may require a reasonable nondisclosure agreement that is no broader than necessary to prevent unauthorized disclosure of the actor’s trade secrets, provided— (i) The agreement states with particularity all information the actor claims as trade secrets; and (ii) Such information meets the definition of a trade secret under applicable law. VerDate Sep<11>2014 09:23 May 01, 2020 Jkt 250001 (c) Additional conditions relating to the provision of interoperability elements. The actor must not engage in any practice that has any of the following purposes or effects. (1) Impeding the efficient use of the interoperability elements to access, exchange, or use electronic health information for any permissible purpose. (2) Impeding the efficient development, distribution, deployment, or use of an interoperable product or service for which there is actual or potential demand. PO 00000 Frm 00321 Fmt 4701 Sfmt 9990 25961 (3) Degrading the performance or interoperability of the licensee’s products or services, unless necessary to improve the actor’s technology and after affording the licensee a reasonable opportunity to update its technology to maintain interoperability. Alex M. Azar II, Secretary, Department of Health and Human Services. [FR Doc. 2020–07419 Filed 4–21–20; 4:15 pm] BILLING CODE 4150–45–P E:\FR\FM\01MYR3.SGM 01MYR3

Agencies

[Federal Register Volume 85, Number 85 (Friday, May 1, 2020)]
[Rules and Regulations]
[Pages 25642-25961]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2020-07419]



[[Page 25641]]

Vol. 85

Friday,

No. 85

May 1, 2020

Part III

Book 2 of 2 Books

Pages 25641-26318





Department of Health and Human Services





-----------------------------------------------------------------------



45 CFR Parts 170 and 171



21st Century Cures Act: Interoperability, Information Blocking, and the 
ONC Health IT Certification Program; Final Rule

Federal Register / Vol. 85, No. 85 / Friday, May 1, 2020 / Rules and 
Regulations

[[Page 25642]]


-----------------------------------------------------------------------

DEPARTMENT OF HEALTH AND HUMAN SERVICES

Office of the Secretary

45 CFR Parts 170 and 171

RIN 0955-AA01


21st Century Cures Act: Interoperability, Information Blocking, 
and the ONC Health IT Certification Program

AGENCY: Office of the National Coordinator for Health Information 
Technology (ONC), Department of Health and Human Services (HHS).

ACTION: Final rule.

-----------------------------------------------------------------------

SUMMARY: This final rule implements certain provisions of the 21st 
Century Cures Act, including Conditions and Maintenance of 
Certification requirements for health information technology (health 
IT) developers under the ONC Health IT Certification Program (Program), 
the voluntary certification of health IT for use by pediatric health 
care providers, and reasonable and necessary activities that do not 
constitute information blocking. The implementation of these provisions 
will advance interoperability and support the access, exchange, and use 
of electronic health information. The rule also finalizes certain 
modifications to the 2015 Edition health IT certification criteria and 
Program in additional ways to advance interoperability, enhance health 
IT certification, and reduce burden and costs.

DATES: 
    Effective date: This final rule is effective on June 30, 2020.
    Incorporation by reference: The incorporation by reference of 
certain publications listed in the rule was approved by the Director of 
the Federal Register as of June 30, 2020.
    Compliance date: Compliance with 45 CFR 170.401, 170.402(a)(1), and 
45 CFR part 171 is required by November 2, 2020.

FOR FURTHER INFORMATION CONTACT: Michael Lipinski, Office of Policy, 
Office of the National Coordinator for Health Information Technology, 
202-690-7151.

SUPPLEMENTARY INFORMATION: 

Table of Contents

I. Executive Summary
    A. Purpose of Regulatory Action
    B. Summary of Major Provisions and Clarifications
    1. Deregulatory Actions for Previous Rulemakings
    2. Updates to the 2015 Edition Certification Criteria
    a. Adoption of the United States Core Data for Interoperability 
(USCDI) as a Standard
    b. Electronic Prescribing
    c. Clinical Quality Measures--Report
    d. Electronic Health Information (EHI) Export
    e. Application Programming Interfaces
    f. Privacy and Security Transparency Attestations
    g. Security Tags and Consent Management
    3. Modifications To the ONC Health IT Certification Program
    4. Health IT for the Care Continuum
    5. Conditions and Maintenance of Certification Requirements
    6. Information Blocking
    C. Costs and Benefits
II. Background
    A. Statutory Basis
    1. Standards, Implementation Specifications, and Certification 
Criteria
    2. Health IT Certification Program(s)
    B. Regulatory History
    C. General Comments on the Proposed Rule
III. Deregulatory Actions for Previous Rulemakings
    A. Background
    1. History of Burden Reduction and Regulatory Flexibility
    2. Executive Orders 13771 and 13777
    B. Deregulatory Actions
    1. Removal of Randomized Surveillance Requirements
    2. Removal of the 2014 Edition From the Code of Federal 
Regulations
    3. Removal of the ONC-Approved Accreditor From the Program
    4. Removal of Certain 2015 Edition Certification Criteria and 
Standards
    a. 2015 Edition Base EHR Definition Certification Criteria
    b. Drug-Formulary and Preferred Drug Lists
    c. Patient-Specific Education Resources
    d. Common Clinical Data Set Summary Record--Create; and Common 
Clinical Data Set Summary Record--Receive
    e. Secure Messaging
    5. Removal of Certain ONC Health IT Certification Program 
Requirements
    a. Limitations Disclosures
    b. Transparency and Mandatory Disclosures Requirements
    6. Recognition of Food and Drug Administration Processes
    a. FDA Software Precertification Pilot Program
    b. Development of Similar Independent Program Processes--Request 
for Information
IV. Updates To the 2015 Edition Certification Criteria
    A. Standards and Implementation Specifications
    1. National Technology Transfer and Advancement Act
    2. Compliance With Adopted Standards and Implementation 
Specifications
    3. ``Reasonably Available'' to Interested Parties
    B. Revised and New 2015 Edition Criteria
    1. The United States Core Data for Interoperability Standard 
(USCDI)
    a. USCDI 2015 Edition Certification Criteria
    b. USCDI Standard--Data Classes Included
    c. USCDI Standard--Relationship to Content Exchange Standards 
and Implementation Specifications
    2. Clinical Notes C-CDA Implementation Specification
    3. Unique Device Identifier(s) for a Patient's Implantable 
Device(s) C-CDA Implementation Specification
    4. Electronic Prescribing Criterion
    a. Electronic Prescribing Standard and Certification Criterion
    b. Electronic Prescribing Transactions
    5. Clinical Quality Measures--Report Criterion
    6. Electronic Health Information (EHI) Export Criterion
    a. Single Patient Export To Support Patient Access
    b. Patient Population Export to Support Transitions Between 
Health IT Systems
    c. Scope of Data Export
    d. Export Format
    e. Initial Step Towards Real-Time Access
    f. Timeframes
    g. 2015 Edition ``Data Export'' Criterion in Sec.  170.315(b)(6)
    7. Standardized API for Patient and Population Services 
Criterion
    8. Privacy and Security Transparency Attestations Criteria
    a. Encrypt Authentication Credentials
    b. Multi-Factor Authentication
    9. Security Tags and Consent Management Criteria
    a. Implementation With the Consolidated CDA Release 2.1
    b. Implementation With the Fast Healthcare Interoperability 
Resources (FHIRr) Standard
    10. Auditable Events and Tamper-Resistance, Audit Reports, and 
Auditing Actions on Health Information
    C. Unchanged 2015 Edition Criteria--Promoting Interoperability 
Programs Reference Alignment
V. Modifications To the ONC Health IT Certification Program
    A. Corrections
    1. Auditable Events and Tamper Resistance
    2. Amendments
    3. View, Download, and Transmit to 3rd Party
    4. Integrating Revised and New Certification Criteria Into the 
2015 Edition Privacy and Security Certification Framework
    B. Principles of Proper Conduct for ONC-ACBs
    1. Records Retention
    2. Conformance Methods for Certification Criteria
    3. ONC-ACBs To Accept Test Results From Any ONC-ATL in Good 
Standing
    4. Mandatory Disclosures and Certifications
    C. Principles of Proper Conduct for ONC-ATLs--Records Retention
VI. Health IT for the Care Continuum
    A. Health IT for Pediatric Setting
    1. Background and Stakeholder Convening
    2. Recommendations for the Voluntary Certification of Health IT 
for Use in Pediatric Care
    a. 2015 Edition Certification Criteria
    b. New or Revised Certification Criteria

[[Page 25643]]

    B. Health IT and Opioid Use Disorder Prevention and Treatment--
Request for Information
VII. Conditions and Maintenance of Certification Requirements for 
Health IT Developers
    A. Implementation
    B. Provisions
    1. Information Blocking
    2. Assurances
    a. Full Compliance and Unrestricted Implementation of 
Certification Criteria Capabilities
    b. Certification to the ``Electronic Health Information Export'' 
Criterion
    c. Records and Information Retention
    d. Trusted Exchange Framework and the Common Agreement--Request 
for Information
    3. Communications
    a. Background and Purpose
    b. Condition of Certification Requirements
    c. Maintenance of Certification Requirements
    4. Application Programming Interfaces
    a. Statutory Interpretation and API Policy Principles
    b. API Standards and Implementation Specifications
    c. Standardized API for Patient and Population Services
    d. API Condition of Certification Requirements
    e. API Maintenance of Certification Requirements
    5. Real World Testing
    a. Unit of Analysis at which Testing Requirements Apply
    b. Applicability of Real World Testing Condition and Maintenance 
of Certification Requirements
    c. Testing Plans, Methods, and Results Reporting
    d. Submission Dates
    e. Real World Testing Pilot Year
    f. Health IT Modules Certified But Not Yet Deployed
    g. Standards Version Advancement Process (SVAP)
    h. Updating Already Certified Health IT Leveraging SVAP 
Flexibility
    i. Health IT Modules Presented for Certification Leveraging SVAP 
Flexibility
    j. Requirements Associated With All Health IT Modules Certified 
Leveraging SVAP Flexibility
    k. Advanced Version Approval for SVAP
    l. Real World Testing Principles of Proper Conduct for ONC-ACBs
    m. Health IT Module Certification & Certification to Newer 
Versions of Certain Standards
    6. Attestations
    7. EHR Reporting Criteria Submission
    C. Compliance
    D. Enforcement
    1. ONC Direct Review of the Conditions and Maintenance of 
Certification Requirements
    2. Review and Enforcement Only by ONC
    3. Review Processes
    a. Initiating Review and Health IT Developer Notice
    b. Relationship With ONC-ACBs and ONC-ATLs
    c. Records Access
    d. Corrective Action
    e. Certification Ban and Termination
    f. Appeal
    g. Suspension
    h. Proposed Termination
    4. Public Listing of Certification Ban and Terminations
    5. Effect on Existing Program Requirements and Processes
    6. Coordination With the Office of Inspector General
    7. Applicability of Conditions and Maintenance of Certification 
Requirements for Self-Developers
VIII. Information Blocking
    A. Statutory Basis
    B. Legislative Background and Policy Considerations
    1. Purpose of the Information Blocking Provision
    2. Policy Considerations and Approach to Information Blocking
    3. General Comments Regarding Information Blocking Exceptions
    C. Relevant Statutory Terms and Provisions
    1. ``Required by Law''
    2. Health Care Providers, Health IT Developers, Exchanges, and 
Networks
    a. Health Care Providers
    b. Health IT Developers of Certified Health IT
    c. Health Information Networks and Health Information Exchanges
    3. Electronic Health Information
    4. Price Information--Request for Information
    5. Interests Promoted by the Information Blocking Provision
    a. Access, Exchange, and Use of EHI
    b. Interoperability Elements
    6. Practices That May Implicate the Information Blocking 
Provision
    a. Prevention, Material Discouragement, and Other Interference
    b. Likelihood of Interference
    c. Examples of Practices Likely to Interfere With Access, 
Exchange, or Use of EHI
    7. Applicability of Exceptions
    a. Reasonable and Necessary Activities
    b. Treatment of Different Types of Actors
    c. Establishing That Activities and Practices Meet the 
Conditions of an Exception
    D. Exceptions to the Information Blocking Definition
    1. Exceptions That Involve not Fulfilling Requests To Access, 
Exchange, or Use EHI
    a. Preventing Harm Exception--When will an actor's practice that 
is likely to interfere with the access, exchange, or use of EHI in 
order to prevent harm not be considered information blocking?
    b. Privacy Exception--When will an actor's practice of not 
fulfilling a request to access, exchange, or use EHI in order to 
protect an individual's privacy not be considered information 
blocking?
    c. Security Exception--When will an actor's practice that is 
likely to interfere with the access, exchange, or use of EHI in 
order to protect the security of EHI not be considered information 
blocking?
    d. Infeasibility Exception--When will an actor's practice of not 
fulfilling a request to access, exchange, or use EHI due to the 
infeasibility of the request not be considered information blocking?
    e. Health IT Performance Exception--When will an actor's 
practice that is implemented to maintain or improve health IT 
performance and that is likely to interfere with the access, 
exchange, or use of EHI not be considered information blocking?
    2. Exceptions That Involve Procedures for Fulfilling Requests To 
Access, Exchange, or Use EHI
    a. Content and Manner Exception--When will an actor's practice 
of limiting the content of its response to or the manner in which it 
fulfills a request to access, exchange, or use EHI not be considered 
information blocking?
    b. Fees Exception--When will an actor's practice of charging 
fees for accessing, exchanging, or using EHI not be considered 
information blocking?
    c. Licensing Exception--When will an actor's practice to license 
interoperability elements in order for EHI to be accessed, 
exchanged, or used not be considered information blocking?
    E. Additional Exceptions--Request for Information
    1. Exception for Complying With Common Agreement for Trusted 
Exchange
    2. New Exceptions
    F. Complaint Process
    G. Disincentives for Health Care Providers--Request for 
Information
IX. Registries Request for Information
X. Patient Matching Request for Information
XI. Incorporation by Reference
XII. Collection of Information Requirements
    A. ONC-ACBs
    B. Health IT Developers
XIII. Regulatory Impact Analysis
    A. Statement of Need
    B. Alternatives Considered
    C. Overall Impact
    1. Executive Orders 12866 and 13563--Regulatory Planning and 
Review Analysis
    2. Executive Order 13771--Reducing Regulation and Controlling 
Regulatory Costs
    a. Costs and Benefits
    b. Accounting Statement and Table
    3. Regulatory Flexibility Act
    4. Executive Order 13132--Federalism
    5. Unfunded Mandates Reform Act of 1995
Regulation Text

I. Executive Summary

A. Purpose of Regulatory Action

    ONC is responsible for the implementation of key provisions in 
Title IV of the 21st Century Cures Act (Cures Act) that are designed to 
advance interoperability; support the access, exchange, and use of 
electronic health information (EHI); and address occurrences of 
information blocking. This final rule implements certain provisions of 
the Cures Act, including Conditions and Maintenance of Certification 
requirements for health information technology (health IT)

[[Page 25644]]

developers, the voluntary certification of health IT for use by 
pediatric health providers, and reasonable and necessary activities 
that do not constitute information blocking. The final rule also 
implements parts of section 4006(a) of the Cures Act to support 
patients' access to their EHI in a form convenient for patients, such 
as making a patient's EHI more electronically accessible through the 
adoption of standards and certification criteria and the implementation 
of information blocking policies that support patient electronic access 
to their health information at no cost. Additionally, the final rule 
modifies the 2015 Edition health IT certification criteria and ONC 
Health IT Certification Program (Program) in other ways to advance 
interoperability, enhance health IT certification, and reduce burden 
and costs.
    In addition to fulfilling the Cures Act's requirements, the final 
rule contributes to fulfilling Executive Order (E.O.) 13813. The 
President issued E.O. 13813 on October 12, 2017, to promote health care 
choice and competition across the United States. Section 1(c) of the 
E.O., in relevant part, states that government rules affecting the 
United States health care system should re-inject competition into 
health care markets by lowering barriers to entry and preventing abuses 
of market power. Section 1(c) also states that government rules should 
improve access to and the quality of information that Americans need to 
make informed health care decisions. For example, as mentioned above, 
the final rule establishes application programming interface (API) 
requirements, including for patients' access to their health 
information without special effort. The API approach also supports 
health care providers' independence to choose the ``provider-facing'' 
third-party services they want to use to interact with the certified 
API technology they have acquired. In addition, the final rule provides 
the Secretary of Health and Human Services' (Secretary) interpretation 
of the information blocking definition as established in the Cures Act 
and the application of the information blocking provision by 
identifying reasonable and necessary activities that would not 
constitute information blocking. Many of these activities focus on 
improving patient and health care provider access to EHI and promoting 
competition.

B. Summary of Major Provisions and Clarifications

1. Deregulatory Actions for Previous Rulemakings
    Since the inception of the Program, we have aimed to implement and 
administer the Program in the least burdensome manner that supports our 
policy goals. Throughout the years, we have worked to improve the 
Program with a focus on ways to reduce burden, offer flexibility to 
both developers and providers, and support innovation. This approach 
has been consistent with the principles of E.O. 13563 on Improving 
Regulation and Regulatory Review (February 2, 2011), which instructs 
agencies to ``periodically review its existing significant regulations 
and determine whether any such regulations should be modified, 
streamlined, expanded, or repealed so as to make the agency's 
regulatory program more effective or less burdensome in achieving the 
regulatory objectives.'' To that end, we have historically, where 
feasible and appropriate, taken measures to reduce burden within the 
Program and make the Program more effective, flexible, and streamlined.
    We reviewed and evaluated existing regulations and identified ways 
to administratively reduce burden and implement deregulatory actions 
through guidance. In this final rule, we have finalized new 
deregulatory actions that will reduce burden for health IT developers, 
providers, and other stakeholders. We have finalized five deregulatory 
actions in section III.B: (1) Removal of a requirement to conduct 
randomized surveillance on a set percentage of certified products, 
allowing ONC-Authorized Certification Bodies (ONC-ACBs) more 
flexibility to identify the right approach for surveillance actions; 
(2) removal of the 2014 Edition from the Code of Federal Regulations 
(CFR); (3) removal of the ONC-Approved Accreditor (ONC-AA) from the 
Program; (4) removal of certain 2015 Edition certification criteria; 
and (5) removal of certain Program requirements. We have not finalized 
a sixth deregulatory action we proposed, related to recognition of the 
Food and Drug Administration (FDA) Software Precertification Program, 
as comments and the early stage of development of the FDA program 
indicate finalization would be premature at this time.
2. Updates to the 2015 Edition Certification Criteria
    This final rule updates the 2015 Edition to remove several 
certification criteria. It also updates some certification criteria to 
reflect standard and implementation specification updates. In 
consideration of public comments, the final rule adds only two new 
technical certification criteria and two new attestation-structured 
privacy and security certification criteria.
a. Adoption of the United States Core Data for Interoperability (USCDI) 
as a Standard
    We noted in the Proposed Rule that, as part of continued efforts to 
ensure the availability of a minimum baseline of data classes that 
could be commonly available for interoperable exchange, ONC adopted the 
2015 Edition ``Common Clinical Data Set'' (CCDS) definition and used 
the CCDS shorthand in several certification criteria. However, the CCDS 
definition also began to be used colloquially for many different 
purposes. As the CCDS definition's relevance grew outside of its 
regulatory context, it was often viewed as a ceiling to the industry's 
collective data set for access, exchange, and use. In addition, we 
noted in the NPRM that as we continue to move toward value-based care, 
the inclusion of additional data classes beyond the CCDS would be 
necessary. In order to advance interoperability, we proposed to remove 
the CCDS definition and its references from the 2015 Edition and 
replace it with the ``United States Core Data for Interoperability 
\1\'' (USCDI). We proposed to adopt the USCDI as a standard, naming 
USCDI Version 1 (USCDI v1) in Sec.  170.213 and incorporating it by 
reference in Sec.  170.299. The USCDI standard would establish a set of 
data classes and constituent data elements required to support 
interoperability nationwide. To achieve the goals set forth in the 
Cures Act, we indicated that we intended to establish and follow a 
predictable, transparent, and collaborative process to expand the 
USCDI, including providing stakeholders with the opportunity to comment 
on the USCDI's expansion. We also noted that once the USCDI is adopted 
by the Secretary in regulation, health IT developers would be allowed 
to take advantage of a new proposed flexibility we called the 
``Standards Version Advancement Process'' (SVAP) (see 84 FR 7497 
through 7500, see also section VII.B.5 of this final rule). In order to 
advance interoperability, we have finalized the adoption of the USCDI 
standard. Because the USCDI is adopted as a standard and the SVAP is 
finalized, the SVAP will allow a developer to voluntarily have their 
products certified to newer, National Coordinator approved versions of 
the

[[Page 25645]]

USCDI in the future without waiting for rulemaking to update the 
version of the USCDI listed in the regulations.
---------------------------------------------------------------------------

    \1\ https://www.healthit.gov/uscdi.
---------------------------------------------------------------------------

b. Electronic Prescribing
    We have finalized an update to the electronic prescribing National 
Council for Prescription Drug Programs (NCPDP) SCRIPT standard in 45 
CFR 170.205(b) from NCPDP SCRIPT standard version 10.6 to NCPDP SCRIPT 
standard version 2017071 for the electronic prescribing certification 
criterion (Sec.  170.315(b)(3)). ONC and the Centers for Medicare & 
Medicaid Services (CMS) have historically maintained aligned e-Rx and 
medication history (MH) standards to ensure that the current standard 
for certification to the electronic prescribing criterion supports use 
of the current Part D e-Rx and MH standards. This helps advance 
alignment with CMS' program standards.
    In a final rule published April 16, 2018, CMS finalized its update 
of its Part D standards to NCPDP SCRIPT standard version 2017071 for e-
Rx and MH, effective January 1, 2020 (83 FR 16440). In addition to 
continuing to reference the transactions previously included in Sec.  
170.315(b)(3), and in keeping with CMS' final rule, we have adopted all 
of the additional NCPDP SCRIPT standard version 2017071 transactions 
that CMS adopted in 42 CFR 423.160(b)(2)(iv). Furthermore, we have 
adopted the same electronic Prior Authorization (ePA) request and 
response transactions supported by NCPDP SCRIPT standard 2017071 
proposed by CMS in the Medicare Program; Secure Electronic Prior 
Authorization for Medicare Part D proposed rule (84 FR 28450). Some 
adopted transactions are required to demonstrate conformance to the 
updated Sec.  170.315(b)(3) criterion, while other transactions are 
optional.
c. Clinical Quality Measures--Report
    In this final rule, we have removed the Health Level 7 
(HL7[supreg]) Quality Reporting Document Architecture (QRDA) standard 
requirements in the 2015 Edition ``Clinical Quality Measures--report'' 
criterion in Sec.  170.315(c)(3) and, in their place, required Health 
IT Modules to support the CMS QRDA Implementation Guide (IGs).\2\ This 
will help reduce the burden for health IT developers and remove 
certification requirements that do not support quality reporting for 
CMS programs.
---------------------------------------------------------------------------

    \2\ https://ecqi.healthit.gov/qrda-quality-reporting-document-
architecture.
---------------------------------------------------------------------------

d. Electronic Health Information (EHI) Export
    We proposed to adopt a new 2015 Edition certification criterion, 
referred to as ``EHI export'' in Sec.  170.315(b)(10) in the Proposed 
Rule. The criterion's proposed conformance requirements were intended 
to provide a means to export the entire EHI a certified health IT 
product produced and electronically managed to support two contexts: 
(1) Single patient EHI export and (2) for patient EHI export when a 
health care provider is switching health IT systems. The proposals did 
not require the exported data to be in a specific standardized format. 
Rather, we proposed to require that such an export be in a computable, 
electronic format made available via a publicly accessible hyperlink. 
We noted that this transparency would facilitate the subsequent 
interpretation and use of the exported information.
    We have finalized the criterion with modifications in response to 
public comment. We have refined the scope of data a Health IT Module 
certified to Sec.  170.315(b)(10) must export, and aligned the 
criterion to the definition of EHI we finalized in Sec.  170.102 and 
Sec.  171.102. The finalized criterion requires a certified Health IT 
Module to electronically export all of the EHI, as defined in Sec.  
171.102, that can be stored at the time of certification by the 
product, of which the Health IT Module is a part. We finalized the 2015 
Edition Cures Update ``EHI export'' criterion in Sec.  170.315(b)(10) 
but did not finalize its inclusion in the 2015 Edition Base Electronic 
Health Record (EHR) definition, as proposed. Our intention with this 
criterion, in combination with other criteria set forth in this final 
rule, is to advance the interoperability of health IT as defined in 
section 4003 the Cures Act, including the ``complete access, exchange, 
and use of all electronically accessible health information.''
e. Application Programming Interfaces (APIs)
    We have adopted a new API certification criterion in Sec.  
170.315(g)(10) to replace the ``application access--data category 
request'' certification criterion (Sec.  170.315(g)(8)), and added it 
to the updated 2015 Edition Base EHR definition. This new 
``standardized API for patient and population services'' certification 
criterion focuses on supporting two types of API-enabled services: (1) 
Services for which a single patient's data is the focus and (2) 
services for which multiple patients' data are the focus. The API 
certification criterion requires the use of the Health Level 7 
(HL7[supreg]) Fast Healthcare Interoperability Resources (FHIR[supreg]) 
standard Release 4 and references several standards and implementation 
specifications adopted in Sec.  170.213 and Sec.  170.215 to support 
standardization and interoperability. This certification criterion will 
align industry efforts around FHIR Release 4 and advance 
interoperability of API-enabled ``read'' services for single and 
multiple patients.
f. Privacy and Security Transparency Attestations
    We have adopted two new privacy and security certification criteria 
requiring transparency attestations from developers of certified health 
IT as part of the updated 2015 Edition privacy and security 
certification framework. The attestations will serve to identify 
whether or not certified health IT supports encrypting authentication 
credentials and/or multi-factor authentication (MFA). While these 
criteria provide increased transparency, they do not require new 
development or implementation to take place. As part of ONC's ongoing 
commitment to advance transparency about certified health IT products, 
ONC will list the developers' attestation responses on the Certified 
Health IT Product List (CHPL).
g. Security Tags and Consent Management
    In the 2015 Edition final rule (80 FR 62646, Oct. 16, 2015), we 
adopted two ``data segmentation for privacy'' (DS4P) certification 
criteria, one for creating a summary record according to the DS4P 
standard (Sec.  170.315(b)(7)) and one for receiving a summary record 
according to the DS4P standard (Sec.  170.315(b)(8)). Certification to 
these 2015 Edition DS4P criteria only required security tagging of 
Consolidated-Clinical Document Architecture (C-CDA) documents at the 
document level. As noted in the 2015 Edition final rule (80 FR 62646), 
certification to these criteria is not linked to meeting the Certified 
EHR Technology definition (CEHRT) used in CMS programs.
    Since the 2015 Edition final rule, the health care industry has 
engaged in additional field testing and implementation of the DS4P 
standard. Stakeholders also shared with ONC--through public forums, 
listening sessions, and correspondence--that only tagging C-CDA 
documents at the document level did not permit providers the 
flexibility to address more complex use cases for representing patient 
privacy preferences. Based on public comment, in this final rule, we

[[Page 25646]]

have changed the names of the two current 2015 Edition DS4P criteria to 
Security tags--Summary of Care (send) and Security tags--Summary of 
Care (receive). We also updated the requirements for these criteria to 
support security tagging at the document, section, and entry levels. 
This change better reflects the purpose of these criteria and enables 
adopters to support a more granular approach to security tagging 
clinical documents for exchange.
    In finalizing this more granular approach for security tagging 
Consolidated Clinical Document Architecture (C-CDA) documents, we note 
that we do not specify rules or requirements for the disposition of 
tagged data or any requirements on health care providers related to 
data segmentation for privacy. The use cases for which health IT 
certified to these criteria might be implemented would be driven by 
other applicable Federal, State, local, or tribal law and are outside 
the scope of the certification criteria. We recognize that the tagging 
of documents is not a fully automated segmentation of the record but 
rather a first, technological step or tool to support health IT 
developers implementing technology solutions for health care providers 
to replace burdensome manual processes for tagging sensitive 
information.
    We also proposed to adopt a new 2015 Edition certification 
criterion, ``consent management for APIs'' in Sec.  170.315(g)(11), to 
support data segmentation and consent management through an API in 
accordance with the Consent Implementation Guide (IG). However, in 
response to comments, we have chosen not to finalize our proposal for 
this criterion at this time.
3. Modifications to the ONC Health IT Certification Program
    In this final rule, we have finalized corrections to the 2015 
Edition privacy and security certification framework (80 FR 62705) and 
relevant regulatory provisions. We also have finalized corrections to 
the relevant current Certification Companion Guides (CCGs). We have 
adopted new and revised Principles of Proper Conduct (PoPC) for ONC-
ACBs. We have finalized clarification that the records retention 
provision includes the ``life of the edition'' as well as three years 
after the retirement of an edition related to the certification of 
Complete EHRs and Health IT Modules. We also have finalized revisions 
to the PoPC in Sec.  170.523(h) to clarify the basis for certification, 
including to permit a certification decision to be based on an 
evaluation conducted by the ONC-ACB for Health IT Modules' compliance 
with certification criteria by use of conformity methods approved by 
the National Coordinator for Health Information Technology (National 
Coordinator). We also have finalized the addition of Sec.  170.523(r) 
to require ONC-ACBs to accept test results from any ONC-Authorized 
Testing Laboratory (ONC-ATL) in good standing under the Program and 
compliant with the ISO/IEC 17025 accreditation requirements consistent 
with the requirements set forth in Sec. Sec.  170.520(b)(3) and 
170.524(a). We believe these new and revised PoPC provide necessary 
clarifications for ONC-ACBs and promote stability among the ONC-ACBs. 
We also have finalized the update of Sec.  170.523(k) to broaden the 
requirements beyond just the Medicare and Medicaid EHR Incentive 
Programs (now renamed the Promoting Interoperability (PI) Programs and 
referenced as such hereafter) and provided other necessary 
clarifications.
    We have finalized a revised PoPC for ONC-ATLs. The finalized 
revision clarifies that the records retention provision includes the 
``life of the edition'' as well as three years after the retirement of 
an edition related to the certification of Complete EHRs and Health IT 
Modules.
4. Health IT for the Care Continuum
    Section 4001(b) of the Cures Act includes two provisions related to 
supporting health IT across the care continuum. The first instructs the 
National Coordinator to encourage, keep, or recognize through existing 
authorities the voluntary certification of health IT for use in medical 
specialties and sites of service where more technological advancement 
or integration is needed. The second outlines a provision related to 
the voluntary certification of health IT for use by pediatric health 
providers to support the health care of children. These provisions 
align closely with our core purpose to promote interoperability and to 
support care coordination, patient engagement, and health care quality 
improvement initiatives. Advancing health IT that promotes and supports 
patient care when and where it is needed continues to be a primary goal 
of the Program. This means health IT should support patient 
populations, specialized care, transitions of care, and practice 
settings across the care continuum.
    We have explored how we might work with the health IT industry and 
with specialty organizations to collaboratively develop and promote 
health IT that supports medical specialties and sites of service. Over 
time, we have taken steps to make the Program modular, more open and 
accessible to different types of health IT, and better able to advance 
functionality that is generally applicable to a variety of care and 
practice settings. We considered a wide range of factors specific to 
the provisions in the Cures Act to support providers of health care for 
children. These include: The evolution of health IT across the care 
continuum, the costs and benefits associated with health IT, the 
potential regulatory burden and compliance timelines, and the need to 
help advance health IT that benefits multiple medical specialties and 
sites of service involved in the care of children. In consideration of 
these factors, and to advance implementation of section 4001(b) of the 
Cures Act specific to pediatric care, we held a listening session where 
stakeholders could share their clinical knowledge and technical 
expertise in pediatric care and pediatric sites of service. Through the 
information learned at this listening session and our analysis of the 
health IT landscape for pediatric settings, we identified existing 2015 
Edition criteria, as well as new or revised 2015 Edition criteria 
proposed in the Proposed Rule, that could benefit providers of 
pediatric care and pediatric settings. In this final rule, we have 
identified the already existing 2015 Edition certification criteria and 
the new or revised 2015 Edition criteria adopted in this final rule 
that support the voluntary certification of health IT for pediatric 
care and pediatric settings. We also elaborate on our next steps to 
support pediatric care and pediatric settings through the development, 
adoption, certification, and use of health IT, including the continued 
support of a pediatrics health IT web page on www.healthit.gov/pediatrics and the future development of informational resources.
    We also recognize the significance of the opioid epidemic 
confronting our nation and the importance of helping to support the 
health IT needs of health care providers committed to preventing 
inappropriate access to prescription opioids and to providing safe, 
appropriate treatment. Therefore, we requested public comment on how 
our existing Program requirements and the proposals in the Proposed 
Rule may support use cases related to Opioid Use Disorder (OUD) 
prevention and treatment and if there were additional areas that we 
should consider for effective implementation of health IT to help 
address OUD prevention and treatment. We received over 100

[[Page 25647]]

comments in responses to this RFI, which we are actively reviewing.
5. Conditions and Maintenance of Certification Requirements
    We have established in this final rule, certain Conditions and 
Maintenance of Certification requirements for health IT developers 
based on the Conditions and Maintenance of Certification requirements 
outlined in section 4002 of the Cures Act. The Program's Conditions and 
Maintenance of Certification requirements express initial requirements 
for health IT developers and their certified Health IT Module(s) as 
well as ongoing requirements that must be met by both health IT 
developers and their certified Health IT Module(s) under the Program. 
In this regard, we have implemented the Cures Act Conditions of 
Certification requirements with further specificity as it applies to 
the Program and implemented any accompanying Maintenance of 
Certification requirements as standalone requirements to ensure that 
the Conditions of Certification requirements are not only met but 
continually being met through the Maintenance of Certification 
requirements. In this rule, we capitalize ``Conditions of 
Certification'' and ``Maintenance of Certification'' when referring to 
Conditions and Maintenance of Certification requirements established 
for the Program under section 4002 of the Cures Act for ease of 
reference and to distinguish from other conditions.
Information Blocking
    Section 4002 of the Cures Act requires that a health IT developer, 
as a Condition and Maintenance of Certification requirement under the 
Program, not take any action that constitutes information blocking as 
defined in section 3022(a) of the Public Health Service Act (PHSA). We 
have adopted the information blocking Condition of Certification 
requirement in Sec.  170.401 as proposed. As finalized, the Condition 
of Certification requirement prohibits any health IT developer under 
the Program from taking any action that constitutes information 
blocking as defined by section 3022(a) of the PHSA. We have also 
finalized that definition in Sec.  171.103.
Assurances
    Section 4002 of the Cures Act also requires that a health IT 
developer, as a Condition of Certification requirement under the 
Program, provide assurances to the Secretary that, unless for 
legitimate purpose(s) as specified by the Secretary, the developer will 
not take any action that constitutes information blocking as defined in 
section 3022(a) of the PHSA or any other action that may inhibit the 
appropriate exchange, access, and use of EHI. We have finalized our 
proposed implementation of this provision through several Conditions of 
Certification and accompanying Maintenance of Certification 
requirements, which are set forth in Sec.  170.402. We have also 
adopted more specific Conditions and Maintenance of Certification 
requirements, which are also set forth in Sec.  170.402, for certified 
health IT developers to provide assurances to the Secretary that it 
does not take any other action that may inhibit the appropriate 
exchange, access, and use of EHI. These requirements serve to provide 
further clarity under the Program as to how health IT developers must 
meet our requirements as promulgated under the Cures Act.
Communications
    The Cures Act also requires as a Condition and Maintenance of 
Certification requirement under the Program that health IT developers 
do not prohibit or restrict communications about certain aspects of the 
performance of health IT and the developers' related business 
practices. We have finalized (in Sec.  170.403) provisions that permit 
developers to impose certain types of limited prohibitions and 
restrictions that strike a balance between the need to promote open 
communication about health IT, and related developer business 
practices, with the need to protect the legitimate business interests 
of health IT developers and others. The provisions identify certain 
narrowly-defined types of communications, such as communications 
required by law, made to a government agency, or made to a defined 
category of safety organization, which will receive ``unqualified 
protection'' under our Program. Under this policy, developers will be 
prohibited from imposing any prohibitions or restrictions on such 
protected communications. Based on public comment received, we have 
also finalized provisions that allow health IT developers certified 
under the Program to place limitations on certain types of 
communications, including screenshots and video.
    We have adopted Maintenance of Certification requirements proposed 
in Sec.  170.403(b) with modifications. A health IT developer must not 
impose or enforce any contractual requirement that contravenes the 
requirements of this Condition of Certification. Furthermore, if a 
health IT developer has contracts/agreements in existence that 
contravene the requirements of this Condition of Certification, the 
developer must notify all affected customers, other persons, or 
entities that the prohibition or restriction within the contract/
agreement will not be enforced by the health IT developer. In response 
to comments, we have finalized in Sec.  170.403(b)(2)(ii) that health 
IT developers are required to amend their contracts/agreements to 
remove or make void such provisions only when the contracts/agreements 
are next modified for other purposes and not within the proposed period 
of time from the effective date of this final rule.
Application Programming Interfaces (APIs)
    As a Condition of Certification requirement in section 4002 of the 
Cures Act requires health IT developers to publish APIs that allow 
``health information from such technology to be accessed, exchanged, 
and used without special effort through the use of APIs or successor 
technology or standards, as provided for under applicable law.'' The 
Cures Act's API Condition of Certification requirement also states that 
a developer must, through an API, ``provide access to all data elements 
of a patient's electronic health record to the extent permissible under 
applicable privacy laws.'' The Cures Act's API Condition of 
Certification requirement in section 4002 includes several key phrases 
and requirements for health IT developers that go beyond the technical 
functionality of the Health IT Modules they present for certification. 
This final rule captures both the technical functionality and behaviors 
necessary to implement the Cures Act API Condition of Certification 
requirement. Specifically, we have adopted new standards, new 
implementation specifications, a new certification criterion, and have 
modified the Base EHR definition. In addition, we have finalized 
detailed Condition and Maintenance of Certification requirements for 
health IT developers.
Real World Testing
    The Cures Act also added a new Condition and Maintenance of 
Certification requirement that health IT developers must successfully 
test the real world use of health IT for interoperability in the 
type(s) of setting(s) in which such technology would be marketed. This 
provision is critical to advancing transparency regarding Health IT 
Modules' performance and to users having information that could be 
crucial to

[[Page 25648]]

their decisions to acquire certified health IT.
    As discussed in section VII.B.5 of this final rule, we have 
established in Sec.  170.405 real world testing Condition and 
Maintenance of Certification requirements that include Maintenance of 
Certification requirements to update Health IT Modules certified to 
certain certification criteria (see Sec.  170.405(b)(3) through (7) and 
section IV.B of this final rule preamble) to ensure this certified 
technology meets its users' needs for widespread and continued 
interoperability.
    As finalized, real world testing Condition and Maintenance of 
Certification requirements apply to health IT developers with one or 
more Health IT Module(s) certified to specific certification criteria 
focused on interoperability and data exchange that are listed in Sec.  
170.405(a), as discussed in section VII.B.5 of this final rule. Under 
these Condition and Maintenance of Certification requirements, health 
IT developers must submit publicly available annual real world testing 
plans as well as annual real world testing results for health IT 
certified to the criteria identified in Sec.  170.405(a). We have also 
finalized a flexibility that we have named the Standards Version 
Advancement Process (SVAP). Under this flexibility, health IT 
developers will have the option to update their health IT that is 
certified to the criteria identified in Sec.  170.405(a) to use more 
advanced version(s) of the adopted standard(s) or implementation 
specification(s) included in the criteria, provided such versions are 
approved by the National Coordinator for use in health IT certified 
under the Program. Similarly, we have finalized our proposal (84 FR 
7497 through 7500) that health IT developers presenting health IT for 
initial certification to one of the criteria listed in Sec.  170.405(a) 
would have the option to certify to National Coordinator-approved newer 
version(s) of one or more of the Secretary-adopted standards or 
implementation specifications applicable to the criterion. All health 
IT developers voluntarily opting to avail themselves of the SVAP 
flexibility must ensure that their annual real world testing plans and 
real world testing results submissions address all the versions of all 
the standards and implementation specifications to which each Health IT 
Module is certified. In addition, we have finalized in Sec.  
170.405(b)(8)(i) the requirement that health IT developers with 
existing certifications to criteria listed in Sec.  170.405(a) who wish 
to avail themselves of the SVAP flexibility must notify both their ONC-
ACB and their affected customers of their plans to update their 
certified health IT, and the update's anticipated impact on their 
existing certified health IT and customers, specifically including but 
not limited to whether, and if so for how long, the health IT developer 
intends to continue supporting the prior version(s) \3\ of the 
standard(s) to which the Health IT Module has already been certified, 
in addition to the National Coordinator-approved newer version(s) 
included in a planned update.
---------------------------------------------------------------------------

    \3\ In the near term, many of these prior versions are likely to 
be the same versions adopted by the Secretary and incorporated by 
reference in subpart B of 45 CFR part 170. Over time, however, we 
anticipate increasing frequency of prior versions certified 
including National Coordinator-approved newer versions of these 
Secretary-adopted standards.
---------------------------------------------------------------------------

    We have finalized our proposal (84 FR 7501) to establish in Sec.  
170.523(p) a new PoPC for ONC-ACBs that requires ONC-ACBs to review and 
confirm that each health IT developer with one or more Health IT 
Module(s) certified to any one or more of the criteria listed in Sec.  
170.405(a) submits real world testing plans and real world results on a 
timeframe that allows for the ONC-ACB to confirm completeness of all 
plans and results by applicable annual due dates. The specific annual 
due dates finalized in Sec.  170.523(p) differ from those proposed as, 
and for the reasons, discussed in section VII.B.5 of this final rule 
preamble. Once completeness is confirmed, ONC-ACBs must make the plans 
available to ONC and the public via the Certified Health IT Product 
List (CHPL).\4\ We have also finalized, with clarifying revisions, the 
PoPC proposed in Sec.  170.523(m) to require ONC-ACBs to aggregate and 
report to ONC no less than quarterly all updates successfully made to 
support National Coordinator-approved newer versions of Secretary-
adopted standards in certified health IT pursuant to the developers 
having voluntarily opted to avail themselves of the SVAP flexibility. 
We also finalize in Sec.  170.523(t) the new PoPC for ONC-ACBs that 
requires them to ensure that developers seeking to take advantage of 
the SVAP flexibility provide the advance notice required in Sec.  
170.405(b)(8) to all affected customers and its ONC-ACB, and comply 
with all other applicable requirements.
---------------------------------------------------------------------------

    \4\ Although real world testing plans and results will not be 
immediately available upon publication of this final rule, an 
overview of the CHPL is available at https://chpl.healthit.gov/#/resources/overview (last accessed 07/12/2019). For additional 
information on how to navigate the CHPL, please refer to the CHPL 
Public User Guide.
---------------------------------------------------------------------------

Attestations
    Section 4002(a) of the Cures Act requires that a health IT 
developer, as Condition and Maintenance of Certification requirements 
under the Program, provide to the Secretary an attestation to all of 
the other Conditions of Certification required in section 3001(c)(5)(D) 
of the PHSA, except for the ``EHR reporting criteria submission'' 
Condition of Certification requirement in Sec.  3001(c)(5)(D)(vii). We 
have finalized regulation text implementing the Cures Act's 
``attestations'' Condition of Certification requirement in Sec.  
170.406. Under Sec.  170.406 as finalized by this rule, health IT 
developers will attest twice a year to compliance with the Conditions 
and Maintenance of Certification requirements (except for the EHR 
reporting criteria submission requirement, which would be metrics 
reporting requirements separately implemented through a future 
rulemaking). We believe requiring attestations every six months under 
Sec.  170.406(b) will properly balance the need to support appropriate 
enforcement with our desire to limit the burden on health IT 
developers. In this regard, we have also identified methods to make the 
process as simple and efficient for health IT developers as possible 
(e.g., 30-day attestation window, web-based form submissions, and 
attestation alert reminders).
    We have also finalized that attestations will be submitted to ONC-
ACBs. We have finalized a new PoPC in Sec.  170.523(q) that an ONC-ACB 
must review these submissions for completion and share the health IT 
developers' attestations with us. We would then make the attestations 
publicly available through the CHPL.
EHR Reporting Criteria Submission
    The Cures Act specifies that health IT developers be required, as 
Condition and Maintenance of Certification requirements under the 
Program, to submit reporting criteria on certified health IT in 
accordance with the EHR Reporting Program established under section 
3009A of the PHSA, as added by the Cures Act. We have not yet 
established an EHR Reporting Program. Once we establish such program, 
we will undertake rulemaking to propose and implement the associated 
Condition and Maintenance of Certification requirements for health IT 
developers.
Enforcement
    Section 4002(a) of the Cures Act adds (in section 3001(c)(5)(D) of 
the PHSA) Program requirements aimed at addressing health IT 
developers' actions and business practices through the Conditions and 
Maintenance of Certification requirements, which expands the current 
focus of the

[[Page 25649]]

Program requirements beyond the certified health IT itself. Equally 
important, Cures Act section 4002(a) also provides that the Secretary 
may encourage compliance with the Conditions and Maintenance of 
Certification requirements and take action to discourage noncompliance. 
We, therefore, have finalized our proposed enforcement framework for 
the Conditions and Maintenance of Certification requirements in 
Sec. Sec.  170.580 and 170.581 to encourage consistent compliance with 
the requirements. More specifically, we have finalized our proposed 
corrective action process in Sec.  170.580 for ONC to review potential 
or known instances where a Condition or Maintenance of Certification 
requirement under the Program has not been met or is not being met by a 
health IT developer. We have also finalized in Sec. Sec.  170.580 and 
170.581 our proposal to utilize, with minor modifications, the 
processes previously established for ONC direct review of certified 
health IT in the enforcement of the Conditions and Maintenance of 
Certification requirements. Where we identify noncompliance, our first 
priority will be to work with the health IT developer to remedy the 
matter through a corrective action process. However, under certain 
circumstances, ONC may ban a health IT developer from the Program and/
or terminate the certification of one or more of its Health IT Modules.
6. Information Blocking
    Section 4004 of the Cures Act added section 3022 of the PHSA (42 
U.S.C. 300jj-52, ``the information blocking provision''). Section 
3022(a)(1) of the PHSA defines practices that constitute information 
blocking when engaged in by a health care provider, or a health 
information technology developer, exchange, or network. Section 
3022(a)(3) authorizes the Secretary to identify, through notice and 
comment rulemaking, reasonable and necessary activities that do not 
constitute information blocking for purposes of the definition set 
forth in section 3022(a)(1).
    We identify eight reasonable and necessary activities as exceptions 
to the information blocking definition, each of which does not 
constitute information blocking for purposes of section 3022(a)(1) of 
the PHSA. The exceptions apply to certain activities that are likely to 
interfere with, prevent, or materially discourage the access, exchange, 
or use of EHI, but that would be reasonable and necessary if certain 
conditions are met.
    In developing and finalizing the final exceptions, we were guided 
by three overarching policy considerations. First, the exceptions are 
limited to certain activities that we believe are important to the 
successful functioning of the U.S. health care system, including 
promoting public confidence in health IT infrastructure by supporting 
the privacy and security of EHI, and protecting patient safety and 
promoting competition and innovation in health IT and its use to 
provide health care services to consumers. Second, each exception is 
intended to address a significant risk that regulated individuals and 
entities (i.e., health care providers, health IT developers of 
certified health IT, health information networks, and health 
information exchanges) will not engage in these reasonable and 
necessary activities because of potential uncertainty regarding whether 
they would be considered information blocking. Third, and last, each 
exception is intended to be tailored, through appropriate conditions, 
so that it is limited to the reasonable and necessary activities that 
it is designed to exempt.
    The eight exceptions are set forth in section VIII.D of this final 
rule. The five exceptions finalized in Sec. Sec.  171.201-205, and 
discussed in section VIII.D.1.a-e of this final rule, involve not 
fulfilling requests to access, exchange, or use EHI. These exceptions 
are intended to prevent harm and protect patient safety, promote the 
privacy and security of EHI, excuse an actor from responding to 
requests that are infeasible, and address activities that are 
reasonable and necessary to promote the performance of health IT. The 
three exceptions finalized in Sec. Sec.  171.301-303, and discussed in 
section VIII.D.2.a-c of this final rule, involve procedures for 
fulfilling requests to access, exchange, or use EHI. These exceptions 
describe when an actor's practice of limiting the content of its 
response to or the manner in which it responds to a request to access, 
exchange, or use EHI will not be considered information blocking; when 
an actor's practice of charging fees, including fees that result in a 
reasonable profit margin, for accessing, exchanging, or using EHI will 
not be considered information blocking; and when an actor's practice to 
license interoperability elements for EHI to be accessed, exchanged, or 
used will not be considered information blocking.
    An actor will not be subject to enforcement actions under the 
information blocking provision for civil monetary penalties (CMP) or 
appropriate disincentives if the actor's practice satisfies at least 
one exception. In order to satisfy an exception, each relevant practice 
by an actor at all relevant times must meet all of the applicable 
conditions of the exception. However, failure to meet the conditions of 
an exception does not automatically mean a practice constitutes 
information blocking. A practice failing to meet all conditions of an 
exception only means that the practice would not have guaranteed 
protection from CMPs or appropriate disincentives. The practice would 
instead be evaluated on a case-by-case basis to assess the specific 
facts and circumstances (e.g., whether the practice would be considered 
to rise to the level of an interference, and whether the actor acted 
with the requisite intent) to determine whether information blocking 
has occurred.
    In addition to establishing the exceptions, we have defined and 
interpreted terms that are present in section 3022 of the PHSA (such as 
the types of individuals and entities covered by the information 
blocking provision). We have also finalized new terms and definitions 
that are necessary to implement the information blocking provision. We 
have codified the information blocking section in a new part of title 
45 of the Code of Federal Regulations, part 171.

C. Costs and Benefits

    Executive Orders 12866 on Regulatory Planning and Review (September 
30, 1993), and 13563 on Improving Regulation and Regulatory Review 
(February 2, 2011), direct agencies to assess all costs and benefits of 
available regulatory alternatives and, if regulation is necessary, to 
select regulatory approaches that maximize net benefits (including 
potential economic, environmental, public health and safety effects, 
distributive impacts, and equity). A regulatory impact analysis (RIA) 
must be prepared for major rules with economically significant effects 
($100 million or more in any one year). OMB has determined that this 
final rule is an economically significant rule as the costs associated 
with this final rule could be greater than $100 million per year. 
Accordingly, we have prepared an RIA that to the best of our ability 
presents the costs and benefits of this final rule.
    We have estimated the potential monetary costs and benefits of this 
final rule for health IT developers, health care providers, patients, 
ONC-ACBs, ONC-ATLs, and the Federal Government (i.e., ONC), and have 
broken those costs and benefits out into the following categories: (1) 
Deregulatory actions (no associated costs); (2) updates to the 2015 
Edition health IT certification criteria; (3) Conditions and 
Maintenance of Certification requirements for a health

[[Page 25650]]

IT developer; (4) oversight for the Conditions and Maintenance of 
Certification requirements; and (5) information blocking.
    We note that we have rounded all estimates to the nearest dollar 
and all estimates are expressed in 2017 dollars as it is the most 
recent data available to address all cost and benefit estimates 
consistently. We also note that we did not have adequate data to 
quantify some of the costs and benefits within this RIA. In those 
situations, we have described the non-quantified costs and benefits of 
our provisions; however, such costs and benefits have not been 
accounted for in the monetary cost and benefit totals below.
    We estimated that the total cost for this final rule for the first 
year after it is finalized (including one-time costs), based on the 
cost estimates outlined above and throughout this RIA, would, on 
average, range from $953 million to $2.6 billion with an average annual 
cost of $1.8 billion. We estimate that the total perpetual cost for 
this final rule (starting in year two), based on the cost estimates 
outlined above, would, on average, range from $366 million to $1.3 
billion with an average annual cost of $840 million.
    We estimated the total annual benefit for this final rule, based on 
the benefit estimates outlined above, would range from $1.2 billion to 
$5.0 billion with primary estimated annual benefit of $3.1 billion.

II. Background

A. Statutory Basis

    The Health Information Technology for Economic and Clinical Health 
(HITECH) Act, Title XIII of Division A and Title IV of Division B of 
the American Recovery and Reinvestment Act of 2009 (the Recovery Act) 
(Pub. L. 111-5), was enacted on February 17, 2009. The HITECH Act 
amended the Public Health Service Act (PHSA) and created ``Title XXX--
Health Information Technology and Quality'' (Title XXX) to improve 
health care quality, safety, and efficiency through the promotion of 
health IT and electronic health information (EHI) exchange.
    The 21st Century Cures Act (hereinafter the ``Cures Act'') was 
enacted on December 13, 2016, to accelerate the discovery, development, 
and delivery of 21st century cures, and for other purposes. The Cures 
Act, Pub. L. 114-255, included Title IV--Delivery, which amended 
portions of the HITECH Act (Title XIII of Division A of Pub. L. 111-5) 
by modifying or adding certain provisions to the PHSA relating to 
health IT.
1. Standards, Implementation Specifications, and Certification Criteria
    The HITECH Act established two new Federal advisory committees, the 
HIT Policy Committee (HITPC) and the HIT Standards Committee (HITSC). 
Each was responsible for advising the National Coordinator for Health 
Information Technology (National Coordinator) on different aspects of 
standards, implementation specifications, and certification criteria.
    Section 3002 of the PHSA, as amended by section 4003(e) of the 
Cures Act, replaced the HITPC and HITSC with one committee, the Health 
Information Technology Advisory Committee (HIT Advisory Committee or 
HITAC). After that change, section 3002(a) of the PHSA established that 
the HITAC would advise and recommend to the National Coordinator on 
different aspects of standards, implementation specifications, and 
certification criteria, relating to the implementation of a health IT 
infrastructure, nationally and locally, that advances the electronic 
access, exchange, and use of health information. Further described in 
section 3002(b)(1)(A) of the PHSA, this included providing the National 
Coordinator with recommendations on a policy framework to advance 
interoperable health IT infrastructure, updating recommendations to the 
policy framework, and making new recommendations, as appropriate. 
Section 3002(b)(2)(A) identified that in general, the HITAC would 
recommend to the National Coordinator, for purposes of adoption under 
section 3004 of the PHSA, standards, implementation specifications, and 
certification criteria and an order of priority for the development, 
harmonization, and recognition of such standards, specifications, and 
certification criteria. Similar to the process previously required of 
the former HITPC and HITSC, the HITAC will develop a schedule for the 
assessment of policy recommendations for the Secretary to publish in 
the Federal Register.
    Section 3004 of the PHSA identifies a process for the adoption of 
health IT standards, implementation specifications, and certification 
criteria and authorizes the Secretary to adopt such standards, 
implementation specifications, and certification criteria. As specified 
in section 3004(a)(1), the Secretary is required, in consultation with 
representatives of other relevant Federal agencies, to jointly review 
standards, implementation specifications, and certification criteria 
endorsed by the National Coordinator under section 3001(c), and 
subsequently determine whether to propose the adoption of any grouping 
of such standards, implementation specifications, or certification 
criteria. The Secretary is required to publish all determinations in 
the Federal Register.
    Section 3004(b)(3) of the PHSA, which is titled Subsequent 
Standards Activity, provides that the Secretary shall adopt additional 
standards, implementation specifications, and certification criteria as 
necessary and consistent with the schedule published by the HITAC. We 
consider this provision in the broader context of the HITECH Act and 
Cures Act to continue to grant the Secretary the authority and 
discretion to adopt standards, implementation specifications, and 
certification criteria that have been recommended by the HITAC and 
endorsed by the National Coordinator, as well as other appropriate and 
necessary health IT standards, implementation specifications, and 
certification criteria.
2. Health IT Certification Program(s)
    Under the HITECH Act, section 3001(c)(5) of the PHSA provides the 
National Coordinator with the authority to establish a program or 
programs for the voluntary certification of health IT. Specifically, 
section 3001(c)(5)(A) specifies that the National Coordinator, in 
consultation with the Director of the National Institute of Standards 
and Technology (NIST), shall keep or recognize a program or programs 
for the voluntary certification of health IT that is in compliance with 
applicable certification criteria adopted under this subtitle (i.e., 
certification criteria adopted by the Secretary under section 3004 of 
the PHSA). The certification program(s) must also include, as 
appropriate, testing of the technology in accordance with section 
13201(b) of the HITECH Act. Overall, section 13201(b) of the HITECH Act 
requires that with respect to the development of standards and 
implementation specifications, the Director of National Institute of 
Standards and Technology (NIST) shall support the establishment of a 
conformance testing infrastructure, including the development of 
technical test beds. The same HITECH Act provision (section 13201(b)) 
also indicates that the development of this conformance testing 
infrastructure may include a program to accredit independent, non-
Federal laboratories to perform testing.
    Section 4001 of the Cures Act amended section 3001(c)(5) of the 
PHSA to instruct the National Coordinator to encourage, keep, or 
recognize, through

[[Page 25651]]

existing authorities, the voluntary certification of health IT under 
the program for use in medical specialties and sites of service for 
which no such technology is available or where more technological 
advancement or integration is needed. Section 3001(c)(5)(C)(iii) in 
particular identifies that the Secretary, in consultation with relevant 
stakeholders, shall make recommendations for the voluntary 
certification of health IT for use by pediatric health providers to 
support the care of children, as well as adopt certification criteria 
under section 3004 to support the voluntary certification of health IT 
for use by pediatric health providers. The Cures Act further amended 
section 3001(c)(5) of the PHSA by adding section 3001(c)(5)(D), which 
provides the Secretary with the authority to require, through notice 
and comment rulemaking, Conditions and Maintenance of Certification 
requirements for the Program.

B. Regulatory History

    The Secretary issued an interim final rule with request for 
comments on January 13, 2010, (75 FR 2014), which adopted an initial 
set of standards, implementation specifications, and certification 
criteria. On March 10, 2010, we published a proposed rule (75 FR 11328) 
that proposed both a temporary and permanent certification program for 
the purposes of testing and certifying health IT. A final rule 
establishing the temporary certification program was published on June 
24, 2010, (75 FR 36158), and a final rule establishing the permanent 
certification program was published on January 7, 2011, (76 FR 1262). 
We have issued multiple rulemakings since these initial rulemakings to 
update standards, implementation specifications, certification 
criteria, and the certification program, a history of which can be 
found in the October 16, 2015 final rule titled, ``2015 Edition Health 
Information (Health IT) Certification Criteria, 2015 Edition Base 
Electronic Health Record (EHR) Definition, and ONC Health IT 
Certification Program Modifications'' (80 FR 62602) (``2015 Edition 
final rule''). A final rule corrections and clarifications notice was 
published for the 2015 Edition final rule on December 11, 2015, (80 FR 
76868), to correct preamble and regulatory text errors and clarify 
requirements of the Common Clinical Data Set (CCDS), the 2015 Edition 
privacy and security certification framework, and the mandatory 
disclosures for health IT developers.
    The 2015 Edition final rule established a new edition of 
certification criteria (``2015 Edition health IT certification 
criteria'' or ``2015 Edition'') and a new 2015 Edition Base EHR 
definition. The 2015 Edition established the capabilities and specified 
the related standards and implementation specifications that CEHRT 
would need to include to, at a minimum, support the achievement of 
``meaningful use'' by eligible clinicians, eligible hospitals, and 
critical access hospitals under the Medicare and Medicaid EHR Incentive 
Programs (EHR Incentive Programs) (now referred to as the Promoting 
Interoperability (PI) Programs) \5\ when the 2015 Edition is required 
for use under these and other programs referencing the CEHRT 
definition. The 2015 Edition final rule also made changes to the ONC 
HIT Certification Program. The final rule adopted a proposal to change 
the Program's name to the ``ONC Health IT Certification Program'' from 
the ONC HIT Certification Program, modified the Program to make it more 
accessible to other types of health IT beyond EHR technology and for 
health IT that supports care and practice settings beyond the 
ambulatory and inpatient settings, and adopted new and revised PoPC for 
ONC-ACBs.
---------------------------------------------------------------------------

    \5\ https://www.federalregister.gov/d/2018-16766/p-4.
---------------------------------------------------------------------------

    After issuing a proposed rule on March 2, 2016, (81 FR 11056), we 
published a final rule titled, ``ONC Health IT Certification Program: 
Enhanced Oversight and Accountability'' (81 FR 72404) (``EOA final 
rule'') on October 19, 2016. The EOA final rule finalized modifications 
and new requirements under the Program, including provisions related to 
our role in the Program. The final rule created a regulatory framework 
for our direct review of health IT certified under the Program, 
including, when necessary, requiring the correction of non-conformities 
found in health IT certified under the Program and suspending and 
terminating certifications issued to Complete EHRs and Health IT 
Modules. The final rule also sets forth processes for us to authorize 
and oversee accredited testing laboratories under the Program. In 
addition, it includes provisions for expanded public availability of 
certified health IT surveillance results.
    On March 4, 2019, the Secretary published a proposed rule titled, 
``21st Century Cures Act: Interoperability, Information Blocking, and 
the ONC Health IT Certification Program'' (84 FR 7424) (``Proposed 
Rule''). The Proposed Rule proposed to implement certain provisions of 
the Cures Act that would advance interoperability and support the 
access, exchange, and use of electronic health information and is the 
subject of this final rule.

C. General Comments on the Proposed Rule

    Comments. Numerous commenters expressed support for the overall 
direction of the Proposed Rule. Numerous commenters also expressed 
support for the policy goals expressed in the Proposed Rule, including: 
Reduced health care costs; improved public health surveillance; 
improved care coordination, continuity of care, and shared access of 
data between patient and provider; improved quality and patient safety; 
increased cost and quality transparency; greater efficiencies; and 
better health outcomes for patients. A few commenters also commended 
our interest in ways to use health IT to address opioid use disorders. 
Many commenters also appreciated detailed context for the provisions in 
the Proposed Rule. Many commenters stated that the proposed provisions 
and standards will provide opportunities for innovation as well as 
increase the ability of health care providers to connect new tools and 
services to their systems.
    A number of commenters commended our responsiveness to the health 
care community, including patients, in drafting the rule. A few 
commenters suggested that the existing language in the rule should 
remain mostly unchanged as ONC drafts the final rule. Many commenters 
commended us for collaborating with public- and private-sector partners 
in developing the Proposed Rule. Specifically, some commenters 
expressed appreciation for our work with CMS and their companion 
Interoperability and Patient Access Proposed Rule. A number of 
commenters shared that they look forward to working with us and CMS as 
the health care industry progresses toward an interoperable system, 
making it easier for small independent practices and providers to move 
to value-based care.
    Response. We appreciate the support expressed by many commenters. 
This final rule maintains the direction of the Proposed Rule, and we 
too look forward to ongoing collaboration with public and private 
sector partners as we implement the provisions of this final rule.
    Comments. A few commenters recommended that the final rule include 
additional resources to assist with readability and ease of 
understanding.
    Response. We thank commenters for their feedback. As we did with 
the

[[Page 25652]]

Proposed Rule, we are providing resources such as infographics, fact 
sheets, webinars, and other forms of educational materials and 
outreach. Many of the education materials can be found on 
www.HealthIT.gov/curesrule.
    Comments. Several commenters expressed the opinion that the use of 
EHRs--and health IT, more generally--has negatively affected the 
quality of health care delivery and that the Proposed Rule will 
exacerbate this issue. Some of these commenters stated that the need to 
input information into EHRs during office visits has resulted in 
clinicians spending less time communicating with patients, and some 
noted the impact of data entry on clinician burnout. A few commenters 
made a similar point that use of EHRs has reduced productivity and, as 
a result, increased health care spending.
    Response. We thank commenters for their feedback. We are aware of 
the challenges stakeholders have experienced in using EHRs and health 
IT more broadly. In the Cures Act, Congress identified the importance 
of easing regulatory and administrative burdens associated with the use 
of EHRs and health IT. Specifically, through section 4001(a) of the 
Cures Act, Congress directed the Department of Health and Human 
Services to establish a goal, develop a strategy, and provide 
recommendations to reduce EHR-related burdens that affect care 
delivery.
    To that end, on November 28, 2018, we, in partnership with CMS, 
released a draft Strategy on Reducing Regulatory and Administrative 
Burden Relating to the Use of Health IT and EHRs \6\ for public 
comment. This draft strategy reflects input HHS received through 
several wide-reaching listening sessions, written input, and 
stakeholder outreach. We released the final report on February 21, 
2020. Reflective of public comment, the final Strategy on Reducing 
Regulatory and Administrative Burdens Relating to the Use of Health IT 
and EHRs \7\ targets burdens tied to regulatory and administrative 
requirements that HHS can directly impact through the rulemaking 
process. The report's strategies, recommendations, and policy shifts 
aim to give clinicians more time to focus on what matters--caring for 
their patients. Based on stakeholder input, the final strategy outlines 
three overarching goals designed to reduce clinician burden: (1) Reduce 
the effort and time required to record health information in EHRs for 
clinicians; (2) reduce the effort and time required to meet regulatory 
reporting requirements for clinicians, hospitals, and health care 
organizations; and (3) improve the functionality and intuitiveness 
(ease of use) of EHRs.
---------------------------------------------------------------------------

    \6\ https://www.healthit.gov/sites/default/files/page/2018-11/Draft%20Strategy%20on%20Reducing%20Regulatory%20and%20Administrative%20Burden%20Relating.pdf.
    \7\ https://www.healthit.gov/sites/default/files/page/2020-02/BurdenReport_0.pdf.
---------------------------------------------------------------------------

    In addition to the final strategy mentioned above, we refer readers 
to section III of this final rule, Deregulatory Actions for Previous 
Rulemakings, for more information on how we have worked to improve the 
Program with a focus on ways to reduce burden, offer flexibility to 
both health IT developers and providers, and support innovation.
    Comments. We received several comments from a variety of 
stakeholders to extend the 60-day comment period for the Proposed Rule, 
stating that due to the depth and complexity of the policies proposed, 
it would be critical for the public to have extended time to provide 
sufficient and thoughtful comments to advance shared goals and shape 
the interoperability landscape.
    Response. In response to stakeholder inquiries to extend the 60-day 
public comment period and based on the stated goals of the Proposed 
Rule to improve interoperability and patient access to health 
information for the purposes of promoting competition and better care, 
we extended the comment period for the Proposed Rule for an additional 
30 days which ended on June 3, 2019.
    Comments. A number of commenters recommended delaying the final 
rule by issuing an Interim Final Rule (IFR) with comment. Commenters 
noted that many organizations are providing comments that include new 
information blocking exceptions and that we will not be able to 
incorporate such suggestions into the final rule without an opportunity 
for comment. Several commenters stated that an IFR was appropriate due 
to the significance and breadth of the Proposed Rule, as well the 
magnitude of changes proposed and that an IFR would allow for 
additional opportunity for stakeholder comment.
    Several commenters recommended that ONC consider issuing a 
Supplemental Notice of Proposed Rulemaking (SNPRM) to seek additional 
comments on the information blocking provisions. Some of these 
commenters stated that new definitions and terms introduced in the 
Proposed Rule need additional clarification and an SNPRM would enable 
ONC to propose such clarifications and seek feedback on modified 
proposals.
    Response. We recognize the importance of allowing enough time for 
comment given the breadth of the Proposed Rule and acknowledge the 
comments requesting the issuance of an IFR or a SNPRM. We believe that 
the advance posting of the Proposed Rule on the ONC website, the 
initial 60-day comment period, and the 30-day extension, provided 
adequate time for comment, especially given the large volume of 
comments received.
    As discussed in the information blocking section of the Proposed 
Rule (84 FR 7508), after hearing from stakeholders and based on our 
findings from our 2015 Report to Congress,\8\ we concluded that 
information blocking is a serious problem and recommended that Congress 
prohibit information blocking and provide penalties and enforcement 
mechanisms to deter these harmful practices. Congress responded by 
enacting the Cures Act on December 13, 2016, with many provisions 
specifying a need for swift implementation. It has been three years 
since the Cures Act was enacted and information blocking remains a 
serious concern. This final rule includes provisions that will address 
information blocking and cannot be further delayed.
---------------------------------------------------------------------------

    \8\ https://www.healthit.gov/sites/default/files/reports/info_blocking_040915.pdf.
---------------------------------------------------------------------------

    We have taken multiple actions to address some expressed concerns 
regarding the timing of the Conditions and Maintenance of Certification 
requirements as well as the comprehensiveness of the information 
blocking proposals. These actions include some burden reduction by 
removing certain certification criteria, narrowing the scope of certain 
certification criteria, and increasing the compliance timeline with 
criteria. For purposes of information blocking, we have established 
compliance date for 45 CFR part 171 that is six months, rather than 
sixty days, after the date this final rule publishes in the Federal 
Register. We have also focused the scope of EHI, and provided new and 
revised exceptions that are actionable and reduce burden. One of these 
new exceptions (see Sec.  171.301(a) and section VIII.D.2.a of this 
final rule) includes a provision by which, until 24 months after this 
rule is published in the Federal Register, an actor's conduct can 
satisfy the conditions of the Content and Manner Exception (Sec.  
171.301) if they provide at least the content that is within the USCDI 
in response to a request for access, exchange, or use of EHI. Because 
of these reasons and those noted above, we decline to issue an IFR or 
SNPRM. Rather, we have issued this final rule to support 
interoperability, empower patient control of their health care, and 
instill competition in health care markets.

[[Page 25653]]

III. Deregulatory Actions for Previous Rulemakings

A. Background

1. History of Burden Reduction and Regulatory Flexibility
    Since the inception of the ONC Health IT Certification Program 
(Program), we have aimed to implement and administer the Program in the 
least burdensome manner that supports our policy goals. Through the 
years, we have worked to improve the Program with a focus on ways to 
reduce burden, offer flexibility, and support innovation. This approach 
has been consistent with the principles of Executive Order (E.O.) 13563 
on Improving Regulation and Regulatory Review (February 2, 2011), which 
instructs agencies to periodically review its existing significant 
regulations and ``determine whether any such regulations should be 
modified, streamlined, expanded, or repealed so as to make the agency's 
regulatory program more effective or less burdensome in achieving the 
regulatory objectives.'' To that end, we have historically taken 
measures where feasible and appropriate to reduce burden within the 
Program and make the Program more effective, flexible, and streamlined.
    For example, in the 2014 Edition final rule (77 FR 54164, Sept. 4, 
2012), we revised the certified electronic health record technology 
(CEHRT) definition to provide flexibility and create regulatory 
efficiencies by narrowing required functionality to a core set of 
capabilities (i.e., the Base EHR definition) plus the additional 
capabilities each eligible clinician, eligible hospital, and critical 
access hospital needed to successfully achieve the applicable objective 
and measures under the EHR Incentive Programs (now referred to as the 
Promoting Interoperability (PI) Programs). ONC has also supported more 
efficient testing and certification methods and reduced regulatory 
burden through the adoption of a gap certification policy. As explained 
in the 2014 Edition final rule (77 FR 54254) and the 2015 Edition final 
rule (80 FR 62681), as modified by the 2015 final rule with corrections 
and clarifications at 80 FR 76868, where applicable, gap certification 
allows for the use of a previously certified health IT product's test 
results for certification criteria identified as unchanged. Developers 
have been able to use gap certification for more efficient 
certification of their health IT when updating from the 2011 Edition to 
the 2014 Edition and from the 2014 Edition to the 2015 Edition.
    ONC introduced further means to reduce regulatory burden, increase 
regulatory flexibility, and promote innovation in the 2014 Edition 
Release 2 final rule (79 FR 54430) published on September 11, 2014. The 
2014 Edition Release 2 final rule established a set of optional 2014 
Edition certification criteria that provided flexibility and 
alternative certification pathways for health IT developers and 
providers based on their specific circumstances. The 2014 Edition 
Release 2 final rule also simplified the Program by discontinuing the 
use of the ``Complete EHR'' certification concept beginning with the 
2015 Edition (79 FR 54443).
    In the 2015 Edition final rule, we did not ``carry forward'' 
certain 2014 Edition certification criteria into the 2015 Edition, such 
as the ``image results,'' ``patient list creation,'' and ``electronic 
medication administration record'' criteria. We determined that these 
criteria did not advance functionality or support interoperability (80 
FR 62682 through 62684). We also did not require all health IT to be 
certified to the ``meaningful use measurement'' certification criteria 
for ``automated numerator recording'' and ``automated measure 
calculation'' (80 FR 62604 and 62605), which the 2014 Edition had 
previously required. Based on stakeholder feedback and Program 
administration observations, we also permitted testing efficiencies for 
the 2015 Edition ``automated numerator recording'' and ``automated 
measure calculation'' criteria by removing the live demonstration 
requirement of recording data and generating reports (80 FR 62703). 
Health IT developers may now self-test their Health IT Modules' 
capabilities and submit the resulting reports to the ONC-Authorized 
Testing Laboratory (ONC-ATL) to verify compliance with the ``meaningful 
use measurement'' criterion.\9\ In order to further reduce burden for 
health IT developers, in our 2015 Edition final rule, we adopted a more 
straightforward approach to privacy and security certification 
requirements and clarified which requirements apply to each criterion 
within the regulatory functional areas (80 FR 62605).
---------------------------------------------------------------------------

    \9\ https://www.healthit.gov/test-method/automated-numerator-recording and https://www.healthit.gov/test-method/automated-measure-calculation.
---------------------------------------------------------------------------

2. Executive Orders 13771 and 13777
    On January 30, 2017, the President issued E.O. 13771 on Reducing 
Regulation and Controlling Regulatory Costs, which requires agencies to 
identify deregulatory actions. This order was followed by E.O. 13777, 
titled ``Enforcing the Regulatory Reform Agenda'' (February 24, 2017). 
E.O. 13777 provides further direction on implementing regulatory reform 
by identifying a process by which agencies must review and evaluate 
existing regulations and make recommendations for repeal or 
simplification.
    In order to implement these regulatory reform initiatives and 
policies, ONC reviewed and evaluated existing regulations in the year 
leading to the issuance of the 21st Century Cures Act: 
Interoperability, Information Blocking, and the ONC Health IT 
Certification Program Proposed Rule (Proposed Rule) (84 FR 7424 through 
7610). During our review, we sought to identify ways to further reduce 
administrative burden, to implement deregulatory actions through 
guidance, and to put forth deregulatory actions in this final rule that 
will reduce burden for health IT developer, providers, and other 
stakeholders.
    Prior to publishing the Proposed Rule, on August 21, 2017, ONC 
issued Relied Upon Software Program Guidance.\10\ Health IT developers 
are permitted to use ``relied upon software'' \11\ to demonstrate 
compliance with certification criteria adopted at 45 CFR part 170, 
subpart C. Historically, in cases where a Health IT Module is paired 
with multiple ``relied upon software'' products for the same 
capability, health IT developers were required to demonstrate 
compliance for the same certification criterion with each of those 
``relied upon software'' products in order for the products to be 
listed on the Certified Health IT Product List (CHPL). With the 
guidance issued on August 21, 2017, health IT developers could 
demonstrate compliance with only one ``relied upon software'' product 
for a criterion/capability. Once the health IT developer demonstrates 
compliance with a minimum of one ``relied upon software'' product, the 
developer can have multiple, additional ``relied upon software'' 
products for the same criterion/capability listed on the CHPL (https://chpl.healthit.gov/). This approach reduces burden for health IT 
developers, ONC-ATLs, and ONC-Authorized Certification Bodies (ONC-
ACBs).
---------------------------------------------------------------------------

    \10\ https://www.healthit.gov/sites/default/files/relieduponsoftwareguidance.pdf.
    \11\ ``Relied upon'' software is defined in the 2011 final rule 
establishing the permanent certification program (76 FR 1276).
---------------------------------------------------------------------------

    On September 21, 2017, ONC announced a deregulatory action to 
reduce the overall burden for testing

[[Page 25654]]

health IT to the 2015 Edition certification criteria.\12\ ONC reviewed 
the 2015 Edition test procedures and changed 30 of the 2015 Edition 
test procedures from requiring ONC-ATL evaluation to requiring only 
attestation by health IT developers that their product has capabilities 
conformant with those specified in the associated certification 
criterion/criteria.\13\ This deregulatory action reduced burden and 
costs program-wide, while still maintaining the Program's high level of 
integrity and assurances. The total testing cost savings for health IT 
developers have been estimated between $8.34 and $9.26 million. ONC-
ATLs also benefitted by having more time and resources to focus on 
tool-based testing (for interoperability-oriented criteria) and being 
responsive to any retesting requirements that may arise from ONC-ACB 
surveillance activities. Health care providers and other users of 
certified health IT did not lose confidence in the Program because 
health IT developers were still required to meet certification criteria 
requirements and maintain their products' conformance to the full scope 
of the associated criteria, including when implemented in the field and 
in production use. ONC and ONC-ACBs continue to conduct surveillance 
activities and respond to end-user complaints.
---------------------------------------------------------------------------

    \12\ https://www.healthit.gov/buzz-blog/healthit-certification/certification-program-updates-support-efficiency-reduce-burden/.
    \13\ https://www.healthit.gov/sites/default/files/policy/selfdeclarationapproachprogramguidance17-04.pdf.
---------------------------------------------------------------------------

B. Deregulatory Actions

    In the Proposed Rule, we proposed (84 FR 7434 through 7439) and 
sought comment on six specific deregulatory actions. Having considered 
the comments received on the proposals, which are summarized below, we 
have decided to finalize five of the six proposed deregulatory actions 
and not to finalize the proposal to recognize the FDA Software 
Precertification Pilot Program. We refer readers to section XIII 
(Regulatory Impact Analysis) of this final rule for a discussion of the 
estimated cost savings from these finalized deregulatory actions.
1. Removal of Randomized Surveillance Requirements
    ONC-ACBs are required under Sec.  170.556 to conduct surveillance 
of certified health IT to ensure that health IT continues to conform 
with and function as required by the full scope of the certification 
requirements. Surveillance is categorized as either reactive 
surveillance (for example, complaint-based surveillance) or randomized 
surveillance. Previously finalized regulations in Sec.  170.556(c)(2) 
required ONC-ACBs to proactively surveil two percent of the 
certificates they issue annually. As discussed in the Proposed Rule, in 
the time since the two percent randomized surveillance requirement was 
finalized, stakeholders had expressed concern that the benefits of in-
the-field, randomized surveillance may not outweigh the time commitment 
required by providers, particularly if no non-conformities are found 
(84 FR 7434). We noted in the Proposed Rule that, in general, health 
care providers had expressed that reactive surveillance (e.g., 
surveillance based on user complaints) is a more logical and economical 
approach to surveillance. Consistent with our September 21, 2017, 
exercise of enforcement discretion on implementation of randomized 
surveillance by ONC-ACBs,\14\ we proposed in the Proposed Rule to 
eliminate certain regulatory randomized surveillance requirements (84 
FR 7434).
---------------------------------------------------------------------------

    \14\ https://www.healthit.gov/sites/default/files/ONC_Enforcement_Discretion_Randomized_Surveillance_8-30-17.pdf.
---------------------------------------------------------------------------

    In the Proposed Rule, we specifically proposed to revise Sec.  
170.556(c) by changing the requirement that ONC-ACBs must conduct in-
the-field, randomized surveillance to specify that ONC-ACBs may conduct 
in-the-field, randomized surveillance (84 FR 7434). We further proposed 
to remove Sec.  170.556(c)(2), which specified that ONC-ACBs must 
conduct randomized surveillance for a minimum of two percent of 
certified health IT products per year. We also proposed to remove the 
requirements in Sec.  170.556(c)(5) regarding the exclusion and 
exhaustion of selected locations for randomized surveillance. 
Additionally, we proposed to remove the requirements in Sec.  
170.556(c)(6) regarding the consecutive selection of certified health 
IT for randomized surveillance. As noted in the Proposed Rule, without 
these regulatory requirements, ONC-ACBs would still be required to 
perform reactive surveillance, and would be permitted to conduct 
randomized surveillance of their own accord, using the methodology 
identified by ONC with respect to scope (Sec.  170.556(c)(1)), 
selection method (Sec.  170.556(c)(3)), and the number and types of 
locations for in-the-field surveillance (Sec.  170.556(c)(4)).
    Comments. A substantial number of commenters supported removing the 
requirements for randomized surveillance. Many commenters supported the 
proposal to revise Sec.  170.556(c) by changing the requirement that 
ONC-ACBs must conduct in-the-field, randomized surveillance to specify 
that ONC-ACBs may conduct in-the-field, randomized surveillance, 
including the removal of Sec.  170.556(c)(2). Commenters noted that 
since ONC-ACBs would still be required to perform reactive 
surveillance, and would be permitted to conduct randomized surveillance 
of their own accord, the regulatory requirement to conduct randomized 
surveillance on a specified portion of certified health IT would be 
unnecessary. Commenters supporting this proposal praised the 
deregulatory action as allowing more flexibility for ONC-ACBs. A number 
of commenters were generally supportive of the proposal and applied the 
caveat that if an ONC-ACB did voluntarily conduct randomized 
surveillance, they should not do so repeatedly on the same Health IT 
Module. These commenters indicated a preference that the requirements 
in Sec.  170.556(c)(6) regarding the consecutive selection of certified 
health IT for randomized surveillance remain. Several commenters were 
supportive of removing randomized surveillance requirements and 
indicated they found this appropriate in view of the Conditions and 
Maintenance of Certification enhancements to the Program as directed by 
the Cures Act, while others noted that reactive surveillance may be 
more effective in surfacing and correcting non-conformities. A number 
of commenters did not support the proposal, with many expressing 
concerns that this could be or be perceived to be a reduction in 
oversight of developers or could reduce providers' confidence that 
certified Health IT Modules would meet their needs. While a majority of 
commenters speaking to surveillance burdens on health care providers 
indicated the removal of mandatory randomized surveillance would, on 
the whole, reduce burden on health care providers, several expressed 
concerns about whether providers can discern when a product does not 
meet certification requirements or know where and how to report their 
concerns about their certified health IT's conformance to Program 
requirements. A few commenters suggested that the increased emphasis on 
reactive surveillance (particularly in some commenters' view because 
ONC is removing randomized surveillance requirements in advance of the 
full implementation of the EHR Reporting Program called for by section 
4002 of

[[Page 25655]]

the Cures Act) indicates a need for additional guidance to help 
providers and particularly clinicians understand how to recognize and 
report potential non-conformities in the certified health IT they use.
    Response. We thank commenters for their input and reiterate our 
continued commitment to sustaining the integrity of our Program, 
including ensuring robust oversight of certified health IT products 
while avoiding unnecessary burdens on all program stakeholders. Having 
considered all comments received, in context of the totality of updates 
we proposed to the Program, we have concluded that the removal of the 
regulatory requirements for ONC-ACBs to conduct randomized surveillance 
is consistent with enhancing Program efficiency while maintaining its 
efficacy. We leave ONC-ACBs the option to conduct randomized 
surveillance as they determine necessary or appropriate to support 
continued conformance to Program requirements by Health IT Modules they 
have certified. We also note that ONC-ACBs that choose to conduct 
randomized surveillance will still be required to use the methodology 
identified by ONC with respect to scope (Sec.  170.556(c)(1)), 
selection method (Sec.  170.556(c)(3)), and the number and types of 
locations for in-the-field surveillance (Sec.  170.556(c)(4)). While we 
appreciate concerns that removal of requirements in Sec.  170.556(c)(6) 
regarding the consecutive selection of certified health IT creates a 
potential that the same Health IT Module(s) could be selected for 
randomized surveillance in consecutive years, we are unaware of 
evidence suggesting that ONC-ACBs choosing to implement randomized 
surveillance would do so in a manner that would tend to erode its 
efficacy by over-sampling some products at the expense of under-
sampling others. Rather than retain a regulatory provision intended to 
counterbalance a regulatory requirement for randomized surveillance of 
a required minimum percent of certified products each year, we believe 
it is more appropriate at this time to remove the restriction on 
consecutive selection of the same Health IT Module(s) or location(s) 
for randomized surveillance and monitor the results of this and other 
Program enhancements finalized in this rule for any indication that we 
may need to further adjust regulatory requirements in the future.
    We thank commenters for bringing to our attention that health care 
providers may be uncertain about how or where they can engage the ONC 
Health IT Certification Program for assistance when the certified 
health IT they rely on is not performing its certified functions as 
they expect and their health IT developer is unresponsive or fails to 
resolve non-conformities with Program requirements. Reactive 
surveillance by ONC-ACBs, informed and focused by end-user complaints, 
has always been an essential component of the Program's oversight and 
assurance of continued conformity of certified Health IT Modules when 
deployed in the field. While we encourage users to begin seeking 
troubleshooting and issue resolution support from the developer of 
their health IT--because the developer is often in the best position to 
act most promptly to resolve problems with their products' 
performance--we also encourage the user to share their concerns with 
the ONC-ACB that certified the health IT in question when the developer 
has not addressed users' concerns that their certified health IT is not 
performing as it is certified to perform. As we recognize that users 
may in some circumstances need, or for purposes potentially including 
but not limited to their own preferences may wish, to share their 
concerns about their certified health IT's performance or other health 
IT matters directly with ONC, we invite health IT users and all other 
interested parties to share their health IT-related feedback or 
concerns with ONC through the Health IT Feedback Form on our 
HealthIT.gov website.\15\ Depending on the nature of a specific 
feedback message, we may contact the submitter for additional 
information and, in some instances, may share the information provided 
with other appropriate entities--such as but not limited to the ONC-
ACBs who certify the products about which we receive feedback, as they 
are often in the best position to assess and respond to feedback 
expressing concerns about conformance of specific certified criteria 
used by Health IT Modules in production environments. All information 
submitted through the Health IT Feedback Form is carefully reviewed and 
helps us to improve our awareness and ability to address health IT-
related issues and challenges. Also, we note for clarity that persons 
sharing health IT-related concerns with ONC via the Health IT Feedback 
Form have the option to remain anonymous and this option has been 
chosen by some submitters. However, we wish to note that anonymous 
submissions will prevent us from acquiring additional information to 
fully follow up on a matter if the submission does not include 
sufficient detail on which to act. In general, submitters should 
provide as much detail as possible about the developer, product name, 
and version of the certified health IT as well as their specific 
concerns about the certified health IT's performance.
---------------------------------------------------------------------------

    \15\ https://www.healthit.gov/form/healthit-feedback-form.
---------------------------------------------------------------------------

2. Removal of the 2014 Edition From the Code of Federal Regulations
    In the March 4, 2019 Proposed Rule, we also proposed to remove the 
2014 Edition from the Code of Federal Regulations (CFR), which includes 
standards and functionality now significantly outmoded (84 FR 7434). We 
noted that removal of the 2014 Edition would make the 2015 Edition the 
new baseline for health IT certification. The 2015 Edition, including 
the additional certification criteria, standards, and requirements 
adopted in this final rule, will better enable interoperability and the 
access, exchange, and use of electronic health information, as 
discussed in the Proposed Rule (84 FR 7434), and its adoption and 
implementation by providers is expected to yield the estimated costs 
savings described (84 FR 7563 and 7564) within the Regulatory Impact 
Analysis (section XIV) of the Proposed Rule and in the Regulatory 
Impact Analysis section (section XIII) of this final rule.
    To implement the removal of the 2014 Edition from the CFR, we 
proposed (84 FR 7434 and 7435) to remove the 2014 Edition certification 
criteria (Sec.  170.314) and related standards, terms, and requirements 
from the CFR. In regard to terms, we proposed to retire the 2014 
Edition-related definitions found in Sec.  170.102, including the 
``2014 Edition Base EHR,'' ``2014 Edition EHR certification criteria,'' 
and ``Complete EHR, 2014 Edition.'' As explained in the 2015 Edition 
final rule (80 FR 62719), the ability to maintain Complete EHR 
certification is only permitted with health IT certified to the 2014 
Edition certification criteria. Because this concept was discontinued 
for the 2015 Edition, we proposed (84 FR 7435) to remove Sec.  170.545 
and any references to Complete EHR from the regulation text in 
conjunction with the removal of the 2014 Edition. We also proposed (84 
FR 7435) to remove references to the 2014 Edition from the Common 
Clinical Data Set (CCDS) definition and effectively replace it with a 
new government-unique standard, the United States Core Data for 
Interoperability (USCDI). We proposed (84 FR 7435) to remove the 
standards and implementation specifications found in Sec. Sec.  
170.200, 170.202, 170.204, 170.205, 170.207, 170.210, and 170.299 that 
are only

[[Page 25656]]

referenced in the 2014 Edition certification criteria. Adopted 
standards that are also referenced in the 2015 Edition would remain. 
Finally, we proposed (84 FR 7435) to remove requirements in Sec.  
170.550(f) and any other requirements in subpart E, Sec. Sec.  170.500 
through 170.599, which are specific to the 2014 Edition and do not 
apply to the 2015 Edition.
    As discussed in the Proposed Rule (84 FR 7435), in order to avoid 
regulatory conflicts, we took into consideration the final rule 
released by CMS on November 16, 2017, titled ``Medicare Program; CY 
2018 Updates to the Quality Payment Program; and Quality Payment 
Program: Extreme and Uncontrollable Circumstance Policy for the 
Transition Year'' (82 FR 53568). This Quality Payment Program (QPP) 
final rule permits eligible clinicians to use EHR technology certified 
to either the 2014 or 2015 Edition certification criteria, or a 
combination of the two for the CY 2018 performance period. This QPP 
final rule also states that the 2015 Edition certified EHR technology 
(CEHRT) will be required starting with the CY 2019 QPP program year (82 
FR 53671). Therefore, we proposed (84 FR 7435) the effective date of 
removal of the 2014 Edition certification criteria and related 
standards, terms, and requirements from the CFR would be the effective 
date of this final rule.
    Comments. The majority of the comments received supported removing 
the 2014 Edition certification criteria from the Code of Federal 
Regulations. Commenters supporting the removal noted that it will 
reduce confusion and acknowledges that standards and functionality in 
the 2014 Edition are now significantly outmoded. Some commenters 
requested the removal be delayed until the end of CY 2019.
    Response. We thank commenters for their support. We have finalized 
the removal of the 2014 Edition from the CFR as proposed, including 
making the removal effective as of the effective date of this final 
rule (60 days after the rule is published in the Federal Register). The 
2015 Edition was the sole edition permitted to meet the CEHRT 
definition beginning in the CY 2019 program year. This final rule is 
published in CY 2020. Therefore, the removal is not in conflict with 
CMS' regulatory requirements for QPP.
    To finalize removal of the 2014 Edition from the CFR, we have 
removed, effective as of the effective date of this final rule, the 
2014 Edition certification criteria in Sec.  170.314. We also finalized 
removal of terms and definitions specific to the 2014 Edition from 
Sec.  170.102, including the ``2014 Edition Base EHR,'' ``2014 Edition 
EHR certification criteria,'' and ``Complete EHR, 2014 Edition'' 
definitions. As explained in the 2015 Edition final rule (80 FR 62719), 
the ``Complete EHR'' concept was discontinued for the 2015 Edition. 
Therefore, in conjunction with the removal of the 2014 Edition, we also 
remove in this final rule Sec.  170.545 and all other references to 
``Complete EHR'' from the regulation text. Moreover, in finalizing the 
removal of the 2014 Edition from the CFR, we also finalize removal of 
the standards and implementation specifications found in Sec. Sec.  
170.200, 170.202, 170.204, 170.205, 170.207, 170.210, and 170.299 that 
are referenced only in the 2014 Edition certification criteria. Adopted 
standards that are also referenced in the 2015 Edition, as modified by 
this final rule, remain in the CFR. We also retained the CCDS 
definition in Sec.  170.102 but removed the standards and 
implementation specifications that reference the 2014 Edition. 
Additionally, we finalized the removal of requirements in Sec.  
170.550(f) and any other requirements in subpart E, Sec. Sec.  170.500 
through 170.599, that are specific to the 2014 Edition and do not apply 
to the 2015 Edition.
3. Removal of the ONC-Approved Accreditor From the Program
    We proposed to remove the ONC-AA from the Program (84 FR 7435). The 
ONC-AA's role is to accredit certification bodies for the Program and 
to oversee the ONC-ACBs. However, years of experience and changes with 
the Program have led ONC to conclude that, in many respects, the role 
of the ONC-AA to oversee ONC-ACBs is now duplicative of ONC's 
oversight. More specifically, ONC's experience with administering the 
Principles of Proper Conduct (PoPC) for ONC-ACBs as well as issuing 
necessary regulatory changes (e.g., ONC-ACB surveillance and reporting 
requirements in the 2015 Edition final rule) has demonstrated that ONC 
on its own has the capacity to provide the appropriate oversight of 
ONC-ACBs. Therefore, we believe removal of the ONC-AA will reduce the 
Program's administrative complexity and burden.
    Comments. All but one commenter specifically addressing this 
proposal were in support of removing the ONC-AA. The one commenter 
opposed to the proposal stated concerns related to de-coupling 
accreditation to ISO/IEC 17065 standards (an internationally recognized 
standard for bodies certifying products, processes, and services to 
provide assurance of compliance with specified requirements such as 
initial testing, inspection, and quality management systems) from 
specific assessment of a certification body's ability to apply their 
accredited ISO/IEC 17065 capabilities to the Program's certification 
scheme requirements. The commenter noted that this might place a 
greater burden on ONC staff than did the Program structure that 
included an ONC-AA. Finally, one of the commenters in support of 
removing the ONC-AA from the Program requested additional clarification 
about criteria and processes that will be used for accreditation of 
certification bodies following removal of the ONC-AA from the Program.
    Response. We thank all commenters for their thoughtful feedback. 
Upon consideration of all comments received on this proposal, we have 
finalized it as proposed. As noted in the preamble to the Proposed Rule 
(84 FR 7435), ONC's experience with administering the PoPC for ONC-ACBs 
as well as issuing necessary regulatory changes (e.g., ONC-ACB 
surveillance and reporting requirements in the 2015 Edition final rule) 
has demonstrated that ONC on its own has the capacity to provide the 
appropriate oversight of ONC-ACBs. Therefore, we believe removal of the 
ONC-AA will reduce the Program's administrative complexity and burden 
while maintaining its effectiveness. We anticipate providing updated 
information about ONC's updated processes for approval and oversight of 
certification bodies through familiar mechanisms including but not 
necessarily limited to the HealthIT.gov website prior to the effective 
date of this final rule, and on an ongoing basis as needed or otherwise 
appropriate to ensure effective transparency about this aspect of the 
Program.
    To finalize this deregulatory action, we have removed the 
definition for ``ONC-Approved Accreditor or ONC-AA'' from Sec.  
170.502. We also removed Sec. Sec.  170.501(c), 170.503, and 170.504 
regarding requests for ONC-AA status, ONC-AA ongoing responsibilities, 
and reconsideration for requests for ONC-AA status. Regarding 
correspondence and communication with ONC, we have revised Sec.  
170.505 to remove specific references to the ``ONC-AA'' and 
``accreditation organizations requesting ONC-AA status.'' We also have 
finalized our proposal to sunset the policies reflected in the final 
rule titled ``Permanent Certification Program for Health Information 
Technology; Revisions to ONC-Approved Accreditor Processes'' (76 FR 
72636), and to remove Sec.  170.575, which established a process for 
addressing instances where the ONC-AA engages in improper conduct or 
does not perform its

[[Page 25657]]

responsibilities under the Program. Because the regulations promulgated 
in this prior final rule relate solely to the role of the ONC-AA, we 
have finalized the removal of those requirements. Accordingly, we also 
revised the application process for ONC-ACB status in Sec.  
170.520(a)(3) to require documentation, with an appropriate scope, that 
confirms that the applicant has been accredited to ISO/IEC 17065 by any 
accreditation body that is a signatory to the Multilateral Recognition 
Arrangement (MLA) with the International Accreditation Forum (IAF), in 
place of the ONC-AA accreditation documentation requirements. 
Similarly, instead of requiring the ONC-AA to evaluate the conformance 
of ONC-ACBs to ISO/IEC 17065, we revise Sec.  170.523(a) to simply 
require ONC-ACBs to maintain accreditation in good standing to ISO/IEC 
17065. This means that ONC-ACBs would need to continue to comply with 
ISO/IEC 17065 and requirements specific to the ONC Health IT 
Certification Program scheme.
4. Removal of Certain 2015 Edition Certification Criteria and Standards
    Having reviewed and analyzed the 2015 Edition, we proposed to 
remove certain certification criteria and standards as discussed in the 
Proposed Rule (84 FR 7435 through 7437) and below. We stated (84 FR 
7435) that we believe the removal of these criteria and standards will 
reduce burden and costs for health IT developers and health care 
providers by eliminating the need to: Design and meet specific 
certification functionalities; prepare, test, and certify health IT in 
certain instances; adhere to associated reporting and disclosure 
requirements; maintain and update certifications for certified 
functionalities, and participate in routine surveillance (84 FR 7435). 
Although we did not expressly state it in the Proposed Rule preamble, 
the burdens and costs reduced by removal of certain criteria from the 
2015 Edition would be those associated with the needs we discussed in 
the preamble (84 FR 7435) specifically in connection to the criteria we 
proposed to remove, which are those that had been set forth in Sec.  
170.315(a)(6), (7) and (8), (10) and (11), and (13), (b)(4) and (5), 
and (e)(2) (as the text of 45 CFR part 170 stood prior to this final 
rule).
a. 2015 Edition Base EHR Definition Certification Criteria
    We proposed to remove certain certification criteria from the 2015 
Edition that had been included in the 2015 Edition Base EHR definition. 
As discussed in the preamble to the Proposed Rule (84 FR 7435), the 
removal of these criteria supports burden and cost reductions for 
health IT developers and health care providers by eliminating the need 
to: Design and meet these specific certification functionalities; 
prepare, test, and certify health IT in certain instances; adhere to 
associated reporting and disclosure requirements; maintain and update 
certifications for these specific certified functionalities; and 
participate in surveillance of health IT certified to these criteria 
and standards.
i. Problem List
    We proposed to remove the 2015 Edition ``problem list'' 
certification criterion (Sec.  170.315(a)(6)) from the 2015 Edition (84 
FR 7436). As we noted in the Proposed Rule, the functionality in this 
criterion was first adopted as a 2011 Edition certification criterion 
to support the associated meaningful use Stage 1 objective and measure 
for recording problem list information. This 2015 Edition ``problem 
list'' criterion functionally remains relatively the same as the 2011 
Edition and has exactly the same functionality as the 2014 Edition 
``problem list'' criterion. We proposed to remove this criterion 
because the criterion no longer supports the ``recording'' objective 
and measure of the CMS PI Programs as such objective and measure no 
longer exist.\16\ Additionally, we stated the functionality is 
sufficiently widespread among health care providers since it has been 
part of certification and the Certified EHR Technology definition since 
the 2011 Edition and has not substantively changed with the 2015 
Edition. Furthermore, we stated in the Proposed Rule that the 
functionality is essential to clinical care and would be in EHR systems 
absent certification, particularly considering the limited 
certification requirements.
---------------------------------------------------------------------------

    \16\ By stating in the NPRM that the objective and measure no 
longer exist, we meant in the CMS PI (formerly EHR Incentive) 
Programs. The authority citation for this statement is the December 
15, 2015 CMS Final Rule ``Medicare and Medicaid Programs; Electronic 
Health Record Incentive Program-Stage 3 and Modifications to 
Meaningful Use in 2015 Through 2017'' (80 FR 62761 and 62785).
---------------------------------------------------------------------------

    Comments. A number of commenters expressed support for removing the 
``problem list'' certification criterion from the 2015 Edition and 
``Base EHR'' definition. Several of those expressing support for the 
removal of this criterion specifically noted that the inclusion of the 
same data elements in the USCDI should suffice to ensure continued 
ability of certified health IT to record and facilitate access and 
exchange of these data. However, a few commenters expressed concern 
that removing this and other requirements would be a disincentive to 
maintain the functionality in the future, and some commenters expressed 
concern about ONC's ability to continue to provide effective oversight 
and require correction if developers do not ensure the functionalities 
perform safely and effectively. Commenters stated that while many 
developers will still continue to support the functionalities proposed 
for removal, eliminating the certification requirement may allow for 
developers to provide a ``stripped-down'' product at a lower price 
point and, in absence of CEHRT definition to guide the providers, 
mislead independent and small providers into unwittingly acquiring 
certified health IT that does not fully meet their needs.
    Response. As discussed in the preamble to the Proposed Rule, a 
criterion specific to the ``problem list'' functionality was first 
adopted in the 2011 Edition, specifically to ensure support for the 
associated meaningful use Stage 1 objective and the measure for 
recording problem list information under the CMS PI Programs. The 
``recording'' objective and measure is no longer a part of the CMS PI 
Programs. However, the functionality remains widespread among EHR 
systems used by health care providers. While this prevalence may be due 
in part to its inclusion in the Certified EHR Technology definition, 
without substantive changes, since the 2011 Edition, we believe the 
more significant reason that this functionality is widely available is 
because it is essential to clinical care, and therefore, that the 
market will and should drive its continued presence in EHR systems 
regardless of certification requirements. While we also appreciate the 
concerns of commenters about the need for health IT to support the 
accurate recording of patients' problems and the standards-based 
exchange of that information, we reiterate that the interoperability-
focused criteria that will remain in the Base EHR definition and 
reference the USCDI will ensure that any system of certified health IT 
meeting the Base EHR definition is capable of using and exchanging data 
on a patient's problems using content, format, and other standards 
applicable to each mode of exchange (e.g., standardized API and C-CDA). 
Moreover, these interoperability-focused criteria will be subject not 
only to the Program's familiar initial certification testing and in-
the-field reactive surveillance requirements but also to the new 
Condition and

[[Page 25658]]

Maintenance of Certification requirements for developers to test 
annually their certified Health IT Modules' interoperability 
performance in the types of real world settings for which they are 
sold.
    After consideration of all comments received, and for the reasons 
noted in the preamble to the Proposed Rule and above, we have finalized 
the removal of the ``problem list'' certification criterion (Sec.  
170.315(a)(6)). We further note that upon the effective date of this 
final rule, the ``problem list'' certification criterion is removed 
from the 2015 Edition and the criterion will no longer be included in 
the 2015 Edition ``safety-enhanced design'' criterion. This criterion, 
in Sec.  170.315(g)(3), specifies the user-centered design testing that 
must be applied to particular EHR functionality submitted for 
certification. However, in response to specific commenters' concerns 
about the impact of removing the functionally-based problem list 
criterion on our ability to take action where developers may retain the 
functionality, but fail to ensure it does not pose a danger to patient 
safety or public health, we note that our responsibility, pursuant to 
section 3001(b) of the PHSA, includes ensuring certified health IT does 
not pose a risk to patient safety or public health, and is not limited 
to measuring the conformity of the health IT to specific certification 
criteria. As discussed in the ``ONC Health IT Certification Program: 
Enhanced Oversight and Accountability'' (EOA) rule which was proposed 
in 81 FR 11056, and finalized in 81 FR 72404 in 2016, ONC has the 
authority to address suspected or confirmed non-conformities to the 
requirements under the ONC Health IT Certification Program if the 
certified health IT is causing or contributing to serious risks to 
public health or safety (81 FR 72406). The EOA final rule established 
in Sec.  170.580 a regulatory framework for ONC's direct review of 
health IT certified under the Program, which expressly addresses the 
potential for ONC to initiate direct review if we have a reasonable 
belief that certified health IT may not conform to the requirements of 
the Program because the certified health IT may be causing or 
contributing to conditions that present a serious risk to public health 
or safety.
    With respect to health care providers' selection of certified 
health IT products, we would encourage all providers to consider the 
Base EHR or Certified EHR Technology (CEHRT) definition as a useful 
starting point. Certain health care payment programs, including the CMS 
PI Programs, require the use of certified health IT. CMS refers to the 
minimum set of required certification functionalities that the health 
IT used by eligible clinicians must have in order to qualify for the 
CMS incentive programs as CEHRT.
    Using certified health IT improves care coordination through the 
electronic exchange of clinical-care documents. It provides a baseline 
assurance that the technology will perform clinical-care and data-
exchange functions in accordance with interoperability standards and 
user-centered design.
ii. Medication List
    We proposed to remove the 2015 Edition ``medication list'' 
certification criterion (Sec.  170.315(a)(7)) (84 FR 7436). As we noted 
in the Proposed Rule, the 2015 Edition ``medication list'' criterion 
remains functionally the same as the 2011 Edition and 2014 Edition 
``medication list'' criteria. As also discussed in the Proposed Rule, a 
functionally-based ``medication list'' criterion was first adopted as a 
2011 Edition certification criterion to support the associated 
meaningful use Stage 1 objective and measure for recording medication 
list information. The ``medication list'' criterion that we proposed to 
remove does not require use of a specific vocabulary standard to record 
medications.
    Comments. Comments on the proposal to remove the ``medication 
list'' criterion were somewhat mixed. While a number of comments 
expressed support for the removal of the ``medication list'' criterion 
from the 2015 Edition as duplicative of medication data included in the 
USCDI a number of commenters expressed concerns with, and a few 
commenters indicated opposition to, the removal of the ``medication 
list'' criterion. A few commenters raised concerns specific to 
elimination of the ``medication list'' criterion in view of the need to 
respond to the opioids crisis. One commenter expressed concern in the 
context of both the medication list and the drug-formulary and 
preferred drug lists criteria as to whether the removal of these 
criteria could potentially impact patients' drug costs. Several 
comments also expressed the same concerns for eliminating the 
``medication list'' that were expressed in regard to removal of the 
``problem list'' criterion, which are summarized above, regarding 
whether developers will continue to include the functionality and 
maintain its safe performance.
    Response. We thank commenters for their input. Upon consideration 
of all comments received on this proposal, we have finalized the 
removal of the ``medication list'' criterion (Sec.  170.315(a)(7)). The 
``recording'' objective and measure of the CMS PI Programs that the 
``medication list'' criterion was originally adopted to support has 
since been retired from the CMS Programs. However, the functionality 
remains widespread among EHR systems used by health care providers. 
While this prevalence may be due in part to its inclusion in the 
Certified EHR Technology definition since the 2011 Edition, we believe 
this functionality is widely available and used in more significant 
part because it is essential to clinical care and, therefore, the 
market will and should drive its continued presence in EHR systems 
regardless of certification requirements. While we also appreciate the 
concerns of commenters about the need for health IT to support 
clinicians' ability to access, maintain, use, and exchange accurate and 
up-to-date information on their patients' current medication lists and 
medication history, we repeat for clarity and emphasis that the 
interoperability-focused criteria that will remain in the Base EHR 
definition, and their inclusion of the USCDI, will ensure that any 
system of certified health IT meeting the Base EHR definition is 
capable of using and exchanging data on a patient's medications using 
content, format, and other standards applicable to each mode of 
exchange (e.g., standardized API consistent with Sec.  171.315(g)(10), 
or exchange of C-CDA documents using the transport standards and other 
protocols in Sec.  171.202). We recognize the critical importance of 
providers' and patients' ability to have, use, and exchange medications 
information to avoid harms that can arise from interactions and 
duplications of therapeutic effects amongst newly prescribed drugs and 
those the patient may already be taking. While the clinical importance 
of maintaining and referencing current, reconciled medication lists is 
not limited to those medications with significant risks of misuse or 
dependency, we agree that it is highlighted by the urgent need to 
ensure opioids are prescribed and used only with due care when 
clinically necessary. We believe this clinical importance supports the 
expectation that the market will ensure this functionality is 
maintained and will drive innovations that improve its usability for 
the clinicians who use it in the course of caring for their patients. 
Moreover, the inclusion of medication information in interoperability-
focused criteria in Sec.  170.405(a) will ensure certified health IT 
can access, use, and exchange medications data according to

[[Page 25659]]

applicable content and formatting standards, which the ``medication 
list'' functionality did not ensure. This interoperability of the data 
is critical to reducing clinician burden related to manually entering 
updated drug lists and necessary to enable use of medication 
information by clinical decision support functionalities. The 
interoperability-focused criteria will also be subject not only to the 
Program's familiar initial certification testing and in-the-field 
reactive surveillance requirements but also to the new Condition and 
Maintenance of Certification requirements for developers to test 
annually their certified Health IT Modules' interoperability 
performance in the types of real world settings for which they are 
marketed.
    We note that once removed from the 2015 Edition, the criterion will 
no longer be included in the 2015 Edition ``safety-enhanced design'' 
criterion in Sec.  170.315(g)(3). However, as noted above in context of 
the ``problem list'' criterion, ONC's responsibility, pursuant to 
section 3001(b) of the PHSA, includes ensuring certified health IT does 
not pose a risk to patient safety or public health. Our responsibility 
for certified health IT and patient safety or public health is not 
limited to measuring the conformity of the health IT to specific 
certification criteria. As discussed in the EOA rule, ONC has the 
authority to address suspected or confirmed non-conformities to the 
requirements under the Health IT Certification Program if the certified 
health IT is causing or contributing to serious risks to public health 
or safety (81 FR 72406). The EOA final rule established in Sec.  
170.580 a regulatory framework for ONC's direct review of health IT 
certified under the Program, which expressly addresses the potential 
for ONC to initiate direct review if we have a reasonable belief that 
certified health IT may not conform to the requirements of the Program 
because the certified health IT may be causing or contributing to 
conditions that present a serious risk to public health or safety.
iii. Medication Allergy List
    We proposed to remove the 2015 Edition ``medication allergy list'' 
certification criterion (Sec.  170.315(a)(8)). The functionality in 
this criterion was first adopted as a 2011 Edition certification 
criterion to support the associated meaningful use Stage 1 objective 
and measure for recording medication allergies information. The 
criterion does not require use of a vocabulary standard to record 
medication allergies, and does not directly support interoperability as 
the criterion does not require representation of medication allergies 
in standardized nomenclature. The criterion no longer supports a 
``recording'' objective and measure of the CMS PI Programs as such 
objective and measure no longer exist. This 2015 Edition ``medication 
allergy list'' criterion remains functionally the same as the 2011 
Edition and 2014 Edition ``medication allergy list'' criteria. The 
functionality is essential to clinical care and would be in EHR systems 
absent certification.
    Comments. Comments on the proposed removal of the ``medication 
allergy list'' criterion were mixed, with several commenters supportive 
of the removal noting that the criterion would be redundant now that 
medication allergy data will be included in the USCDI. Commenters 
expressed concern with the removal of the criterion and questioned the 
ubiquity of the medication allergy list functionality and whether 
health IT developers would continue to support the functionality if not 
required by ONC regulations.
    Response. We thank commenters for their input. Upon consideration 
of all comments received on this proposal, we have finalized the 
removal of the ``medication allergy list'' certification criterion 
(Sec.  170.315(a)(8)). The ``recording'' objective and measure of the 
CMS PI Programs that this criterion was originally adopted to support 
has since been retired from the CMS Programs. However, the 
functionality remains widespread among EHR systems. While this 
prevalence may be due in part to its inclusion in the Certified EHR 
Technology definition since the 2011 Edition, its importance to 
clinical care suggests the market will drive ongoing availability and 
enhancement of this functionality over time. Furthermore, because 
medication allergies are included in the USCDI, all systems of 
certified health IT meeting the Base EHR definition will be required to 
be able to exchange and use medication allergy information according to 
applicable content and formatting standards, which the ``medication 
allergies'' criterion did not ensure. This interoperability is critical 
to reducing clinician burden related to manually entering updated drug 
lists and necessary to enable use of medication information by clinical 
decision support functionalities. We believe that requiring the 
interoperability of medication allergy information will facilitate 
innovation and improvement in health IT's ability to meet clinicians' 
and patients' needs more than would the continuation of the 
``medication allergies'' functionally-based criterion.
    We note that once removed from the 2015 Edition, the ``medication 
allergy list'' criterion will also no longer be included in the 2015 
Edition ``safety-enhanced design'' criterion. However, as noted in 
context of removed criteria above, ONC's responsibility, pursuant to 
section 3001(b) of the PHSA includes ensuring certified health IT does 
not pose a risk to patient safety or public health. Our responsibility 
for certified health IT and patient safety or public health is not 
limited to measuring the conformity of the health IT to specific 
certification criteria. As discussed in the EOA rule, ONC has the 
authority to address suspected or confirmed non-conformities to the 
requirements under the Health IT Certification Program if the certified 
health IT is causing or contributing to serious risks to public health 
or safety (81 FR 72406). The EOA final rule established in Sec.  
170.580 a regulatory framework for ONC's direct review of health IT 
certified under the Program, which expressly addresses the potential 
for ONC to initiate direct review if we have a reasonable belief that 
certified health IT may not conform to the requirements of the Program 
because the certified health IT may be causing or contributing to 
conditions that present a serious risk to public health or safety.
iv. Smoking Status
    We proposed to remove the 2015 Edition ``smoking status'' criterion 
(Sec.  170.315(a)(11)), which would include removing it from the 2015 
Edition Base EHR definition (84 FR 7436). We had previously adopted a 
2015 Edition ``smoking status'' certification criterion that does not 
reference a standard. However, the CCDS definition, which we proposed 
to remove from regulation in favor of adopting the new USCDI standard, 
required smoking status to be coded in accordance with a standard value 
set of eight SNOMED CT[supreg] codes defined in Sec.  170.207(h). As 
with other functionality that was included in 2014 Edition, we believe 
this functionality is now widespread. Further, smoking status data will 
continue to be required to be available for access and exchange via the 
USCDI.
    Comments. Comments on this proposal were mixed, with a number of 
commenters expressing support for the removal of ``smoking status'' 
criterion in the Program and several noting that it is not needed or 
duplicative in the context of Program requirements to support the 
USCDI. A few commenters stated concerns that eliminating the 
requirement would provide a

[[Page 25660]]

disincentive for developers to maintain the function in the future. 
Several commenters expressing concerns about removal of this criterion 
noted its importance to patient care and to public health, raising 
points such as the use of smoking status as a key determinant to 
classify cases of some reportable conditions, such as carbon monoxide 
poisoning. Concerns raised by commenters opposed to removing smoking 
status data from providers' EHR systems included potential for 
additional provider burden, such as that related to providing complete 
case reporting data and responding to public health requests for 
additional information on patient smoking status during case 
investigation processes.
    Response. We thank commenters for their input. Upon consideration 
of the comments, we have finalized the removal of the ``smoking 
status'' criterion (Sec.  170.315(a)(11)). While we continue to believe 
that accurate, up-to-date information on a patient's smoking status and 
history has significant clinical value, we believe that its importance 
to clinical care provides adequate motivation for the market to drive 
ongoing availability and enhancement of this functionality over time. 
Because smoking status information is included in the USCDI, all 
systems of certified health IT meeting the Base EHR definition will now 
be required to be able to exchange and use smoking status information 
according to applicable content and formatting standards. The ``smoking 
status'' recording functionality criterion we have removed did not 
ensure smoking status information was captured in a structured, 
interoperable manner and interoperability of this data is critical to 
reducing clinician burden related to maintaining complete, current 
smoking status information. It is also necessary to enable use of 
smoking status information by clinical decision support and public 
health reporting functionalities. We believe that interoperability and 
exchange of smoking status information through the interoperability-
focused certification criteria that reference the USCDI standard will 
better facilitate innovation and improvement in health IT's ability to 
meet clinicians' and patients' needs than would continuation of the 
``smoking status'' functionally-based recording criterion.
Removal of Specific USCDI Smoking Status Code Set
    Along with the ``smoking status'' criterion, we proposed to remove 
the requirement to code smoking status according to the eight smoking 
status SNOMED CT[supreg] codes referenced in the value set adopted in 
Sec.  170.207(h). These eight codes reflected an attempt to capture 
smoking status in a consistent manner. Stakeholder feedback indicated 
that these eight codes do not appropriately and accurately capture all 
clinically relevant patient smoking statuses. Accordingly, we proposed 
to no longer require use of only the specific eight SNOMED CT[supreg] 
codes for representing smoking status and remove the value set standard 
by deleting and reserving Sec.  170.207(h).
    Comments. Comments specifically addressing this proposal were 
generally supportive of removing the specific value set of eight SNOMED 
CT[supreg] codes, though many also noted the importance of continuing 
to require health IT certified under the Program to retain the ability 
to include or access, exchange, and use appropriately standardized 
smoking status information. Several comments made specific suggestions 
related to broadening or revising the vocabulary standard requirements 
for smoking status information going forward. Other commenters 
suggested adding other forms of tobacco use, including smokeless and 
second hand, as well as e-cigarette (vaping) use.
    Response. We appreciate all commenters' input and note that no 
comments received raised concerns that are not addressed by inclusion 
of smoking status information in the USCDI, which all interoperability-
focused criteria within the 2015 Edition Base EHR definition, as 
revised through this final rule, reference. As is the case with patient 
problems, medications, and medication allergies, we believe having 
smoking status information available for standards-based exchange is an 
important facilitator of better care and more effective public health 
reporting with less data-related burden on clinicians and less need for 
follow-up by public health professionals to compensate for case 
reporting data that is incomplete or is not fully interoperable. As is 
the case with the other removed criteria that were focused on internal 
recording capabilities, we believe the market can, will, and should be 
the primary driver for the ongoing maintenance and enhancement of 
functionalities for end users to record or modify these data. 
Furthermore, the Program's focus is more appropriately spent on 
ensuring that certified health IT supports interoperable access, use, 
and exchange of these data as the key facilitator for more coordinated 
patient care and for ongoing innovation and improvement in both 
provider- and patient-facing functionalities. Because comments on 
revisions or enhancements to smoking status data standardization moving 
forward are outside the scope of this section, we will not address them 
in specific detail here. However, we note that the USCDI v1 references 
as the standard for smoking status information SNOMED CT[supreg], U.S. 
Edition.\17\
---------------------------------------------------------------------------

    \17\ For more information on finalized policy regarding adoption 
of the USCDI standard, see section IV.B.1 of this final rule. USCDI 
v1 can be accessed freely and directly in its entirety at https://www.healthit.gov/isa/sites/isa/files/inline-files/USCDIv12019revised2.pdf.
---------------------------------------------------------------------------

    Having considered all comments received on this proposal, we have 
finalized the removal of the eight-code value set standard and removed 
and reserved Sec.  170.207(h).
b. Drug-Formulary and Preferred Drug List Checks
    We proposed to remove the 2015 Edition ``drug-formulary and 
preferred drug list checks'' criterion in Sec.  170.315(a)(10).
    Comments. Some commenters expressed concern that this criterion's 
removal could negatively impact prescribers' ability to help their 
patients manage their prescription drug expenses. Although several 
commenters supported the removal of this criterion in principle, a 
number of comments expressed concerns about the effect of removal of 
the ``drug-formulary and preferred drug list checks'' and other 
criteria from the Program on health care providers' ability to comply 
with CMS and State-specific regulatory requirements for successful 
participation in the Medicare Quality Payment Program (QPP), or the 
Medicare or Medicaid PI Programs. One commenter, noting that the Drug-
Formulary and Preferred Drug List Checks criterion is associated with 
the CMS e-prescribing objective measures that CMS has finalized for 
2019 and subsequent performance years specifically, recommended 
coordination with CMS to ensure alignment across the policies 
maintained by these two components of HHS.
    Response. We thank commenters for their input. As discussed in the 
Proposed Rule (84 FR 7437), the 2015 Edition ``drug-formulary and 
preferred drug list checks'' criterion does call for functionality to 
check drug formulary and preferred drug lists, but does not require use 
of any specific interoperability standards. The 2015 Edition ``drug-
formulary and preferred drug list checks'' criterion does not include 
functionality or advance interoperability beyond what was required by 
the 2014 Edition ``drug-formulary checks'' criterion. While we

[[Page 25661]]

believe this functionality is fairly ubiquitous now due in part to the 
widespread adoption of health IT certified to the 2014 Edition, we do 
not believe it is necessary to continue to require certification to it 
under the Program in order to ensure it remains widely available. 
Instead, we believe, prescribers' and patients' interest in assuring 
patients can get the medications they need at the best available value 
will provide adequate motivation for the market to drive ongoing 
availability and enhancement of this functionality over time, including 
through increasing use of relevant interoperability standards essential 
to making this functionality more affordable and seamlessly reliable at 
scale than is feasible in the absence of interoperability driven by 
ubiquitous use of open standards. Because the ``drug-formulary and 
preferred drug list checks'' criterion we proposed to remove does not 
require use of standards or directly drive interoperability, we do not 
believe its continued inclusion in the Program would provide sufficient 
value to providers or patients to justify the burden on developers and 
providers of meeting Program compliance requirements specific to this 
criterion. We also recognize the importance of ensuring alignment 
between ONC Health IT Certification Program regulations and the CMS 
regulations that reference them. We have been and will continue to work 
in close partnership with our CMS colleagues to ensure that our 
regulations remain aligned, and that we provide affected stakeholders 
with the information they need to understand how the rules work 
together and how to succeed under CMS' PI Programs using health IT 
certified under ONC's Program. We, therefore, permit ONC-ACBs to issue 
certificates for this criterion up until January 1, 2022 to align with 
the requirements of the CMS Medicaid PI Program, as this criterion is 
associated with measures under the Medicaid program that will continue 
through 2021; after 2021 there will be no further incentives under the 
Medicaid Promoting Interoperability Program (84 FR 42592). We have not 
finalized our proposal to remove the criterion from the CFR but 
included a provision in Sec.  170.550(m)(1) to only allow ONC-ACBs to 
issue certificates for this criterion until January 1, 2022.
c. Patient-Specific Education Resources
    We proposed to remove the 2015 Edition ``patient-specific education 
resources'' certification criterion in Sec.  170.315(a)(13) (84 FR 
7437). We stated that, based on the number of health IT products that 
have been certified for this functionality as part of 2014 Edition 
certification and already for 2015 Edition, we believe that health IT's 
ability to identify appropriate patient education materials is 
widespread now among health IT developers and their customers (e.g., 
health care providers). We also noted that we have recently seen 
innovative advancements in this field, including the use of automation 
and algorithms to provide appropriate education materials to patients 
in a timely manner. These advancements help limit clinical workflow 
interruptions and demonstrate the use and promise of health IT to 
create efficiencies and improve patient care. As such, we stated that 
removal of this criterion would prevent certification from creating an 
unnecessary burden for developers and providers and an impediment to 
innovation.
    Comments. Some commenters expressed concern related to this 
functionality not yet being consistently used by all providers and to 
whether removal of this criterion may create a barrier to successful 
participation for providers in the Medicaid PI Program. One commenter 
noted that providers' workflow changes to use this functionality are 
substantial and expressed concern related to providers potentially not 
undertaking such changes if the criteria were not required to be 
included in health IT and used by providers.
    Response. While we continue to recognize the importance of patient 
and provider interaction to promote positive health outcomes, we also 
believe that this criterion, narrowly focused on a specific 
functionality not connected to interoperability, is no longer the best 
way to encourage innovation and advancement in health IT's ability to 
support clinician-patient interactions and relationships.
    Having reviewed all comments received on this proposal, we have 
decided not to remove the ``patient-specific education resources'' 
criterion from the Program at this time. We recognize the importance of 
ensuring alignment between ONC Health IT Certification Program 
regulations and the CMS regulations that reference them. We will 
continue to work in close partnership with our CMS colleagues to ensure 
that our regulations remain aligned and that we provide affected 
stakeholders with the information they need to understand how the rules 
work together and how to succeed under CMS incentive programs using 
health IT certified under ONC's Program. CMS has identified this 
criterion as supporting the patient electronic access to health 
information objective and measure, which is expected to remain 
operational for Medicaid until January 1, 2022; after 2021, there will 
be no further incentives under the Medicaid Promoting Interoperability 
Program (84 FR 42592). We, therefore, will permit ONC-ACBs to issue 
certificates for this criterion up until January 1, 2022, to align with 
the requirements of the CMS Medicaid PI Program (84 FR 42592). We have 
included a provision in Sec.  170.550(m)(1) to only allow ONC-ACBs to 
issue certificates for this criterion until January 1, 2022.
d. Common Clinical Data Set Summary Record--Create; and Common Clinical 
Data Set Summary Record--Receive
    As stated in the proposed rule (84 FR 7437), we assessed the number 
of products certified to the 2015 Edition ``Common Clinical Data Set 
summary record--create'' (Sec.  170.315(b)(4)) and ``Common Clinical 
Data Set summary record--receive'' (Sec.  170.315(b)(5)) criteria that 
have not also been certified to the 2015 Edition ``transitions of 
care'' criterion (Sec.  170.315(b)(1)) that also requires health IT be 
capable of creating and receiving Common Clinical Data Set (CCDS) 
Summary Records using the same interoperability standards. We explained 
that, based on our findings of only two unique products certified only 
to these criteria and not to the ``transitions of care'' criterion at 
the time of the drafting of the Proposed Rule, there appears to be 
little market demand for certification to 2015 Edition ``Common 
Clinical Data Set summary record--create'' (Sec.  170.315(b)(4)) and 
``Common Clinical Data Set summary record--receive'' (Sec.  
170.315(b)(5)) criteria alone. Therefore, we proposed to remove these 
certification criteria from the 2015 Edition.
    Comments. The comments we received on this proposal supported this 
removal.
    Response. We thank commenters for their support and have finalized 
removal of the 2015 Edition ``Common Clinical Data Set summary record--
create'' (Sec.  170.315(b)(4)) and ``Common Clinical Data Set summary 
record--receive'' (Sec.  170.315(b)(5)) criteria.
e. Secure Messaging
    We proposed to remove the 2015 Edition ``secure messaging'' 
criterion (Sec.  170.315(e)(2)). As explained in the Proposed Rule (84 
FR 7437), ONC strongly supports patient and provider communication, as 
well as protecting the privacy and security of patient information, but 
no longer believes that a separate certification criterion focused

[[Page 25662]]

on a health IT's ability to send and receive secure messages between 
health care providers and patients is necessary. This criterion would 
also no longer be associated with an objective or measure under the CMS 
PI Programs based on proposals and determinations in recent CMS 
rulemakings (83 FR 41664; 83 FR 35929).
    Comments. Several comments specifically referencing this proposal 
were supportive of removing this criterion. A number of commenters 
expressed concern with the removal of the ``secure messaging'' 
criterion, including whether removal of this criterion may create a 
barrier to successful participation for providers in the CMS PI 
Programs. Other commenters expressed concerns about continued 
availability of secure digital endpoints for health care providers. 
Some commenters noted that some providers and patients might prefer to 
continue using ``secure messaging'' functionality in lieu of other 
options for a variety of purposes for which they currently use it, 
while others expressed concern that the separate ``secure messaging'' 
functionality will disappear from the market if no longer supported by 
ONC requirements. Commenters expressed that options for data access and 
exchange, such as portals and APIs, might satisfy providers' and 
patients' needs for interoperable communication. However, commenters 
expressed a concern that these options may not ensure continued 
availability to new market entrants' health IT without requiring the 
technology to interact with developer- or system-specific interfaces.
    Response. We thank commenters for their input. Having reviewed all 
comments received on this proposal, we have decided not to remove the 
``secure messaging'' criterion from the Program at this time. We 
recognize the importance of ensuring alignment between ONC Health IT 
Certification Program regulations and the CMS regulations that 
reference them. We will continue to work in close partnership with our 
CMS colleagues to ensure that our regulations remain aligned and that 
we provide affected stakeholders with the information they need to 
understand how the rules work together and how to succeed under CMS 
incentive programs using health IT certified under ONC's Program. CMS 
has identified this criterion as supporting the coordination of care 
through patient engagement objective and measure, which is expected to 
remain operational for Medicaid until January 1, 2022; after 2021 there 
will be no further incentives under the Medicaid Promoting 
Interoperability Program (84 FR 42592). We, therefore, will permit ONC-
ACBs to issue certificates for this criterion up until January 1, 2022 
to align with the requirements of the CMS Medicaid PI Program (84 FR 
42592). We have included a provision in Sec.  170.550(m)(1) to only 
allow ONC-ACBs to issue certificates for this criterion until January 
1, 2022.
    Limiting certificates to this criterion for this period will help 
spur further innovations in patient engagement while helping to reduce 
regulatory burdens and costs for health IT developers and health care 
providers. The other 2015 Edition certification criteria that support 
patient engagement, such as the 2015 Edition ``view, download, and 
transmit to 3rd party,'' ``API,'' and ``patient health information 
capture'' certification criteria better support interoperability and 
innovation in patient engagement. We have seen developers integrate 
secure messaging functionality as part of other patient engagement 
features, such as patient portals, and integrate messaging with access 
to and exchange of clinical and administrative data. These integrated 
technologies currently in use offer more comprehensive options for 
providers and patients to interact and share information via a secure 
platform and may render the separate ``secure messaging'' criterion and 
functionality redundant to robust integrated options. We also believe 
removing the standalone ``secure messaging'' criterion will encourage 
the market to pursue other innovative means of offering patient 
engagement and interaction functionalities that providers and patients 
want, with the convenience and efficiency they demand. Thus, we believe 
that the removal of this criterion will help reduce burden and costs 
without negative impact on current or future innovations in patient 
engagement and secure information exchange. In response to the concern 
about new market entrants being able to receive data needed to serve 
their customers, we note that the ``view, download, and transmit to 3rd 
party'' criterion remains available for patients who wish to send their 
health information to a third party of the patient's choice. Other 
remaining interoperability-focused criteria, such as ``transitions of 
care,'' ensure that systems of health IT certified to at least those 
criteria remaining in the ``Base EHR'' definition will remain capable 
of supporting providers' use of new entrant and other third party 
health IT of their choosing without requiring that health IT to 
integrate or interface with their certified health IT.
5. Removal of Certain ONC Health IT Certification Program Requirements
    We proposed to remove certain mandatory disclosure requirements and 
a related attestation requirement under the Program. As discussed in 
the Proposed Rule (84 FR 7437), we believe removal of these 
requirements will reduce costs and burden for Program stakeholders, 
particularly for health IT developers and ONC-ACBs.
a. Limitations Disclosures
    We proposed to remove Sec.  170.523(k)(1)(iii)(B), which requires 
ONC-ACBs to ensure that certified health IT includes a detailed 
description of all known material information concerning limitations 
that a user may encounter in the course of implementing and using the 
certified health IT, whether to meet ``meaningful use'' objectives and 
measures or to achieve any other use within the scope of the health 
IT's certification. We proposed to remove Sec.  170.523(k)(1)(iv)(B) 
and (C), which state that the types of information required to be 
disclosed include, but are not limited to: (B) Limitations, whether by 
contract or otherwise, on the use of any capability to which technology 
is certified for any purpose within the scope of the technology's 
certification; or in connection with any data generated in the course 
of using any capability to which health IT is certified; (C) 
limitations, including but not limited to technical or practical 
limitations of technology or its capabilities, that could prevent or 
impair the successful implementation, configuration, customization, 
maintenance, support, or use of any capabilities to which technology is 
certified; or that could prevent or limit the use, exchange, or 
portability of any data generated in the course of using any capability 
to which technology is certified.
    Comments. Most of the comments specifically referencing this 
proposal were supportive. A few commenters raised concerns regarding 
the utility of mandatory disclosures to health care providers, their 
health information exchange partners, and ONC, with some commenters 
offering suggestions for how ONC could use disclosures information in 
the future. A few commenters' concerns specifically referenced the 
disclosure of costs information.
    Response. We thank commenters for their input. We have finalized 
removal of Sec.  170.523(k)(1)(iii)(B) and Sec.  170.523(k)(1)(iv)(B) 
and (C), as proposed (84 FR 7437 and 7438). As

[[Page 25663]]

discussed in the Proposed Rule (84 FR 7438), these specific disclosure 
requirements are superseded by the Cures Act information blocking 
provision and Conditions of Certification requirements, which we 
proposed to implement in the same Proposed Rule (84 FR 7424). As also 
noted in the Proposed Rule (84 FR 7438), we proposed (84 FR 7465 and 
7466) a complementary Condition of Certification requirement that 
developers would be prohibited from taking any action that could 
interfere with a user's ability to access or use certified capabilities 
for any purpose within the scope of the technology's certification 
discussed further in section VII.2.
    We also note here to ensure clarity that we did not propose, and 
have not finalized, a complete removal of the transparency requirements 
in Sec.  170.523(k)(1). Requirements under Sec.  170.523(k)(1) other 
than those specifically proposed for removal will remain in place. The 
transparency requirements remaining in place include: Sec.  
170.523(k)(1)(iii)(A), which describes the plain language detailed 
description of all known material information concerning additional 
types of costs that a user may be required to pay to implement or use 
the Complete EHR or Health IT Module's capabilities, whether to meet 
meaningful use objectives and measures, or to achieve any other use 
within the scope of the health IT's certification; and Sec.  
170.523(k)(1)(iv)(A) specification that the types of information 
required by Sec.  170.523(k)(1)(iii) include, but are not limited to, 
additional types of costs or fees (whether fixed, recurring, 
transaction-based, or otherwise) imposed by a health IT developer (or 
any third party from whom the developer purchases, licenses, or obtains 
any technology, products, or services in connection with its certified 
health IT) to purchase, license, implement, maintain, upgrade, use, or 
otherwise enable and support the use of capabilities to which health IT 
is certified; or in connection with any data generated in the course of 
using any capability to which health IT is certified.
b. Transparency and Mandatory Disclosures Requirements
    We proposed to remove the Principle of Proper Conduct (PoPC) in 
Sec.  170.523(k)(2), which requires ONC-ACBs to ensure health IT 
developers' adherence to a requirement that the health IT developer 
submit an attestation that it will disclose all of the information in 
its mandatory disclosures per Sec.  170.523(k)(1) to specified parties 
(e.g., potential customers or anyone inquiring about a product quote or 
description of services). As discussed in the Proposed Rule (84 FR 
7438), we believe this provision is no longer necessary and that its 
removal is appropriate to further reduce administrative burden for 
health IT developers and ONC-ACBs.
    Comments. The majority of commenters specifically discussing this 
proposal expressed support for the removal of the PoPC in Sec.  
170.523(k)(2). A few commenters expressed concern that the high degree 
of transparency ONC noted in the Proposed Rule might not be maintained 
as they noted a possibility that the PoPC requiring the ONC-ACBs to 
ensure the developers submitted an attestation, and, in turn, the 
developers' obligation to make the attestation, may be driving the 
currently observed levels of transparency.
    Response. We thank commenters for their input. We have decided to 
finalize the removal of the PoPC in Sec.  170.523(k)(2). We appreciate 
the importance of holding health IT developers accountable for meeting 
all requirements of participation in the Program, including meeting or 
exceeding the minimum required transparency disclosures. We believe 
that the needed transparency and accountability will be maintained and 
enhanced by certain Condition and Maintenance of Certification 
requirements we have finalized in this rule, which include the 
assurances and attestations specifically discussed in section VII.2 in 
relation to this proposed removal of Sec.  170.523(k)(2). We believe 
that the removal of the PoPC requirements in Sec.  170.523(k)(2) will 
likely aid in the avoidance of unnecessary costs and burden for Program 
stakeholders, particularly health IT developers and ONC-ACBs.
6. Recognition of Food and Drug Administration Processes
    Section 618 of the Food and Drug Administration Safety and 
Innovation Act (FDASIA), Public Law 112-144, required that the Food and 
Drug Administration (FDA), in consultation with ONC and the Federal 
Communications Commission (FCC) (collectively referred to as ``the 
Agencies'' \18\ for this final rule), develop a report containing a 
proposed strategy and recommendations on an appropriate, risk-based 
regulatory framework pertaining to health IT, including mobile medical 
applications, that promotes innovation, protects patient safety, and 
avoids regulatory duplication. The FDASIA Health IT Report of April 
2014,\19\ contained a proposed strategy and recommendations on an 
appropriate, risk-based regulatory framework pertaining to health IT 
that promotes innovation, protects patient safety, and avoids 
regulatory duplication. Public comments, received prior to the report's 
publication and after,\20\ recommended that health IT developers/
manufacturers apply a single process that satisfies the requirements of 
all agencies, and existing safety and quality-related processes, 
systems, and standards should be leveraged for patient safety in health 
IT. On July 27, 2017, FDA announced a voluntary Software 
Precertification Pilot Program as part of a broader Digital Health 
Innovation Action Plan.\21\ It was developed in order to create a 
tailored approach toward recognizing the unique characteristics of 
digital technology by looking first at the firm, rather than primarily 
at each product of the firm, as is currently done for traditional 
medical products. The FDA plans to explore whether and how pre-
certified companies that have demonstrated a culture of quality, 
patient safety, and organizational excellence could bring certain types 
of digital health products to market either without FDA premarket 
review or with a more streamlined FDA premarket review.
---------------------------------------------------------------------------

    \18\ ONC is not an agency, but an office within the Department 
of Health and Human Services.
    \19\ https://www.fda.gov/downloads/AboutFDA/CentersOffices/OfficeofMedicalProductsandTobacco/CDRH/CDRHReports/UCM391521.pdf.
    \20\ https://www.federalregister.gov/documents/2013/05/30/2013-12817/food-and-drug-administration-safety-and-innovation-act-fdasia-request-for-comments-on-the, https://blogs.fda.gov/fdavoice/index.php/2014/04/fda-seeks-comment-on-proposed-health-it-strategy-that-aims-to-promote-innovation/ and https://www.regulations.gov/document?D=FDA-2014-N-0339-0001.
    \21\ https://www.fda.gov/MedicalDevices/DigitalHealth/DigitalHealthPreCertProgram/Default.htm.
---------------------------------------------------------------------------

a. FDA Software Precertification Pilot Program
    We proposed (84 FR 7438 and 7439) to establish processes that would 
provide health IT developers that can document holding pre-
certification under the FDA Software Precertification Pilot Program 
with exemptions to the ONC Health IT Certification Program's 
requirements for testing and certification of its health IT to the 2015 
Edition ``quality management systems'' criterion (Sec.  170.315(g)(4)) 
and the 2015 Edition ``safety-enhanced design'' criterion (Sec.  
170.315(g)(3)), as these criteria are applicable to the health IT 
developer's health IT presented for

[[Page 25664]]

certification. We also stated that such a ``recognition'' could, 
depending on the final framework of the FDA Software Precertification 
Pilot Program, be applicable to the functionally-based 2015 Edition 
``clinical'' certification criteria (Sec.  170.315(a)). We noted in the 
Proposed Rule that the proposed ``recognition'' could also be 
appropriate to address any or all of the following functionally-based 
2015 Edition criteria in the event their proposed removal were not 
finalized: ``problem list'' (Sec.  170.315(a)(6)), ``medication list'' 
(Sec.  170.315(a)(7)), ``medication allergy list'' (Sec.  
170.315(a)(8)), ``drug-formulary and preferred drug list checks'' 
(Sec.  170.315(a)(10)),'' and ``smoking status'' (Sec.  
170.315(a)(11)).
    We noted (84 FR 7439) that despite proffered benefits including 
alignment with both EOs 13563 and 13771 regarding deregulatory, less 
burdensome, and more effective regulatory schemes and programs, and 
serving as a regulatory relief for those health IT developers 
qualifying as small businesses under the Regulatory Flexibility Act (84 
FR 7587 and 7588), there may be reasons not to adopt such a 
``recognition'' approach. We noted as examples of such reasons that 
stakeholders may not agree that the FDA Software Precertification 
Program sufficiently aligns with our Program, and that stakeholders may 
have operational concerns. Accordingly, we welcomed comments on these 
and other aspects of our proposed ``recognition'' approach, including 
the 2015 Edition certification criteria that should be eligible for 
``recognition.''
    Comments. The majority of commenters commended ONC's efforts to 
recognize the FDA Software Precertification Program. However, most 
commenters expressed concerns that FDA's program was not yet mature 
enough to assess the degree of alignment to the ONC Health IT 
Certification Program. Many commenters expressed concerns that the FDA 
Software Precertification Pilot Program focuses on development and 
business practices, with a potential for streamlining requirements for 
pre-market clearance of specific functionalities, while ONC's 
certification Program focuses less on development practices and more on 
certification of individual software products as meeting Program-
specified requirements for functionality and interoperability, 
including conformance with specific interoperability standards. Many of 
these commenters indicated that until the FDA program is more fully 
mature they would prefer to reserve judgment on how recognition could 
or should be structured to satisfy the needs of ONC's Program at lower 
burden on those developers for whom dual participation is a need or an 
appealing option. Several commenters noted potential for recognition of 
developers who achieve precertification status under the FDA's program 
to streamline or offer them a low-burden option for satisfying certain 
requirements under ONC's Program. However, several commenters urged 
that obtaining FDA precertification status should not be the only way a 
developer could satisfy any requirement under ONC's Program, noting 
that a developer of one or more certified Health IT Modules that is 
newer to the market or simply smaller and not engaged in development of 
software subject to FDA regulation could find the FDA Software 
Precertification Program's requirements a higher hurdle to entering or 
remaining in the ONC-certified health IT market sector than the ONC 
requirements the recognition might replace.
    Response. Considering commenters' concerns and the maturity of the 
FDA Software Precertification Program--which remains in a pilot phase 
at the time this final rule is being drafted--we have decided not to 
finalize recognition of the FDA Software Precertification Program at 
this time. However, we anticipate continuing to consult and coordinate 
with our colleagues at FDA and to monitor the details and experience of 
the FDA Software Precertification Program as it continues to mature. We 
continue to believe that there may be potential for recognition of the 
FDA Software Precertification Program to contribute in the future to 
our ongoing goals of reducing burden and promoting innovation while 
maintaining or enhancing the assurance that the ONC Health IT 
Certification Program provides, but we have not finalized our proposal 
at this time.
b. Development of Similar Independent Program Processes--Request for 
Information
    In the Proposed Rule (84 FR 7439), we included a request for 
information (RFI) related to the development of similar independent 
processes to those of the FDA Software Precertification Program for 
purposes of our Program. We received 21 comments on this RFI and 
appreciate the input provided by commenters. We will continue to 
consider whether to develop similar independent processes and whether 
this should be included in future rulemaking.

IV. Updates to the 2015 Edition Certification Criteria

    In order to capture and share patient data efficiently, health care 
providers need health IT that store data in structured formats. 
Structured data allows health care providers to easily retrieve and 
transfer patient information, and use health IT in ways that can aid 
patient care. We proposed to update the 2015 Edition by adopting a 
limited set of revised and new 2015 Edition certification criteria, 
including new standards, to support these objectives. Some of these 
criteria and standards are included in the Certified EHR Technology 
(CEHRT) definition used for participation in HHS Programs, such as the 
Promoting Interoperability (PI) Programs (formerly the EHR Incentive 
Programs), some are required to be met for participation in the ONC 
Health IT Certification Program, and some, though beneficial, are 
unassociated with the CEHRT definition and not required for 
participation in any HHS program, including the ONC Health IT 
Certification Program (Program).
    Comments. We received a few comments in support of our approach to 
modify the 2015 Edition health IT certification criteria. One commenter 
commended ONC for proposing logical updates to the 2015 Edition 
certification criteria, rather than overhauling the Program or 
establishing a new edition of certification, stating iterative changes 
will provide stability and allow the industry to adapt to new market 
forces. Commenters stated that this incremental approach best serves 
the health care provider and health IT developer community. One 
commenter applauded ONC for proposing logical updates to the 2015 
Edition health IT certification criteria and recommended that ONC 
continue to seek to maximize the impact of these certification changes 
and pursue all opportunities to simplify existing criteria.
    However, a number of commenters requested that ONC put forth a new 
edition and suggested varied approaches to a new edition. Commenters 
suggested that ONC clearly delineate the difference between the 
editions by creating a new naming convention for the updated criteria, 
such as a version number. Others recommended a 2020 Edition or the 
corresponding year in which this rule is effective. Still other 
commenters recommended the proposed updated 2015 Edition be renamed to 
the 2021 Edition instead of renamed with a Release 2 at end of the 
existing name. Some commenters identified the scope of the proposed

[[Page 25665]]

changes as the reason ONC should establish the updates as a new edition 
of certification criteria rather than simply updating the 2015 Edition. 
However, the majority of commenters recommending a new edition based 
their concern on the potential confusion among providers who purchase 
and use certified health IT resulting from different products available 
under the same label.
    Response. We thank commenters for their input on the tradeoffs 
associated with modifying the current 2015 Edition versus creating a 
new edition. We considered a variety of factors when we framed our 
proposals. First, we reviewed the scope of each proposed update and the 
cumulative scope of the proposals overall for health IT developers and 
sought to identify whether it would be more appropriate to require 
health IT developers participating in the Program to implement updates 
to Health IT Modules certified to the 2015 Edition or to test and 
certify health IT products to an entirely new edition of certification 
criteria. Second, we considered the impact that either approach would 
have on health care providers, including how such updated Health IT 
Modules or products certified to a new edition would be implemented by 
providers participating in CMS programs.
    We have considered the impact on health IT developers related to 
the scope of the individual updates as well as the cumulative scope of 
all updates to the 2015 Edition adopted in this final rule (see also 
section XIII Regulatory Impact Analysis). In this final rule, we have 
only adopted two new technical certification criteria in Sec.  
170.315(b)(10) and Sec.  170.315(g)(10) to which health IT developers 
seeking to upgrade their products will need to present Health IT 
Modules for certification. Unlike the new criteria introduced in prior 
certification edition rulemakings, both of these new criteria are an 
expansion or modification of existing criteria within the 2015 Edition 
which are currently in use in certified health IT. The new criteria in 
Sec.  170.315(b)(10) relates to the 2015 Edition criteria in Sec.  
170.315(b)(6) with an expansion of the data and a removal of the 
specificity for the standard requirement. The new Standardized API 
criteria in Sec.  170.315(g)(10) relates to the 2015 Edition API 
criteria with an expansion of security requirements and the addition of 
applicable standards. For the remainder of the updated criteria, a 
developer would not be required to present a Health IT Module for 
certification in order to update a certified product in accordance with 
this final rule. Instead, a health IT developer would update their 
certified Health IT Module, notify the ONC-ACB that they have done so, 
and make the update available their customers. Additionally, unlike 
prior certification edition rulemakings, the certification criteria 
updated to address compliance with the USCDI do not include new 
functionality nor do they require a complete redesign of Health IT 
Modules certified to such certification criteria. As noted in the 
Proposed Rule, the updates to the CCDS to create the USCDI were 
intentionally limited to a modest expansion that most health IT 
developers already supported, were already working toward, or should be 
capable of updating their health IT to support in a timely manner. 
Please see Table 1 for a list of all certification criteria changes.
    In consideration of the impact our approach would have on health 
care providers, we note that impact and potential burden for providers 
is of particular importance given that CY2019 was the first performance 
year where eligible clinicians (ECs), eligible hospitals, dual-eligible 
hospitals, and critical access hospitals (CAHs) participating in CMS 
programs--including the CMS Promoting Interoperability Program and the 
Quality Payment Program/Merit-based Incentive Payment System--were 
required to use health information technology certified to the 2015 
Edition to meet the requirements of the CMS CEHRT definition. If we 
were to adopt a new edition of certification criteria, CMS programs 
would have to consider establishing a new CEHRT definition and a 
subsequent requirement for program participants who have only recently 
completed a full edition update to their technology used for program 
participation. Historically, with a new edition of certification 
criteria, health IT developers have packaged Health IT Modules 
certified to new, modified, and unchanged criteria into a wholly new 
certified product. Historical data indicates that these complete 
updates to the edition are particularly challenging for both health IT 
developers seeking certification and for health care providers as they 
place deadlines for a significant number of health IT developers to 
support and implement new products for a significant number of health 
care providers simultaneously. As a result, the burden of updating the 
technology is compounded for both health IT developers and health care 
providers. While ONC does not itself place any such requirements on 
health care providers, we believe the risk of such significant burden 
must be considered in health IT policy decisions.
    Further, we believe the scope of the updates and the impact on 
health IT developers and health care providers must be considered in 
tandem--meaning that an entirely new edition should only be established 
when the scope of the updates is significant enough to warrant the 
impacts of implementation. When the scope of updates does not warrant 
implementation of an entirely new edition of certification criteria, we 
believe it is appropriate to update the existing criteria. For example 
the 2015 Edition included new criteria that were neither built upon nor 
updated to existing criteria in the 2014 Edition, which was 
significantly different than the 2011 Edition. In contrast, health IT 
developers have been able to employ regular or cyclical updates without 
modifying all Health IT Modules certified to unchanged criteria in 
order to implement updates to existing certification criteria such as 
the annual updates to CMS eCQMs or for changes made to public health 
reporting standards. In such cases, the changes may be implemented by 
health IT developers in the manner most appropriate for their product 
and their customers, such as through routine service and maintenance 
rather than a completely new implementation.
    In order to understand the impact these updates would have on 
participants in the CMS programs which reference them for use by 
program participants, we compare these updates to the current 
definition of CEHRT established by CMS at 42 CFR 495.4 for eligible 
hospitals, CAHs and Medicaid eligible professionals and at 42 CFR 
414.1305 for eligible clinicians in MIPS. For 2019 and subsequent 
years, the CMS CEHRT definition specifies the use of EHR technology 
certified to 2015 Edition including technology that meets the 2015 
Edition Base EHR definition in Sec.  170.102, as well as other 
certified technology necessary to be a meaningful user. The updates 
finalized in this final rule impact both certification criteria 
included in the Base EHR definition as well as criteria required for 
applicable objectives and measures. Specifically, this final rule 
updates several criteria currently applicable for certified Health IT 
Modules used by CMS program participants for the CMS objectives and 
measures necessary to be a meaningful user, including:
     Revisions to the electronic prescribing criterion in Sec.  
170.315(b)(3) to reference an updated e-prescribing standard;

[[Page 25666]]

     Revisions relating to the drug-formulary and preferred 
drug list checks criterion in Sec.  170.315(a)(10) to include at 
170.550(m)(1) to only allow ONC-ACBs to issue certificates for this 
criterion until January 1, 2022;
     Replacement of the API criterion in Sec.  170.315(g)(8) 
with a new API criterion in Sec.  170.315(g)(10) referencing an API 
standard and related security standards;
     Revisions to several criteria to reference the USCDI and 
implement other standards updates (see Table 1 for specifics); and
     Revisions to Sec.  170.315(c)(3), to update quality 
reporting standards.
    In general, health IT developers have 24 months from the 
publication date of the final rule to make technology certified to 
these updated criteria available to their customers, and during this 
time developers may continue supporting technology certified to the 
prior version of certification criteria for use by their customers. For 
providers participating in CMS programs, this means they can continue 
to use the certified technology they have available to them to support 
program participation and can work with their developers to implement 
any updates in a manner that best meets their needs.
    For the revisions to electronic prescribing criterion in Sec.  
170.315(b)(3) and to the quality reporting standards, in Sec.  
170.315(c)(3), the updates adopted for certified health IT align 
specifically with changes already required by CMS for use by health 
care providers. This means health IT developers are already 
implementing and supporting these updates. The implementation of these 
updates is driven by other requirements and so repackaging such updates 
in a new edition (or a new product) would create a redundancy and could 
have unintended cost burden on health care providers. For the updates 
to the criteria referencing the USCDI, as noted previously, we based 
the USCDI on the existing CCDS with modest expansion that most health 
IT developers already supported, were already working toward, or should 
be capable of updating their health IT to support in a timely manner. 
Finally, for the removal of the drug-formulary and preferred drug list 
checks in Sec.  170.315(a)(10), we note that the removal from the 
Program has negligible impact on health care providers.
    First, as discussed in past CMS regulations related to the use of 
these functionalities by participants in CMS programs, health care 
providers have noted that while formulary checks are a promising 
approach, the utility of the specific functionality that is certified 
is not necessarily consistently applicable for all prescriptions (80 FR 
62833). Second, as it does not remove the product from the market, any 
providers who are using the current functionality may continue to use 
the technology for their purposes. For the replacement of the API 
criterion in Sec.  170.315(g)(8) with a new Standardized API criterion 
in Sec.  170.315(g)(10) referencing an API standard and related 
security standards, we reiterate that health IT developers have 24 
months from the date of publication of this final rule to update their 
technology and make such available to their customers. The 2015 Edition 
final rule adopted an API criterion in Sec.  170.315(g)(8) which was 
implemented by many health IT developers using the underlying standard 
adopted in this final rule for the Standardized API criterion in Sec.  
170.315(g)(10). This common use impacted our decision to adopt the 
standard in our update to the 2015 Edition (see also section VII.B.4.c 
Standardized API for Patient and Population Services). We, therefore, 
believe that both the scope of the updates and the potential impact on 
health IT developers and health care providers do not constitute 
sufficient justification for the potential burden associated with 
adopting an entirely new edition of certification criteria. Instead, we 
believe it is most reasonable and effective for these updates to be 
part of the existing 2015 Edition as modified in this final rule.
    We acknowledge the concerns of commenters who expressed the 
potential risk of confusion about the updates among their customers and 
how to best communicate that a product meets the updated version of a 
given certification criterion. We strongly encourage health IT 
developers to work with their customers to promote understanding of 
these updates. In addition, we have taken several mitigating steps. 
First, we revisited our proposed regulatory structure and revised it so 
that the structure more clearly reflects if a change is updating the 
previously adopted standard, or a more significant change to the 
criterion such as adding a new standard. This maintains the prior 2015 
Edition regulatory structure for the majority of the updates except for 
Sec.  170.315(b)(10) and (g)(10) as discussed previously, and 
establishes a more clear sense of scope.
    Second, in order to support effective communication of the updates, 
we are implementing a practical approach to facilitate transparency 
using the Certified Health IT Product List (CHPL),\22\ which is the 
tool that health care providers and the general public may use to 
identify the specific certification status of a product at any given 
time, to explore any certification actions for a product, and to obtain 
a CMS Certification ID for a product used when participating in CMS 
programs. While we retain the overall 2015 Edition title, we will 
distinguish the 2015 Edition certification criteria from the new or 
revised criteria adopted in this final rule by referring to the new or 
revised criteria as the 2015 Edition Cures Update on the CHPL for 
products that are certified. The CHPL will also differentiate to what 
standards the health IT will be certified and will allow health care 
providers to identify if and when a specific Health IT Module has been 
updated. This will help to eliminate some of the confusion among 
providers who are seeking to understand the certification and update 
the status of the product they are currently using. It can also be a 
resource for providers who may be making a new purchase of certified 
health IT to make an informed decision about which products support the 
most up to date available standards and functionality.
---------------------------------------------------------------------------

    \22\ ONC Certified Health IT Product List: https://chpl.healthit.gov.
---------------------------------------------------------------------------

    We further note that, while in the past ONC has largely relied on 
creating a new edition to implement changes to certification criteria, 
in each case, those changes included some updates to existing criteria, 
but also criteria containing functionality and standards that were 
entirely new and did not build on the prior edition. In addition, the 
Cures Act set in motion a shift for the ONC Health IT Certification 
Program by including Conditions and Maintenance of Certification 
requirements which allowed for processes such as the Standards Version 
Advancement Process (SVAP) flexibility within real world testing, which 
allows better alignment to industry efforts for standards advancement 
while maintaining accountability. These new provisions help to remove 
barriers for standards development and version updates, which limit a 
health IT developer's ability to provide individually relevant, timely, 
and innovative solutions to their clients. This change is consistent 
with our approach to adopt incremental updates in this final rule 
rather than to adopt a complete new edition of certification criteria. 
This final rule is the first time we have executed on the concept of 
Maintenance of Certification requirements for existing certificates, 
and we foresee the potential for future

[[Page 25667]]

rulemakings to include incremental updates to certification criteria 
when such updates are appropriate.
    Please see Table 1 for a list of all certification criteria 
changes.

                                       Table 1--2015 Edition Cures Update
----------------------------------------------------------------------------------------------------------------
                                                                                                Impact on CMS
                                                New/revised/ removed/  2015 Edition cures         promoting
    Certification criteria        Reference         time- limited        update--timing       interoperability
                                                    certification                               (PI) programs
----------------------------------------------------------------------------------------------------------------
Problem list.................  Sec.             Removed.............  Effective date of     Removed from 2015
                                170.315(a)(6).                         final rule (60 days   Edition Base EHR
                                                                       after publication).   definition.
Medication list..............  Sec.             Removed.............  Effective date of     Removed from 2015
                                170.315(a)(7).                         final rule (60 days   Edition Base EHR
                                                                       after publication).   definition.
Medication allergy list......  Sec.             Removed.............  Effective date of     Removed from 2015
                                170.315(a)(8).                         final rule (60 days   Edition Base EHR
                                                                       after publication).   definition.
Drug Formulary and Preferred   Sec.             Time-limited          ONC-ACBs only         PI Measures:
 Drug List Checks.              170.315(a)(10).  Certification.        permitted to issue    --e-Rx
                                                                       certificates for      ---Query of PDMP
                                                                       this criterion        Operational for
                                                                       until January 1,      Medicaid until
                                                                       2022.                 January 1, 2022.
Smoking status...............  Sec.             Removed.............  Effective date of     Removed from 2015
                                170.315(a)(11).                        final rule (60 days   Edition Base EHR
                                                                       after publication).   definition.
Patient-specific Education     Sec.             Time-limited          ONC-ACBs only         Operational for
 Resource.                      170.315(a)(13).  Certification.        permitted to issue    Medicaid until
                                                                       certificates for      January 1, 2022
                                                                       this criterion        Supports Patient
                                                                       until January 1,      Electronic Access
                                                                       2022.                 to Health
                                                                                             Information
                                                                                             Objective Measure.
Transitions of Care..........  Sec.             Revised.............  Update to USCDI/C-    PI Measures:
                                170.315(b)(1).                         CDA companion guide   --Support
                                                                       within 24 months      Electronic Referral
                                                                       after the             Loops by Sending
                                                                       publication date of   Health Information
                                                                       final rule.           --Support
                                                                                             Electronic Referral
                                                                                             Loops by Receiving
                                                                                             and Incorporating
                                                                                             Health Information.
Clinical information           Sec.             Revised.............  Update to USCDI/C-    PI Measures:
 reconciliation and             170.315(b)(2).                         CDA companion guide   --Support
 incorporation.                                                        within 24 months      Electronic Referral
                                                                       after the             Loops by Receiving
                                                                       publication date of   and Incorporating
                                                                       final rule.           Health Information.
Electronic prescribing.......  Sec.             Revised.............  Update standard       PI Measures:
                                170.315(b)(3).                         within 24 months      --e-Prescribing.
                                                                       after the
                                                                       publication of
                                                                       final rule.
Common Clinical Data Set       Sec.             Removed.............  Effective date of
 summary record--create.        170.315(b)(4).                         final rule (60 days
                                                                       after publication).
Common Clinical Data Set       Sec.             Removed.............  Effective date of
 summary record--receive.       170.315(b)(5).                         final rule (60 days
                                                                       after publication).
Data Export..................  Sec.             Time-limited          ONC-ACBs may only     Removed from 2015
                                170.315(b)(6).   Certification.        issue certificates    Edition Base EHR
                                                                       until 36 months       definition
                                                                       after the             effective date of
                                                                       publication date of   the final rule (60
                                                                       the final rule.       days after
                                                                                             publication).
Security tags--summary of      Sec.             Revised.............  Document, section,
 care--send.                    170.315(b)(7).                         and entry (data
                                                                       element) level; or
                                                                       Document level for
                                                                       the period until 24
                                                                       months after
                                                                       publication date of
                                                                       final rule.
Security tags--summary of      Sec.             Revised.............  Document, section,
 care--receive.                 170.315(b)(8).                         and entry (data
                                                                       element) level; or
                                                                       Document level for
                                                                       the period until 24
                                                                       months after
                                                                       publication date of
                                                                       final rule.
Care plan....................  Sec.             Revised.............  Update to C-CDA       ....................
                                170.315(b)(9).                         companion guide
                                                                       within 24 months
                                                                       after publication
                                                                       date of final rule.
EHI export...................  Sec.             New.................  Update within 36
                                170.315(b)(10).                        months of
                                                                       publication date of
                                                                       final rule.
Clinical quality measures      Sec.             Revised.............  Effective date of     PI Programs.
 (CQMs)--report.                170.315(c)(3).                         final rule (60 days
                                                                       after publication).
Auditable events and tamper-   Sec.             Revised.............  Update to new ASTM
 resistance.                    170.315(d)(2).                         standard within 24
                                                                       months after
                                                                       publication date of
                                                                       final rule.
Audit report(s)..............  Sec.             Revised.............  Update to new ASTM
                                170.315(d)(3).                         standard within 24
                                                                       months after
                                                                       publication date of
                                                                       final rule.
Auditing actions on health     Sec.             Revised.............  Update to new ASTM
 information.                   170.315(d)(10).                        standard within 24
                                                                       months after
                                                                       publication date of
                                                                       final rule.
Encrypt authentication         Sec.             New.................  Effective date of
 credentials.                   170.315(d)(12).                        final rule (60 days
                                                                       after publication)
                                                                       (New and updated
                                                                       certifications
                                                                       only).
Multi-factor authentication    Sec.             New.................  Effective date of
 (MFA).                         170.315(d)(13).                        final rule (60 days
                                                                       after publication)
                                                                       (New and updated
                                                                       certifications
                                                                       only).
View, Download, and Transmit   Sec.             Revised.............  Update to USCDI/C-    PI Measure:
 to 3rd Party.                  170.315(e)(1).                         CDA companion guide   --Provide Patients
                                                                       within 24 months      Electronic Access
                                                                       after publication     to Their Health
                                                                       date of final rule.   Information.
Secure Messaging.............  Sec.             Time-limited          ONC-ACBs only         Operational for
                                170.315(e)(2).   Certification.        permitted to issue    Medicaid until
                                                                       certificates for      January 1, 2022
                                                                       this criterion        Supports the
                                                                       until January 1,      Coordination of
                                                                       2022.                 Care through
                                                                                             Patient Engagement
                                                                                             Objective.
Transmission to public health  Sec.             Revised.............  Update to USCDI/C-    PI Measure:
 agencies-- electronic case     170.315(f)(5).                         CDA companion guide   --Electronic Case
 reporting.                                                            within 24 months      Reporting.
                                                                       after publication
                                                                       date of final rule.
Consolidated CDA creation      Sec.             Revised.............  Update to USCDI/C-
 performance.                   170.315(g)(6).                         CDA companion guide
                                                                       within 24 months
                                                                       after publication
                                                                       date of final rule.
Application Access--Data       Sec.             Time-limited          24 months after       PI Measure:
 Category Request.              170.315(g)(8).   Certification.        publication date of   --Provide Patients
                                                                       final rule.           Electronic Access
                                                                                             to Their Health
                                                                                             Information.

[[Page 25668]]

 
Application Access--All Data   Sec.             Revised.............  Update to USCDI/C-    PI Measure:
 Request.                       170.315(g)(9).                         CDA companion guide   --Provide Patients
                                                                       within 24 months      Electronic Access
                                                                       after publication     to Their Health
                                                                       date of final rule.   Information.
Standardized API for patient   Sec.             New.................  Update within 24      Added to the 2015
 and population services.       170.315(g)(10).                        months of             Edition Base EHR
                                                                       publication date of   definition.
                                                                       final rule.
----------------------------------------------------------------------------------------------------------------
Note: The CHPL will be updated to indicate the standards utilized for new or revised certification criteria, as
  well as denote criteria removed from the Program.

A. Standards and Implementation Specifications

1. National Technology Transfer and Advancement Act
    The National Technology Transfer and Advancement Act (NTTAA) of 
1995 (15 U.S.C. 3701 et. seq.) and the Office of Management and Budget 
(OMB) Circular A-119 \23\ require the use of, wherever practical, 
technical standards that are developed or adopted by voluntary 
consensus standards bodies to carry out policy objectives or 
activities, with certain exceptions. The NTTAA and OMB Circular A-119 
provide exceptions to electing only standards developed or adopted by 
voluntary consensus standards bodies, namely when doing so would be 
inconsistent with applicable law or otherwise impractical. Agencies 
have the discretion to decline the use of existing voluntary consensus 
standards if determined that such standards are inconsistent with 
applicable law or otherwise impractical, and instead use a government-
unique standard or other standard. In addition to the consideration of 
voluntary consensus standards, the OMB Circular A-119 recognizes the 
contributions of standardization activities that take place outside of 
the voluntary consensus standards process. Therefore, in instances 
where use of voluntary consensus standards would be inconsistent with 
applicable law or otherwise impracticable, other standards should be 
considered that meet the agency's regulatory, procurement or program 
needs, deliver favorable technical and economic outcomes, and are 
widely utilized in the marketplace.
---------------------------------------------------------------------------

    \23\ https://www.whitehouse.gov/sites/whitehouse.gov/files/omb/circulars/A119/revised_circular_a-119_as_of_1_22.pdf.
---------------------------------------------------------------------------

    Comments. A couple of commenters stated that they do not support 
Federal programs' use of the NTTAA voluntary consensus standards 
exceptions, and asked that the involved Federal programs continue to 
utilize consensus-based standards developed through work done by 
organizations such as HL7[supreg]. They noted that such work 
incorporates public health inputs, and stated that it is critical for 
there to be sufficient discussion and consideration of all stakeholder 
concerns in adopting such critical technologies such as FHIR[supreg].
    Response. We thank commenters for their feedback. We clarify that 
many of the standards we adopt in this final rule are developed and/or 
adopted by voluntary consensus standards bodies, except where we found 
that a government unique standard is more appropriate. We are aware of 
no voluntary consensus standards that could serve as an alternative for 
the following purposes in this final rule.
    In this final rule, we use voluntary consensus standards except 
for:
     The standard adopted in Sec.  170.213, the United States 
Core Data for Interoperability (USCDI), Version 1 (v1), is a hybrid of 
government unique policy (i.e., determining which data to include in 
the USCDI) and voluntary consensus standards (i.e., the vocabulary and 
code set standards attributed to USCDI data elements). We have placed 
time limitations on the predecessor to this standard, the Common 
Clinical Data Set (CCDS) definition, under this rule, and replaced it 
with the USCDI in all applicable criteria except for the data export 
criterion in Sec.  170.315(b)(6), on which we have also placed a time 
limit. We refer readers to the ``Revised and New 2015 Edition 
Criteria'' in section IV.B of this preamble.
     The standards adopted in Sec.  170.205(h)(3) and (k)(3). 
We replaced the current HL7[supreg] QRDA standards with government 
unique standards, the CMS Implementation Guide for Quality Reporting 
Document Architecture: Category I; Hospital Quality Reporting; 
Implementation Guide for 2019, and the CMS Implementation Guide for 
Quality Reporting Document Architecture: Category III; Eligible 
Clinicians and Eligible Professionals Programs; Implementation Guide 
for 2019, that will more effectively support the associated 
certification criterion's use case, which is reporting electronic 
clinical quality measure (eCQM) data to CMS.
2. Compliance With Adopted Standards and Implementation Specifications
    In accordance with Office of the Federal Register regulations 
related to ``incorporation by reference,'' 1 CFR part 51, which we 
follow when we adopt proposed standards and/or implementation 
specifications in a final rule, the entire standard or implementation 
specification document is deemed published in the Federal Register when 
incorporated by reference therein with the approval of the Director of 
the Federal Register. Once published, compliance with the standard and/
or implementation specification includes the entire incorporated 
document, unless we specify otherwise. For example, for the HL7[supreg] 
FHIR U.S. Core Implementation Guide (IG) STU 3.1.0 adopted in this 
final rule (see section VII.B.4), health IT certified to certification 
criteria referencing this IG would need to demonstrate compliance with 
all mandatory elements and requirements of the IG. If an element of the 
IG is optional or permissive in any way, it would remain that way for 
testing and certification unless we specified otherwise in regulation. 
In such cases, the regulatory text would preempt the permissiveness of 
the IG.
3. ``Reasonably Available'' to Interested Parties
    The Office of the Federal Register has established requirements for 
materials (e.g., standards and implementation specifications) that 
agencies propose to incorporate by reference in the Code of Federal 
Regulations (79 FR 66267; 1 CFR 51.5(b)). To comply with these 
requirements, in section XI (``Incorporation by Reference'') of this 
preamble, we provide summaries of, and uniform resource locators (URLs) 
to, the standards and implementation specifications we have adopted and 
subsequently incorporate by reference in the Code of Federal 
Regulations. To note, we also provide relevant information about these 
standards and implementation specifications

[[Page 25669]]

throughout the relevant preamble policy discussions and regulation text 
sections of the final rule.

B. Revised and New 2015 Edition Criteria

1. The United States Core Data for Interoperability Standard (USCDI)
    As we noted in the Proposed Rule, the initial focus of the Program 
was to support the Medicare and Medicaid EHR Incentive Programs (76 FR 
1294) now referred to as the Promoting Interoperability (PI) Programs. 
As such, the 2014 Edition certification criteria mirrored those 
functions specified by the CMS PI Programs objectives and measures for 
providers demonstrating meaningful use (MU) of certified health IT. In 
order to improve efficiency and streamline the common data within our 
Program's certification criteria, we created a single definition for 
all the required data that could be referenced for all applicable 
certification criteria. We created the term ``Common MU Data Set'' to 
encompass the common set of MU data types/elements (and associated 
vocabulary standards) for which certification would be required across 
several certification criteria (77 FR 54170).
    The 2015 Edition final rule modified the Program to make it open 
and accessible to more types of health IT, and health IT that supports 
various care and practice settings beyond those included in the CMS PI 
Programs (80 FR 62604). In comparison to the previous editions, the 
2015 Edition focused on identifying health IT components necessary to 
establish an interoperable nationwide health information 
infrastructure, fostering innovation and opening new market 
opportunities, and allowing for more health care provider and patient 
choices in electronic health information access and exchange. In order 
to align with this approach, we made changes in the 2015 Edition final 
rule that resulted in updated vocabulary and content standards to 
improve and advance interoperability and health information exchange 
(80 FR 62604). The 2015 Edition final rule further expanded 
accessibility and availability of data exchanged by updating the 
definition of Base EHR in the 2015 Edition to include enhanced data 
export, transitions of care, and application programming interface 
(API) capabilities, all of which previously required that, at a 
minimum, the CCDS be available (80 FR 62602 through 62604).
    We further noted in the Proposed Rule (84 FR 7440) that the 
regulatory approach to using and referencing a ``definition'' to 
identify electronic health information, for access, exchange and use, 
including associated vocabulary codes, has had its drawbacks. While 
ONC's ``CCDS'' definition served its designed purpose (to reduce 
repetitive text in each of the certification criteria in which it is 
referenced), the term CCDS, and the data set it represents, also began 
to be used by outside organizations such as the Argonaut Project \24\ 
for additional use cases beyond the C-CDA and ONC's Health IT 
Certification Program. As these organizations identified the need to 
expand the content of the CCDS, the CCDS definition in regulation 
became a limitation to developing additional data access, exchange, and 
uses outside of ONC's programs. As we move towards value-based care and 
the inclusion of Data Classes that go beyond clinical data, and as part 
of ONC's continued efforts to evaluate the availability of a minimum 
baseline of Data Classes that must be commonly available for 
interoperable exchange, we acknowledge the need to change and improve 
our regulatory approach to the CCDS. Therefore, in order to advance 
interoperability by adopting new data and vocabulary codes sets that 
support data exchange, we proposed to remove the ``Common Clinical Data 
Set'' in Sec.  170.315(b)(4) and Sec.  170.315(b)(5), and its 
references throughout the 2015 Edition and replace it with the ``United 
States Core Data for Interoperability'' (USCDI) standard. This first 
version of USCDI will be designated ``version 1 (v1).'' The USCDI 
standard aims to achieve the goals set forth in the Cures Act by 
specifying a common set of data classes and elements that have been 
designed to improve data usage and interoperable data exchange.
---------------------------------------------------------------------------

    \24\ https://argonautwiki.hl7.org/Main_Page.
---------------------------------------------------------------------------

    We proposed to adopt the USCDI v1 as a standard defined in Sec.  
170.102. Here, ``Standard'' is defined as a ``technical, functional, or 
performance-based rule, condition, requirement, or specification that 
stipulates instructions, fields, codes, data, materials, 
characteristics, or actions.'' The USCDI standard would be composed of 
Data Classes, which may be further delineated into groupings of 
specific Data Element(s). For example, ``patient demographics'' is a 
Data Class, and within that Data Class there is ``patient name,'' which 
is a Data Element. As noted in section IV.B.1.b, for the overall 
structure and organization of the USCDI, please consult 
www.healthIT.gov/USCDI.
    We noted in the Proposed Rule (84 FR 7441) that ONC intended to 
establish and follow a predictable, transparent, and collaborative 
process to expand the USCDI, including providing stakeholders with the 
opportunity to comment on the USCDI's expansion. We indicated that once 
the Secretary adopts the first version of the USCDI through rulemaking, 
which we proposed in Sec.  170.213 in the Proposed Rule, health IT 
developers would be allowed to take advantage of the ``Standards 
Version Advancement Process'' (SVAP) flexibility. The SVAP (which we 
proposed in Sec.  170.405(b) and which is discussed in section VII.B.5, 
below) would permit health IT developers to voluntarily implement and 
use a newer version of a Secretary-adopted standard such as the USCDI, 
subject to certain conditions including a requirement that the newer 
version is approved for use by the National Coordinator, and does not 
conflict with requirements under other applicable law. We received a 
number of comments regarding these proposals, which are outlined in the 
subsections below.
    Comments. We received broad support for the adoption of version 1 
of the USCDI as a new standard defining critical health care data to 
promote interoperability. Some commenters from health plans, while 
supportive of patient and provider access to health care data, voiced 
concerns about health plans being required to make data available in 
the USCDI standard. Other commenters noted that USCDI v1 does not 
include data classes and elements that pertain to all health care 
settings, including public health, and would therefore not be broadly 
applicable to all health care settings.
    Response. We thank commenters for their support of the adoption of 
USCDI v1 as a standard. We wish to clarify that the adoption of version 
1 of the USCDI as a standard for our Program is not specific to a 
setting of care, a health care specialty, or a specific category of 
health IT user. Nor is the USCDI specific to a particular content 
exchange standard (e.g., HL7 C-CDA, HL7 FHIR, HL7 V2, and NCPDP 
SCRIPT). Rather, it applies to the certification of health IT and 
certified health IT's ability to send and receive the Data Elements 
defined by USCDI without requirements regarding functionality, user 
interface, or the use of those Data Elements in exchange. While some 
users may find few opportunities to exchange these Data Elements, many 
will exchange these Data Elements frequently, and we believe that all 
health care providers should have certified health IT that can provide 
them with a means to appropriately share and access the USCDI data set 
when exchanging data with other providers. Accordingly, we

[[Page 25670]]

seek to clarify a point with respect to our proposal regarding the 
USCDI and health IT certification. For the purposes of the ONC Health 
IT Certification Program, specific certification criteria are the way 
the USCDI comes into effect. For example, the USCDI is referenced as 
part of the data requirements in the updated ``transitions of care'' 
certification criterion (Sec.  170.315(b)(1)), which also specifies 
that for certification to that criterion, the C-CDA must be used as the 
syntax to hold all of the USCDI data.
    As we explained, we believe that the adoption of USCDI v1 for all 
certified health IT will advance interoperability by ensuring 
utilization of common data and vocabulary code sets, and that 
standardization will support both electronic exchange and usability of 
the data. Furthermore, because ONC will establish and follow a 
predictable, transparent, and collaborative process to expand future 
versions of USCDI, including providing stakeholders with the 
opportunity to comment on draft USCDI's expansion, stakeholders will 
have ample opportunities to advance additional Data Classes and Data 
Elements relevant to a wide range of health care use cases. After 
consideration of these comments and the overall support of commenters, 
we have adopted the USCDI v1 as a standard in Sec.  170.213.
    We have also extended the compliance timelines with which a health 
IT developer needs to update to the USCDI, therefore, we have not 
removed the CCDS definition from Sec.  170.102 as proposed but revised 
it to remove references to 2014 Edition standards and provided time 
limitations for when health IT developers need to update to the USCDI.
a. USCDI 2015 Edition Certification Criteria
    We proposed (84 FR 7441) to adopt the USCDI Version 1 (USCDI v1) in 
Sec.  170.213.\25\ The USCDI is a standardized set of health Data 
Classes and constituent Data Elements that would be required to support 
nationwide electronic health information exchange. Once adopted in this 
final rule, health IT developers would be required to update their 
certified health IT to support the USCDI v1 for all certification 
criteria affected by this proposed change. We also proposed conforming 
changes in the sections below to update the following formerly CCDS-
dependent 2015 Edition certification criteria to incorporate the USCDI 
standard:
---------------------------------------------------------------------------

    \25\ We note that USCDI v1 is an updated version and 
distinguished from the Draft United States Core Data for 
Interoperability (USCDI) previously made available for public review 
and comment in the course of its development as a prospective 
standard. The data classes and elements in the USCDI v1 were 
proposed in Sec.  170.213 and defined in the Proposed Rule, and an 
additional USCDI v1 document with technical standards information 
was posted electronically concurrent with the publication of the 
Proposed Rule in order to provide the public adequate time to fully 
review and comment on both the proposed regulation and the USCDI v1 
technical information.
---------------------------------------------------------------------------

     ``transitions of care'' (Sec.  170.315(b)(1));
     ``view, download, and transmit to 3rd party'' (Sec.  
170.315(e)(1));
     ``transmission to public health agencies--electronic case 
reporting'' (Sec.  170.315(f)(5));
     ``consolidated CDA creation performance'' (Sec.  
170.315(g)(6)); and
     ``application access--all data request'' (Sec.  
170.315(g)(9)).
    We did not include the ``data export'' criterion (Sec.  
170.315(b)(6)) in the proposed list of criteria that would be revised 
to include the USCDI standard because we proposed to remove the ``data 
export'' criterion (Sec.  170.315(b)(6)) and instead proposed to adopt 
a criterion that we referenced as ``EHI export'' in the Proposed Rule 
(Sec.  170.315(b)(10)). For similar reasons, we did not include the 
``application access--data category request'' criterion (Sec.  
170.315(g)(8)) because we proposed to replace it with the API 
certification criterion (Sec.  170.315(g)(10)) that derives its data 
requirements from the USCDI.
    We also proposed, as a Maintenance of Certification requirement 
(Sec.  170.405(b)(3)) for the real world testing Condition of 
Certification requirement (Sec.  170.405(a)), that health IT developers 
with health IT certified to the five above-identified certification 
criteria prior to the effective date of this final rule would have to 
update such certified health IT to the proposed revised standards (84 
FR 7441 and 7596). We further proposed, as a Maintenance of 
Certification requirement (Sec.  170.405(b)(3)) for the real world 
testing Condition of Certification requirement (Sec.  170.405(a)), that 
health IT developers must provide the updated certified health IT to 
all their customers with health IT previously certified to the 
identified criteria no later than 24 months after the effective date of 
this final rule (84 FR 7441 and 84 FR 7596). For the purposes of 
meeting this compliance timeline, we noted that we expected health IT 
developers to update their certified health IT and notify their ONC-ACB 
on the date at which they have reached compliance. We noted that 
developers would also need to factor these updates into their next real 
world testing plan as discussed in section VII.B.5 of the Proposed 
Rule.\26\
---------------------------------------------------------------------------

    \26\ The finalized real world testing Condition and Maintenance 
of Certification requirements are discussed in section VII.B.5 of 
this final rule.
---------------------------------------------------------------------------

    Comments. The majority of commenters supported the proposed 
adoption of USCDI v1 and incorporation of the USCDI into the revised 
and new certification criteria. Some commenters expressed concern that 
incorporation of the USCDI into the ``transmission to public health 
agencies--electronic case reporting'' certification criteria could have 
a negative impact on data received by public health reporting programs. 
Some commenters stressed the need for reasonable adoption timelines. 
Some suggested a longer adoption and implementation timeline for 
incorporation of the USCDI as part of certified health IT.
    Response. ONC acknowledges that some entities, such as public 
health agencies, may need to consider what the expanded set of data the 
USCDI v1 offers may mean to their reporting programs and requirements. 
To be clear, the USCDI's existence as a stand-alone standard will not 
impact or change public health reporting requirements. However, certain 
data now included in the USCDI, such as clinical notes, would now 
become more readily available for public health reporting and a State's 
public health program's policy may need to be revisited if a State 
seeks to make use of the ``new'' data the adoption of the USCDI stands 
to make more easily available, and more usable upon receipt. We also 
believe that the proposed 24-month timeline for updating certified 
health IT to comply with the new USCDI standard in Sec.  170.213 is an 
adequate implementation timeline, based on other adoption timelines 
with similar technical complexities. We, therefore, have finalized 
revisions for the five above-identified formerly CCDS-dependent 2015 
Edition certification criteria to incorporate the USCDI standard.
    We have finalized a modification to the regulation text for these 
criteria based on public comment related to mitigating the risk of 
potential confusion caused by updates to existing criteria. As 
discussed earlier in this preamble (section IV), we received public 
comment requesting that all revised criteria be included in a new 
edition of certification criteria. At the start of section IV, we 
discuss in response to these comments that we do not believe the 
creation of a new edition is appropriate given that the scope of the 
updates to the 2015 Edition is tied

[[Page 25671]]

to standards updates required to keep pace with current industry 
practices. However, we do plan to distinguish the 2015 Edition 
certification criteria from the updated criteria in this final rule by 
referring to them as the 2015 Edition Cures Update on the CHPL.
    However, as Health IT Modules are updated to the new standards over 
time, there is a need to define what is required for certification and 
what is required for compliance to prior certification. Therefore, we 
have finalized that for criteria being updated from the CCDS to the 
USCDI, 24 months after publication date of the final rule shall be 
applicable for a transition from the CCDS to the USCDI. We have 
finalized that for the period until 24 months after the publication 
date of the final rule, the CCDS remains applicable for certified 
Health IT Modules until such Health IT Modules are updated to the 
USCDI. This means that upon the effective date of the rule, for the 
identified criteria the following apply for certification and 
compliance:
     The USCDI, or
     The CCDS for the period up to 24 months after the 
publication date of the final rule.
    This allows for developers to plan the transition for their 
products more effectively and supports certification continuity. We 
have finalized a modification to the regulation text to require the 
USCDI, or the CCDS for the period lasting until 24 months after the 
publication date of the final rule.
    We have finalized this modification to the regulation text for the 
following criteria:
     ``transitions of care'' (Sec.  170.315(b)(1));
     ``view, download, and transmit to 3rd party'' (Sec.  
170.315(e)(1));
     ``transmission to public health agencies--electronic case 
reporting'' (Sec.  170.315(f)(5));
     ``consolidated CDA creation performance'' (Sec.  
170.315(g)(6)); and
     ``application access--all data request'' (Sec.  
170.315(g)(9)).
    We have finalized in Sec.  170.405(b)(3), as a Maintenance of 
Certification requirement under the real world testing Condition of 
Certification requirement, that health IT developers with health IT 
certified to the five above-identified certification criteria prior to 
the effective date of this final rule, would have to update such 
certified health IT to the revisions within 24 months of the 
publication date of this rule.
    As of this final rule's effective date, the ``data export'' 
criterion in Sec.  170.315(b)(6) is no longer required as a part of the 
2015 Edition Base EHR definition. ONC-ACB's will not be permitted to 
issue certificates to this certification criteria after 36 months after 
the publication date of this final rule. As discussed in the ``EHI 
export'' section below, we have retained Sec.  170.315(b)(6) ``as is,'' 
without updates to the USCDI. Thus, health IT developers with health IT 
certified to the prior certification criterion in Sec.  170.315(b)(6) 
do not have to update such certified health IT to the revisions listed 
above, but are permitted to maintain or seek new Health IT Module 
certification to this criterion should they desire this functionality.
b. USCDI Standard--Data Classes Included
    As we noted in the Proposed Rule (84 FR 7441), the USCDI Version 1 
(USCDI v1) and its constituent Data Elements incorporated 
recommendations we had accepted from public comments we had previously 
received on our Draft USCDI and Proposed Expansion Process,\27\ which 
we published January 5, 2018 as well as initial feedback on that draft 
from the Health IT Advisory Committee, both of which occurred prior to 
the publication of the Proposed Rule. The standard we proposed to adopt 
in Sec.  170.213 also reflected and acknowledged the burden that 
rapidly expanding the USCDI v1 beyond the CCDS could cause. As a 
result, the USCDI v1 that we proposed was a modest expansion of the 
CCDS, which we indicated that most health IT developers already 
supported, were already working toward, or should be capable of 
updating their health IT to support in a timely manner. Therefore, in 
our Proposed Rule, we outlined only the delta between the CCDS and the 
USCDI v1. For the overall structure and organization of the USCDI 
standard, we urged stakeholders to consult www.healthIT.gov/USCDI.
---------------------------------------------------------------------------

    \27\ https://www.healthit.gov/sites/default/files/draft-uscdi.pdf (January 5, 2018).
---------------------------------------------------------------------------

    Comments. We received numerous comments proposing new Data Classes, 
Data Elements, and other changes within the USCDI beyond those we 
included in the Proposed Rule. Comments recommended including new Data 
Elements and/or classes within the USCDI v1 related to encounter data, 
financial transaction and insurance data, and specialty-specific Data 
Elements related to cancer treatment, social determinants of health, 
and more. Another commenter identified an error in the Procedures Data 
Class citing the wrong code set for dental procedures in the USCDI v1.
    Response. We thank the many commenters for their input on the 
USCDI. We recognize that the USCDI v1 as proposed represents a modest 
change over the current CCDS definition. As we indicated in the 
Proposed Rule (84 FR 7441), we view this initial version of the USCDI 
standard as a starting point to support improved interoperability. We 
are also sensitive to requirements related to the development and 
implementation of adopting the USCDI standard. In the interests of 
maintaining our proposed implementation timeline of 24 months from the 
publication of this final rule, and after consideration of these 
comments and the overall support of commenters, we have finalized the 
adoption of the Data Classes and elements of the USCDI standard as 
proposed, with changes outlined in the subsections below. Additionally, 
in order to address the error pointed out to us via comments in the 
Procedures Data Class, as was stated in the draft USCDI v1,\28\ we 
clarified that the American Dental Association's Code on Dental 
Procedures and Nomenclature (CDT) should be used for Dental Procedures 
in the USCDI v1, not SNODENT as was erroneously stated in the draft 
USCDI v1.
---------------------------------------------------------------------------

    \28\ https://www.healthit.gov/sites/default/files/draft-uscdi.pdf.
---------------------------------------------------------------------------

    With respect to the USCDI's expansion in future years, ONC will 
establish and follow a predictable, transparent, and collaborative 
process to expand the USCDI, which will provide stakeholders with the 
opportunity to comment on the USCDI's expansion and to advance 
additional Data Classes and Data Elements relevant to a wide range of 
use cases related to health care. Prior to this final rule, we 
published our initial thinking as well as examples of Data Classes and 
Data Elements that we believed could be appropriate to propose for 
adding to the USCDI.\29\ We have also solicited feedback and 
recommendations from the HITAC. As we evaluated public comments and 
conducted our own research prior to the issuance of this final rule, we 
also wanted to identify for stakeholders another potential source that 
could be used to focus efforts around new USCDI Data Classes and Data 
Elements. As is noted throughout this rule, the HL7[supreg] 
FHIR[supreg] standard represents health information in what are called 
``FHIR resources.'' When it comes to logically organizing FHIR 
resources that relate to one another and share common properties, FHIR 
uses a concept called a ``compartment.'' Through the standards 
development process a ``Patient Compartment'' has been

[[Page 25672]]

created, which lists all of the FHIR resources that are associated with 
a patient. The Patient Compartment ``includes any resources where the 
subject of the resource is the patient, and some other resources that 
are directly linked to resources in the patient compartment.'' This 
organizing framework provides a potentially rich set of a Data Classes 
and Data Elements to consider for inclusion in the USCDI, including 
clinical, encounter, specialty, and financial data. As ONC looks to 
make its own investments to advance the implementation experience 
associated with prospective USCDI Data Classes and Data Elements, we 
intend to leverage the Patient Compartment to guide our thinking. In 
addition, we will also look to and encourage industry to look at other 
organizing frameworks such as the Clinical Quality/Clinical Decision 
Support realms and the payer-to-provider community (e.g., DaVinci 
Project \30\) to help identify data that would be best to focus on for 
USCDI expansion.
---------------------------------------------------------------------------

    \29\ https://www.healthit.gov/sites/default/files/draft-uscdi.pdf.
    \30\ https://www.hl7.org/about/davinci/index.cfm.
---------------------------------------------------------------------------

i. Updated Versions of Vocabulary Standard Code Sets
    We proposed (84 FR 7441) that the USCDI v1 would include the newest 
versions of the ``minimum standard'' code sets included in the CCDS 
available at publication of this final rule. We requested comment on 
that proposal and on whether it could result in any interoperability 
concerns. We also noted that criteria such as the 2015 Edition ``family 
health history'' criterion (Sec.  170.315(a)(12)), the 2015 Edition 
``transmission to immunization registries'' criterion (Sec.  
170.315(f)(1)), and the 2015 Edition ``transmission to public health 
agencies--syndromic surveillance'' criterion (Sec.  170.315(f)(2)) 
reference ``minimum standard'' code sets; however, we indicated that we 
were considering updating the versions of these standards listed and 
incorporated by reference in part 170 subpart B that are referenced by 
these criteria from the versions adopted in the 2015 Edition final 
rule.
    We also noted, for purposes of clarity, that consistent with Sec.  
170.555, unless the Secretary prohibits the use of a newer version of 
an identified minimum standard code set for certification, health IT 
could continue to be certified or upgraded by developers to a newer 
version of an identified minimum standard code set than that included 
in USCDI v1 or the most recent USCDI version that the National 
Coordinator has approved for use in the Program using the SVAP 
flexibility.
    Comments. There was general support from commenters for updating 
``minimum standard'' code sets requirements to the newest versions of 
these code sets as part of the update from CCDS to the USCDI. One 
commenter recommended adopting the Data Class requirement first, 
followed by a delayed requirement of updated versions of the ``minimum 
standards'' code sets, in order to allow implementers more time to make 
changes to their systems.
    Response. We do not believe that adopting the corresponding 
``minimum standards'' code sets that are updated in the USCDI v1 would 
impose a significant burden on implementers. In consideration of the 
overall support from commenters, we have finalized our proposal that 
the USCDI v1 include the newest versions of the ``minimum standard'' 
code sets available at the time of finalization of this final rule. We 
have not, however, finalized the proposal for the 2015 Edition ``family 
health history'' criterion (Sec.  170.315(a)(12)), the 2015 Edition 
``transmission to immunization registries'' criterion (Sec.  
170.315(f)(1)), and the 2015 Edition ``transmission to public health 
agencies--syndromic surveillance'' criterion (Sec.  170.315(f)(2)) to 
reference the newest versions of the ``minimum standard'' code sets for 
these criteria, because the flexibility already exists to use newer 
versions of code sets included in these criteria. We note that for 
these certification criteria, health IT developers may take advantage 
of the previously established \31\ flexibility to seek certification to 
newer versions of the ``minimum standards'' code with Sec.  170.555.
---------------------------------------------------------------------------

    \31\ 77 FR 54163, 54268-69 (September 4, 2012).
---------------------------------------------------------------------------

ii. Address and Phone Number
    We proposed (84 FR 7442) new Data Elements in the USCDI v1 for 
``address'' and ``phone number.'' We noted that the inclusion of 
``address'' (to represent the postal location for the patient) and 
``phone number'' (to represent the patient's telephone number) would 
improve the comprehensiveness of health information for patient care. 
We further noted that the inclusion of these Data Elements was 
consistent with the list of patient matching Data Elements already 
specified in the 2015 Edition ``transitions of care'' certification 
criterion (Sec.  170.315(b)(1)(iii)(G)), which supports the exchange of 
patient health information between providers of patient care.
    Comments. Commenters unanimously supported the addition of address 
and phone numbers to the USCDI v1. The majority of commenters on this 
proposal recommended the use of the U.S. Postal Service address format 
to improve address data quality. Commenters also recommended additional 
elements of address and phone number indicating effective period (e.g., 
current address, former address); use (e.g., mobile phone number, 
landline, etc.), and email address.
    Response. We thank the commenters for their recommendations and 
agree that these additional Data Elements can be useful to provide 
better care and assist with patient matching. In consideration of these 
comments, we have finalized the addition of the following Data Elements 
within the Patient Demographics Data Class:
     ``current address'';
     ``previous address'';
     ``phone number'';
     ``phone number type''; and
     ``email address.''
    We further clarify that ``phone number'' and ``phone number type'' 
must be represented using the same standards, ITU-T E.123 (02/2001) and 
ITU-T E.164, as already adopted for this data in 45 CFR 170.207(q) and 
referenced in the 2015 Edition ``transitions of care'' certification 
criterion (Sec.  170.315(b)(1)(iii)(G)).
    We appreciate commenters' recommendations to use the U.S. Postal 
Service Postal Addressing Standards, which include address formatting 
guidance and a variety of products to improve address quality, such as 
address element standardization and validation which are published and 
available for public use.\32\ The U.S. Postal Service Postal Addressing 
Standards include standardized names for common unit identifiers, line 
by line acceptance requirements for mail services, and overall address 
format guidance that has been specifically designed to support 
labelling of mail items for acceptance by the U.S. Postal Service 
automated sorting processes. We acknowledge the potential for its use 
within health IT to improve patient matching. However, while the U.S. 
Postal Service Postal Addressing Standards include a single 
representation for certain data elements (such as rendering apartment 
as apt, building as bldg, floor as fl, etc.) they also allow variations 
for other data elements, such as ``acceptable'' and ``preferred'' 
spellings and abbreviations for street and city names. This may result 
in multiple ``valid'' addresses. To reconcile this variation, the U.S. 
Postal Service provides a file listing preferred

[[Page 25673]]

city and State combinations as well as a file of street name and zip 
code combinations and the resulting aggregated address would then 
require manual reconciliation. We believe the U.S. Postal Service 
Postal Addressing Standards may be useful guidance for health IT 
developers. However, because of the variation, the required use of 
reference files, and the manual reconciliation necessary for 
implementation, we have not adopted the U.S. Postal Service Postal 
Addressing Standards as a required standard for the address Data 
Elements within the USCDI. We encourage the use of standardized 
elements to accurately represent patient address including use of 
standardized references in the U.S Post Service Postal Addressing 
Standards where applicable. In addition, we will continue to work with 
standards developing organizations to evaluate potential solutions to 
improve patient matching, including considering the potential 
adaptability of the U.S. Postal Service formats for health IT use 
cases.
---------------------------------------------------------------------------

    \32\ U.S. Postal Service: Postal Addressing Standards 
(Publication 28) available at https://pe.usps.com/text/pub28/welcome.htm.
---------------------------------------------------------------------------

    The U.S. Postal Service also maintains web based tools for address 
validation services and provides implementation guidance to integrate 
these tools into technical workflows for IT systems in e-commerce and 
other industries. We agree that these address validation tools have the 
potential to greatly improve address data quality, and we encourage 
health IT developers and other relevant health IT users such as health 
information networks to explore mechanisms by which such address 
validation might support patient matching. While not specifically 
designed for patient matching and other health care related 
applications, USPS address validation has been piloted in these 
settings. To adapt the address validation tool to a health care purpose 
requires the services of a third party with licensing of the tool and 
the development of a bespoke process to execute the tool. The 
aggregated patient address could then be compared against the USPS 
address on file and the patient data could be amended where inaccurate, 
appended where incomplete, or a linked record of secondary address data 
could be created depending on the percent of confidence in the specific 
match. This process would then require manual reconciliation. The 
results of these pilots indicate significant complexity and burden 
associated with implementation of this process. Given these burdens, we 
believe it would not be appropriate to require the integration of this 
distinct functionality into certified health IT at this time. We again 
encourage the further development and use of standardized approaches 
for address validation and will continue to monitor and analyze such 
efforts for consideration in future rulemaking.
iii. Pediatric Vital Signs
    As proposed (84 FR 7442), the USCDI v1 included the pediatric vital 
sign data elements, which are specified as optional health information 
in the 2015 Edition CCDS definition. The proposed pediatric vital signs 
included: head occipital-frontal circumference for children less than 3 
years of age, BMI percentile per age and sex for youth 2-20 years of 
age, weight for age per length and sex for children less than 3 years 
of age, and the reference range/scale or growth curve, as appropriate. 
As explained in section VI.A.2 of this final rule, the inclusion of 
pediatric vital sign Data Elements in the draft USCDI v1 align with the 
provisions of the Cures Act related to health IT to support the health 
care of children. Prior to the publication of the Proposed Rule, 
stakeholders emphasized the value of pediatric vital sign data elements 
to better support the safety and quality of care delivered to children. 
We also note in our Proposed Rule and in the 2015 Edition proposed rule 
(80 FR 16818 and 16819) that the Centers for Disease Control and 
Prevention (CDC) recommends as part of best practices the use of these 
pediatric vital signs for settings of care in which pediatric and 
adolescent patients are seen. The availability of a reference range/
scale or growth curve would help with proper interpretation of the 
measurements for the BMI percentile per age and sex and weight for age 
per length and sex.
    Further, we noted our belief that the inclusion of this health 
information in the USCDI v1 was the appropriate next step after first 
specifying them as optional in the CCDS definition as part of the 2015 
Edition rulemaking (80 FR 62695), and as a means of supporting patient 
access to their EHI in a longitudinal format through certified health 
IT (see section 3009(e)(2)(A)(i) of the PHSA as amended by the Cures 
Act). We recognized, however, that certain health IT developers and 
their customers may not find these capabilities and information useful. 
Therefore, we requested comment on the inclusion of pediatric vital 
signs in the USCDI v1, including the potential benefits and costs for 
all stakeholders stemming from its inclusion in the USCDI v1.
    Comments. Commenters generally supported the inclusion of the 
pediatric vital signs Data Elements in the USCDI v1. Some commenters 
opposed their inclusion or believed the inclusion of these Data 
Elements should be optional since pediatric vital signs are not 
applicable to all specialties and would add implementation burden and 
cost without benefit. One commenter stated that only the measurements 
and associated metadata (units of measure, date/time measurement taken, 
method of measurement), not the calculated percentiles according to 
applicable pediatric growth charts, should be required as part of the 
exchange of patient data. One commenter recommended adding the 
nutritional status Data Element ``mid-arm circumference.'' Finally, 
several commenters suggested or requested clarification on the 
pediatric vital signs Data Elements we proposed (84 FR 7442). 
Specifically, stakeholders in the pediatric community asked for 
clarification of the proposed pediatric vital sign ``weight for age per 
length and sex for children less than 3 years of age,'' noting it does 
not correspond to any existing pediatric growth charts. Rather, they 
noted that there is a growth chart ``weight-for-length'' for children 
less than 3 years of age.
    Response. We recognize that the adoption of these Data Elements has 
the potential to add burden and cost for some health IT products, but 
we believe the inclusion of these Data Elements can contribute 
significantly to the longitudinal care of patients. Pediatric care is 
not isolated to a single specialty or setting of care, and clinicians 
providing health care for children--especially those providing care for 
children with complex conditions--may practice in a wide range of 
settings using a wide range of health IT systems. Many key stakeholders 
believe that the ability to capture, calculate, and transmit key 
pediatric growth data using health IT is critical to providing care to 
these populations as well as communicating with other providers, 
parent/guardians, and patients. We also note that adoption of the USCDI 
standard and its Data Classes and elements is not specific as to its 
usage within a setting of care, a health care specialty, or by a 
specific category of health IT user; rather it applies to certified 
health IT's ability to send and receive those Data Elements without 
requirements regarding functionality, user interface, or the use of 
those Data Elements in exchange. While some users may find few 
opportunities to exchange these Data Elements, many will exchange these 
Data Elements frequently. As we have noted previously, we believe that 
the adoption

[[Page 25674]]

of USCDI for all certified health IT will advance interoperability by 
ensuring compliance with new data and vocabulary codes sets that 
support the data.
    We also appreciate the commenter's suggestion for an additional 
Data Element. As we have noted, ONC will establish and follow a 
predictable, transparent, and collaborative process to expand the 
USCDI, which will provide stakeholders with the opportunity to advance 
additional Data Classes and Data Elements relevant to a wide range of 
use cases related to health care.
    Regarding the request to clarify and better define these proposed 
pediatric vital signs, we note that these Data Elements, as written and 
proposed, were previously included as optional health information in 
the 2015 Edition CCDS definition. The discrepancy between the adopted 
pediatric vital signs and standardized pediatric growth charts was not 
identified previously. Therefore, we wish to clarify that the above-
referenced pediatric vital signs include both the vital measurements 
and the percentiles used in the following growth charts currently 
recommended by the Centers for Disease Control and Prevention: \33\ for 
infants birth to 36 months of age: Weight-for-length; and head 
occipital-frontal circumference for age; and for children 2-20 years of 
age: Body mass index (BMI) for age.
---------------------------------------------------------------------------

    \33\ https://www.cdc.gov/growthcharts/index.htm.
---------------------------------------------------------------------------

    In consideration of these comments, we have finalized the following 
pediatric Data Elements in the Vital Signs Data Class of the USCDI v1: 
Head occipital-frontal circumference percentile (Birth to 36 Months); 
weight-for-length percentile (Birth to 36 Months); body mass index 
(BMI) percentile (2-20 Years of Age); and the reference range/scale or 
growth curve, as appropriate.
iv. Clinical Notes
    We proposed (84 FR 7442) to include in the USCDI v1 a new Data 
Class entitled ``clinical notes.'' ``Clinical notes'' was included in 
the proposed USCDI v1 based on significant feedback from the industry 
since the 2015 Edition final rule. We also received similar feedback 
during the Trusted Exchange Framework and Common Agreement (TEFCA) 
stakeholder sessions and public comment period. As we noted, ``clinical 
notes'' have been identified by stakeholders as highly desirable data 
for interoperable exchange. The free text portion of the clinical notes 
was most often relayed by clinicians as the data they sought, but were 
often missing during electronic health information exchange. We 
additionally noted that clinical notes can be composed of text 
generated from structured (pick-list and/or check the box) fields as 
well as unstructured (free text) data. We explained that a clinical 
note may include the assessment, diagnosis, plan of care and evaluation 
of plan, patient teaching, and other relevant data points.
    We recognized that a number of different types of clinical notes 
could be useful for stakeholders. We indicated our understanding that 
work is being done in the community to focus on a subset of clinical 
notes. We considered three options for identifying the different ``note 
types'' to adopt in USCDI v1. The first option we considered allowed 
for the community to offer any and all recommended notes. The second 
option we considered set a minimum standard of eight note types. This 
option was derived from the eight note types identified by the Argonaut 
Project participants.\34\ The third option we identified looked to the 
eleven HL7 Consolidated Clinical Document Architecture (C-CDA) document 
types identified in the C-CDA Release 2.1, which also included the note 
types being identified by the Argonaut Project participants. We 
ultimately proposed the second option because it unites public and 
private interests toward the same goal. We indicated that the eight 
selected note types were a minimum bar and, in the future, the USCDI 
could be updated to include other clinical notes. Specifically, we 
proposed to include the following clinical note types for both 
inpatient and outpatient (primary care, emergency department, etc.) 
settings in USCDI v1 as a minimum standard: (1) Discharge Summary note; 
(2) History & Physical; (3) Progress Note; (4) Consultation Note; (5) 
Imaging Narrative; (6) Laboratory Report Narrative; (7) Pathology 
Report Narrative; and (8) Procedures Note (84 FR 7442). We requested 
comment on whether to include additional note types as part of the 
USCDI v1.
---------------------------------------------------------------------------

    \34\ Link to the Clinical Notes Argonaut Project identified (to 
clarify: Seven bullets are listed, however, we split laboratory and 
pathology note types into their own note) https://wiki.hl7.org/index.php?title=201805_Clinical_Notes_Track.
---------------------------------------------------------------------------

    Comments. Commenters broadly supported adding ``clinical notes'' as 
a new Data Class to the USCDI v1, in particular to enable the use of 
free text for data exchange. Several commenters requested clarity as to 
whether the proposal to adopt this new Data Class would require the 
capture and exchange of unstructured, or ``raw'' or ``free'' text, 
narrative clinical information or more comprehensive documents such as 
those defined by C-CDA. Some commenters recommended adding certain note 
types--including continuity of care, operative, and nursing notes--
while others recommended removing some of the proposed note types. In 
particular, Laboratory/Pathology Report Narrative note types were 
thought to be duplicative of content in the Laboratory Data Class and 
element Value/Results. Some commenters recommended Imaging Narrative 
not be used, but added to a new Data Class, Diagnostic Tests, which 
would combine Laboratory and Radiology tests and results.
    Response. We thank commenters for their support and 
recommendations. While we recognize that there may be alternative 
methods of organizing different clinical note types, we believe there 
is value in grouping all clinical notes into a single Data Class within 
the USCDI. As we noted above and in the Proposed Rule, we have adopted 
the eight note types identified by the Argonaut Project participants 
because it unites public and private interests toward the same goal. As 
we indicated, the eight selected note types are a minimum bar and, in 
the future, the USCDI could be updated to include other clinical note 
types. The eight selected note types reflect the most clearly and 
consistently recommended set of clinical note type. While a variety of 
additional note types were recommended, there was no consensus for 
additional note types beyond these eight. In consideration of these 
comments, we have finalized the clinical notes as a Data Class in the 
USCDI v1, with only the following eight clinical note types for both 
inpatient and outpatient (primary care, emergency department, etc.) 
settings as a minimum standard as proposed: (1) Discharge Summary Note; 
(2) History & Physical; (3) Progress Note; (4) Consultation Note; (5) 
Imaging Narrative; (6) Laboratory Report Narrative; (7) Pathology 
Report Narrative; and (8) Procedures Note.
    We wish to further clarify that we have adopted the new Clinical 
Notes Data Class in order to enable capture and exchange of free text 
clinical information categorized by the above clinical note types. We 
refer commenters to our response in section IV.B.1.d of the final 
rule--Clinical Notes C-CDA Implementation Specification--that addresses 
the relationship of the clinical notes Data Class to C-CDA 
implementation specification.
    We also seek to clarify two points. First, that these clinical note 
types are content exchange standard agnostic. They should not be 
interpreted or associated with the specific C-CDA Document Templates 
that may share the

[[Page 25675]]

same name. Secondly, we clarify that these note types are required to 
be represented in their plain-text form when included in various 
content exchange standards (e.g., C-CDA, FHIR) as may be applicable to 
the certification criteria in which the USCDI is referenced.
v. Provenance
    We proposed (84 FR 7442) for the USCDI v1 to include a new Data 
Class, entitled ``provenance.'' As we indicated, stakeholders \35\ have 
identified ``provenance'' as valuable for interoperable exchange. 
Stakeholders also referenced the provenance of data as a fundamental 
need to improve the trustworthiness and reliability of the data being 
exchanged. Provenance describes the metadata, or extra information 
about data, that can help answer questions such as who created the data 
and when.
---------------------------------------------------------------------------

    \35\ https://www.healthit.gov/topic/interoperability/trusted-exchange-framework-and-common-agreement.
---------------------------------------------------------------------------

    In the Proposed Rule, we noted that the inclusion of ``provenance'' 
as a Data Class in the USCDI v1 would also complement the Cures Act 
requirement in section 4002(a) to support the exchange of data through 
the use of APIs. This approach differs from the exchange of data via 
the C-CDA. While C-CDAs are often critiqued due to their relative 
``length,'' the C-CDA represents the output of a clinical encounter and 
includes relevant context. The same will not always be true in an API 
context. APIs facilitate the granular exchange of data and, as noted in 
the original 2015 Edition final rule, offer the potential to aggregate 
data from multiple sources using a web or mobile application (80 FR 
62675). The inclusion of provenance would help retain the relevant 
context so the recipient can better understand the origin of the data.
    We proposed to further delineate the provenance Data Class into 
three Data Elements: ``the author,'' which represents the person(s) who 
is responsible for the information; ``the author's time stamp,'' which 
indicates the time the information was recorded; and ``the author's 
organization,'' which would be the organization the author is 
associated with at the time they interacted with the data (84 FR 7442). 
We indicated that we identified these three Data Elements as 
fundamental for data recipients to have available and noted that they 
are commonly captured and currently available through standards. We 
requested comment on the inclusion of these three Data Elements and 
whether any other provenance Data Elements, such as the identity of the 
individual or entity the data was obtained from or sent by (sometimes 
discussed in standards working groups as the provenance of the data's 
``last hop''), would be essential to include as part of the USCDI v1 
standard. We acknowledged that there is currently work to help define 
provenance in a standard robust manner, and that we anticipated 
adopting the industry consensus once it became available.
    Comments. Commenters overwhelmingly supported the addition of 
provenance as a new Data Class for USCDI v1. Several commenters stated 
that the proposed elements were insufficient for the purpose of audit 
logs for use and disclosure of health data, citing the existing 
standard specification ASTM E2147.\36\ Other commenters stated that 
these proposed elements did not apply to all use cases of exchanged 
data and requested clarification regarding applicability, including 
whether provenance would have to be created for elements created before 
the implementation deadline of USCDI v1. Because this is a new Data 
Class, some commenters also requested additional time to adopt and 
implement this new requirement. Some commenters stated that there could 
be ambiguity in designating ``author'' for certain clinical information 
such as patient-reported medications, while in certain other cases, 
there could be multiple authors for the same clinical information, such 
as clinical notes. Additionally, some commenters suggested that the 
``author'' be limited to only a limited set of Data Elements and not to 
all the Data Elements. Another commenter specifically addressed several 
concerns related to the definition of ``author'' for this purpose. 
Commenters specifically stated they understood author to be the person 
entering the data into the EHR, but noted that data may also be 
historical, captured from a device, started by a patient and completed 
by clinical staff, entered by a patient, entered by resident/students 
working under a supervising physician, or reported by a patient. The 
commenter noted that there are additional documentation scenarios such 
as dictation to scribes or other medical staff, which conflate 
``responsibility'' for authorship, and that defining author for every 
Data Element can be complex. Finally, one health IT developer 
recommended a 36-month implementation period to begin only after test 
procedures, implementation guides, and test and validation tools are 
available and after ONC has consulted at least five CEHRT developers.
---------------------------------------------------------------------------

    \36\ https://www.astm.org/Standards/E2147.htm.
---------------------------------------------------------------------------

    Response. We acknowledge that these Data Elements may not be able 
to fully support the needs of all use cases, but we believe their 
adoption will improve the trustworthiness and reliability of data being 
exchanged. For this Data Class, it appears that many commenters over-
interpreted our proposal and the effect of having these data in the 
USCDI. As we noted earlier, the adoption of the USCDI standard and its 
Data Classes and elements is not specific as to its usage within a 
setting of care, a health care specialty, or by a specific category of 
health IT user. Rather it applies to certified health IT's ability to 
send and receive those Data Elements without requirements regarding 
functionality, user interface, or the use of those Data Elements in 
exchange. Therefore, with respect to our reference to provenance data 
in the USCDI, we have no preset notion or explicit upfront requirement 
for how this data should be used. We believe that having provenance 
data is highly impactful, essential for trustworthy interoperability, 
and will generate greater value for stakeholders as they identify new 
ways to put this data to use.
    Regarding ``author'' as a Data Element within the provenance Data 
Class, we agree that significant practical scope challenges may arise. 
Our analysis of the concerns raised by commenters identified a risk of 
unintended burden and potential risk of error and misattribution 
associated with this particular Data Element. In most use cases, the 
inclusion of author organization and author time stamp is sufficient to 
convey provenance. As a result, we have not finalized the ``author'' as 
a required Data Element within the provenance Data Class in USCDI. 
However, we understand that for exchanging certain data elements, such 
as ``clinical notes,'' it is critical to also send the ``author'' 
information if available. Our analysis of the various content exchange 
standards and specifications (e.g., C-CDA and FHIR) indicates that even 
though the ``author'' Data Element is not explicitly required in USCDI, 
the health IT specifications in which USCDI Data Elements are 
represented also set specific data element requirements for certain 
contexts. For example, in the context of clinical notes, these content 
exchange standards require health IT systems to be capable of 
exchanging ``author'' information when it is available. Further, 
``author'' is treated as a ``Must Support'' data element in the FHIR US 
Core Implementation Guide STU 3.1.0 and has a ``SHALL'' constraint 
(with

[[Page 25676]]

appropriate null flavor value) in the C-CDA 2.1. As we have noted 
previously, we believe that the proposed 24-month timeline for updating 
certified health IT to comply with the new USCDI standard in Sec.  
170.213 is an adequate implementation timeline and will maintain this 
requirement as finalized earlier in this section.
    Therefore, in consideration of the comments received, we have 
finalized the provenance Data Class in the USCDI v1 and the following 
two Data Elements:
     ``author time stamp,'' which indicates the time the 
information was recorded; and
     ``author organization,'' which would be the organization 
the author is associated with at the time they interacted with the 
data.
    We believe these two provenance Data Elements, ``author 
organization'' and ``author time stamp,'' within the USCDI v1, which 
are also used in the C-CDA and FHIR-based certification criteria we 
have adopted that incorporate the USCDI, will serve as a foundation on 
which industry stakeholders can subsequently work together to build out 
additional provenance data requirements in the USCDI. As noted above, 
we have not finalized the proposed Data Element ``the author,'' which 
represents the person(s) who was responsible for the information.
vi. Medication Data Request for Comment
    In the Proposed Rule, we proposed (84 FR 7443) that the USCDI v1 
``Medication'' Data Class include two constituent Data Elements within 
it: Medications and Medication Allergies. With respect to the latter, 
Medication Allergies, we requested comment on an alternative approach. 
This approach would remove the Medication Allergies Data Element from 
the Medication Data Class and add it to a new Data Class titled 
``Substance Reactions,'' which would include the concept of 
``Medication Allergies.'' The new ``Substance Reactions'' Data Class 
would include the following Data Elements: ``Substance'' and 
``Reaction,'' and include SNOMED CT as an additional applicable 
standard for non-medication substances.
    Comments. The majority of commenters supported the creation of a 
new Data Class ``Substance Reactions'' but requested we preserve the 
Medication Allergy element because of patient safety concerns related 
to the adoption of an entirely new Data Element. One commenter 
supported the change but recommended the new Data Class name be aligned 
with the HL7 FHIR resource ``AllergyIntolerance.'' This would also be 
consistent with the C-CDA 2.1 ``Allergy and Intolerance'' section.
    Response. We thank the commenters for their input. While we 
appreciate that there may be some risk associated with the adoption of 
a new Data Element, we believe this alternative approach better aligns 
with other standards representing substance reactions, including 
medication allergies, and this alignment enhances patient safety. 
Additionally, we agree with the commenter who suggested renaming this 
new Data Class to align with FHIR and C-CDA approaches.
    In consideration of comments, we have finalized the creation of a 
Data Class in USCDI v1 entitled ``Allergies and Intolerances,'' instead 
of ``Substance Reactions'' from the original USCDI v1 proposal. The 
Allergies and Intolerances Data Class in USCDI v1 consists of the 
following Data Elements: ``Substance--(Medication),'' ``Substance--
(Drug Class),'' and ``Reaction.'' ``Substance--(Medication)'' must be 
represented by RxNorm codes and ``Substance--(Drug Class)'' must be 
represented by SNOMED CT codes. The addition of the ``Substance--(Drug 
Class)'' better represents when an individual may have a reaction to an 
entire drug class as opposed to a specific medication. Additionally, we 
believe having the Allergy and Intolerances Data Class separated from 
the Medication Class will accommodate potential additions of other 
substance Data Elements such as food, environmental, and biologic 
agents. The Data Element ``Reaction'' is meant to include, but is not 
limited to, medication allergies. As the USCDI is updated over time to 
include substances other than medications, we can also see the need to 
have substance reactions updated as part of this Data Class. To reflect 
this change, we have updated the terminology in the regulatory text in 
Sec.  170.315 to remove ``medication allergy'' and replace with 
``allergy and intolerance.''
c. USCDI Standard--Relationship to Content Exchange Standards and 
Implementation Specifications
    In recognition of the evolution of standards over time and to 
facilitate updates to newer versions of standards, we proposed (84 FR 
7443) that the USCDI v1 (Sec.  170.213) would be agnostic as to 
``content exchange'' standard. As we noted, the USCDI v1 establishes 
``data policy'' and does not directly associate with the content 
exchange standards and implementation specifications which, given a 
particular context, may require the exchange of the entire USCDI, a 
USCDI Data Class, or some or all of the Data Elements within a given 
Data Class or classes. We further indicated that, to our knowledge, all 
Data Classes in the USCDI v1 can be supported by commonly used 
``content exchange'' standards, including HL7 C-CDA Release 2.1 and 
FHIR.
    We received no comments on this specific proposal and we have 
finalized our proposal to make USCDI v1 agnostic as to ``content 
exchange standard'' as described.
2. Clinical Notes C-CDA Implementation Specification
    In conjunction with our proposal to adopt the USCDI v1, we proposed 
to adopt the HL7 CDA[supreg] R2 IG: C-CDA Templates for Clinical Notes 
R1 Companion Guide, Release 1 in Sec.  170.205(a)(5) (``C-CDA Companion 
Guide''). The C-CDA Companion Guide provides supplemental guidance and 
additional technical clarification for specifying data in the C-CDA 
Release 2.1.\37\ As we noted in the Proposed Rule (84 FR 7443), the 
proposed USCDI v1 included new Data Classes, such as ``clinical 
notes,'' which were further supported through the C-CDA Companion 
Guide. For example, the C-CDA Companion Guide provides specifications 
for clinical notes by indicating that clinical notes should be recorded 
in ``note activity'' and requires references to other discrete data, 
such as ``encounters.'' The C-CDA Companion Guide also enhances 
implementation of the updated 2015 Edition certification criteria that 
reference the C-CDA Release 2.1 (Sec.  170.205(a)(4)). As noted by 
stakeholders, the C-CDA Release 2.1 includes some optionality and 
ambiguity with respect to Data Element components, such as the 
locations and value sets. We attempted to address some of this 
optionality by clarifying requirements using Certification Companion 
Guides (CCGs) \38\ and by specifying in the CCDS definition where 
certain data should be placed in the C-CDA Release 2.1 templates (e.g., 
``goals'' in the goals section).\39\ The C-CDA Companion Guide, which 
was released in August, 2015, provides similar, but additional C-CDA 
implementation structure. For example, race and ethnicity are required 
Data Elements in the USCDI and must be included in C-CDA exchanges if 
known, or they may be marked with a nullFlavor value ``UNK'' (unknown) 
if not known. The

[[Page 25677]]

C-CDA Release 2.1 is unclear on the location and value set, but the C-
CDA Companion Guide clarifies the location and value set. We noted in 
the Proposed Rule that the adoption of the C-CDA Companion Guide would 
align with our goal to increase the use of consistent implementation of 
standards among health IT developers and improve interoperability. We 
proposed to adopt this C-CDA Companion Guide to support best practice 
implementation of USCDI v1 Data Classes and 2015 Edition certification 
criteria that reference C-CDA Release 2.1 (Sec.  170.205(a)(4)). The 
criteria include:
---------------------------------------------------------------------------

    \37\ https://www.hl7.org/implement/standards/product_brief.cfm?product_id=447.
    \38\ https://www.healthit.gov/topic/certification-ehrs/2015-edition-test-method.
    \39\ https://www.healthit.gov/sites/default/files/topiclanding/2018-04/2015Ed_CCG_CCDS.pdf.
---------------------------------------------------------------------------

     ``transitions of care'' (Sec.  170.315(b)(1));
     ``clinical information reconciliation and incorporation'' 
(Sec.  170.315(b)(2));
     ``care plan'' (Sec.  170.315(b)(9));
     ``view, download, and transmit to 3rd party'' (Sec.  
170.315(e)(1));
     ``consolidated CDA creation performance'' (Sec.  
170.315(g)(6)); and
     ``application access--all data request'' (Sec.  
170.315(g)(9)).
    We proposed, as a Maintenance of Certification requirement for the 
real world testing Condition of Certification requirement, that health 
IT developers with health IT certified to the six above-identified 
certification criteria prior to the effective date of a subsequent 
final rule would have to update such certified health IT to the 
proposed revisions (84 FR 7443).\40\ We further proposed as a 
Maintenance of Certification requirement for the real world testing 
Condition of Certification requirement, that health IT developers would 
be required to provide the updated certified health IT to all their 
customers with health IT previously certified to the identified 
criteria no later than 24 months after the effective date of a final 
rule (84 FR 7443). For the purposes of meeting that compliance 
timeline, we indicated that we expected health IT developers to update 
their certified health IT without new mandatory testing and notify 
their ONC-ACB on the date at which they have reached compliance. 
Developers would also need to factor these updates into their next real 
world testing plan as discussed in section VII.B.5 of the Proposed 
Rule.\41\
---------------------------------------------------------------------------

    \40\ We proposed to codify this requirement in Sec.  
170.405(b)(4) (84 FR 7596).
    \41\ The finalized real world testing plan requirements, 
codified in Sec.  170.405(b)(2) are discussed in section VII.B.5 of 
this final rule.
---------------------------------------------------------------------------

    Comments. One commenter supported the use of C-CDA for Clinical 
Notes. One commenter sought clarity on testing for Clinical Notes 
conformance to C-CDA 2.1, noting that all C-CDA documents are the same 
except for the document header. Two commenters recommended review of 
the Common Well Concise Consolidated CDA white paper.
    Response. We thank the commenters for their suggestions and 
support. During the past few months, industry stakeholders updated the 
C-CDA Companion Guide to a newer version to best address how clinical 
notes should be handled in the C-CDA. In consideration of the update to 
the C-CDA Companion Guide and the comments, we have finalized the 
adoption of the most up-to-date version, HL7 CDA R2 IG: C-CDA Templates 
for Clinical Notes STU Companion Guide, Release 2 in Sec.  
170.205(a)(5) (``C-CDA Companion Guide'') and have incorporated by 
reference in Sec.  170.299. This includes adoption of the USCDI v1 and 
the associated Data Classes.
    In order to align ``clinical information reconciliation and 
incorporation'' (Sec.  170.315(b)(2)) with the updated Data Classes in 
the USCDI v1 as proposed in 84 FR 7441, we have replaced the 
``medication allergies'' data element in Sec.  170.315(b)(2)(iii)(D)(2) 
criterion to ``Allergies and Intolerances'' Data Class and require 
reconciliation of all the data elements in ``Allergies and 
Intolerances'' Data Class, which includes Substance (Medication), 
Substance (Drug Class), and Reaction Data Elements. We have revised the 
regulation text (Sec.  170.315(b)(2)) to align with this change. We 
decline to accept the recommendation to adopt the CommonWell 
specification as we believe the criterion is best met following the C-
CDA specification published by HL7.
    We have additionally finalized the timeline for the update to the 
use of the C-CDA companion guide of 24 months after the publication 
date of this final rule for the following criteria:
     ``transitions of care'' (Sec.  170.315(b)(1));
     ``clinical information reconciliation and incorporation'' 
(Sec.  170.315(b)(2));
     ``care plan'' (Sec.  170.315(b)(9));
     ``view, download, and transmit to 3rd party'' (Sec.  
170.315(e)(1));
     ``consolidated CDA creation performance'' (Sec.  
170.315(g)(6)); and
     ``application access--all data request'' (Sec.  
170.315(g)(9)).
3. Unique Device Identifier(s) for a Patient's Implantable Device(s) C-
CDA Implementation Specification
    We noted in the Proposed Rule (84 FR 7443) our awareness of a 
recently published implementation guide (IG) by HL7 that provides 
further guidance on the unique device identifier (UDI) requirements. 
The Health Level 7 (HL7) CDA R2 Implementation Guide: C-CDA 
Supplemental Templates for Unique Device Identification (UDI) for 
Implantable Medical Devices, Release 1-US Realm (UDI IG Release 1), 
identifies changes needed to the C-CDA to better facilitate the 
exchange of the individual UDI components in the health care system 
when devices are implanted in a patient. The UDI components include the 
Device Identifier (DI) and the following individual production 
identifiers: The lot or batch number, serial number, manufacturing 
date, expiration date, and distinct identification code. As this new IG 
had been recently published, we requested comment on whether we should 
add this UDI IG as a requirement in Sec.  170.299(f)(35) for health IT 
to adopt in order to meet the requirements for content exchange using 
C-CDA. In addition, we indicated that we did not have a reliable basis 
on which to estimate how much it would cost to meet the requirements 
outlined in the UDI IG; and, therefore, we requested comment on the 
cost and burden of complying with this proposed requirement.
    Comments. Commenters unanimously supported adoption of the UDI IG 
Release 1 as a new requirement for health IT to meet the requirements 
for the USCDI UDI Data Class. One commenter requested additional 
guidance regarding the determination of the ``person responsible for 
the information'' contained in the ``Device'' entry. None of the 
commenters provided a basis of estimate for the cost to meet the 
requirements outlined in the UDI IG Release 1.
    Response. We thank the commenters for their support. As we noted 
earlier, the adoption of the USCDI standard and its Data Classes and 
elements is not specific as to its usage within a setting of care, a 
health care specialty, or by a specific category of health IT user; 
rather it applies to certified health IT's ability to send and receive 
those Data Elements without requirements regarding functionality, user 
interface, or the use of those Data Elements in exchange. Therefore, we 
do not specify who must enter such data.
    We note also that the C-CDA Companion Guide referenced in 
subsection (d) below of this final rule now includes the content of the 
UDI IG Release 1 named in the Proposed Rule. In consideration of 
comments, we have finalized the proposed UDI Data Class within the 
USCDI v1, and have adopted the UDI Organizer Template defined in the 
UDI IG Release 1 and subsequently published as Appendix B of the 
HL7[supreg]

[[Page 25678]]

CDA[supreg] R2 IG: C-CDA Templates for Clinical Notes, Release 2.1 
Companion Guide, Release 2--US Realm, October 2019, as a new 
requirement for Health IT Modules to meet the requirements for C-CDA-
based exchange. We note that the UDI Organizer Template, though 
subsequently published in Appendix B of the HL7 CDA R2 IG: C-CDA 
Templates for Clinical Notes STU Companion Guide, Release 2, September 
2019, remains substantially unchanged from its previous publication in 
the UDI IG Release 1 in November 2018 and has been thoroughly reviewed 
and subjected to balloting and a public comment process.
4. Electronic Prescribing Criterion
    We proposed to adopt a new version of the NCPDP SCRIPT standard in 
45 CFR 170.205(b)(1), specifically NCPDP SCRIPT standard version 
2017071 (84 FR 7444). Because we proposed to adopt a new standard for 
electronic prescribing (e-Rx), we also proposed to adopt a new 
certification criterion in Sec.  170.315(b)(11) for the proposed e-Rx 
standard to replace the old standard in Sec.  170.315(b)(3). The 
proposed new certification criterion reflected our proposed adoption of 
NCPDP SCRIPT standard version 2017071 as well as all transactions 
adopted for the CMS Medicare Part D E-prescribing Program (84 FR 
23832). These proposals were made to realign ONC's Health IT 
Certification Program (Program) policies with those of CMS' Part D E-
prescribing rules. ONC and CMS have historically aligned standards 
adopted under their programs such as those for e-Rx and medication 
history (MH) to ensure that entities regulated under both schemes can 
comply with the different programs' requirements. For this reason, we 
stated that should our proposal to adopt the new e-Rx criterion (Sec.  
170.315(b)(11)) be finalized prior to January 1, 2020, we also proposed 
to permit continued certification to the current 2015 Edition 
``electronic prescribing'' criterion (Sec.  170.315(b)(3)) that 
references NCPDP SCRIPT standard version 10.6 for the period of time in 
which that version of the NCPDP SCRIPT standard would continue to be 
used in the CMS Medicare Part D E-prescribing Program or the CMS 
Promoting Interoperability Programs. Finally, we proposed in 84 FR 7445 
that once NCPDP SCRIPT standard version 10.6 is no longer used in those 
Programs, we would no longer permit certification to that criterion and 
would remove it from the Code of Federal Regulations, and that we would 
consider setting an effective date for such actions in a subsequent 
final rule based on stakeholder feedback and CMS policies at the time.
    In addition to continuing to reference the current transactions 
included in Sec.  170.315(b)(3), in keeping with CMS' Modernizing Part 
D and Medicare Advantage To Lower Drug Prices and Reduce Out-of-Pocket 
Expenses final rule (84 FR 23832), we also proposed in 84 FR 7445 and 
in Sec.  170.315(b)(11) to require the support of all of the NCPDP 
SCRIPT standard version 2017071 transactions CMS has adopted for the 
Part D E-prescribing regulations in 42 CFR 423.160(b)(2)(iv). Given the 
January 1, 2020 effective date in CMS rulemaking (83 FR 16440) and the 
effective date of this final rule, we have finalized our proposed 
update to the new version of the standard for the electronic 
prescribing criterion in Sec.  170.315(b)(3) instead of creating a new 
criterion as proposed in 84 FR 7427 in Sec.  170.315(b)(11). Unlike 
other criteria in this final rule that allow testing to either version 
of a required standard until 24 months after the publication date of 
this final rule, we will not allow certification testing to version 
10.6 of the NCPDP SCRIPT standard, as the implementation date for CMS' 
new Part D E-prescribing Program of January 1, 2020 has passed. 
However, based on stakeholder feedback, we have finalized a transition 
period in 45 CFR 170.405(b)(4)(ii) of 24 months from the date of 
publication of this final rule for certification so developers may test 
and certify to the updated criterion with all associated transactions.
    Comments. The majority of commenters were supportive of our 
proposal and recommended moving to the NCPDP SCRIPT standard version 
2017071 for the e-Rx certification criterion in alignment with CMS' 
adoption of the standard for the Part D E-prescribing Program. However, 
a number of commenters expressed concern that while EHRs or other 
electronic prescribing systems may become certified, pharmacy 
information systems (PIS) lack a similar certification program and 
associated standards and technical capability requirements, thus 
creating a mismatch between the e-prescribing system requirements for 
EHR users and PIS users. Several commenters specifically noted that 
PIS, which send or receive these transactions, are not required to 
adopt the capability to support these transactions as they are out of 
scope for the Program.
    Response. First, we note that the comments suggesting that 
pharmacies on the sending or receiving end of Part D e-Rx transactions 
are not required to utilize NCPDP SCRIPT standard version 2017071 
transactions are inaccurate. To the extent that a pharmacy conducts 
electronic prescribing with prescribers e-prescribing Part D covered 
drugs for Part D eligible individuals, those pharmacies are required to 
use the NCPDP SCRIPT version 2017071 standard. While there may not be 
2015 Edition certification criteria to which pharmacy information 
systems can be certified, the Part D rules require support of the 
standard under the Part D E-prescribing Program. Thus, we believe the 
mismatch concerns raised by commenters are unfounded. As a general 
matter, Part D prescribers need health IT systems capable of conducting 
compliant transactions (regardless of ONC certification) and so too do 
Part D receiving pharmacies. ONC health IT certification will provide 
an added layer of assurance for Part D prescribers that their e-Rx 
systems have been tested and certified as being capable of accurately 
conducting the adopted NCPDP SCRIPT standard version 2017071 
transactions.\42\
---------------------------------------------------------------------------

    \42\ https://www.govinfo.gov/content/pkg/FR-2015-10-16/pdf/2015-25597.pdf.
---------------------------------------------------------------------------

    In addition, we received several comments related to the readiness 
of PIS for specific transactions beyond those defined for Part D. We 
include these comments as applicable in the discussion of each 
transaction below. We reiterate that PIS are outside the scope of the 
ONC Health IT Certification Program, and we acknowledge the challenge 
of pharmacy readiness to support all transactions at this time, but if 
they conduct e-Rx for part D covered drugs prescribed to Part D 
eligible Medicare beneficiaries, they will be required to use the 
standard we are adopting for our program by the Medicare Part D e-Rx 
Program--so if they do e-prescribing at all, we expect that they will 
be able to conduct transactions using the standard adopted here. 
Generally, the goal of certification is to ensure that Health IT 
Modules voluntarily submitted for the Program are capable of conducting 
the transactions as specified. This ensures that providers have the 
capability to use the certified product for these transactions where 
feasible. For this reason, we have finalized the transactions as 
described below for certified Health IT Modules and encourage pharmacy 
information system developers to advance their capacity to support a 
nationwide network of fully interoperable pharmacy information systems.
    Comments. As noted, the majority of commenters were supportive of 
the proposal to remove the 2015 Edition

[[Page 25679]]

certification criterion (codified in Sec.  170.315(b)(3)) that 
references NCPDP SCRIPT standard version 10.6 and replace it with an 
updated e-Rx criterion (proposed to be codified in Sec.  
170.315(b)(11)). Commenters requested that ONC work with CMS on a 
smooth transition and timeline that would allow adequate time for the 
development, testing, and full adoption of these updates. A number of 
commenters stated that the NCPDP SCRIPT standard version 2017071 is not 
backward compatible with NCPDP SCRIPT standard version 10.6, and 
therefore there should be no transition period where both standards are 
applicable. Commenters sought clarity on the timing of the change and 
expressed concerns that developers and providers may face operational 
issues in their adoption of version 2017071 of the NCPDP SCRIPT 
standard by January 1, 2020. Commenters recommended that ONC allow 
certification timelines that support compliance with Part D while 
allowing adequate time to mitigate the risk associated with the 
additional requirements for certification to the proposed criterion.
    Response. We appreciate the support expressed by commenters as well 
as the concern about maintaining alignment between required standards 
across HHS. We note that the CMS requirement for Part D e-Rx 
transactions includes a compliance date of January 1, 2020, and that 
industry feedback notes a consistent and deliberate move toward 
readiness for the adoption of the new standard for Part D e-Rx, 
including by health IT industry leaders supporting pharmacy 
implementation. We believe that this overall industry readiness 
supports our adoption of the update to the standard for certification 
purposes and to be in alignment with the required standard update for 
Part D e-Rx purposes. In response to the request for a smooth 
transition and continuity of certification for health care providers, 
we have finalized a revision to the existing criterion in Sec.  
170.315(b)(3) rather than removing and replacing the criterion. In 
order to support the transition to the new standard for Part D, at the 
request of stakeholders, ONC issued guidance \43\ in the third quarter 
of CY2019 stating, ``. . . developers of 2015 Edition certified Health 
IT Modules certified to the e-prescribing criterion adopted at 45 CFR 
170.315(b)(3) are permitted to update their products to use the NCPDP 
SCRIPT standard version 2017071 to meet CMS' compliance requirements . 
. .'' This guidance also noted that ONC would discontinue certification 
of new products to the electronic prescribing certification criterion 
using version 10.6 of the NCPDP SCRIPT standard as of January 1, 2020.
---------------------------------------------------------------------------

    \43\ For Part D covered drugs prescribed for Part D eligible 
individuals. ONC Electronic Prescribing Certification Companion 
Guide: https://www.healthit.gov/test-method/electronic-prescribing.
---------------------------------------------------------------------------

    In consideration of the comments we received, we have finalized our 
proposal to update the electronic prescribing (e-Rx) NCPDP SCRIPT 
standard used for electronic prescribing in the 2015 Edition to NCPDP 
SCRIPT standard version 2017071, which results in a new e-Rx standard 
becoming the baseline for certification. As the effective date of this 
final rule will occur after January 1, 2020, we have not finalized our 
proposal to permit new products to continue to be certified to the 
prior standard until the January 1, 2020 date. Instead, we discontinued 
certification of new products to the former electronic prescribing 
criterion using the NCPDP SCRIPT standard version 10.6 to align with 
CMS requirements. We have finalized this update as a modification to 
the existing certification criterion rather than as a separate new 
certification criterion to allow for a smooth transition, and to allow 
for continuity with the certification(s) issued to Health IT Modules 
for Sec.  170.315(b)(3) prior to January 1, 2020 that are updated under 
the ONC guidance. This approach will also continue to allow for 
compliance with the January 1, 2020 timeline for CMS' Medicare Part D 
e-Rx and Medication History standards.
    As noted by commenters, we understand that there is a lack of 
backward compatibility between the two standards. In order to allow for 
a reasonable transition period to certification to the full set of 
NCPDP SCRIPT transactions and other requirements defined in the updated 
e-Rx certification criterion, we have framed our Maintenance of 
Certification in section 45 CFR 170.405(b)(5)(ii) with flexibility that 
will allow health IT developers up to 24 months from the date of 
publication of this final rule to test and certify to the updated 
criterion reflective of all NCPDP SCRIPT 2017071 transactions to 
demonstrate full conformance with the updated criterion. After January 
1, 2020, use of the NCPDP SCRIPT 10.6 standard will be prohibited under 
the Part D program, so we do not expect or anticipate health IT systems 
certified to Sec.  170.315(b)(3) will conduct Part D transactions using 
that standard. We also recognize, however, for the purposes of 
maintaining a product certificate with Sec.  170.315(b)(3) in its 
scope, that these 24 months from the date of publication from this 
final rule enable continued compliance and oversight associated with 
other capabilities in Sec.  170.315(b)(3) that are not applicable for 
Part D, and for which conformance is still required.
    We have finalized this 24-month period for the update for this 
criterion under the real world testing provisions in Sec.  
170.405(b)(5) as follows:
     Electronic Prescribing. A health IT developer with health 
IT certified to Sec.  170.315(b)(3) prior to June 30, 2020, must:
    [cir] Update their certified health IT to be compliant with the 
revised versions of this criterion adopted in Sec.  170.315(b)(3)(ii); 
and
    [cir] Provide its customers of the previously certified health IT 
with certified health IT that meets paragraph (b)(5)(i) of this section 
by May 2, 2022.
a. Electronic Prescribing Standard and Certification Criterion
    Comments. Commenters expressed concerns about standardization 
generally within the context of e-prescribing. Several commenters 
expressed concern about using the NCPDP SCRIPT standard version 
2017071, the RxNorm standard, as a requirement for e-prescribing, and 
other standards such as Fast Healthcare Interoperability Resources 
(FHIR). One commenter further stated that only inventory (packaging or 
unit dose strength) codes are standardized in RxNorm, and that drug 
regimens should be standardized and made computable in RxNorm for 
safety reasons. Another commenter noted that RxNorm does not index 
brand names exhaustively with a single unique ID for each branded drug, 
but that current indexing only allows for generic-level 
interoperability and only at unit dose level. One commenter expressed 
concern that the criterion as proposed does not appear to support 
medication assisted treatment (MAT) for opioid use disorder (OUD) and 
other long-acting medications. Another commenter stated a hope that 
standards such as the NCPDP SCRIPT version 2017071 standard can ease 
data integration into the workflow, lessen burden, and help achieve 
greater compliance with policy and legal requirements for querying 
State prescription drug monitoring programs (PDMP). Another commenter 
supported the adoption of the NCPDP SCRIPT standard version 2017071 
because the standard supports the prescribing of compound medications 
and the sig (i.e., instructions) field is not limited to 140 
characters.

[[Page 25680]]

    Some commenters also provided suggestions to improve the NCPDP 
SCRIPT 2017071 standard and its availability to the public by the 
standards developing organization. Another commenter stated that 
today's NCPDP standards are not in an API-ready format, and recommended 
CMS and ONC collaborate with NCPDP to explore API FHIR standards 
specific to the HL7 Da Vinci Project for a January 2022 effective date 
or later. A few commenters stated that because many NCPDP standards are 
not openly accessible and require a paid membership to obtain the 
technical specifications, our adoption could limit widespread adoption 
and a standardized implementation nationwide. Several commenters 
suggested that ONC adopt FHIR as a standard for the Program, and for 
the e-Rx criterion specifically. We also received several comments that 
are out of scope which are not addressed in this rulemaking.
    Response. We appreciate the commenters' consideration of the 
standards. We note that RxNorm is a standard maintained by the National 
Library of Medicine (NLM). ONC adopted RxNorm to represent medication 
information as a vocabulary standard in Sec.  170.207(d) (80 FR 62612). 
We encourage all developers who have experience with, and feedback 
relevant to, RxNorm to contact NLM. As a reminder, RxNorm is considered 
a minimum standard code set under the Program, and developers are 
permitted to upgrade their products to comply with a newer version of 
RxNorm without adversely affecting a product's certification status 
pursuant to 45 CFR 170.555(b)(2) as long as no other law prohibits such 
action.
    In reference to the OUD prevention and treatment-related concerns 
that commenters expressed, we note that the NCPDP SCRIPT 2017071 
standard does support the exchange of medicines used in medication-
assisted treatment (MAT) for opioid use disorder treatment purposes. An 
electronic prescription of controlled substances transaction containing 
a MAT drug such as buprenorphine can be sent from a prescriber to a 
pharmacy through the specified transactions, and the updated Sec.  
170.315(b)(3) criterion also requires the inclusion of a reason for the 
prescription using  or  elements, or 
optionally, the technology must be able to receive and transmit the 
reason for the prescription using the  element. In 
addition, the RxHistoryRequest transaction contains a patient consent 
indicator that the receiving entity must evaluate for accurate 
reporting. We are also aware that many PDMPs across the country accept 
reporting of medication history transactions containing buprenorphine, 
naltrexone, and other medications that could be used in the treatment 
of OUD.
    We thank commenters for their input related to improvements that 
could be made to the NCPDP SCRIPT version 2017071 standard, however 
NCPDP is a member-driven standards developing organization that 
requires membership in order to participate in standards developing and 
to access standards and implementation guides. We appreciate the 
suggestion to provide a direct link to the appropriate NCPDP SCRIPT 
standard implementation guide, but we have no authority over the 
business processes of standards developing organizations like NCPDP. We 
encourage any and all participants with an interest in improving the 
standard to engage with NCPDP. Regarding the recommendation for ONC to 
collaborate with NCPDP to explore FHIR, we appreciate the suggestion 
and support any advancements in technical standards and frameworks that 
support interoperability. At this time, NCPDP SCRIPT standard version 
2017071 has not been mapped to FHIR, but ONC will continue to monitor 
the industry for opportunities to align the ONC Health IT Certification 
Program with industry developments.
    Comments. Five commenters fully supported all proposed transactions 
and requirements detailed in the Proposed Rule. The vast majority of 
commenters noted concerns about the proposed criterion specific to the 
transactions proposed for adoption in the Sec.  170.315(b)(11) e-Rx 
certification criterion; details in support or not in support of 
adoption as proposed are further detailed for each type of transaction 
below. As a whole, the primary concerns for the transactions and 
requirements as proposed include the following: (1) EHRs are required 
to comply with the new transactions and requirements, while receiving 
pharmacy information systems are not; (2) lack of pharmacy adoption and 
readiness, as sufficient adoption should occur prior to making the 
transactions required; and (3) implementation of the proposed 
transactions and requirements is resource intensive, if not 
prohibitive, in order to meet the January 1, 2020 deadline set by CMS. 
Several commenters suggested either an extension or that certain 
transactions should be made optional.
    Response. We appreciate all of the public comments and have 
modified the transactions to specify which transactions are finalized 
as required for Health IT Modules for purposes of obtaining or 
retaining certification to Sec.  170.315(b)(3), which are optional for 
Health IT Modules for purposes of obtaining or retaining certification 
to Sec.  170.315(b)(3), and any other Sec.  170.315(b)(3) requirements 
below. Additional public comment received and related responses are 
grouped below based on the comment's relation to the specific 
transactions. We note that ``optional'' for the purposes of 
certification does not mean, and should not be interpreted as, 
``optional'' for Part D E-prescribing Program compliance. To the extent 
that prescribers and pharmacies conduct electronic prescribing with 
Part D covered drugs prescribed for Part D eligible individuals they 
will be required to use the NCPDP SCRIPT 2017071 standard to conduct 
those transactions under the Part D E-prescribing Program. Thus, a 
transaction designated as ``optional'' for the purposes of 
certification means a health IT developer can elect to have that 
transaction explicitly tested as part of certification for its product 
or can choose not to do so--either will allow its product to be 
certified to Sec.  170.315(b)(3). We reiterate that comments regarding 
CMS' January 1, 2020 timeline are out of scope as we cannot change CMS' 
policy or its timeline.
b. Electronic Prescribing Transactions
    In addition to adopting the NCPDP SCRIPT version 2017071 standard 
for the transactions that are listed in the current ``electronic 
prescribing'' criterion (Sec.  170.315(b)(3)), we also proposed to 
adopt and require conformance to all of the NCPDP SCRIPT version 
2017071 standard transactions CMS adopted in 42 CFR 423.160(b)(2)(iv). 
We proposed this updated 2015 electronic prescribing criterion to 
therefore include the following transactions:
i. Create and Respond to New Prescriptions (NewRx, NewRxRequest, 
NewRxResponseDenied)
    We proposed in 84 FR 7444 to enable a user to perform the related 
electronic transactions for NewRx, NewRxRequest and 
NewRxResponseDenied. A NewRx transaction is a new prescription from a 
prescriber to a pharmacy so that it can be dispensed to a patient. A 
NewRxRequest is a request from a pharmacy to a prescriber for a new 
prescription for a patient. A NewRxResponseDenied is a denied response 
to a previously sent NewRxRequest (if approved by the

[[Page 25681]]

prescriber, a NewRx would be sent instead). A NewRxResponseDenied 
response may occur when the NewRxRequest cannot be processed or if 
information is unavailable.
    Comments. While the NewRx transaction received unanimous support as 
a required transaction for adoption in the updated Sec.  170.315(b)(3) 
criterion, the vast majority of commenters opposed adopting the 
NewRxRequest and NewRxResponseDenied transactions as required 
transactions primarily due to a lack of adoption by the PIS involved in 
the exchange. Several commenters stated that the NewRxRequest and 
NewRxResponseDenied is not yet in broad use. A commenter who supported 
adoption of NewRxRequest and NewRxRequestDenied believed that they may 
be beneficial for electronic prescribing of controlled substances 
(EPCS) and noted that pharmacies have expressed interest in 
implementation.
    Response. In consideration of public comments, we have adopted 
NewRx as a required transaction, and NewRxRequest and 
NewRxResponseDenied as optional transactions in the updated Sec.  
170.315(b)(3) electronic prescribing criterion. We have finalized these 
latter two transactions as optional in response to commenters' concerns 
regarding a lack of adoption by the PIS that would be involved in the 
exchange. Additionally, we note that pursuant to the certification 
criterion, health IT presented for certification must be capable of 
including the reason for the prescription as referenced in the updated 
Sec.  170.315(b)(3)(ii) or Sec.  170.315(b)(3)(ii)(D) in the NewRx 
transaction.
ii. Request and Respond to Change Prescriptions (RxChangeRequest, 
RxChangeResponse)
    We proposed in 84 FR 7444 to enable a user to perform the related 
electronic transactions for RxChangeRequest and RxChangeResponse. An 
RxChangeRequest transaction originates from a pharmacy and may be sent 
to a prescriber to: Request a change in the original prescription (new 
or fillable); validate prescriber credentials; request a review by a 
prescriber of the drug requested; or obtain prior authorization from 
the payer for the prescription. An RxChangeResponse transaction 
originates from a prescriber to respond to: A prescription change 
request from a pharmacy; a request for a prior authorization from a 
pharmacy; or a prescriber credential validation request from a 
pharmacy.
    Comments. Most commenters supported the proposed adoption of the 
RxChangeRequest and RxChangeResponse transactions. One commenter 
recommended against adoption until industry adoption is more widely 
spread across retail pharmacies and demonstrates value.
    Response. Because the majority of commenters were in support of 
adoption of the RxChangeRequest and RxChangeResponse transactions as 
proposed, we have included these transactions as required in the 
updated Sec.  170.315(b)(3) electronic prescribing criterion. 
Additionally, we note that pursuant to the certification criterion, 
health IT presented for certification must be capable of including the 
reason for the prescription as referenced in the updated Sec.  
170.315(b)(3)(ii) or Sec.  170.315(b)(3)(ii)(D) in the RxChangeRequest 
and RxChangeResponse transactions.
iii. Request and Respond to Cancel Prescriptions (CancelRx, 
CancelRxResponse)
    We proposed in 84 FR 7444 to enable a user to perform the related 
electronic transactions for CancelRx and CancelRxResponse. A CancelRx 
transaction is a request from a prescriber to a pharmacy to not fill a 
previously sent prescription. A CancelRx must contain pertinent 
information for the pharmacy to be able to find the prescription in 
their system (patient, medication (name, strength, dosage, form), 
prescriber, and prescription number if available). A CancelRxResponse 
is a response from a pharmacy to a prescriber to acknowledge a 
CancelRx, and is used to denote if the cancellation is approved or 
denied.
    Comments. The majority of public comments reflected support for 
finalizing CancelRx and CancelRxResponse as required transactions. One 
commenter stated that the CancelRx transaction will reduce cost and 
improve patient safety, as patients may have remaining refills 
available that are subsequently modified based on a physician's new 
assessment. Another commenter noted that certified technology currently 
supports CancelRx transactions in version 10.6 of the NCPDP SCRIPT 
standard and encouraged developers to upgrade their technology to 
support CancelRx transactions in NCPDP SCRIPT standard version 2017071, 
as these transactions provide great value to end users. One commenter 
expressed concern for pharmacy readiness for CancelRx, and felt there 
should be sufficient industry adoption in place before it is a 
certification requirement.
    Response. We thank commenters for their overall support of the 
proposed CancelRx and CancelRxResponse transactions. In light of the 
commenters' overall support for the proposed CancelRx transactions and 
in order to support patient safety and the free flow of communication 
between prescribers and pharmacies, we have included these transactions 
as required in the revised Sec.  170.315(b)(3) electronic prescribing 
criterion. We reiterate that although PIS are outside the scope of the 
ONC Health IT Certification Program, we encourage pharmacy information 
system developers to advance their capacity to support a nationwide 
network of fully interoperable PIS. Additionally, we note that pursuant 
to the certification criterion, health IT presented for certification 
must be capable of including the reason for the prescription as 
referenced in the updated Sec.  170.315(b)(3)(ii) or Sec.  
170.315(b)(3)(ii)(D) in the CancelRx transaction.
iv. Request and Respond to Renew Prescriptions (RxRenewalRequest, 
RxRenewalResponse)
    We proposed in 84 FR 7444 to enable a user to perform the related 
electronic transactions for RxRenewalRequest and RxRenewalResponse. An 
RxRenewalRequest transaction originates from a pharmacy to request 
additional refills beyond those originally prescribed. An 
RxRenewalResponse transaction originates from a prescriber to respond 
to the request from the pharmacy.
    Comments. Commenters supported adoption of the RxRenewalRequest and 
RxRenewalResponse transactions as proposed. One commenter stated that 
these transactions could be implemented after the CMS deadline of 
January 1, 2020 without loss of current functionality. Another 
commenter said that these transactions are widely used in the industry 
and provide great value to end users.
    Response. We appreciate the support for the RxRenewalRequest and 
RxRenewalResponse transactions and have included these transactions as 
required in the updated Sec.  170.315(b)(3) electronic prescribing 
criterion. We reiterate that the entire updated Sec.  170.315(b)(3) 
criterion and requirements must be met before certification can be 
granted. Additionally, we note that pursuant to the certification 
criterion, health IT presented for certification must be capable of 
including the reason for the prescription as referenced in the

[[Page 25682]]

updated Sec.  170.315(b)(3)(ii) or Sec.  170.315(b)(3)(ii)(D) in the 
RxRenewalRequest and RxRenewalResponse transactions.
v. Receive Fill Status Notifications (RxFill, RxFillIndicatorChange)
    We proposed in 84 FR 7444 to enable a user to perform the related 
electronic transactions for RxFill and RxFillIndicatorChange. An RxFill 
transaction is sent from a pharmacy to a prescriber or long term and 
post-acute care (LTPAC) facility indicating the FillStatus (dispensed, 
partially dispensed, not dispensed or returned to stock, or transferred 
to another pharmacy) of the new, refill, or resupply prescriptions for 
a patient. RxFillIndicator informs the pharmacy of the prescriber's 
intent for fill status notifications for a specific patient/medication. 
An RxFillIndicatorChange is sent by a prescriber to a pharmacy to 
indicate that the prescriber is changing the types of RxFill 
transactions that were previously requested, and in which the 
prescriber may modify the fill status of transactions previously 
selected or may cancel future RxFill transactions.
    Comments. While the RxFill transaction received unanimous support 
as a required transaction, the vast majority of comments opposed 
adopting the RxFillIndicatorChange as proposed due to a lack of 
industry adoption and broad use by PIS. One commenter stated that there 
has not been a significant use case for the RxFillIndicatorChange 
transaction to prescribers. A few commenters suggested that ONC wait to 
require the RxFillIndicatorChange until this transaction is more widely 
adopted by both prescribers and pharmacies and value is realized in the 
industry, and suggested either removing RxFillndicatorChange from the 
proposed criterion or making this transaction optional. Another 
commenter argued that RxFillIndicatorChange should be optional as 
development to support this transaction in NCPDP SCRIPT standard 
version 2017071 would be resource intensive. Commenters in support of 
the adoption of the RxFillIndicatorChange transaction stated it is the 
only way to alter the prescriber notification preferences in an 
ambulatory or acute setting outside of a fillable message. Commenters 
supporting adoption of the RxFillIndicatorChange transaction further 
noted that, historically, the lack of prescriber control over 
notification messages may have had an impact on hindering adoption. One 
commenter suggested that, in lieu of the RxFillIndicatorChange 
transaction, EHRs receive all fill notifications and subsequently use 
logic to bring the clinician's attention to only important indicators.
    Response. We appreciate all of the comments that supported the 
RxFill transaction and the RxFillIndicatorChange transaction. After 
consideration of comments received on the RxFill and 
RxFillIndicatorChange transactions, we have adopted the RxFill 
transaction as required and the RxFillIndicatorChange transaction as 
optional in the updated Sec.  170.315(b)(3) electronic prescribing 
criterion. We encourage further development and innovation to address 
the concerns that we heard from commenters, and we will continue to 
monitor advancements in standards and technology for future rulemaking. 
We reiterate that PIS are outside the scope of the ONC Health IT 
Certification Program and encourage pharmacy information system 
developers to advance their capacity to support a nationwide network of 
fully interoperable PIS. Additionally, we note that pursuant to the 
certification criterion, health IT presented for certification must be 
capable of including the reason for the prescription as referenced in 
the updated Sec.  170.315(b)(3)(ii) or Sec.  170.315(b)(3)(ii)(D) in 
the RxFill transaction.
vi. Request and Receive Medication History (RxHistoryRequest, 
RxHistoryResponse)
    We proposed in 84 FR 7444 to enable a user to perform the related 
electronic transactions for RxHistoryRequest and RxHistoryResponse. An 
RxHistoryRequest transaction is a request from a prescriber to a 
pharmacy for a list of medications that have been prescribed, 
dispensed, claimed, or indicated by a patient. An RxHistoryResponse is 
a response to an RxHistoryRequest containing a patient's medication 
history. It includes the medications that were dispensed or obtained 
within a certain timeframe, and optionally includes the prescriber that 
prescribed it.
    Comments. Commenters supported adoption of the RxHistoryRequest and 
RxHistoryResponse transactions as proposed. One commenter also stated 
that both transactions could facilitate EHR and other health IT data 
integration with PDMP systems, yet noted that in many cases, State law 
or policy prohibits data integration between EHRs and PDMPs. Another 
commenter stated that these transactions are widely used in the 
industry and provide great value to end users.
    Response. We appreciate all comments we have received on the use of 
the RxHistoryRequest and RxHistoryResponse transactions. We agree with 
the commenter that the RxHistoryRequest and RxHistoryResponse 
transactions support data integration between health IT systems such as 
EHRs and other information technology systems such as PDMPs, and 
encourage any efforts made by developers to fully integrate 
prescription and other health data into a provider's workflow within 
allowable law. We reiterate that ONC does not have control over State 
laws that govern PDMPs. We will continue to monitor regulatory and 
industry advancements in this area and will take them into 
consideration in future rulemaking. We have adopted these transactions 
as required in the updated Sec.  170.315(b)(3) electronic prescribing 
criterion. Additionally, we note that pursuant to the certification 
criterion, health IT presented for certification must be capable of 
including the reason for the prescription as referenced in the updated 
Sec.  170.315(b)(3)(ii) or Sec.  170.315(b)(3)(ii)(D) in the 
RxHistoryResponse transaction.
vii. Ask the Mailbox If There Are Any Transactions (GetMessage)
    We proposed in 84 FR 7444 to enable a user to perform the 
electronic transaction GetMessage for Ask the Mailbox. This transaction 
is used by the prescriber or pharmacy when asking the mailbox if there 
are any transactions. It is the basis for the mechanism used by a 
prescriber or pharmacy system to receive transactions from each other, 
from a payer, or from the Risk Evaluation and Mitigation Strategy 
(REMS) Administrator via a switch acting as a mailbox.
    Comments. Approximately half of commenters opposed adoption of the 
GetMessage transaction and the other half supported adoption in the 
updated Sec.  170.315(b)(3) electronic prescribing criterion. 
Commenters not in support of the GetMessage transaction asserted that 
it is not in use by prescribers and that it is an obsolete method of 
message retrieval. Commenters in support of adoption argued that it is 
applicable when not transacting with real-time messaging, and should be 
adopted as an optional transaction.
    Response. We thank commenters for their input. After careful 
consideration of all comments received, and in our ongoing efforts to 
align with CMS Part D requirements, we have determined to adopt the 
GetMessage transaction as optional for the updated Sec.  170.315(b)(3) 
electronic prescribing criterion.

[[Page 25683]]

viii. Relay Acceptance of a Transaction Back to the Sender (Status)
    We proposed in 84 FR 7444 to enable a user to perform the related 
electronic transaction to relay acceptance of a transaction back to the 
sender. A Status transaction in response to any applicable transaction 
other than GetMessage indicates acceptance and responsibility for a 
request. A Status transaction in response to GetMessage indicates that 
no mail is waiting for pickup. A Status transaction cannot be held in 
an electronic mailbox and may not contain an error.
    Comments. Commenters supported adoption of the Status transaction 
as proposed. Two commenters noted that since the transaction is an 
acknowledgement, it would not contain the reason for the prescription 
as referenced in the updated Sec.  170.315(b)(3)(ii) or Sec.  
170.315(b)(3)(ii)(D).
    Response. We appreciate all comments in support of the Status 
transaction and have included this transaction as required in the 
updated Sec.  170.315(b)(3) electronic prescribing criterion. As an 
acknowledgement, we agree that the NCPDP SCRIPT version 2017071 
standard does not support the conveying the reason for the prescription 
in the Status transaction, and have modified the requirement to reflect 
this.
ix. Respond That There Was a Problem With the Transaction (Error)
    We proposed in 84 FR 7444 to enable a user to perform the related 
electronic transaction for Error response. This transaction indicates 
an error has occurred and that the request was terminated. An Error can 
be generated when there is a communication problem or when the 
transaction actually had an error. An Error can be held in an 
electronic mailbox, as it may be signifying to the originator that a 
transaction was unable to be delivered or encountered problems in the 
acceptance. The Error must be a different response than a Status, since 
the communication between the system and the mailbox must clearly 
denote the actions taking place. An Error is a response being delivered 
on behalf of a previous transaction, while Status signifies no more 
mail.
    Comments. Commenters supported adoption of the Error transaction as 
proposed. Two commenters noted that since the transaction is an 
acknowledgement, it would not contain the reason for the prescription 
as referenced in the updated Sec.  170.315(b)(3)(ii) or Sec.  
170.315(b)(3)(ii)(D).
    Response. We appreciate all comments in support of the Error 
transaction and have included this transaction as required in the 
updated Sec.  170.315(b)(3) electronic prescribing criterion. As an 
acknowledgement, we agree that the NCPDP SCRIPT version 2017071 
standard does not support the reason for the prescription in the Error 
transaction, and we have modified that requirement to reflect this.
x. Respond That a Transaction Requesting a Return Receipt Has Been 
Received (Verify)
    We proposed in 84 FR 7445 to enable a user to perform the related 
electronic transaction for Verify. This transaction is a response to a 
pharmacy or prescriber indicating that a transaction requesting a 
return receipt has been received. Verifications result when a ``return 
receipt requested'' flag is set in the original request. Upon receiving 
a transaction with ReturnReceipt set, it is the responsibility of the 
receiver to either generate a Verify in response to the request 
(recommended), or generate a Status in response to this request, 
followed subsequently by a free-standing Verify transaction. This 
transaction notifies the originator that the transaction was received 
at the software system. It is not a notification of action taking 
place, since time may elapse before the ultimate response to the 
transaction may take place.
    Comments. Commenters supported adoption of the Verify transaction 
as proposed. Two commenters noted that since the transaction is an 
acknowledgement, it would not contain the reason for the prescription 
as referenced in the updated Sec.  170.315(b)(3)(ii) or Sec.  
170.315(b)(3)(ii)(D).
    Response. We appreciate all comments in support of the Verify 
transaction and have included this transaction as required in the 
updated Sec.  170.315(b)(3) electronic prescribing criterion. As an 
acknowledgement, we agree that the NCPDP SCRIPT standard version 
2017071 does not support the reason for the prescription in the Verify 
transaction, and we have modified that requirement to reflect this.
xi. Request to Send an Additional Supply of Medication (Resupply)
    We proposed in 84 FR 7445 to enable a user to perform the related 
electronic transaction for Resupply. This transaction is a request from 
a Long Term and Post-Acute Care (LTPAC) organization to a pharmacy to 
send an additional supply of medication for an existing order. An 
example use case is when a medication supply for a resident is running 
low (e.g., 2-3 doses) and a new supply is needed from the pharmacy. In 
such a circumstance, the LTPAC organization sends the Resupply 
transaction as a way to notify the pharmacy that an additional supply 
for the medication is needed.
    Comments. Commenters expressed concern over adopting this 
transaction as a required transaction for a few reasons. Some 
commenters noted that the Resupply transaction is only applicable to 
LTPAC practice settings for management of on-site pharmacy inventory 
and for communication between a LTPAC facility and a contracted 
pharmacy. Other commenters mentioned that PIS on the sending or 
receiving end of the transaction are not required to support this 
transaction. Some commenters stated that this transaction is not widely 
adopted among prescribers, and that it should not be adopted until this 
occurs. Two commenters requested that we either remove the transaction 
from the final rule or make the Resupply transaction optional. Other 
commenters stated that while this transaction may be beneficial in the 
future, it was their opinion that it is premature to require the 
Resupply transaction in the electronic prescribing criterion at this 
time.
    Response. We appreciate all comments related to the Resupply 
transaction and have included this transaction as optional in the 
updated Sec.  170.315(b)(3) electronic prescribing criterion. We are 
aware of several ONC-certified EHRs and other health IT that were 
either designed exclusively for, or were expressly designed to support, 
LTPAC providers in addition to other institutions, and encourage those 
and other developers to undergo certification testing to the Resupply 
transaction. Additionally, we note that pursuant to the certification 
criterion, health IT presented for certification must be capable of 
including the reason for the prescription as referenced in the updated 
Sec.  170.315(b)(3)(ii) or Sec.  170.315(b)(3)(ii)(D) in the Resupply 
transaction. We reiterate that PIS are outside the scope of the ONC 
Health IT Certification Program and encourage pharmacy information 
system developers to advance their capacity to support a nationwide 
network of fully interoperable PIS.
xii. Communicate Drug Administration Events (DrugAdministration)
    We proposed in 84 FR 7445 to enable a user to perform the related 
electronic transaction for DrugAdministration.

[[Page 25684]]

This transaction communicates drug administration events from a 
prescriber or care facility to the pharmacy or other entity. It is a 
notification from a prescriber or care facility to a pharmacy or other 
entity that a drug administration event has occurred (e.g., a 
medication was suspended or administration was resumed).
    Comments. Commenters expressed concern over adopting this 
transaction as a required transaction for a few reasons. Some 
commenters noted that the DrugAdministration transaction is only 
applicable to LTPAC practice settings and is therefore not relevant to 
the scope of all certified health IT products, though one commenter 
noted that there could be possible value of this transaction in 
ambulatory and acute care settings as well. In addition, one commenter 
reported LTPAC organizations interested in potentially using e-
prescribing transactions rated DrugAdministration as a low priority 
transaction type, meaning there may not be a wide user base interested 
in implementing it.
    Response. We appreciate comments related to the DrugAdministration 
transaction and have included this transaction as optional in the 
updated Sec.  170.315(b)(3) electronic prescribing criterion. We are 
aware of several ONC-certified EHRs and other health IT that were 
either designed exclusively for, or are used in support of, LTPAC 
providers, and encourage those and other developers to undergo 
certification testing to the DrugAdministration transaction. In light 
of the commenters' concerns, we have adopted the DrugAdministration 
transaction as optional because the ONC Health IT Certification Program 
is agnostic to care settings and programs, yet still supports many 
different use cases. This allows the ONC Health IT Certification 
Program to support multiple program and setting needs, including but 
not limited to the Promoting Interoperability Programs and long term 
and post-acute care. Because the transaction will be optional in the 
updated (b)(3) criterion, developers whose clients do not support long 
term care settings will not be required to demonstrate their capacity 
to send this transaction.
xiii. Request and Respond to Transfer One or More Prescriptions Between 
Pharmacies (RxTransferRequest, RxTransferResponse, RxTransferConfirm)
    We proposed in 84 FR 7445 to enable a user to perform the related 
electronic transactions for RxTransferRequest, RxTransferResponse and 
RxTransferConfirm. The RxTransferRequest transaction is used when the 
pharmacy is asking for a transfer of one or more prescriptions for a 
specific patient to the requesting pharmacy. The RxTransferResponse 
transaction is the response to the RxTransferRequest which includes the 
prescription(s) being transferred or a rejection of the transfer 
request. It is sent from the transferring pharmacy to the requesting 
pharmacy. The RxTransferConfirm transaction is used by the pharmacy 
receiving (originally requesting) the transfer to confirm that the 
transfer prescription has been received and the transfer is complete.
    Comments. The vast majority of commenters expressed concerns with 
the proposal to adopt RxTransferRequest, RxTransferResponse, and 
RxTransferConfirm transactions as proposed because they are only used 
in pharmacy-to-pharmacy transactions and are not applicable to EHRs. 
Further, two commenters noted that PIS are not required to support 
these transactions. Conversely, the two commenters that supported these 
transactions cited the benefit of allowing pharmacies to transfer 
unfilled controlled substance prescriptions, including Schedule 2, 
between pharmacies.
    Response. We thank commenters for their input. We proposed to 
require all of the NCPDP SCRIPT 2017071 standard transactions CMS 
adopted in 42 CFR 423.160(b)(2)(iv) to illustrate our continued 
dedication to establish and maintain complementary policies to ensure 
that the current standard for certification to the electronic 
prescribing criterion permits use of the current Part D e-Rx and MH 
standards. With consideration of comments, and because it was not the 
intent of this certification criterion to include pharmacy specific 
transactions for the purposes of certification, we have adopted 
RxTransferRequest, RxTransferResponse, and RxTransferConfirm as 
optional in the updated Sec.  170.315(b)(3) electronic prescribing 
criterion. We reiterate that PIS are outside the scope of the ONC 
Health IT Certification Program and encourage pharmacy information 
system developers to advance their capacity to support a nationwide 
network of fully interoperable PIS.
xiv. Recertify the Continued Administration of a Medication Order 
(Recertification)
    We proposed in 84 FR 7445 to enable a user to perform the related 
electronic transaction for Recertification. This transaction is a 
notification from a LTPAC facility, on behalf of a prescriber, to a 
pharmacy recertifying the continued administration of a medication 
order. An example use is when an existing medication order has been 
recertified by the prescriber for continued use.
    Comments. Commenters expressed concern over adopting the 
Recertification transaction as proposed primarily because it is only 
applicable to LTPAC practice settings. One commenter stated that LTPAC 
organizations interested in potentially using e-prescribing 
transactions rated Recertification as a low priority transaction type, 
suggesting that there may not be a wide user base interested in using 
it.
    Response. We appreciate all comments in support of the 
Recertification transaction. In light of commenters concerns, we have 
adopted this transaction as optional in the updated Sec.  170.315(b)(3) 
electronic prescribing criterion. We are aware of several ONC-certified 
EHRs and other health IT that were either designed expressly for or in 
support of LTPAC providers, among other institutions, and encourage 
those and other developers to undergo certification testing to the 
Recertification transaction.
xv. Complete Risk Evaluation and Mitigation Strategy (REMS) 
Transactions (REMSInitiationRequest, REMSInitiationResponse, 
REMSRequest, and REMSResponse)
    We proposed in 84 FR 7445 to enable a user to perform the related 
electronic transactions for REMSInitiationRequest, 
REMSInitiationResponse, REMSRequest, and REMSResponse. With CMS' 
adoption of these transactions in their recently issued final rule 
associated with e-Rx for Medicare Part D (42 CFR 423.160(b)(2)(iv)(W)-
(Z)), we believe that it will be beneficial to include these four REMS 
transactions as part of this certification criterion: 
REMSInitiationRequest, REMSInitiationResponse, REMSRequest, and 
REMSResponse.
    Furthermore, under the Food and Drug Administration Amendments Act 
(FDAAA) of 2007 (Pub. L. 110-85), the Food and Drug Administration 
(FDA) requires REMS from a pharmaceutical manufacturer if the FDA 
determines that a REMS is necessary to ensure the benefits of a drug 
outweigh the risks associated with the drug. In support of our sister 
agencies' work, we therefore proposed to include the REMS transactions 
as part of this certification criterion.

[[Page 25685]]

    Comments. The vast majority of commenters supported adoption of 
REMSInitiationRequest, REMSInitiationResponse, REMSRequest, and 
REMSResponse as optional, not required, transactions. Those in support 
of the transactions as proposed suggested that ONC should develop 
strategies to encourage providers to consciously consider and 
appropriately act on alerts to reduce the risk that these messages can 
easily be clicked through and missed, particularly if that provider is 
experiencing alert fatigue. Multiple reasons were provided by 
commenters who stated that the proposed REMS transactions should be 
adopted as optional in the proposed certification criterion. These 
reasons included the state of system readiness and adoption by 
manufacturers, REMS administrators, and pharmacy information systems. 
Another commenter stated that these REMS transactions are not yet in 
widespread use and should be piloted before being required as they 
require extensive design and development effort.
    Response. Given comments in support of the REMSInitiationRequest, 
REMSInitiationResponse, REMSRequest, and REMSResponse transactions, we 
have included these transactions as optional in the updated Sec.  
170.315(b)(3) electronic prescribing criterion. We encourage 
commenters, developers, and other stakeholder to review and provide 
feedback on sections related to REMS (https://www.healthit.gov/isa/allows-a-prescriber-communicate-a-rems-administrator) and all other 
electronic prescribing use cases on the ONC Interoperability Standards 
(ISA) and post suggested edits and updates on these transactions as the 
industry advances. We encourage manufacturers, REMS administrators, and 
pharmacy information system developers to adopt these and other NCPDP 
SCRIPT standard version 2017071 transactions to improve safe 
prescribing practices and patient safety, and encourage developers to 
test their capacity to send and receive REMS messages by utilizing the 
testing tools that are available.
xvi. Electronic Prior Authorization
    The Part D E-prescribing prior authorization process in 84 FR 28450 
through 28458 requires that providers supply additional clinical 
information to verify that the medication can be covered under the 
Medicare Part D benefit. The prior authorization process is intended to 
promote better clinical decision-making and ensure that patients 
receive medically necessary prescription drugs. We are looking for ways 
that would streamline the process for exchanging clinical and financial 
data amongst prescribers and payers for prior authorization and improve 
patients' access to needed medications. Electronic prior authorization 
(ePA) automates this process by allowing providers to request and 
respond to electronic prior authorization transactions within their 
workflow. Using electronic prior authorization (ePA) transactions in 
the NCPDP SCRIPT standard version 2017071 provides a standard structure 
for exchanging prior authorization (PA) questions and answers between 
prescribers and payers, while allowing payers to customize the wording 
of the questions. Electronic prior authorization transactions will 
additionally support the automation of the collection of data required 
for PA consideration, allowing a health IT developer to systemically 
pull data from a patient's medical record. The efficiency gains offered 
by the ePA transactions in the NCPDP SCRIPT standard version 2017071 
are the primary driver behind the development of this new capability. 
We believe the adoption of the ePA transactions included in version 
2017071 of the NCPDP SCRIPT standard as optional transactions aligns 
with CMS' proposals for Part D ePA, and therefore, will not be adopting 
NCPDP SCRIPT standard version 2013101 as suggested by the commenter. On 
June 17, 2019, CMS issued the Secure Electronic Prior Authorization for 
Medicare Part D proposed rule (84 FR 28450), including a proposed new 
transaction standard for the Medicare Prescription Drug Benefit 
program's (Part D) e-prescribing program. Under this proposal, Part D 
plan sponsors would be required to support version 2017071 of the NCPDP 
SCRIPT standard for four ePA transactions, and prescribers would be 
required to use that standard when performing ePA transactions for Part 
D covered drugs they wish to prescribe to Part D eligible individuals. 
While not currently adopted as part of the Part D eRx standard, the 
NCPDP SCRIPT standard version 2017071 includes eight transactions that 
would enable the prescribers to initiate medication ePA requests with 
Part D plan sponsors at the time of the patient's visit. The eight 
transactions are: PAInitiationRequest, PAInitiationResponse, PARequest, 
PAResponse, PAAppealRequest, PAAppealResponse, PACancelRequest, and 
PACancelResponse.
    Comments. Several commenters recommended the adoption of the ePA 
transactions available in the NCPDP SCRIPT standard version 2017071 for 
a variety of reasons, including improving efficiencies in the prior 
authorization process, improving patient outcomes, reducing point-of-
sale rejections, increasing health IT developer adoption, and improving 
the Medicare Part D member experience. Several commenters indicated 
that lack of vendor support for the ePA transactions is a major barrier 
to physician use of the transactions. One commenter also suggested ONC 
adopt the NCPDP SCRIPT standard version 2013101 prior authorization 
transactions.
    Response. We thank commenters for their feedback. In consideration 
of comments, we have adopted the ePA transactions in the NCPDP SCRIPT 
standard version 2017071 as optional for the updated Sec.  
170.315(b)(3) electronic prescribing criterion. We believe the adoption 
of the ePA transactions included in version 2017071 of the NCPDP SCRIPT 
standard as optional transactions aligns with CMS' proposals for Part D 
ePA. We note that this final rule allows only for the voluntary 
certification of Health IT Modules by health IT developers to support 
these transactions, and does not require the certification, adoption, 
or use of such Health IT Modules by health care providers for this or 
any other purpose. We also note that development, testing, and 
implementation to support these transactions are important first steps 
toward integrating pharmacies in the prior authorization process for 
Part D prescriptions, while supporting widespread industry adoption and 
reducing burden on providers. We refer readers to the ONC Strategy on 
Reducing Regulatory and Administrative Burden Relating to the Use of 
Health IT and EHRs,\44\ drafted in partnership with CMS, for further 
discussion of potential opportunities to ease related clinician burden 
through improved health IT enabled processes.
---------------------------------------------------------------------------

    \44\ https://www.healthit.gov/topic/usability-and-provider-burden/strategy-reducing-burden-relating-use-health-it-and-ehrs.
---------------------------------------------------------------------------

xvii. Reason for the Prescription
    For each transaction specified, the technology must be able to 
receive and transmit the reason for the prescription.
    Comments. Commenters supported continued adoption of the reason for 
the prescription in specific electronic prescribing transactions. Some 
commenters noted that some of the proposed transactions would not 
contain the reason for the prescription as referenced in the updated

[[Page 25686]]

Sec.  170.315(b)(3)(ii) or Sec.  170.315(b)(3)(ii)(D).
    Response. We thank commenters for their feedback. We reiterate our 
decision to require Health IT Modules seeking certification to the 
updated electronic prescribing certification criterion to be capable of 
including the reason for the prescription as referenced in the updated 
Sec.  170.315(b)(3)(ii) or Sec.  170.315(b)(3)(ii)(D) within relevant 
electronic prescription transactions to support patient safety and 
align with HHS goals to expand safe, high quality health care. Health 
IT certified to the updated Sec.  170.315(b)(3) criterion must have the 
capacity to enable a user to receive and transmit the reason for the 
prescription using the diagnosis elements:  or 
, or optionally, the technology must be able to receive and 
transmit the reason for the prescription using the  
element, and be consistent with the International Statistical 
Classification of Diseases and Related Health Problems (ICDs) sent in 
the diagnosis element(s). The  element defines the 
indication for use of the medication as meant to be conveyed to the 
patient, and is included in the Sig. This requirement would apply to 
the following NCPDP SCRIPT standard version 2017071 transactions that 
we have adopted in this criterion (see discussion above): NewRx, 
RxChangeRequest, RxChangeResponse, CancelRx, RxRenewalRequest, 
RxRenewalResponse, RxFill, RxHistoryResponse, Resupply, 
RxTransferRequest, RxTranferResponse, REMSInitiationRequest, 
REMSInitiationResponse, REMSRequest, REMSResponse, PAInitiationRequest, 
PAInitiationResponse, PARequest, PAResponse, PAAppealRequest, 
PAAppealResponse, PACancelRequest, and PACancelResponse.
xviii. Oral Liquid Medications
    Limit a user's ability to prescribe all oral liquid medications in 
only metric standard units of mL (i.e., not cc).
    Comments. While not within the scope of the Proposed Rule, one 
commenter did not support the continued requirement to prescribe oral 
liquids in ``mL'' units. The commenter supported the use of metric 
units, but did not agree with the requirement of the ONC Health IT 
Certification Program to limit this to only milliliters. The commenter 
recommended that the unit of measure used by a prescriber be at their 
discretion, as long as it is appropriate for the dosage.
    Response. We thank the commenter for the input. Because this 
requirement is out of scope for the Proposed Rule in that we did not 
propose to change this conformance requirement, we decline to relax or 
retire the requirement for oral liquid medications to be prescribed in 
mL units. When we first adopted this requirement for the 2015 Edition 
Proposed Rule, several commenters were supportive of improving patient 
safety through use of the metric standard for dosing, but recommended 
that this requirement only apply to oral liquid medications. Incorrect 
dosage is a common error with liquid medication, often resulting from 
confusion between different dose measurements (e.g., mL and teaspoons). 
If these measurements are confused with each other, too much or too 
little of the medicine can be given. This requirement is also in 
alignment with NCPDP SCRIPT implementation recommendations.
xix. Signatura (Sig) Element
    The Signatura (Sig) element is used to support electronic 
prescribing for the consistent expression of patient directions for use 
by relaying this information between a prescriber and a pharmacist. It 
must be legible, unambiguous, and complete to ensure the prescriber's 
instructions for use of the medication are understood. For each 
transaction, the technology must be able to receive and transmit the 
reason for the prescription using the indication elements in the SIG 
Segment.
    Comments. One commenter requested that the Sig element be required 
rather than optional to aid in future medication reconciliation and 
clinical reporting. Another commenter noted that the NCPDP SCRIPT 
standard version 2017071 allows for an increase in Sig length.
    Response. Given the lack of attention paid to and support for 
modifying the electronic prescribing criterion for Sig from optional to 
required, we have decided to retain Sig as optional in the updated 
Sec.  170.315(b)(3) criterion. As discussed in the Reason for 
Prescription section, health IT may optionally seek certification to 
the updated electronic prescribing criterion by demonstrating their 
capacity to receive and transmit the reason for the prescription using 
the Sig element.
xx. Real Time Pharmacy Benefit
    While development is still currently underway by NCPDP, the Real-
Time Pharmacy Benefit (RTPB) standard is not yet complete. When 
complete, the RTPB standard is expected to facilitate the ability for 
pharmacy benefit payers/processors to communicate formulary and benefit 
information to providers. In the absence of that or another similar 
standard, CMS has adopted policies requiring the development and/or 
implementation of Real Time Benefit Transaction (RTBT) standards in the 
Part D e-Rx Program in the context of recent rulemaking. On May 16, 
2019, CMS issued the Modernizing Part D and Medicare Advantage to Lower 
Drug Prices and Reduce Out-of-Pocket Expenses final rule, which 
includes a requirement under the electronic prescribing standards that 
Part D plan sponsors implement one or more electronic real-time benefit 
tools that are capable of integrating with at least one prescriber's 
electronic prescribing system or electronic health record no later than 
January 1, 2021 (84 FR 23832). One commenter recommended that CMS and 
ONC coordinate with NCPDP on requirements for real-time benefit 
functionality. We are also aware of industry efforts to develop a 
consumer-facing real-time pharmacy benefit functionality FHIR[supreg]-
based implementation guide that we anticipate will be balloted in 2020. 
ONC will continue to monitor these efforts and consider proposing the 
NCPDP RTPB standard or a similar standard to enable real-time benefit 
transactions in future rulemaking.
xxi. Other Comments Received Outside the Scope of This Rule
    We note that we received several comments specifically addressing 
the electronic prescribing of controlled substances and prescription 
drug monitoring programs. We note that these specific comments are 
outside the scope of the proposals finalized in this rule. However, we 
note that we included a discussion of these topics in relation to the 
discussion of the RFI on OUD prevention and treatment in the Proposed 
Rule in 84 FR 7461.
5. Clinical Quality Measures--Report Criterion
    In the 2015 Edition final rule, ONC adopted four clinical quality 
measure (CQM) certification criteria, Sec.  170.315(c)(1) CQMs--record 
and export, Sec.  170.315(c)(2) CQMs--import and calculate, Sec.  
170.315(c)(3) CQMs--report, and Sec.  170.315(c)(4) CQMs--filter (80 FR 
62649 through 62655). These four criteria were adopted with the intent 
to support providers' quality improvement activities and in 
electronically generating CQM reports for reporting with certified 
health IT to programs such as the EHR Incentive Programs, Quality 
Payment Program, and Comprehensive Primary Care plus initiative. The 
``CQMs--report''

[[Page 25687]]

certification criterion (Sec.  170.315(c)(3)) included an optional 
certification provision for demonstrating that the health IT can create 
Quality Reporting Document Architecture (QRDA) reports in the form and 
manner required for submission to CMS programs, which is in accordance 
with CMS' QRDA Implementation Guide (IGs).
    The CMS QRDA IGs provide technical guidance and specific 
requirements for implementing the HL7 QRDA Category I (QRDA I) and 
Category III (QRDA III) standards for reporting to CMS quality 
reporting programs.\45\ The CMS QRDA IGs include the formal template 
definitions and submission criteria for submitting QRDA documents to 
the Comprehensive Primary Care Plus (CPC+) and Merit Based Incentive 
Payments System (MIPS) Programs. Some of the conformance statements in 
the HL7 QRDA standards have been further constrained to meet the 
specific requirements from these CMS programs. The CMS QRDA IGs also 
only list the templates specifying CMS-specific reporting requirements 
from the base HL7 QRDA standards. QRDA I is an individual-patient-level 
report. It contains quality data for one patient for one or more 
electronic clinical quality measures (eCQMs). QRDA III is an aggregate 
quality report. A QRDA III report contains quality data for a set of 
patients for one or more eCQMs.
---------------------------------------------------------------------------

    \45\ The following resources provide additional information on 
the differences between the CMS QRDA and the HL7 QRDA standards: 
https://ecqi.healthit.gov/system/files/QRDA_HQR_2019_CMS_IG_final_508.pdf (pg. 38) and https://ecqi.healthit.gov/sites/default/files/2019-07/2020-CMS-QRDA-III-Eligible-Clinicians-and-EP-IG-07182019-508.pdf (pg. 18).
---------------------------------------------------------------------------

    Since the 2015 Edition final rule was published, we have gained 
additional certification experience and received feedback from the 
industry that health IT certified to the ``CQMs--report'' criterion 
(Sec.  170.315(c)(3)) are only/primarily being used to submit eCQMs to 
CMS for participation in CMS' programs. Therefore, as a means of 
reducing burden, we proposed to remove the HL7 CDA[supreg] Release 2 
Implementation Guide: QRDA I; Release 1, Draft Standard for Trial Use 
(DSTU) Release 3 (US Realm), Volume 1 (Sec.  170.205(h)(2)), as well as 
the QRDA Category III, Implementation Guide for CDA[supreg] Release 2 
(Sec.  170.205(k)(1)) and the Errata to the HL7 Implementation Guide 
for CDA[supreg] Release 2: QRDA Category III, DSTU Release 1 (US 
Realm), September 2014 (Sec.  170.205(k)(2)) standard requirements (HL7 
QRDA standards) from the current 2015 Edition CQMs--report criterion in 
Sec.  170.315(c)(3), and we also proposed to require that health IT 
certified to the current 2015 Edition CQMs--report criterion support 
the CMS QRDA IGs (84 FR 7446). We stated that this change would 
directly reduce burden on health IT developers and indirectly providers 
as they would no longer have to develop and support two forms of the 
QRDA standard.
    We also solicited comment in the Proposed Rule on the future 
possibility of FHIR-enabled APIs replacing or complementing QRDA-based 
quality reporting. We also noted in the Proposed Rule that the Fast 
Health Interoperability Resources (FHIR[supreg]) standard offers the 
potential for supporting quality improvement and reporting needs, and 
holds the potential of being a more efficient and interoperable 
standard to develop, implement, and utilize to conduct quality 
reporting through APIs. We believe until the potential benefits of 
FHIR[supreg] APIs can be realized for quality reporting, and that 
solely requiring the CMS QRDA IGs for the updated 2015 Edition ``CQMs--
report'' criterion will balance the burden on developers, while still 
ensuring module users' abilities to meet their quality reporting 
obligations to CMS (84 FR 7446).
    To support the proposal, we proposed to incorporate by reference in 
Sec.  170.299 the latest annual CMS QRDA IGs, specifically the 2019 CMS 
QRDA I IG for Hospital Quality Reporting \46\ (Sec.  170.205(h)(3)) and 
the 2019 CMS QRDA III IG for Eligible Clinicians and Eligible 
Professionals (Sec.  170.205(k)(3)).\47\ We noted in the Proposed Rule 
that developers would be able to update certified health IT to newer 
versions of the CMS QRDA IGs through the real world testing Maintenance 
of Certification provision for standards and implementation 
specification updates in Sec.  170.405(b). We also proposed that a 
Health IT Module would need to be certified to both standards to ensure 
flexibility for Health IT Module users. We solicited comment on whether 
to consider an approach that would permit certification to only one of 
the standards depending on the care setting for which the Health IT 
Module is designed and implemented.
---------------------------------------------------------------------------

    \46\  https://ecqi.healthit.gov/system/files/QRDA_HQR_2019_CMS_IG_final_508.pdf.
    \47\ https://ecqi.healthit.gov/system/files/2019_CMS_QRDA_III_Eligible_Clinicians_and_EP_IG-508.pdf.
---------------------------------------------------------------------------

    Comments. The majority of commenters were supportive of the 
proposal to remove the HL7 QRDA standard requirements from the 2015 
Edition CQMs--report criterion in Sec.  170.315(c)(3), and to require 
that health IT certified to the criterion support the proposed CMS QRDA 
IGs. Some commenters observed that the main use cases for the certified 
QRDA export functionality (which is specific to CMS eCQMs) are to 
support direct data submission to CMS at the conclusion of reporting 
periods, to enable use of third party data submission Health IT Modules 
to meet CMS reporting requirements, and to support data extraction for 
registry reporting for participation in CMS programs such as MIPS. 
Commenters noted that while in some cases the extraction of data using 
a QRDA may also support other use cases--for example for a registry--
because of the specificity of the criteria to the CMS eCQMs, such a 
transaction using the certified functionality is primarily for CMS 
reporting. Commenters noted the use of the CMS QRDA IG does not impede 
use of the data for other purposes. Finally, commenters noted that ONC 
should continue to provide health IT developers the flexibility to 
offer a non-certified QRDA functionality that could support eCQMs 
beyond those included for CMS programs. One commenter observed that 
while some health IT systems also provide tools for internal quality 
performance monitoring, those tools often do not rely on the generation 
of QRDA exports.
    Some commenters reported that the technical support of multiple 
versions of QRDA standards is unnecessary. Other commenters recommended 
maintaining only the HL7 standard or offering certification to the HL7 
standard as an optional alternative to the CMS QRDA IG. One commenter 
who recommended maintaining both the HL7 standard and the CMS QRDA IGs 
suggested that ONC cite the CMS version(s) of the QRDA IG as a 
technical resource in the same manner the C-CDA companion guide is 
cited for the transition of care criteria and only require certifying 
to the HL7 version. These commenters agreed that developers should not 
have to certify to both HL7 QRDA and CMS QRDA IGs, but suggested if a 
developer passed certification for the CMS QRDA IGs, they should be 
deemed to have achieved certification to the HL7 QRDA standard as well. 
Commenters noted that the CMS QRDA apply specifications to the HL7 QRDA 
to support CMS eCQM reporting requirements.
    Other commenters specifically stated that the HL7 QRDA should 
remain as an optional certification criterion, since other 
organizations (e.g., certain hospital accreditation organizations such 
as The Joint Commission) use the

[[Page 25688]]

HL7 QRDA, and there is need to assure the same style for submission 
across programs. They recommended that the HL7 QRDA IG persist as a 
continuing option in the Program to enhance alignment with other 
standards and C-CDA, and to encourage a base standard alignment across 
implementers such as CMS and The Joint Commission. They stated that 
citing only to the CMS QRDA IG may lead to misalignment with the base 
standards and reduce incentives to update the base standard.
    Some commenters expressed concern over the proposed removal of HL7 
QRDA standards from the original 2015 Edition CQMs, stating it may 
undermine private sector efforts to self-regulate and stated that the 
removal of the HL7 QRDA may not achieve the envisioned burden reduction 
through the mere elimination of developers' need to certify and 
maintain multiple standards. While some commenters suggested that 
removing HL7 QRDA from the certification criteria could simplify the 
reporting process by recognizing the widespread use of CMS' QRDA IGs, 
they noted that the HL7 QRDA is currently the standard for most EHR 
systems and questioned how ONC proposed to implement this change given 
the prominence of HL7 standards in EHR systems. Several commenters 
noted that the disconnect between what the certification testing 
required, and how the standard was really being used in the industry 
(primarily but not exclusively to meet the CMS QRDA IG) created 
unnecessary certification testing burden, and asserted that the 
adoption of the CMS proprietary IG was more appropriate than to 
maintain HL7 QRDA.
    Response. We thank commenters for their support for the proposal 
and comments regarding the versions of standards. We understand the 
concerns expressed in opposition to this proposal, and we appreciate 
specifically the identification of potential risk for the elimination 
of the HL7 standard as applicable for other use cases. As noted 
previously, since the 2015 Edition final rule was published (October 
16, 2015), we have gained received feedback from the industry that 
health IT certified to the ``CQMs--report'' criterion (Sec.  
170.315(c)(3)) are only or primarily being used to submit eCQMs to CMS 
for participation in CMS' programs. In addition, we note that while the 
HL7 QRDA may be used for other purposes, the ``CQMs--report'' criterion 
(Sec.  170.315(c)(3)) is specific to the CMS eCQMs specified for 
participation in CMS reporting programs and no other eCQMs are tested 
under that criterion. This specificity applies not only to the current 
2015 Edition ``CQMs--report'' criterion, but also to the other 2015 
Edition CQM criteria and the prior 2014 Edition CQM criteria. This 
specificity is intended to provide assurances through testing and 
certification of the accuracy and standardization of CMS program 
measures across platforms, while recognizing that it would not be 
possible to specifically test to the entire universe of potential eCQMs 
in use by health care providers. Because of this dependency, testing 
and certification of both the HL7 QRDA for CQMs-report and the CMS QRDA 
IG is redundant to support eCQM data reporting.
    This has a dual impact on our considerations to finalize our 
proposal to require only the CMS QRDA IG. First, for use cases that are 
not related to CMS eCQM reporting, the certified functionality would 
not specifically support third party non-CMS eCQM reporting 
requirements, and so the modification to the functionality does not 
change the inability to use the certified version of the functionality 
for such purposes. Second, for those use cases involving registries or 
other third parties that are implementing or supporting CMS eCQM 
reporting, use of the CMS QRDA IG could additionally support such 
purposes. In addition, we are not restricting health IT developers from 
creating and providing to customers a non-certified functionality that 
supports the HL7 QRDA for the extraction of data for eCQMs that are not 
CMS eCQMs. We note that this is not a change from the prior policy 
allowing such flexibility. The prior certification for the QRDA IG 
included testing of CMS eCQMs only and it neither supported nor 
restricted any development of a QRDA functionality for non-CMS eCQMs.
    We also agree that this approach will support closer alignment 
between the testing to the CMS QRDA IG specifications for a certified 
health IT module and the technical requirements for CMS program 
reporting. As part of the development of the CMS QRDA IGs, CMS strives 
to use the annual update process to resolve issues with CQMs based on 
updates to clinical guidelines and to advance the requirements as the 
standard for reporting eCQM data matures. In this way, aligning the 
criterion to the CMS program requirements that it specifically supports 
allows for alignment between these efforts as well as allowing for 
continued updates through the standards version advancement process. We 
also believe our finalized proposal will not impede private sector 
initiatives as the CMS IGs support the continued efforts by public/
private collaboration through standards developing organizations (SDOs) 
to refine standards.
    Therefore, as a means of reducing burden, we have finalized our 
proposal to remove the HL7 QRDA standard requirements from the 2015 
Edition CQMs--report criterion in Sec.  170.315(c)(3). We maintain our 
position that this would directly reduce burden on health IT developers 
and indirectly for health care providers as there would no longer be a 
requirement to develop and support two forms of the QRDA standard. We 
note that this does not preclude developers from continuing to support 
the underlying standard, especially where such standard may support 
reporting or health information exchange for other quality or public 
health purposes. Instead, we are simply not requiring testing and 
certification of any such standards, thereby eliminating testing and 
certification burden from a criterion that is at this time scoped to 
the purpose of reporting for CMS quality programs.
    Comments. A few commenters did not support the proposal but instead 
recommended that CMS adopt the HL7 QRDA standard and do away with its 
own. However, several commenters offered suggestions to CMS on the 
development of the CMS QRDA IG and the alignment to the HL7 QRDA 
standard. A number of commenters noted the National Technology Transfer 
and Advancement Act of 1995 principle that Federal agencies are 
generally required to use technical standards that are developed by 
voluntary consensus standards bodies rather than a proprietary standard 
specific to an HHS program. Commenters also stated if CMS wanted to 
retain certain aspects of its standard, it should work with HL7 to get 
these vetted, balloted and approved for inclusion within the HL7 
standard. Commenters also recommended working with SDOs or other 
organizations to sufficiently support CMS QRDA IGs. Some commenters 
suggested that consolidation of QRDA standards would be more likely 
result in reducing provider burdens than what ONC proposed.
    Response. We thank the commenters for their recommendations to 
improve the CMS QRDA IGs, or for CMS to work toward including the 
aspects of CMS QRDA IGs that they require for their program operations 
in SDO-balloted and approved consensus standards. Specific suggestions 
for CMS IG development are outside the scope of this rule. ONC had 
previously included the HL7 QRDA standards for certification in the 
2015 Edition in order to potentially support a broader range of use 
cases than

[[Page 25689]]

reporting for CMS programs. However, the specificity of the criterion 
to the CMS eCQMs limits the utility of the certified functionality 
beyond use with CMS eCQMs and as stated in the Proposed Rule, since the 
2015 Edition final rule, ONC and CMS received significant stakeholder 
feedback that health IT modules certified to the ``CQMs--report'' 
criteria at 170.314(c)(3) in the 2014 Edition and 170.315(c)(3) for the 
2015 Edition are used only or primarily for reporting to CMS programs. 
While we reiterate that these comments are outside the scope of this 
rule, we will continue to take this and other feedback into 
consideration and will continue to work with CMS, standards developing 
organizations, and health IT industry partners to explore the concerns 
raised in relation to reducing burden and promoting interoperable 
standards for quality reporting.
    Comments. Commenters provided mixed feedback on whether the updated 
2015 Edition ``CQMs--report'' criterion should require adherence to 
both CMS QRDA IGs, specifically the 2019 CMS QRDA I IG for Hospital 
Quality Reporting \48\ and the 2019 CMS QRDA III IG for Eligible 
Clinicians and Eligible Professionals.\49\ The majority of commenters 
recommended that to reduce burden, ONC should consider a certification 
approach that permits developers to seek certifications based on the 
care setting(s) their health IT modules are intended serve. For 
example, commenters suggested that ONC should only require 
certification to the 2019 QRDA I IG for Hospital Quality Reporting if a 
Health IT Module is designed exclusively for the reporting of hospital 
measures, and only require certification to the 2019 QRDA III IG for 
Eligible Clinicians and Eligible Professionals when a Health IT Module 
is designed exclusively for the reporting of ambulatory measures. In 
instances in which both populations are served, the developer would 
then seek certification to both standards. Commenters suggested this 
approach would avoid the unnecessary burden of certifying to a standard 
that the Health IT Module was not intended to serve. Other commenters 
stated that the certification requirements should ensure that certified 
Health IT Modules can support quality measure reporting by all 
potential users, especially given the potential expansion of eligible 
participants in certain CMS programs (e.g., should a program expand 
from hospital-based only to include ambulatory measures). These 
commenters recommended the adoption of a requirement for certified 
Health IT Modules to calculate and export both CMS QRDA I patient-level 
reports for Hospital Quality Reporting and CMS QRDA III aggregate 
summary reports for Eligible Clinicians and Eligible Professionals. 
These commenters noted that if a certified Health IT Module can only 
send an aggregate report without a patient level report, then this 
would greatly diminish the ability to verify the underlying 
calculations. However, commenters recommended that ONC clarify that the 
transition to CMS QRDA I IG-based reports (patient-level, QRDA I IG for 
Hospital Quality Reporting) does not necessarily mean that a hospital 
quality measure must be certified by any system (i.e., an ambulatory 
Health IT Module can certify to only CMS QRDA III IG requirements). 
Commenters also sought clarity that the transition to QRDA III reports 
(aggregate-level, IG for Eligible Clinicians and Eligible 
Professionals) does not necessarily mean that an ambulatory quality 
measure must be certified by any system (i.e., a hospital system can 
certify to only hospital measures). Finally, one commenter noted that 
certifying ambulatory quality measures for the QRDA I to a hospital IG 
is not effective and will interfere with the use case of using QRDA I 
to combine data between multiple ambulatory systems such as for group 
reporting.
---------------------------------------------------------------------------

    \48\  https://ecqi.healthit.gov/system/files/QRDA_HQR_2019_CMS_IG_final_508.pdf.
    \49\ https://ecqi.healthit.gov/system/files/2019_CMS_QRDA_III_Eligible_Clinicians_and_EP_IG-508.pdf.
---------------------------------------------------------------------------

    Response. We thank commenters for their comments regarding whether 
a Health IT Module should be certified to both CMS QRDA IG standards or 
whether to consider an approach that permits certification to only one 
of the standards depending on the care setting for which the Health IT 
Module is designed and implemented. We agree with commenters that our 
certification approach should prevent unintended burden by tailoring 
the requirements to the type of measures being tested. This would mean 
that for the updated certification criterion ``CQMs--report'' in Sec.  
170.315(c)(3) a Health IT Module testing only ambulatory measures would 
test only with the CMS QRDA III IG for ambulatory measures and a Health 
IT Module testing only inpatient measures would test only with the QRDA 
I CMS IG for inpatient measures. A Health IT Module supporting both 
ambulatory and inpatient measures would be required to test to both the 
CMS QRDA I IG and the CMS QRDA III IG. We clarify that testing for the 
2015 Edition ``CQM--capture and export'' criterion in Sec.  
170.315(c)(1) criteria includes demonstrating the capability to export 
a QRDA I report specific to the eCQM being tested--which would support 
use case noted by the commenter to combine data across multiple 
ambulatory systems. We have not proposed and have not finalized a 
change to the 2015 Edition ``CQM--capture and export'' criterion in 
Sec.  170.315(c)(1). We further note that health IT developers may 
leverage QRDA file formats for a wide range of use cases and that our 
inclusion of the CMS QRDA I and QRDA III IGs does not prohibit the use 
of the QRDA standard for any other purpose. As noted above, we have 
finalized the adoption of the CMS QRDA IGs for the ``CQMs--report'' 
criterion in Sec.  170.315(c)(3) for which the Health IT Module is 
presented for certification.
    Comments. The majority of commenters supported the proposal to 
adopt the latest CMS QRDA IGs at the time of final rule publication, as 
CMS updates their QRDA IGs annually to support the latest eCQM 
specifications and only accepts eCQM reporting to the latest version. 
However, a few commenters recommended that ONC monitor this part of the 
certification process for unintended consequences since CMS' IGs are 
updated on a yearly basis. Some commenters noted that given the lack of 
alignment with timing, eCQM measures and standards will continue to 
lack testing. Other commenters recommended the IGs be updated in 
alignment with updates to the certification standards. A few commenters 
requested clarification of the effective dates and asked ONC to 
evaluate and propose a timeline for the implementation of an alignment 
between the programs. In addition, commenters asked for clarification 
on whether ONC will propose penalties for providers who may be unable 
to meet the timeline if it is insufficient.
    Response. We thank commenters for their input and have adopted the 
latest CMS QRDA IG versions available at the time of publication of 
this final rule. For details on the latest CMS QRDA IGs, we refer 
readers to the CMS QRDA I Implementation Guide for Hospital Quality 
Reporting and CMS QRDA III Implementation Guide for Eligible Clinicians 
and Eligible Professionals available on the eCQI Resource Center 
website.\50\ We note that CMS updates

[[Page 25690]]

the CMS eCQMs on an annual basis as well as the CMS QRDA IGs for 
reporting to CMS programs. As in prior years going back to the 2014 
Edition, HHS will continue to update the Cypress testing tool to 
support health IT developer testing to the most recent annual update. 
We note that CMS has previously required that EHR technology used for 
eCQM reporting be certified to all eCQMs but does not need to be 
recertified each time it is updated to a more recent version of the 
eCQM electronic specifications, unless the EHR technology is supporting 
new eCQMs or functionality (such as the ``CQM--filter'' criterion in 
Sec.  170.315(c)(4)) (84 FR 42505). This approach allows for continued 
updates to and testing of eCQMs while minimizing the burden on 
developers and providers to support those updates in time for each 
annual performance period. Finally, we note that ONC has no authority 
to set requirements, incentives, or penalties for health care providers 
related to the use of health IT, and we direct readers to CMS for 
information on health IT requirements in CMS programs.
---------------------------------------------------------------------------

    \50\ The Electronic Clinical Quality Improvement (eCQI) Resource 
Center. CMS QRDA I Implementation Guide for Hospital Quality 
Reporting and CMS QRDA III Implementation Guide for Eligible 
Clinicians and Eligible Professionals. Available at: https://ecqi.healthit.gov/qrda.
---------------------------------------------------------------------------

    Comments. The majority of commenters agreed with ONC's assessment 
in the Proposed Rule that quality reporting is not yet ready to 
transition to FHIR and that more testing and validation of FHIR is 
needed before requiring a new API-based reporting functionality as a 
part of the Program. Some commenters supported the adoption of FHIR 
Release 4-enabled APIs as a replacement for QRDA-based reports, but 
stated that published documentation aligning HL7 C-CDA, QRDA, and/or 
FHIR standards to CMS' ``Quality Data Model,\51\'' which is an 
information model that defines relationships between patients and 
clinical concepts in a standardized format to enable electronic quality 
performance measurement and that would allow for more consistent eCQM 
reporting and improved interoperability in clinical quality feedback 
between health systems and data registries. Other commenters stated 
that FHIR standards will likely strengthen standardized data element 
availability and flexibility to improve the types of eCQMs that may be 
developed, and suggested that CMS continue to work with the National 
Quality Forum, measure stewards, and measure developers to advance both 
existing evidence-based measures (e.g., either administrative or hybrid 
measures) and evolving outcome measures that utilize population-based 
electronic clinical data.
---------------------------------------------------------------------------

    \51\ https://ecqi.healthit.gov/qdm.
---------------------------------------------------------------------------

    Response. We thank commenters for their support. We believe there 
are potential benefits to be gained by exploring both near-term, 
program specific implementations of APIs to support current quality 
reporting submission mechanisms such as for CMS eCQM reporting as well 
as the long-term potential to reimagine quality measurement by 
leveraging API technologies. We believe that these technology 
approaches could help providers and payers, including CMS, move from 
the current approach, in which providers are required to calculate and 
submit results on specific quality measures, to one in which payers, 
including CMS, could obtain clinical data for quality measurement 
directly through an API. This could potentially include the ability to 
obtain clinical data for a defined group or sample set of patients to 
assess quality across patient populations, as well as to compare 
clinical data for patients over time to assess quality impacts through 
longitudinal measurement. We believe emerging innovative standards are 
now available to support such models, specifically the ability to 
respond with clinical data for a defined group or sample set of 
patients using the bulk data capabilities in FHIR Release 4. We note 
that readiness for such an approach, both for recipients of quality 
data and for health IT developers supporting quality improvement 
solutions, is not yet mature for adoption of such a criterion in the 
Program. However, we are committed to continuing to work with HHS 
partners, health care providers, health IT developers and SDOs to 
explore the potential for such solutions in the future.
    Comments. Several commenters recommended additional changes not 
considered in the Proposed Rule. For example, one commenter recommended 
ONC require that to be certified in Sec.  170.315(c)(1) ``CQMs--record 
and export,'' Sec.  170.315(c)(2), ``CQMs--import and calculate,'' and 
Sec.  170.315(c)(3) ``CQMs--report,'' a Health IT Module be certified 
in a minimum of 9 eCQMs instead of one eCQM and that the Sec.  
170.315(c)(1) criterion should require the ability to export all 
patients for a given eCQM. Currently, the ability to export a QRDA I 
file can be limited to one patient at a time. Commenters noted that 
this limitation defeats the purpose of data interoperability and does 
not advance the goals of ONC to increase access to data and the 
interoperability of Health IT Modules. And another commenter 
recommended that, in addition to the adoption of the CMS IGs under the 
Sec.  170.315(c)(3) criterion, that the CMS IGs replace the 
corresponding HL7 QRDA IGs as ONC's Program standard under the Sec.  
170.315(c)(1) criterion (which currently references QRDA I exclusively) 
and Sec.  170.315(c)(2) criterion (which currently references only QRDA 
I as standard, but also involves use of QRDA III for purposes of 
verifying appropriate calculation of measures from imported QRDAs).
    Response. We thank commenters for input and clarifications. While 
we appreciate comments suggesting changes to Sec.  170.315(c)(1) 
``CQMs--record and export,'' and Sec.  170.315(c)(2) ``CQMs--import and 
calculate,'' the recommended changes are outside the scope of our 
proposal. Therefore, while we may consider these recommendations for 
future Program rulemaking, we have not adopted the suggested changes to 
Sec.  170.315(c)(1) ``CQMs--record and export,'' or Sec.  170.315(c)(2) 
``CQMs--import and calculate in this final rule.
    As noted previously, we have finalized the update to the ``CQMs--
report'' criterion in Sec.  170.315(c)(3) to require that health IT 
developers use the CMS QRDA IG appropriate to the measures being 
submitted for testing and certification to read as follows: ``Clinical 
quality measures--report. Enable a user to electronically create a data 
file for transmission of clinical quality measurement data in 
accordance with the applicable implementation specifications specified 
by the CMS implementation guides for Quality Reporting Document 
Architecture (QRDA), category I, for inpatient measures in Sec.  
170.205(h)(3) and CMS QRDA, category III, for ambulatory measures in 
Sec.  170.205(k)(3).''
6. Electronic Health Information (EHI) Export Criterion
    We proposed to adopt a new 2015 Edition certification criterion 
referred to as ``EHI Export'' in Sec.  170.315(b)(10). The criterion's 
conformance requirements were intended to support two contexts in which 
we believed that all EHI produced and electronically managed by a 
developer's technology should be made readily available for export as a 
capability of certified health IT. First, we proposed in Sec.  
170.315(b)(10)(i) at 84 FR 7447 that health IT certified to this 
criterion would support single patient EHI export upon a valid request 
by a patient or a user on the patient's behalf. Second, we proposed in 
Sec.  170.315(b)(10)(ii) at 84 FR 7447 that the proposed criterion 
would support the export of all EHI when a health care

[[Page 25691]]

provider chooses to transition or migrate information to another health 
IT system. Third, we proposed in Sec.  170.315(b)(10)(iii) that the 
export format(s) used to support the exports must be made available via 
a publicly accessible hyperlink, including keeping the hyperlink up-to-
date with the current export format.
    At the time of the Proposed Rule, we indicated our belief that this 
proposed certification criterion provided a useful first step toward 
enabling patients to have electronic access to their EHI and equipping 
health care providers with better tools to transition patient EHI to 
another health IT system. We noted that this criterion would create a 
baseline capability for exporting EHI. We requested comments regarding 
the proposed single patient EHI export and the proposed database export 
functionalities, as well as the proposed scope of data export and other 
criterion elements throughout the Proposed Rule section at 84 FR 7447 
through 7449.
    Comments. Commenters generally supported the intent of the proposed 
``EHI export'' criterion to advance the access, exchange, and use of 
EHI. Commenters in favor of the criterion and its proposed conformance 
requirements stated that it would foster innovative export capabilities 
and inform areas where additional standards development could be 
needed. We also received a variety of comments asking for adjustments 
to proposed requirements. A majority of commenters requested revisions 
to the criterion, including calling for a defined set of data elements 
for export and specific data transport standards. Many commenters 
offered recommended standards or requested that we provide specific 
standards to reduce variation. These commenters indicated that no 
defined standard could lead to broad interpretation and potential 
inadequacies of the data export. Some commenters expressed a medical 
record keeping concern that the proposed standards-agnostic approach 
for the export functionality could be problematic, stating that the 
export could create a dissonance if the EHI renders health record 
content in a form or format that is different from what a provider 
produces or utilizes as output. Other commenters opposed the adoption 
of this proposed criterion. These commenters expressed concern that 
later implementation of standards, such as APIs, would make developers 
invest time and funding into the proposed requirements only for the 
work to be discarded in the future.
    Response. We thank commenters for their feedback on the proposed 
``EHI export'' criterion at 84 FR 7446 of the Proposed Rule (Sec.  
170.315(b)(10)). We have considered commenters' concerns, support, and 
recommendations and adopted a revised version of this certification 
criterion. This final certification criterion is designed to align with 
section 4006(a) of the Cures Act, which requires the Secretary, in 
consultation with the National Coordinator, to promote policies that 
ensure that a patient's EHI is accessible to that patient and the 
patient's designees, in a manner that facilitates communication with 
the patient's health care providers and other individuals (84 FR 7447). 
In addition, this criterion complements other provisions that support 
patients' access to their EHI and health care providers use of EHI, 
such as the secure, standard-based API certification criterion 
(proposed in 84 FR 7427 and finalized in Sec.  170.315(g)(10)), and 
also supports longitudinal data record development. Therefore, we have 
finalized the criterion with revisions. Notably, in response to 
comments on this criterion and the proposed information blocking 
policies, we have adopted a focused definition of EHI in Sec.  170.102 
and Sec.  171.102. For context purposes, the EHI definition is focused 
on ``electronic protected health information as defined in 45 CFR 
160.103 to the extent that it would be included in a designated record 
set as defined in 45 CFR 164.501'' with additional caveats not repeated 
here for briefness. Put simply, the EHI definition represents the same 
ePHI that a patient would have the right to request a copy of pursuant 
to the HIPAA Privacy Rule. This is a regulatory concept with which the 
industry has nearly 20 years of familiarity. Health IT developers' 
customer base includes health care providers who are HIPAA covered 
entities, and in many cases developers serve as HIPAA business 
associates to their covered-entity customers. Thus, health IT 
developers should be accustomed to identifying ePHI so that their 
products support appropriately securing it, the fulfillment of patient 
access requests, and the identification and reporting on breaches. They 
should, therefore, be well prepared to identify what EHI their 
product(s) would need to export in order to support a patient's HIPAA 
right of access. The finalized criterion requires a certified Health IT 
Module to include export capabilities for a single patient (Sec.  
170.315(b)(10)(i)) and patient population (Sec.  170.315(b)(10)(ii)) 
related to EHI. More specifically, the export(s) will need to include 
the EHI that can be stored at the time of certification by the product, 
of which the Health IT Module is a part. We emphasize that such 
``stored'' data applies to all EHI and is agnostic as to whether the 
EHI is stored in or by the certified Health IT Module or in or by any 
of the other ``non-certified'' capabilities of the health IT product of 
which the certified Health IT Module is a part. The scope of EHI 
applies across the product as a whole as a means to further promote the 
access, exchange, and use of EHI for the use cases required to be 
supported by this certification criterion. The finalized scope of data 
included in the criterion export is discussed in greater detail under 
the ``Scope of Data Export'' (IV.B.6.c) section below.
    While the data that must be exported has been more specifically 
scoped, the certification criterion does not require a specific 
standard format be used for the purposes of representing the exported 
EHI. We also modified the certification criterion's documentation 
requirements in Sec.  170.315(b)(10)(iii) to be more concise. As 
finalized, the documentation required for the export format(s) used to 
support (b)(10)(i) and (ii) functionality must be kept up-to-date and 
made available via a publicly accessible hyperlink. Additional 
information is included under ``Export Format'' below.
    We appreciate the comments received regarding the specific data 
sets and data transmission standards for this certification criterion. 
We reiterate that the finalized certification criterion is specific to 
EHI, as defined, that can be stored at the time of certification by the 
product, of which the Health IT Module is part, and is not limited to a 
predefined data set or to specific data transmission standards. 
Developers are required to ensure the health IT products they present 
for certification are capable of exporting all of the EHI that can be 
stored at the time of certification by the product. We acknowledge that 
the amount of EHI exported and format in which such EHI is represented 
will differ by developer and products of which certified Health IT 
Modules are a part. Each product presented for certification, of which 
the Health IT Module is a part, will likely vary in the amount of EHI 
it can store. As a result, the amount of EHI that will need to be able 
to be exported in order to demonstrate conformance with this 
certification criterion will vary widely because of the diversity of 
products presented for certification. For example, small software 
components only capable of storing a certain scope of EHI (and only 
certified to a few certification criteria) will only need to be able to

[[Page 25692]]

export that stored EHI in order to meet this certification criterion. 
In contrast, a more comprehensive product with an EHI storage scope 
well beyond all of the adopted certification criteria would by its 
nature need to demonstrate it could export a lot more EHI. But even in 
this latter case, it is important to note that while that scope of EHI 
may be comprehensive for that product, it may still not be all of the 
health information for which a health care provider is the steward and 
that meets the EHI definition within the health IT products deployed 
within their organization. In other words, a health IT user may have 
other health IT systems with no connection to the Certification Program 
that store EHI and such EHI would still be in scope from an information 
blocking perspective. We note all of these distinctions to make clear 
for and to dissuade readers from jumping to an improper conclusion that 
the EHI export criterion in the Certification Program is a substitute 
for or equivalent to the EHI definition for the purposes of information 
blocking. We direct readers to the information blocking section (VIII) 
for additional information. Unless a health care provider (which is an 
``actor'' regulated by the information blocking provision) only used a 
single health IT product to store EHI that was also certified to this 
certification criterion, the EHI definition will always be larger. 
Regardless of the amount of EHI each product has within its scope to 
export, the purpose of this certification criterion is to make the EHI 
already available in such health IT products more easily available for 
access, exchange, and use by patients and their providers, which is a 
fundamental principle established by the Cures Act.
    As technology continues to advance, and as stated in the Proposed 
Rule at 84 FR 7447, this criterion may not be needed in the future. 
However, the comments suggesting we not adopt this certification 
criterion at all because it will be outmoded at some point in the 
future did not appear to acknowledge that all technology is eventually 
replaced for a variety of reasons. We too look forward to a day where 
standards-based APIs are the predominant method for enabling electronic 
health information to be accessed, exchanged, and used. We strongly 
encourage industry partners to engage in their own consortiums, with 
ONC and other Federal agencies, and other stakeholders in the health IT 
ecosystem to advance standards development, prototypes, and pilot 
testing in order to ultimately build a body of evidence that could 
accelerate the adoption and implementation timeline of technology that 
could either add more structure to or remove the need for this 
certification criterion in the future. However, we do not accept the 
promise of this future state as a reason to simply wait, nor do we 
believe that the potential of this future justifies delaying the 
incremental progress the industry can make. In this case, had we 
followed such commenters direction, we would be withholding from 
patients and health care providers the certainty that there would be 
technical capabilities within a defined time that could be used to 
enable the access, exchange, and use of EHI. We note that suggestions 
by commenters to structure the certification criterion to only move 
information within specific data sets or via specific standards-based 
export functionality would delay the ability of patients and users of 
health IT to access, exchange, and use the information they need and 
would run counter to the underlying principles supporting this 
certification criterion--that the electronic health information should 
be accessible for access, exchange, and use. For this reason, we have 
not included specific data set or export requirements in this 
certification criterion as some commenters suggested.
    In consideration of comments, the finalized ``EHI export'' 
criterion in Sec.  170.315(b)(10) is not included in the 2015 Edition 
Base EHR definition, which is a modification from what we proposed. We 
revised the policy in recognition of comments received, including 
comments regarding the structure and scope of the criterion as proposed 
and the development burden of the criterion. As finalized here, we 
believe that including this certification criterion in the Conditions 
and Maintenance of Certification is the best place to include the 
requirement associated with the criterion. Thus, we have finalized the 
Sec.  170.315(b)(10) certification criterion as a general certification 
requirement for the ONC Health IT Certification Program, and have not 
included it in the 2015 Edition Base EHR Definition.
    In general, we also note that those who use Health IT Module(s) 
certified to the ``EHI export'' criterion remain responsible for 
safeguarding the security and privacy of individuals' EHI consistent 
with applicable laws and regulations related to health information 
privacy and security, including the HITECH Act, HIPAA Privacy and 
Security Rules, 42 CFR part 2, and State laws. The existence of a 
technical capability to make EHI more accessible and useable by Health 
IT Module users does not alter or change any of their data protection 
responsibilities under applicable laws and regulations.
    Comments. Comments received included concerns with the development 
and use of the certification criterion. Some commenters expressed 
support for the criterion's overall flexibility but cautioned ONC to be 
realistic regarding the goals and expectations for the certification 
criterion. These commenters also expressed concern that the proposed 
certification criterion would result in development for an ambiguous 
scope of data export and would divert from work needed to achieve other 
interoperability goals. Other commenters stated concerns that 
development costs could potentially be passed onto health IT users, 
such as health care providers. These commenters also anticipated use 
and implementation challenges for users that work with multiple 
systems.
    Response. We thank commenters for sharing their concerns. In 
regards to the use of the capabilities required by this certification 
criterion, we interpreted from comments some confusion related to 
potential ``users'' of the health IT. As previously defined under the 
Program, ``user'' is a health care professional or their office staff; 
or a software program or service that would interact directly with the 
certified health IT (80 FR 62611, 77 FR 54168).
    We also appreciate the comments and concerns regarding the 
potential development burden that could result to meet the requirements 
of the proposed criterion. In consideration of those expressed 
concerns, we have narrowed the scope of data that must be exported. 
This more focused scope should measurably reduce the stated ambiguity 
by commenters and development burden for health IT developers in 
contrast to what was proposed (84 FR 7448). We appreciate the concerns 
expressed for the potential user(s) of Health IT Modules, but note that 
the certification criterion is designed to advance the electronic 
movement of data out of a product while factoring in the current 
variability in health IT. As always, we encourage developers to seek 
innovative and expedient capabilities that, at minimum, meet the 
requirements of the certification criterion, as well as the developing 
needs of their health IT users.
    Comments. Commenters provided alternative ideas for the criterion 
specific to USCDI. Some recommended amending the criterion to require 
the specific structure and applicable standards for USCDI elements, or 
starting this criterion with a minimum of USCDI data elements. Several 
commenters recommended expanding

[[Page 25693]]

the existing 2015 Edition ``data export'' criterion to include USCDI in 
lieu of the proposed ``EHI export'' criterion.
    Response. We thank commenters for sharing these ideas. We have 
finalized the ``EHI export'' criterion as described above. Our intent 
under this finalized criterion is to advance export functionality for 
single patient and patient population EHI exports, while leaving 
flexibility in regard to format and without assigning specific data 
sets due to the different scopes of data that health IT may include. 
Toward those ends, limiting the scope of this certification criterion 
to solely the data represented by the USCDI would make it no different 
than other USCDI bounded certification criteria already adopted and 
would not advance the policy interests we have expressed. In regards to 
comments on the existing 2015 Edition ``data export'' criterion (Sec.  
170.315(b)(6)), we refer readers to our discussion of the criterion 
below.
    Comments. Some comments expressed confusion and asked for guidance 
on how this certification criterion would apply to health IT that is no 
longer certified. Commenters also asked for guidance on how this 
criterion applies to other systems that interact with Health IT Modules 
certified to this criterion based on the proposed scope of data for 
export.
    Response. We thank commenters for requesting clarification. We 
first clarify that the export functionality under this certification 
criterion applies to Health IT Modules presented for certification 
under the Program. More specifically, if a health IT developer presents 
for certification a health IT product of which a Health IT Module is a 
part and the product electronically stores EHI, certification to Sec.  
170.315(b)(10) is required. As noted in our response above, this would 
include the EHI that can be stored at the time of certification by the 
product, of which the Health IT Module is a part. This includes all EHI 
stored by the product's certified and ``non-certified'' capabilities. 
For example, if a health IT product includes a component(s) that is 
presented for certification and that component stores EHI, then that 
EHI must be made available for export, in accordance with Sec.  
170.315(b)(10). Importantly, the scope of data required to be exported 
in accordance with Sec.  170.315(b)(10) includes only to the EHI that 
can be stored at the time of certification by the product. We emphasize 
that such ``stored'' data applies to all EHI and is agnostic as to 
whether the EHI is stored in or by the certified Health IT Module or in 
or by any of the other ``non-certified'' capabilities of the health IT 
product of which the certified Health IT Module is a part. The scope of 
EHI applies across the product as a whole as a means to further promote 
the access, exchange, and use of EHI for the use cases required to be 
supported by this certification criterion.
a. Single Patient Export To Support Patient Access
    As part of this criterion, we proposed a functionality for single 
patient EHI export at 84 FR 7447 which would enable a user of certified 
health IT to timely create an export file(s), with the proposed scope 
of data export of all of the EHI the health IT product produces and 
electronically manages on a single patient. The functionality would 
also require a user to be able to execute this capability at any time 
the user chooses and without subsequent developer assistance to 
operate. In addition, we proposed that health IT certified to this 
criterion would be required to enable the ability to limit the users 
who could create such export file(s) in at least one of two ways: To a 
specific set of identified users, and (2) as a system administrative 
function. We also proposed that the export file(s) created must be 
electronic and in a computable format and that the export file(s) 
format, including its structure and syntax, must be included with the 
exported file(s).
    Comments. We received many comments in support of the proposal for 
single patient export to support patient access under the certification 
criterion. The majority of these commenters provided recommended 
revisions, including suggested transmission formats and data export 
content standards. Some commenters recommended the addition of this 
certification criterion to the list of criteria subject to real world 
testing.
    Response. We thank commenters for their feedback. We have finalized 
the single patient export functionality in Sec.  170.315(b)(10)(i) with 
some modifications. We finalized a focused data export scope, which 
applies to the data expected to be available for export under the 
single patient export capability. We defined the scope of data that 
needs to be exported to EHI that can be stored at the time of 
certification by the product, of which the Health IT Module is a part. 
Thus, we have modified the title of Sec.  170.315(b)(10)(i) to ``single 
patient electronic health information export'' to reflect the scope of 
this data export. We finalized that the capability for a user to 
execute a single patient export must be able to be limited at least one 
of two ways: To a specific set of identified users, and as a system 
administrative function. While we finalized as proposed in Sec.  
170.315(b)(10)(i)(D) that the export files must be electronic and in a 
computable format, we modified in Sec.  170.315(b)(10)(ii)(E) that the 
publicly accessible hyperlink of the export's format must be included 
with the exported file(s). This modification clarifies that the user is 
able to access the format, and that the developer will keep their 
hyperlink up-to-date.
    We appreciate commenter's recommendations for specific data 
transmission formats and data content standards, and considered the 
range of recommendations when developing the finalized scope of data 
export required for this criterion. We believe the definition of EHI as 
focused in Sec.  171.102, as well as the modifications to the scope of 
data export, addresses the data ambiguity concerns received by 
commenters. We direct readers to our detailed discussion of the scope 
of data export below. As finalized, the certification criterion's 
export, for both single and patient population EHI Export, remain 
standards-agnostic. We believe that the finalized certification 
criterion will serve as an initial step towards increased access, 
exchange, and use of electronically available data. We will continue 
working alongside industry stakeholders and will revisit export 
strategies as standards continue to develop and mature. We appreciate 
confirmation that commenters support inclusion of the criterion in 
Sec.  170.315(b)(10) alongside the rest of the care coordination 
criteria in Sec.  170.315(b), and have finalized that this 
certification criterion is part of the real world testing Condition of 
Certification requirement.
    Comments. Some commenters asked ONC to clarify how health IT 
developers may limit the users' ability to access and initiate the 
export function in Sec.  170.315(b)(10)(i), and to include examples of 
potential permissible and non-permissible behaviors.
    Response. We appreciate the comments received. We again clarify 
that ``user'' is a health care professional or their office staff; or a 
software program or service that would interact directly with the 
certified health IT (80 FR 62611, 77 FR 54168). In regards to questions 
on permissible behaviors for developers, the ability to limit the 
health IT users' access to the single patient EHI export functionality 
in Sec.  170.315(b)(10)(i) is intended to be used by and at the 
discretion of the organization implementing the technology. We 
reiterate that similar to the 2015 edition ``data export'' criterion in 
Sec.  170.315(b)(6), this cannot be used by health IT developers as a 
way to

[[Page 25694]]

thwart or moot the overarching user-driven aspect of this capability 
(80 FR 62646). We do not wish to limit this functionality to specific 
permissible or non-permissible behaviors at this time, but reaffirm in 
Sec.  170.315(b)(10)(i)(B) that a user must be able to execute the 
single patient EHI export capability at any time the user chooses and 
without subsequent developer assistance to operate. To be clear, the 
user must be able to execute the export without the intervention of the 
developer. We also finalize, as proposed, in Sec.  170.315(b)(10)(i)(C) 
that this capability must limit the ability of user who create such 
export files(s) in at least one of two ways; (1) to a specific set of 
identified users, and (2) as a system administrative function.
    Comments. The majority of comments received asked for further 
clarity on ``timely'' regarding a health IT user's request to create an 
export file(s).
    Response. We thank commenters for the questions. We specify that 
``timely'' means near real-time, while being reasonable and prudent 
given the circumstances.
    Comments. Commenters also sought clarity on data in electronic 
health records that may be shared between patients and possibly 
included in the export. These commenters asked if under the proposed 
criterion, patients have a right to information about others that may 
be contained in their medical record.
    Response. We thank commenters for submitting these questions. In 
regards to shared patient data concerns, we note that the export 
functionality requirements apply to what a product with a Health IT 
Module certified to this criterion must be able to do regardless of 
whether the developer is operating the export for a health care 
provider or a health care provider is maintaining and operating the 
technology in their own production environment. Under the HIPAA Privacy 
Rule, when a covered health care provider, in the course of treating an 
individual, collects or otherwise obtains an individual's family 
medical history, this information may become part of the medical record 
for that individual and thus be included in the ``designated record 
set'' (defined at 45 CFR 164.501)). Thus, if the family medical history 
becomes part of the designated record set, the individual/patient may 
exercise the right of access (45 CFR 164.524) under the HIPAA Privacy 
Rule to this information in the same fashion as any other information 
in the medical record. The HIPAA Privacy Rule does not prevent 
individuals, themselves, from gathering medical information about their 
family members or from deciding to share this information with family 
members or others, including their health care providers. Thus, 
individuals are free to provide their doctors with a complete family 
medical history or communicate with their doctors about conditions that 
run in the family. To the degree that, for example, Patient A's medical 
record include that their mother had breast cancer, that information 
would be accessible to Patient A because it was provided by Patient A 
and included as part of their medical record. Under this criterion, 
patients would not have a ``right'' to other patient's records, 
consistent with existing laws. In general, with respect to patient 
access to information, we note that Health IT Module users must ensure 
that any disclosures of data conform to all applicable laws and 
regulations, including but not limited to alignment between this rule 
and the HIPAA Privacy Rule, as discussed in IV.B.6 above. We also refer 
readers to the information blocking section at VIII in this preamble, 
as well.
    Comments. Commenters requested clarity on how ONC will monitor a 
developer's compliance with exporting in a timely manner and what 
penalties ONC will impose if there is a delay in regards to a Health IT 
Module user's request. Commenters requested ONC release sub-regulatory 
guidance that describes how users may file complaints and recommended 
ONC work with the HHS Office for Civil Rights (OCR) on patient 
education.
    Response. Any noncompliance by developers with the finalized ``EHI 
export'' certification criterion (Sec.  170.315(b)(10)) or the 
associated Conditions and Maintenance of Certification requirements 
(e.g., Sec.  170.402(a)(4) and (b)(2)) would be subject to review, 
corrective action, and enforcement procedures under the Program. We 
refer readers to the enforcement (VII) and information blocking (VIII) 
sections of this preamble for further information. We do not believe 
there is a general need to work with OCR further on this particular 
issue or to issue further sub-regulatory guidance. The functionality of 
the ``EHI export'' criterion in Sec.  170.315(b)(10) provides a user 
(e.g., a health care provider) with the ability to export a file for a 
single patient and multiple patients. If a user or other stakeholder 
has concerns about ongoing compliance of health IT certified to this 
criterion, with the required functionality of the criterion, or the 
associated Conditions and Maintenance of Certification requirements, 
they may file a complaint with the health IT developer, an ONC-ACB, or 
ONC.
    Comments. Some commenters requested specific stakeholder exemptions 
from this requirement, such as health plans.
    Response. We thank commenters for the recommendations. We note that 
the ``EHI export'' criterion is applicable only to health IT products 
presented by developers for certification under the Program that meet 
the criterion and ``Assurances'' Condition of Certification 
requirements in Sec.  170.402. In addition, we note that the 
information subject to the export requirements is EHI that can be 
stored at the time of certification by the product, of which the Health 
IT Module is a part.
i. EHI Export for Patient-Initiated Requests
    In the Proposed Rule, we reiterated that the ``user'' of the single 
patient export functionality would typically be a provider or their 
office staff on behalf of the patient (80 FR 62611, 77 FR 54168). We 
also recognized that in service to innovative and patient-centric 
approaches, a health IT developer could develop a method that allows a 
patient to execute the request for data export without needing a 
provider to do so on their behalf. Under this scenario, we sought 
comments on whether the single patient export functionality should be 
made more prescriptive and require that the developers design the 
health IT to allow only the patient and their authorized representative 
to be the requestor of their EHI (84 FR 7447).
    Comments. In the scenario of patient-centric approaches created by 
developers, the majority of commenters were in favor of developers 
designing the export capability to make the patient and their 
authorized representative able to be the direct requestors of their EHI 
without needing a provider to execute this capability on their behalf. 
We also received recommended terms to further define ``authorized 
representative'' under this scenario. Several commenters advised 
against specifying or restricting the potential additional user roles 
able to initiate a single patient export. Some commenters recommended 
additional requirements for developers, including requiring developers 
to create this capability to enable the patient or their ``proxy'' to 
request their information through and receive information from the 
patient's health portal or an application. Commenters asked for the 
final rule to include clarification on what the patient and their 
authorized representative can access. We did receive some comments that 
requested clarification of this potential approach.

[[Page 25695]]

We also received comments expressing confusion with the patient and 
authorized representative requests applying across the certification 
criterion, as opposed to the proposed and previously defined ``users'' 
of health IT that will typically perform the request on behalf of a 
patient.
    Response. We thank commenters for their input and requests for 
clarification. In response to the concerns and potential confusion, we 
clarify the following. This certification criterion does not require 
``direct-to-patient'' functionality in order to demonstrate 
conformance. Providing such a capability and demonstrating conformance 
to this certification criterion with such a capability would be at the 
sole discretion of the health IT developer. In general, just like with 
the ``data export'' criterion in Sec.  170.315(b)(6), the capability to 
execute this certification criterion can be health care provider/health 
care organization initiated (presumably upon that organization 
receiving a request by patient for their EHI). In instances where the 
functionality certified to this criterion is implemented in a ``direct-
to-patient'' way such that the patient can request and accept EHI 
export without assistance from a user, we recognize that further 
configuration of the functionality or product in which it is 
implemented may be needed in order to account for applicable laws 
related to the patient's information access rights and other privacy 
and information blocking policies that apply to the configuration and 
use of the Health IT Module. While this specific capability within the 
certification criterion emphasizes health IT developer assistance must 
not be needed to operate the export, we recognize that user assistance 
(e.g., a provider) may be necessary to initiate such capability in the 
user's product.
b. Patient Population EHI Export for Transitions Between Health IT 
Systems
    In addition to the single patient export functionality in Sec.  
170.315(b)(10)(i), we proposed in Sec.  170.315(b)(10)(ii) that health 
IT certified to this criterion would also facilitate the migration of 
EHI to another health IT system. We proposed that a health IT developer 
or health IT certified to this criterion must, at a user's request, 
provide a complete export of all EHI that is produced or electronically 
managed (84 FR 7447 through 7448) by means of the developer's certified 
health IT.
    Comments. We received many comments in support of the functionality 
under this criterion for transitions between health IT systems. Many 
commenters recommended format and content specifications, such as the 
use of bulk FHIR[supreg]-based APIs for export transmission. Some 
commenters stressed that ONC should determine and require standards, as 
well as clarify the scope of data export specific to this use case. 
Some commenters expressed concerns, including gathering patient consent 
and the developer burden that may exist with gathering data from 
disparate systems under the proposed scope terminology. One commenter 
was against the transitions between health IT systems capability, 
citing that data structured for one system will not necessarily work in 
another.
    Response. We thank commenters for their feedback specific to the 
functionality of transitions between health IT systems under this 
criterion. We finalized this export functionality with modifications. 
First, this functionality is now referred to as ``patient population 
electronica health information export'' in Sec.  170.315(b)(10)(ii) to 
better reflect the policy intent of patient data transitions in 
instances of providers switching health IT systems, and to reflect the 
finalized scope of data that a product with a certified Health IT 
Module must be capable of exporting. Similar to the modifications in 
Sec.  170.315(b)(10)(i), we finalized in Sec.  170.315(b)(10)(ii)(A) 
that the export files must be electronic and in a computable format and 
we modified in Sec.  170.315(b)(10)(ii)(B) that the publicly accessible 
hyperlink of the export's format must be included with the exported 
file(s). This modification clarifies that the user is able to access 
the format, and that the developer will keep their hyperlink up-to-
date.
    In response to comments on defining a separate scope of data export 
specific to the patient population export functionality, it is our 
final policy for this certification criterion to align both the single 
patient and patient population export data to EHI, as defined in this 
rule, that can be stored at the time of certification by the product, 
of which the Health IT Module is a part. This narrower scope also 
addressed concerns received regarding development burden expressed 
regarding gathering data from disparate systems under the proposed 
scope terminology.
    In regards to the comments on enforcing format and standards for 
data transmission, it is our intent under this certification criterion 
that health IT developers have flexibility regarding how the export 
outcome is achieved. We again encourage the industry to work together 
toward this common goal and to create an industry-wide approach. We do 
acknowledge the comments received that data structured for one system 
may not necessarily seamlessly align with another, and refer commenters 
to the export format requirements of this certification criterion. As 
finalized in Sec.  170.315(b)(10)(ii)(A), the export created must be 
electronic and in a computable format. In contrast with the single 
patient EHI export capability, which must be available to a user 
without subsequent developer assistance to operate, the patient 
population EHI export capability of this criterion could require action 
or support on the part of the health IT developer. We acknowledged in 
the Proposed Rule (84 FR 7448) that because of anticipated large volume 
of electronic health information that could be exported under this 
specific proposed capability, developer action or support could be 
needed. Our thinking remains the same post-public comments even with 
the narrowed scope of data export. While exporting one patient's data 
on an as-needed basis is a capability that should be executable by a 
user on their own, orchestrating an entire export of EHI for migration 
to another health IT system is an entirely different task and dependent 
on a variety of factors such as the organization's overall 
infrastructure and deployment footprint. Additionally, developers of 
health IT certified to this criterion are required to provide the 
assurances in Sec.  170.402, which include providing reasonable 
cooperation and assistance to other persons (including customers, 
users, and third-party developers) to enable the use of interoperable 
products and services. Thus, while developers have flexibility 
regarding how they implement the export functionality for transitions 
between systems, they are ultimately responsible for ensuring that the 
capability is deployed in a way that enables a customer and their 
third-party contractors to successfully migrate data. Such cooperation 
and assistance could include, for example, assisting a customer's 
third-party developer to automate the export of EHI to other systems. 
We refer readers to the export format section below for additional 
details.
    We note that the narrowed scope of data that certified Health IT 
Modules must be capable of exporting does not reduce contractual 
obligations of health IT developers to continue to support providers if 
they do want to change systems, and direct readers to the information 
blocking section (VIII) for additional information.

[[Page 25696]]

c. Scope of Data Export
    We proposed in 84 FR 7448 and in Sec.  170.315(b)(10) that for both 
use cases supported by this criterion, the scope of data that the 
certified health IT product must be capable of exporting would 
encompass all the EHI that the health IT system produces and 
electronically manages for a patient or group of patients. Our 
intention was that ``produces and electronically manages'' would 
include a health IT product's entire database. In the Proposed Rule, 
our use of the term EHI was deliberate. At the time of rulemaking, the 
proposed definition of the EHI term in Sec.  171.102 was intended to 
support the consistency and breadth of the types of data envisioned by 
this proposed criterion. We requested comment on the terminology used 
(``produces and electronically manages'') or whether there were 
alternatives to the proposed language.
    Comments. Some commenters were supportive of our proposed scope of 
data export requirements, while a few others offered alternative 
specific terminology options. Those commenters suggested terminology 
such as all EHI the health IT system ``collects and retains,'' or 
``produces or can electronically access, exchange, or use.'' A majority 
of commenters, however, stated that the proposed terminology, including 
the proposed EHI definition, left broad interpretations of the scope of 
data a Health IT Module would have to be capable of exporting under 
this criterion. These commenters expressed concerns that the ambiguity 
and potentially vast amounts of data would create undue burden on 
health IT developers for development and upkeep of export capabilities, 
as well as compliance issues with other applicable laws. A majority of 
commenters requested and highlighted a need for further specificity 
regarding the terminology used to define data exported under this 
criterion. Some commenters expressed concerns that a developer 
presenting a Health IT Module for certification may not know all 
systems a user may later connect to the health IT capabilities. We also 
received many comments reflecting varied thoughts on what should or 
should not be included in the criterion's data export. Some commenters 
strongly opposed any data limits, citing existing regulations such as 
the HIPAA Privacy Rule right of access, while others proposed 
alternatives to constrain data export requirements, citing development 
infeasibility.
    Recommendations to constrain the proposed criterion's scope 
included alignment with other regulations and data standards, such as 
the USCDI. We also received a recommended requirement for health IT 
developers to provide a plain language definition of the EHI typically 
included in their Health IT Module's export. Some commenters expressed 
confusion on how the criterion's proposed scope of data export may 
apply to EHI ``produced or electronically managed'' by both the 
product's certified and ``non-certified'' capabilities as well as data 
from third parties.
    Response. We thank commenters for feedback on our proposed terms 
and for specific recommendations. The finalized criterion draws the 
upper bound of its data scope from the focused definition of EHI as 
finalized. The criterion export includes the EHI, as defined, that can 
be stored at the time of certification by the product, of which the 
Health IT Module is a part. As defined in this rule, EHI means 
electronic protected health information as defined in 45 CFR 160.103 to 
the extent that it would be included in a designated record set as 
defined in 45 CFR 164.501 (other than psychotherapy notes as defined in 
45 CFR 164.501 or information compiled in reasonable anticipation of, 
or for use in, a civil, criminal, or administrative action or 
proceeding), regardless of whether the actor is a covered entity as 
defined in 45 CFR 160.103. In response to comments received, this 
revised scope of data for export provides a more manageable and less 
administratively burdensome certification criterion for health IT 
developers for several reasons.
    We agree with commenters that our proposed terms of all EHI a 
health IT system ``produces and electronically manages'' (84 FR 7448) 
raised the potential for broad variance in interpretations and concerns 
about the breadth of data intended for export under this criterion and 
potential development burden. We also considered the comments noting 
that a developer presenting a Health IT Module for certification may 
not, at the time of certification, know all systems a user will later 
connect to the health IT capabilities. Ultimately, we considered 
several approaches to better reflect the policy intent and to alleviate 
confusion related to the proposed criterion. In consideration of the 
public comments and the policy outcome we sought to address, we revised 
the final criterion`s phrasing to describe what information health IT 
products with Health IT Module(s) certified to the criterion must be 
capable of exporting. The revised scope of data export applies to both 
the single patient and patient population export functionalities as 
well as the Conditions and Maintenance of Certification requirements 
tied to this criterion.
    First, we agree with comments received and acknowledge that a 
health IT developer is best positioned to know (and would be solely 
responsible for only) the EHI that can be stored by the health IT 
product at the time the Health IT Module is presented for 
certification. In response to comments regarding the applicability of 
the scope of export to the product's certified and ``non-certified'' 
capabilities, as well as data from third parties, we clarify and 
reiterate the following from our prior responses. We emphasize that 
such ``stored'' data applies to all EHI and is agnostic as to whether 
the EHI is stored in or by the certified Health IT Module or in or by 
any of the other ``non-certified'' capabilities of the health IT 
product of which the certified Health IT Module is a part. To be clear, 
conformance ``at the time of certification'' means the combined data 
that can be stored by the product, of which the Health IT Module is a 
part, at the time the Health IT Module is presented for certification. 
As such, for the purposes of this certification criterion, the EHI that 
must be exported does not include any data generated from unique post-
certification in response to a particular customer (though such data 
could meet the definition of EHI for the purposes of information 
blocking). Such modifications could include custom interfaces and other 
data storage systems that may be subsequently and uniquely connected to 
a certified Health IT Module post-certification. Additionally, to 
remain consistent with ``at the time of certification,'' we clarify 
that any new EHI stored by the product due to ongoing enhancements 
would need to be included within the scope of certification only when a 
new version of the product with those new EHI storage capabilities is 
presented for certification and listing on the CHPL. In consideration 
of comments, we believe that this approach to define storage at the 
time the product is presented for certification of a Health IT Module 
will make the certification requirements more clear for health IT 
developers and more efficient to administer from a Program oversight 
perspective.
    In addition, the use of ``can be stored by'' refers to the EHI 
types stored in and by the health IT product, of which the Health IT 
Module is a part. This is meant to be interpreted as the combination of 
EHI a heath IT product stores itself and in other data storage 
locations. Thus, the cumulative data

[[Page 25697]]

covered by these storage techniques would be in the scope of data 
export.
    Per our policy intent, by focusing the definition of EHI and 
defining the data for export under this criterion, users of certified 
Health IT, such as health care providers, will have the ability to 
create ``readily producible'' exports of the information of a single 
patient upon request by the user, which increases patient access as 
reflected in the Cures Act. Lastly, in support of the second 
functionality we finalized for patient population export, the EHI 
exported (within the Health IT product's scope of data export) would 
likely be of significant importance to health care providers for the 
purposes of transitioning health IT systems and maintaining continuity 
of care for patients, and also helps remove potential barriers to users 
switching systems to meet their needs or their patient's needs.
    In finalizing this policy, we emphasize that health IT developers 
may provide the export of data beyond the scope of EHI and for 
functionalities beyond those discussed under this criterion. In such 
cases, for additional export purposes, it is advised that health IT 
developers and users discuss and agree to appropriate requirements and 
functionalities. We again emphasize that health IT product users must 
ensure that any disclosures of data conform to all applicable laws, 
including the HIPAA Rules and 42 CFR part 2. Stakeholders should review 
applicable laws and regulations, including those regarding patients' 
right of access to their data, in order to determine the appropriate 
means of disclosing patient data. We also refer readers to the 
information blocking section at VIII.
i. Image, Imaging Information, and Image Element Export
    In the Proposed Rule, we noted at 84 FR 7448 that clinical data 
would encompass imaging information, both images and narrative text 
about the image. However, we addressed that EHRs may not be the 
standard storage location for images. We solicited additional feedback 
and comments on the feasibility, practicality, and necessity of 
exporting images and/or imaging information. We requested comment on 
what image elements, at a minimum, should be shared such as image 
quality, type, and narrative text. We did not make any proposals in 84 
FR 7448.
    Comments. Most commenters were supportive of sharing images and/or 
related data elements, expressing that interoperability should include 
electronic ordering of imaging studies, which they asserted would 
assist health care providers in delivering care. Other commenters 
expressed burden concerns with data image export, particularly 
challenges around the movement and storage of large amounts of data and 
accumulating data from disparate health IT systems. A few commenters 
requested specific exclusion of images or videos created as a byproduct 
of procedures. As for minimum image data elements to share, 
recommendations varied and included Digital Imaging and Communications 
in Medicine (DICOMTM) data elements or file type 
recommendations. Comments included additional policy recommendations, 
such as making Picture Archiving and Communication Systems (PACS) 
developers subject to certification rules and requiring EHI export data 
to include links for remote authorized access to externally hosted 
images.
    Response. We thank commenters for their shared insight and 
recommendations regarding the export of images, imaging information, 
and image elements. Health IT Modules certified to the finalized 
criterion must electronically export all of the EHI, as defined, that 
can be stored at the time of certification by the product, of which the 
Health IT Module is a part. Thus, any images, imaging information, and 
image elements that fall within this finalized scope of EHI that can be 
stored at the time of certification in or by the product, of which the 
Health IT Module is a part will need to be exported under this 
certification criterion. We appreciate the recommendations received for 
image transfer methods and encourage the stakeholder community to 
continue exploring innovative image transfer methods, including for 
image transfer that would fall outside of this certification criterion. 
We appreciate the policy recommendations, such as including PACS 
developers. The ``EHI export'' certification criterion only applies to 
developers of health IT seeking or maintaining certification under the 
Program. To the extent such providers are developers of health IT under 
the Program they would be included. If they are not developers under 
the Program, they would not be included.
    We also thank commenters for their suggestions to require data 
export to include links for remote authorized access to externally 
hosted images. We note that the export requirements of this 
certification criterion refers to the EHI that can be stored at the 
time of certification by the product, of which the Health IT Module is 
a part. In the context of imaging, if the only EHI stored in or by the 
product to which this certification criterion applies are links to 
images/imaging data (and not the images themselves, which may remain in 
a PACS) then only such links must be part of what is exported. We 
encourage developers to work with their customers to achieve innovative 
ways to share all relevant data, including situations outside of the 
scope of data export under this criterion where images could be made 
more accessible.
ii. Attestation of Information a Health IT Developer Cannot Support for 
Export
    In the Proposed Rule (84 FR 7448), we also solicited comment on 
whether we should require, to support transparency, health IT 
developers to attest or publish as part of the export format 
documentation the types of EHI they cannot support for export. We did 
not have any specific proposals.
    Comments. The majority of commenters supported public attestation 
regarding the information a Health IT Module is unable to export. Some 
commenters requested that we add to the regulatory text to state that 
developers attest to information they cannot support for export ``and/
or ingestion.'' Some commenters questioned if it is fair for EHI 
developers to delineate what is in their Health IT Module's scope of 
data for export under this criterion. Another felt that this 
requirement should be extended to health care delivery organizations 
and that the attestation should be included within patient portals or 
other communications.
    Response. We thank commenters for their feedback. We again note the 
revised scope of data export under this finalized criterion. Under the 
finalized approach, which focuses on the export of the EHI that can be 
stored at the time of certification by the product, we have determined 
that our final requirements provide sufficient clarity and have not 
included any additional requirements such as those on which we sought 
comment. Additionally, we believe the recommendation for ingestion 
would be impracticable as part of this certification criterion due to 
the flexibility we permit for the output format(s). It would not be 
possible from a regulatory enforcement perspective to administer a 
certification criterion that included within its scope a conformance 
requirement for a Health IT Module's capability to import any 
proprietary format that may exist without prior knowledge of such 
formats.
iii. Export Exclusion Request for Comments
    In the Proposed Rule, we proposed metadata categories at 84 FR 7448 
for

[[Page 25698]]

exclusion from this criterion. We also requested feedback on what 
metadata elements should remain included for export or added to the 
list of excluded data. Metadata proposed for exclusion from the 
criterion included metadata present in internal databases used for 
physically storing the data, metadata that may not be necessary to 
interpret the EHI export, and metadata that refers to data that is not 
present in the EHI export. Examples of these proposed exclusions are 
provided at 84 FR 7448.
    Comments. Commenters offered varied recommendations for metadata 
elements to remain excluded, or to be included under the scope of data 
export for this criterion. We received several comments strongly 
supporting the inclusion of audit log metadata. Commenters noted that 
the inclusion of audit log metadata had potential legal utility and 
could aid in the patient's ability to have all of their data and 
knowing who has accessed their data. Commenters also requested 
increased clarity on the definition of metadata, audit log, and access 
log in regards to this rulemaking, and requested the use of standards 
to further clarify policy intentions. We note, however, that other 
commenters were against the inclusion of audit log data as part of the 
EHI export. Those against inclusion stated that this information was 
not necessary to interpret the EHI export, could be burdensome for 
development of export capabilities, and potentially contain personally 
identifiable information of the health care staff.
    Response. We thank commenters for their input on potential metadata 
exclusions. As noted above, we have finalized that EHI that can be 
stored at the time of certification by the product is the scope of data 
that must be included in exports pursuant to Sec.  170.315(b)(10). 
Under this revised and specified scope of data export, it is no longer 
necessary to list specific metadata exclusions or inclusions. We direct 
readers to the discussion of scope of data export (IV.B.6.c) under this 
criterion for further details.
d. Export Format
    We did not propose a content standard for the export. However, we 
did propose to require documentation in Sec.  170.315(b)(10)(iii) that 
health IT developers include the export file(s) format, including its 
structure and syntax, such as a data dictionary or export support file, 
for the exported information to assist the user requesting the 
information in processing the EHI (84 FR 7448). This was to prevent 
loss of information or its meaning to the extent reasonably practicable 
when using the developer's certified Health IT Module(s). We also 
proposed in Sec.  170.315(b)(10)(iii) that the developer's export 
format must be made available via a publicly accessible hyperlink and 
kept up-to date.
    Comments. Comments received were in favor of this proposal in Sec.  
170.315(b)(10)(iii). Several commenters were supportive of the 
flexibility of export format for developers, as long as export 
documentation is provided as specified in the Proposed Rule, citing 
specifically how this would support the export capability in Sec.  
170.315(b)(10)(ii). Some commenters recommended additional 
clarification for the publicly accessible hyperlink, specifically to 
ensure that information is available without login or other associated 
requirements. Commenters also provided export format suggestions.
    Response. We thank commenters for their feedback regarding 
developers' export format. We have finalized Sec.  170.315(b)(10)(iii) 
with modifications to clarify the regulatory text. We finalized that 
the export format(s) used to support Sec.  170.315(b)(10)(i) and Sec.  
170.315(b)(10)(ii) of this section must be kept up-to-date.
    We clarify that the documentation for the export format(s) in Sec.  
170.315(b)(10)(iii) consists of information on the structure and syntax 
for how the EHI will be exported by the product such as, for example, 
C-CDA document(s) or data dictionary for comma separated values (csv) 
file(s), and not the actual EHI. The user will use the export format 
documentation to process the EHI after it is exported by the product. 
We also require that health IT developers keep the export format(s) 
used to support Sec.  170.315(b)(10)(i) and Sec.  170.315(b)(10)(ii) 
must be ``up-to-date.'' For example, if the health IT developer had 
previously specified the C-CDA standard as the export format for 
meeting the criterion, but subsequently updated their product to use 
the FHIR standard and stopped supporting C-CDA export format then the 
documentation for export format would need to be updated so that users 
are able to continue to accurately process the EHI exported by the 
product. We appreciate suggestions received regarding ensuring that 
such information is available without login or other associated 
requirements. In response to these comments, our policy intent to 
foster transparency, and in alignment with other certification 
criterion requirements set forth in this rule, we note our 
modifications in Sec.  170.315(b)(10)(i)(E) and Sec.  
170.315(b)(10)(ii)(B) that the publicly accessible hyperlink of the 
export's format must be included with the exported file(s). We clarify 
that the hyperlink must allow any person to directly access the 
information without any preconditions or additional steps. We note that 
the export format need not be the same format used internally by the 
certified health IT and the health IT developer does not need to make 
public their proprietary data model. This certification criterion also 
does not prescribe how (i.e., media/medium) the exported information is 
to be made available to the user, as this may depend on the size and 
type of information to be exported. While file formats and related 
definitions are not finalized as specific certification requirements, 
we encourage developers to continue to foster transparency and best 
practices for data sharing, such as machine-readable format, when they 
create and update their export format information.
e. Initial Step Towards Real-Time Access
    In the Proposed Rule at 84 FR 7449, we offered a clarifying 
paragraph to highlight that the criterion in Sec.  170.315(b)(10) was 
intended to provide a step in the direction of real-time access goals, 
as well as a means to, within the confines of other applicable laws, 
encourage mobility of electronic health data while other data transfer 
methods were maturing. In that section, we clarified that 
``persistent'' or ``continuous'' access to data is not required to 
satisfy the proposed ``EHI export'' criterion's requirements, and that 
the minimum requirement of developers presenting Health IT Module(s) 
for certification to this criterion is for a discrete data export 
capability. In this clarification section, we did not have specific 
proposals or requests for comments.
    Comments. We received recommendations to further specify the use of 
``persistent'' and ``continuous'' in context of access to EHI. 
Additional commenters recommended specifying Representational state 
transfer (REST) or ``RESTful'' transfer, or specifying data transport 
methods.
    Response. We thank commenters for their input. We first clarify 
that this section was added to the Proposed Rule for additional 
clarification and to provide prospective context on the proposed 
certification criterion. However, we recognize from the comments 
received that our reference to ``persistent'' or ``continuous'' access 
in the Proposed Rule may have created confusion. We again note that 
``persistent'' or ``continuous'' access is not required by health IT 
developers

[[Page 25699]]

presenting Health IT Module(s) to satisfy the requirements of this 
certification criterion. We have finalized the ``EHI export'' criterion 
as described above in response to comments received on proposals we 
have made. We appreciate the responses to our future looking points in 
the Proposed Rule but have not made further revisions to the final 
certification criterion in response.
f. Timeframes
    We requested input and comments on the criterion and timeframes at 
84 FR 7449. In particular, beyond the proposal to export all the EHI 
the health IT system produces and electronically manages, we sought 
comment on whether this criterion should include capabilities to permit 
health care providers to set timeframes for the EHI export, such as 
only the ``past two years'' or ``past month'' of EHI (84 FR 7449).
    Comments. A majority of commenters were against the concept of 
allowing providers to set timeframes for the export functionality. 
Commenters were concerned that creating the capability to limit 
timeframes would involve significant technical complexity for health IT 
developers. Commenters also expressed concern that allowing providers 
the capability to limit timeframes would not align with the HIPAA 
Privacy Rule right of access at 45 CFR 164.524 and could potentially 
implicate information blocking. Commenters provided alternative 
approaches and concepts to implement timeframe capabilities for this 
criterion, including use of APIs, granting flexibility to developers, 
allowing intervals or dynamic timeframe requirements, and considering 
permitted fees. Commenters asked for clarification on how far back the 
data request capabilities could go and requested clarification 
regarding how this criterion aligns with other API-related criteria 
within this rule.
    Response. We thank commenters for their feedback. We will not 
require the Health IT Module support a specific or user-defined 
timeframe range or time limit capability for the purposes of 
demonstrating conformance to this certification criterion. We agree 
with commenters concerns regarding potential development complexity for 
health IT developers if we included such a requirement upfront. What 
this means, however, is that for the purposes of testing and 
certification, a health IT developer will need to prove that the 
product, of which a Health IT Module is part, can perform the 
capabilities required by the certification criterion, inclusive of all 
EHI that could be exported. In turn, when these capabilities are 
deployed in production they will need to be capable of exporting all of 
the EHI that can be stored at the time of certification by the product, 
of which the Health IT Module is a part. We also agree with the points 
received regarding the HIPAA Privacy Rule right of access at 45 CFR 
164.524 and emphasize the importance of HIPAA covered entities aligning 
with applicable law regarding patient access to health information.
g. 2015 Edition ``Data Export'' Criterion in Sec.  170.315(b)(6)
    We proposed to remove the ``data export'' criterion (defined in 
Sec.  170.315(b)(6)) from the 2015 Edition Base EHR definition in Sec.  
170.102 and to replace ``data export'' with the proposed ``EHI export'' 
criterion (defined in Sec.  170.315(b)(10)) by amending the third 
paragraph of the 2015 Edition Base EHR definition in Sec.  170.102. We 
did not propose a transition period for the ``data export'' criterion. 
Rather, we proposed to remove the criterion from the 2015 Edition Base 
EHR definition upon the effective date of a final rule. We also 
proposed to modify the 2015 Edition Base EHR definition to include the 
new proposed export criterion (defined in Sec.  170.315(b)(10)), with 
an implementation date 24 months from the effective date of the final 
rule. We welcomed comments on this approach.
    Comments. Some commenters were in favor of immediate removal of 
this criterion (Sec.  170.315(b)(6)) from the 2015 Edition Base EHR 
definition, stating it would reduce burden. However, the majority of 
commenters were against a potential gap in functionality due to the 
compliance timeline for the new export criterion (Sec.  170.315(b)(10)) 
and requested that we keep the ``data export'' criterion until the new 
criterion in Sec.  170.315(b)(10) and other standardized data 
transmission methods were fully implemented. Some commenters supported 
an indefinite retention of the ``data export'' criterion, regardless of 
the proposed addition of Sec.  170.315(b)(10). Several commenters also 
recommended to expand the current Sec.  170.315(b)(6) criterion through 
USCDI as an alternative approach to the proposed ``EHI export'' 
criterion in Sec.  170.315(b)(10). In addition, some commenters 
expressed concern that that the ``data export'' criterion is 
inconsistent with CMS Quality Payment Program (QPP) requirements such 
as View, Download, and Transmit (VDT) at 83 FR 59814 of the CY 2019 
Physician Fee Schedule final rule.
    Response. In consideration of public comments in support of the 
retention of the ``data export'' certification criterion, we have 
maintained the ``data export'' certification criterion in Sec.  
170.315(b)(6) as available for certification until 36 months after this 
final rule's publication date. To implement this decision, we have 
finalized in Sec.  170.550(m) that ONC-ACBs are permitted to issue 
certificates to ``data export'' in Sec.  170.315(b)(6) until, but not 
after, 36 months after the publication date of this final rule. 
However, we note the ``data export'' certification criterion has been 
removed from the 2015 Edition Base EHR definition (in Sec.  170.102) as 
of the general effective date of this final rule (60 days after its 
publication in the Federal Register). During the 36 months immediately 
following publication of this final rule, developers will be able to 
maintain the certification to Sec.  170.315(b)(6) as a standardized 
means of exporting the discrete data specified in the CCDS, but the 
criterion will not be updated to the USCDI. Given that certification to 
the Sec.  170.315(b)(6) criterion will no longer be available after 36 
months, we do not believe an update to the USCDI is the best path. 
Rather, Sec.  170.315(b)(6) will remain an unchanged criterion in the 
Program for the 36 months immediately following publication of this 
final rule in the Federal Register. After that timeframe, the EHI 
export criterion in Sec.  170.315(b)(10), including that certification 
criterion's scope of data export, will remain an available data export 
certification criterion for health IT developers that present for 
certification a Health IT Module that is part of a heath IT product 
which electronically stores EHI. This approach will support prior 
investments in Sec.  170.315(b)(6) by developers and their customers, 
and also encourage movement toward the interoperability opportunities 
afforded by new criteria.
    Regarding commenter concerns that the ``data export'' criterion is 
inconsistent with CMS QPP requirements, such as View, Download and 
Transmit (VDT), we do not believe that this criterion would be 
inconsistent with QPP program requirements. In the CY 2019 Physician 
Fee Schedule final rule, CMS removed the VDT measure in Sec.  
170.315(e)(1) (83 FR 59814). However, the Promoting Interoperability 
performance category of QPP currently includes the measure entitled 
Provide Patients Electronic Access to their Health Information (83 FR 
59812 through 59813), and CMS has identified technology certified to 
the ``View, Download and Transmit to 3rd party'' criterion at 45 CFR 
170.315(e)(1) as required to meet this measure (83 FR

[[Page 25700]]

59817). The Data Export criterion in Sec.  170.315(b)(6) is not 
required for the Provide Patients Electronic Access to their Health 
Information measure included in the Promoting Interoperability 
performance category, nor have we proposed to change the ``View, 
Download and Transmit to 3rd party'' criterion in Sec.  170.315(e)(1) 
required for this measure, thus we do not believe this final policy 
will conflict with CMS requirements for QPP.
7. Standardized API for Patient and Population Services Criterion
    We proposed to adopt a new API criterion in Sec.  170.315(g)(10) at 
84 FR 7449. In response to comments, we are adopting a Standardized API 
for Patient and Population Services criterion for Certification in 
Sec.  170.315(g)(10) with modifications. The new criterion, will 
replace the old ``application access--data category request'' 
certification criterion (Sec.  170.315(g)(8)). In doing so, we are also 
adding the Standardized API for Patient and Population Services 
criterion to the updated 2015 Edition Base EHR definition and removing 
the application access--data category request criterion (Sec.  
170.315(g)(8)). This finalized Standardized API for patient and 
population services certification criterion requires the use of the 
FHIR Release 4 and several implementation specifications. The new 
criterion focuses on supporting two types of API-enabled services: (1) 
Services for which a single patient's data is the focus and (2) 
services for which multiple patients' data are the focus. Please refer 
to the ``Application Programming Interfaces'' section (VII.B.4) in this 
preamble for a more detailed discussion of the ``API'' certification 
criterion and related Conditions and Maintenance of Certification 
requirements.
8. Privacy and Security Transparency Attestations Criteria
    In 2015, the HIT Standards Committee (HITSC) recommended the 
adoption of two new ``authentication'' certification criteria for the 
Program (81 FR 10635). The National Coordinator endorsed the HITSC 
recommendations for consideration by the Secretary, and the Secretary 
determined that it was appropriate to propose adoption of the two new 
certification criteria through rulemaking. To implement the Secretary's 
determination, we proposed two new criteria to which health IT would 
need to be certified (84 FR 7450). These would require the developer to 
attest to whether the Health IT Module for which they are seeking 
certification to the criteria encrypts authentication credentials 
(Sec.  170.315(d)(12)) and/or supports multi-factor authentication 
(Sec.  170.315(d)(13)). We did not propose to require that health IT 
have these authentication and encryption-related functions, but instead 
proposed that a health IT developer must indicate whether or not their 
certified health IT has those capabilities by attesting ``yes'' or 
``no.'' We did, however, propose to include the two criteria in the 
2015 Edition privacy and security certification framework (Sec.  
170.550(h)). For clarity, attesting ``yes'' to either of these criteria 
indicates that the Health IT Module can support either Approach 1 or 
Approach 2 of the 2015 Edition privacy and security certification 
framework for these criteria.
    We note that we received many comments on the proposed ``encrypt 
authentication credentials'' and ``multi-factor authentication'' 
criteria, but the majority of comments conflated the two proposals and 
provided collective responses. Therefore, we have responded to them in 
kind to preserve the integrity of the comments.
a. Encrypt Authentication Credentials
    We proposed in 84 FR 7450 to adopt an ``encrypt authentication 
credentials'' certification criterion in Sec.  170.315(d)(12) and 
include it in the P&S certification framework (Sec.  170.550(h)). We 
proposed to make the ``encrypt authentication credentials'' 
certification criterion applicable to any Health IT Module currently 
certified to the 2015 Edition and any Health IT Module presented for 
certification that is required to meet the ``authentication, access 
control, and authorization'' certification criterion adopted in Sec.  
170.315(d)(1) as part of Program requirements.
    Encrypting authentication credentials could include password 
encryption or cryptographic hashing, which is storing encrypted or 
cryptographically hashed passwords, respectively. If a developer 
attests that its Health IT Module encrypts authentication credentials, 
we proposed in 84 FR 7450 that the attestation would mean that the 
Health IT Module is capable of protecting stored authentication 
credentials in accordance with standards adopted in Sec.  
170.210(a)(2), Annex A: Federal Information Processing Standards (FIPS) 
Publication 140-2, ``Approved Security Functions for FIPS PUB 140-2, 
Security Requirements for Cryptographic Modules.'' We posited that FIPS 
Publication 140-2 is the seminal, comprehensive, and most appropriate 
standard. Moreover, in the specified FIPS 140-2 standard, there is an 
allowance for various approved encryption methods, and health IT 
developers would have the flexibility to implement any of the approved 
encryption methods in order to attest ``yes'' to this criterion. We 
noted that health IT developers should keep apprised of these standards 
as they evolve and are updated to address vulnerabilities identified in 
the current standard.
    We did not propose that a Health IT Module would be required to be 
tested to the ``encrypt authentication credentials'' certification 
criterion. Rather, by attesting ``yes,'' the health IT developer is 
attesting that if authentication credentials are stored, then the 
authentication credentials are protected consistent with the encryption 
requirements above. We proposed in 84 FR 7450 that the attestations 
``yes'' or ``no'' would be made publicly available on the Certified 
Health IT Product List (CHPL). We proposed in 84 FR 7450 that, for 
health IT certified prior to the final rule's effective date, the 
health IT would need to be certified to the ``encrypt authentication 
credentials'' certification criterion within six months after the final 
rule's effective date. For health IT certified for the first time after 
the final rule's effective date, we proposed that the health IT must 
meet the proposed criterion at the time of certification.
    We also noted that some Health IT Modules presented for 
certification are not designed to store authentication credentials. 
Therefore, we specifically requested comment on whether we should 
include an explicit provision in this criterion to accommodate such 
health IT. We stated that this could be similar to the approach we 
utilized for the 2015 Edition ``end-user device encryption'' criterion 
(Sec.  170.315(d)(7)(ii)), where we permit the criterion to be met if 
the health IT developer indicates that their health IT is designed to 
prevent electronic health information from being locally stored on end-
user devices.
b. Multi-Factor Authentication
    We proposed in 84 FR 7450 to adopt a ``multi-factor 
authentication'' (MFA) criterion in Sec.  170.315(d)(13) and include it 
in the P&S certification framework (Sec.  170.550(h)). We proposed to 
make the ``multi-factor authentication'' certification criterion 
applicable to any Health IT Module currently certified to the 2015 
Edition and any Health IT Module presented for certification that is 
required to meet the ``authentication, access control, and 
authorization'' certification criterion adopted in Sec.  170.315(d)(1) 
as part of Program requirements. To provide clarity as to what a 
``yes'' attestation for ``multi-factor authentication'' attestation 
would

[[Page 25701]]

mean, we provided the following explanation. MFA requires users to 
authenticate using multiple means to confirm they are who they claim to 
be in order to prove one's identity, under the assumption that it is 
unlikely that an unauthorized individual or entity will be able to 
succeed when more than one token is required. MFA includes using two or 
more of the following: (i) Something people know, such as a password or 
a personal identification number (PIN); (ii) something people have, 
such as a phone, badge, card, RSA token or access key; and (iii) 
something people are, such as fingerprints, retina scan, heartbeat, and 
other biometric information. Thus, we proposed in 84 FR 7451 that in 
order to be issued a certification, a health IT developer must attest 
to whether or not its Health IT Module presented for certification 
supports MFA consistent with industry-recognized standards (e.g., NIST 
Special Publication 800-63B Digital Authentication Guidelines, ISO 
27001).\52\
---------------------------------------------------------------------------

    \52\ NIST Special Publication 800-63B: https://pages.nist.gov/800-63-3/sp800-63b/cover.html
---------------------------------------------------------------------------

    We proposed in 84 FR 7451 that, for health IT certified prior to 
the final rule's effective date, the health IT would need to be 
certified to the ``multi-factor authentication'' certification 
criterion within six months after the final rule's effective date. For 
health IT certified for the first time after the final rule's effective 
date, we proposed that the health IT must meet this criterion at the 
time of certification. We solicited comment on the method of 
attestation and, if the health IT developer does attest to supporting 
MFA, whether we should require the health IT developer to explain how 
they support MFA. In particular, we asked whether a health IT developer 
should be required to identify the MFA technique(s) used/supported by 
submitting specific information on how it is implemented, including 
identifying the purpose(s)/use(s) to which MFA is applied within their 
Health IT Module, and, as applicable, whether the MFA solution complies 
with industry standards.
    Comments. The vast majority of commenters supported the adoption of 
the two proposed privacy and security transparency attestation 
certification criteria. A few commenters were opposed to the new 
criteria. Several supporters of the proposed criteria recommended that 
we make the criteria operative functional requirements (including 
testing), rather than yes/no attestations. Some of these commenters 
reasoned that MFA should be a requirement for all certified health IT, 
given the risks involved with single-factor authentication and how easy 
it is today to implement MFA. We also received a number of comments 
requesting that we clarify that the MFA proposal does not create a 
requirement for health care providers to implement MFA or encryption of 
authentication credentials. Similarly, we received several comments 
seeking clarification that a ``yes'' attestation would only require 
support of MFA, not that MFA would have to be implemented. Along these 
same lines, several commenters expressed concerns that the requirements 
could interfere with clinical care and urged that the requirements not 
contribute to provider burden.
    Response. We have adopted both proposed privacy and security 
transparency attestation criteria and included both criteria (Sec.  
170.315(d)(12) and Sec.  170.315(d)(13)) in the P&S certification 
framework (Sec.  170.550(h)), with minor modifications. While some 
commenters recommended that MFA should be a requirement for all 
certified health IT, we did not propose such a requirement nor could 
health IT developers have foreseen such an outcome in this final rule 
based on our proposals, particularly considering the clarity provided 
with our proposals (84 FR 7450) and the complexities of such a 
requirement. For example, as noted by commenters below, MFA may not be 
appropriate or applicable in all situations and there is wide variation 
in authentication needs and approaches throughout the industry. These 
criteria will, however, still provide increased transparency, and if a 
developer attests ``yes'' to these criteria regarding a certified 
Health IT Module, that Health IT Module will then be subject to ONC-ACB 
surveillance for any potential non-conformity with the requirements of 
these criteria. Given the strong support expressed in public comments 
for these criteria as proposed, we believe this is the appropriate 
approach at this time.
    While we believe that encrypting authentication credentials and MFA 
represent best practices for privacy and security in health care 
settings, we emphasize again that these criteria do not require 
certified health IT to have these capabilities or for health IT 
developers to implement these capabilities for a specific use case or 
any use case. Equally important, the criteria place no requirements on 
health IT users, such as health care providers, to implement these 
capabilities (if present in their Health IT Modules) in their health 
care settings. However, we note that information regarding the security 
capabilities of certified health IT provided by such transparency can 
aid health IT users in making informed decisions on how best to protect 
health information and comply with applicable security regulations 
(e.g., the HIPAA Security Rule).
    Comments. Some commenters who supported the proposed criteria 
requested clarification on the scope and intent of the criteria, 
including what level of authentication and which types of users and 
user roles the criteria apply to, as well as on how to attest for 
multiple sign-on paths. A number of commenters noted the wide variation 
in authentication needs and approaches throughout the industry, and 
they recommended that we permit health IT developers to describe how 
they support authentication, rather than simply attest ``yes'' or 
``no.'' The commenters stated that such information would provide 
helpful clarity regarding what the certified health IT supports. 
Additionally, several commenters stated that we should require that 
health IT developers explain how they support MFA. A number of 
commenters stressed that MFA may not be appropriate or applicable in 
all situations, and in particular, several commenters noted that 
automated transactions, including some that may occur in the public 
health reporting context, cannot support MFA.
    Response. In response to requests for modifications and 
clarifications, we have modified the ``encrypt authentication 
credentials'' criterion to permit a health IT developer that attests 
``no'' for its Health IT Module(s) to indicate why the Health IT 
Module(s) does not support encrypting stored authentication 
credentials. A health IT developer that attests ``no'' to the ``encrypt 
authentication credentials'' criterion may explain, for example, that 
its Health IT Module is not designed to store authentication 
credentials, therefore there is no need for the Health IT Module to 
encrypt authentication credentials because it does not store, or have 
the capability to store, authentication credentials.
    For the ``MFA'' criterion, consistent with our solicitation of 
comments and the comments received recommending that health IT 
developers explain how they support MFA, we have modified the criterion 
to require health IT developers that attest ``yes'' to describe the use 
cases supported. For example, a health IT developer could attest 
``yes'' to supporting MFA and state that the Health IT Module supports 
MFA for remote access by clinical users, thus providing clarity on the 
user roles to which MFA applies for that particular Health IT Module. 
To be clear, health IT

[[Page 25702]]

developers are not expected to provide specific technical details about 
how they support MFA that could pose security risks. Again, the purpose 
is to enable health IT developers to give an indication of the types of 
uses for which their Health IT Module(s) support MFA. We note that 
health IT developers may wish to add new MFA use cases for their 
certified health IT over a period of time. In such instances, to 
provide the clarity sought in the Proposed Rule as to the MFA 
technique(s) used/supported and how MFA is implemented, including 
identifying the purpose(s)/use(s) to which MFA is applied within their 
Health IT Modules, any new MFA use cases are required to comply with 
this criterion's ``yes'' attestation provisions and be part of the 
quarterly CHPL reporting by health IT developers and ONC-ACBs under 
Sec.  170.523(m).
    If a health IT developer attests ``no,'' then it would not be 
required to explain why its Health IT Module does not support 
authentication, through multiple elements, of the user's identity with 
the use of industry-recognized standards. We did not propose to require 
an explanation for ``no'' attestation nor did we request comment on 
allowing health IT developers to provide an explanation for a ``no'' 
attestation like we did for ``yes'' attestations (84 FR 7450-7451). 
However, in an effort to provide transparency and consistency for these 
privacy and security attestation criteria, we will also permit 
developers to provide a reason for attesting ``no'' in order to provide 
more context. Such a reason may be due to MFA being inapplicable or 
inappropriate. In those cases, a developer could state, for example, 
that the Health IT Module does not support MFA because it is engaged in 
system-to-system public health reporting and MFA is not applicable.
    Comments. We received several comments requesting adjustment to the 
deadline for compliance to meet these criteria. We also received a 
number of comments recommending that we only apply both of the proposed 
criteria to new certifications and new Health IT Modules, and not to 
Health IT Modules already in widespread use.
    Response. Regarding the timeframe for compliance, and in response 
to comments recommending that we only apply the criteria to ``new 
certifications,'' we have determined that certification to these 
criteria as part of the updated 2015 Edition privacy and security 
certification framework (Sec.  170.550(h)) will only be necessary for 
Health IT Modules that are presented for certification. Thus, a new 
Health IT Module seeking certification for the first time to the 
criteria specified in the 2015 Edition privacy and security 
certification framework (Sec.  170.550(h)), after the effective date of 
this final rule, will need to meet these privacy and security 
transparency attestation criteria at the time of certification. 
Similarly, a previously certified Health IT Module that has undergone 
revision, such as removal of certain capabilities, and is presenting 
for revised certification to the criteria specified in the 2015 Edition 
privacy and security certification framework (Sec.  170.550(h)) after 
the effective date of this final rule, will need to meet these privacy 
and security transparency attestation criteria at the time of 
certification. We believe that this approach will still provide the 
intended transparency as health IT will need to be issued new 
certifications as Health IT Modules are updated or certified to other 
new or revised criteria adopted in this final rule. At the same time, 
this approach should reduce burden for health IT developers and allow 
them more time to plan and prepare to meet these new transparency 
requirements.
9. Security Tags and Consent Management Criteria
    In the 2015 Edition final rule, we adopted two ``data segmentation 
for privacy'' (DS4P) certification criteria. One criterion, ``DS4P-
send'' (Sec.  170.315(b)(7)), includes capabilities for applying 
security tags according to the DS4P standard in Sec.  170.205(o) at the 
document-level of a summary care record formatted to the C-CDA 2.1 
standard in Sec.  170.205(a)(4). The other criterion, ``DS4P-receive'' 
(Sec.  170.315(b)(8)), includes capabilities for receiving a summary 
care record formatted to the C-CDA 2.1 standard in Sec.  170.205(a)(4) 
with document-level security tags according to the DS4P standard in 
Sec.  170.205(o). As noted in the 2015 Edition final rule (80 FR 
62646), certification to these criteria is not required to meet the 
CEHRT definition for PI Programs.
    Security tagging enables computer systems to recognize the 
existence of sensitive elements in data and properly protect the 
privacy and security of the data by ensuring that only the appropriate 
individuals and entities can access it. Security tagging capabilities 
do not compromise the availability or comprehensiveness of health 
information available for treatment or research purposes; rather, they 
enable appropriate access controls in accordance with existing 
policies, governance, and applicable laws. The DS4P standard describes 
a method for applying security tags to HL7 CDA documents to ensure that 
privacy policies established at a record's source can be understood and 
enforced by the recipient of the record.
    The utility of the DS4P standard is not limited to data subject to 
the Federal regulations governing the Confidentiality of Substance Use 
Disorder Patient Records, 42 CFR part 2 (80 FR 62647). DS4P may be 
implemented to support other data exchange use cases in which 
compliance with State or Federal legal frameworks require special 
protections for sensitive health information. Security tagging 
capabilities are an initial step towards enabling an interoperable 
health care system to use technical standards to permit appropriate 
access, use, or disclosure of sensitive health information in 
accordance with applicable policies and patient preferences. We 
understand and acknowledge additional challenges related the prevalence 
of unstructured data, sensitive images, and potential issues around use 
of sensitive health information by clinical decision support systems. 
The adoption of document level data tagging for structured documents 
would not solve these issues, but could help move technology in the 
direction where these issues could be addressed (80 FR 16841).
    Adoption of the 2015 Edition final rule DS4P criteria was 
consistent with earlier HIT Policy Committee (HITPC) recommendations 
for the use of security tagging to enable the electronic implementation 
and management of disclosure policies that originate from the patient, 
the law, or an organization, in an interoperable manner, so that 
electronic sensitive health information may be appropriately 
shared.\53\ The HITPC recommendations consisted of a glide path for the 
exchange of 42 CFR part 2-protected data starting with the inclusion of 
Level 1 (document level tagging) send and receive functionality. The 
HITPC also recommended advancing the exchange of 42 CFR part 2-
protected data, by outlining additional capabilities in sharing, 
viewing and incorporating privacy restricted data at a more granular 
level, as well as

[[Page 25703]]

managing computable patient consent for the use of restricted data.\54\
---------------------------------------------------------------------------

    \53\ See HIT Policy Committee (HITPC) Recommendation Letter to 
ONC, July 2 014, https://www.healthit.gov/facas/sites/faca/files/PSTT_DS4P_Transmittal%20Letter_2014-07-03.pdf; see also HITPC's 
Privacy and Security Tiger Team Public Meeting, Transcript, May 12, 
2014, https://www.healthit.gov/facas/sites/faca/files/PSTT_Transcript_Final_2014-05-12.pdf.; Public Meeting, Transcript, 
May 27, 2014, https://www.healthit.gov/facas/sites/faca/files/PSTT_Transcript_Final_2014-05-27.pdf.
    \54\ For more details on the two glide paths for part 2-
protected data, see https://www.healthit.gov/facas/sites/faca/files/PSTT_DS4P_Transmittal%20Letter_2014-07-03.pdf.
---------------------------------------------------------------------------

    Since the 2015 Edition final rule, the health care industry has 
engaged in additional field testing and implementation of the DS4P 
standard. As of the beginning of the fourth quarter of the 2019 
calendar year, 34 Health IT Modules were certified to one or both of 
the current 2015 Edition DS4P certification criteria (Health IT Modules 
with multiple certified versions were counted once). Stakeholders have 
shared with ONC--through public forums, listening sessions, and 
correspondence--that document-level security tagging does not provide 
enough flexibility to address more complex privacy and security use 
cases. Stakeholders noted that certain provider types, such as 
pediatrics and behavioral health, often rely on burdensome manual 
workflows to appropriately segment and share sensitive health 
information according to State and local laws. Additionally, 
stakeholders expressed interest in ONC adopting health IT standards 
that work with DS4P to support electronic consent for the exchange of 
security tagged data over an API.
    Therefore, in consideration of stakeholder feedback and HITPC 
recommendations to adopt DS4P certification criteria on a glide path, 
we proposed (84 FR 7452) to remove the 2015 Edition DS4P-send (Sec.  
170.315(b)(7)) and DS4P-receive (Sec.  170.315(b)(8)) certification 
criteria. We proposed that the effective date of removal of these 
criteria would be the effective date of the final rule. We proposed to 
replace the removed DS4P criteria with two new 2015 Edition DS4P 
certification criteria in Sec.  170.315(b)(12) and Sec.  170.315(b)(13) 
that would support security tagging according to the DS4P standard at 
the document, section, and entry levels of C-CDA 2.1 formatted 
documents. Our primary purpose for proposing to remove and replace the 
criteria, in lieu of proposing to revise them, was to provide clarity 
to stakeholders about the additional functionality enabled by health IT 
certified to the new criteria. We also proposed a new 2015 Edition 
certification criteria for sharing patient consent information over an 
API using the Substance Abuse and Mental Health Services 
Administration's (SAMHSA) Consent2Share (C2S) IG a FHIR-based exchange 
standard, in Sec.  170.315(g)(11). We noted resources released by ONC 
and OCR, such as the HHS Security Risk Assessment Tool \55\ and the 
Guide to Privacy and Security of Electronic Health Information,\56\ as 
well as the Office for Civil Rights' security risk analysis guidance 
\57\ that entities may employ to make risk-based decisions regarding 
their implementation of the proposed DS4P criteria. We also noted the 
availability of the Electronic Consent Management Landscape Assessment, 
Challenges, and Technology report.\58\ The report includes suggestions 
for overcoming barriers associated with implementing electronic consent 
management, which may be considered for further research and 
discussion.
---------------------------------------------------------------------------

    \55\ HHS Security Risk Assessment Tool: https://www.healthit.gov/providers-professionals/security-risk-assessment.
    \56\ ONC Guide to Privacy and Security of Electronic Health 
Information: https://www.healthit.gov/sites/default/files/ pdf/
privacy/privacy-and-security-guide.pdf.
    \57\ HHS Office for Civil Rights: https://www.hhs.gov/hipaa/for-professionals/security/guidance/; and https://www.hhs.gov/hipaa/for-professionals/security/guidance/guidance-risk-analysis/?language=es.
    \58\ https://www.healthit.gov/sites/default/files/privacy-security/ecm_finalreport_forrelease62415.pdf.
---------------------------------------------------------------------------

    We note that we received many comments on the proposed DS4P 
criteria and the proposed consent management for the API criterion but 
the majority of comments conflated the two proposals and provided a 
collective response. We tried to separate where possible, but in some 
instances, we kept them combined in order to preserve the integrity of 
the comments.
a. Implementation With the Consolidated CDA Release 2.1
    In place of the removed 2015 Edition DS4P criteria, we proposed (84 
FR 7452) to adopt new DS4P-send (Sec.  170.315(b)(12)) and DS4P-receive 
(Sec.  170.315(b)(13)) criteria that would remain based on the CDA 2.1 
and the HL7 DS4P standard. These criteria would include capabilities 
for applying security tags according to the DS4P standard at the 
document, section, and entry level. We believe this offers more 
valuable functionality to providers and patients, especially given the 
complexities of the landscape of privacy laws for multiple care and 
specialty settings. We stated in the Proposed Rule that we believe 
health IT certified to these criteria would support multiple practice 
settings and use cases.
    Comments. We received many comments both in support and against 
this proposal. In certain instances, commenters were supportive of our 
aims but felt there were too many barriers and challenges near term, 
including but not limited to the perceived cost involved with 
successful segmentation in practice and indicated we should delay our 
finalization of the proposal. Others felt immediate adoption of our 
proposal in the final rule was critical for patient care and the secure 
exchange of sensitive health information. Many commenters in favor of 
our proposal provided examples of use cases which it could support, 
such as helping to combat the opioid crisis by facilitating the secure 
exchange of sensitive health information across health care settings 
and including substance use disorder (SUD) information covered by 42 
CFR part 2. We also received support of our proposal for the protection 
of women's health--the commenter explained that segmenting at the 
element level would protect individuals who have experienced intimate 
partner violence, sexual assault, and other sensitive experiences. 
Stakeholders shared with us that focusing certification on segmentation 
to only the document level does not permit providers the flexibility to 
address more granular segmentation needs. We received many comments on 
this proposal in the context of the following topics: provider and 
developer burden; readiness of the standard and C-CDA exchange; 
information blocking and EHI; future multidisciplinary activities (such 
as workgroups) and creating a vision for segmentation using health IT; 
safety; privacy policy conformity; suggested use cases; cost; and 
requests for specific clarifications. We describe these comments 
further below.
    Response. We thank commenters for their input. To address the 
comments concerned about the cost and timing, at the current time, 
these criteria are voluntary and not required under the definition of 
CEHRT or to participate in any HHS program. For more information on the 
costs for the adoption of these criteria, please see the Regulatory 
Impact Analysis in section XIII. For the reasons noted above, in this 
final rule, we have finalized our proposal to support a more granular 
approach to privacy tagging data consent management for health 
information exchange supported by the C-CDA exchange standard. We do 
this not by removing and replacing the 2015 Edition DS4P criteria with 
new Sec.  170.315(b)(12) and Sec.  170.315(b)(13), but by revising the 
2015 Edition DS4P criteria, DS4P criteria DS4P-send (Sec.  
170.315(b)(7)) and DS4P-receive (Sec.  170.315(b)(8)), to include the 
full scope of the HL7 DS4P standard for

[[Page 25704]]

security tagging at the document, section and entry level with 
modifications as described below.
    Comments. We received many comments regarding the perceived burden 
of segmentation on providers and developers including comments focused 
on workflow challenges. One commenter indicated a lack of system and 
explained that tagging is burdensome for implementers because it does 
not describe how to determine what information is sensitive and should 
be tagged. Another indicated that DS4P creates a permanent added burden 
of extensive and costly manual data curation to redact each page to 
meet overlapping Federal and State regulations. Commenters indicated 
end users would be required to flag each individual data element, a 
process that is time consuming and error prone. They further explained 
that granular level privacy tagging has the risk of adding additional 
data entry burden to provider workflows if users must tag each item 
individually.
    Response. We appreciate the thoughtful comments submitted on the 
proposed criteria. Notably, with respect to the comments we received 
that expressed concern about the DS4P standard due to the burden, our 
analysis of the comments indicates that the concerns the commenters 
express are more closely related to the complexity of the privacy law 
landscape than to the specific functionality and standard in our 
proposal. As noted above, at the current time, these criteria are 
voluntary and not required under the definition of CEHRT or to 
participate in any HHS program. The DS4P standard is a tool and 
voluntary certification to these criteria is an initial step towards 
enabling an interoperable health care system to use technical standards 
to compute and persist security tags to permit access, use, or 
disclosure of sensitive health information. The criteria do not specify 
that a manual workflow is required to implement security tagging, and 
we understand from examples of DS4P use in practice that solutions may 
include the use of value sets to automate the tagging process. We 
reiterate that these criteria are intended to apply standards to the 
transmission of documents so that such security tags may be 
interoperable. Though the updated criteria would support a more 
granular approach to tagging the sensitive information, we recognize 
that this will not solve the whole problem of how to manage data 
segmentation for privacy and consent management. The recipient will 
still receive and can view the information that is tagged--the 
recipient will need to determine what they are going to do with that 
information. Policies and procedures for what to do with the 
information once it is received are outside the scope of these criteria 
and this final rule. However, we emphasize that health care providers 
already have processes and workflows to address their existing 
compliance obligations for State and Federal privacy laws, which could 
be made more efficient and cost effective through the use of health IT, 
rather than relying on case-by-case manual redaction and subsequent 
workarounds to transmit redacted documents. We believe this tool may be 
one part of innovative solutions to support health IT enabled privacy 
segmentation in care coordination workflows to significantly reduce the 
burden of these manual processes currently in practice.
    Comments. Several commenters indicated that enhanced segmentation 
may unintentionally impact clinical care when providers are presented 
with an incomplete picture of patient data. Commenters stated there 
could be patient care risks involved with not sharing elements as users 
of downstream systems may not realize that a single element is filtered 
and act improperly, such as by prescribing a contraindicated medication 
due to missing information.
    Response. DS4P is a technical standard for C-CDA that helps health 
care providers comply with existing, applicable laws. As such, health 
care providers should already have processes and workflows in place to 
address their existing compliance obligations. The DS4P standard does 
not itself create incomplete records. Under existing law, patients 
already have the right to prevent re-disclosure of certain types of 
data by withholding consent to its disclosure or to place restrictions 
on its re-disclosure. DS4P allows providers to electronically tag 
(mark) data as sensitive and express re-disclosure restrictions and 
other obligations in an electronic form. DS4P does not determine 
whether a segmentation obligation exists legally or what that legal 
obligation means to the recipient. Instead, DS4P allows for tagging and 
exchange of health information that has already been determined to be 
sensitive and in need of special protections under existing law.
    Comments. We received comments in support of our proposal 
indicating that, without data segmentation, other mandatory criteria, 
such as the proposed ``EHI export'' criterion, would be difficult to 
implement without risking disclosure of sensitive data or information 
blocking. One commenter indicated that without this technical standard, 
it would be difficult for stakeholders to know whether appropriate 
consent has been obtained prior to releasing health information. 
Further, the commenter indicated concern that without such 
capabilities, hospitals and health systems could be accused of 
information blocking because they cannot verify that a patient has 
given consent for their EHI to be shared. They further commented that 
if ONC does not finalize this criterion, then we should provide an 
appropriate exception in the information blocking provisions so that an 
entity is not accused of information blocking because they do not know 
if another organization has obtained consent from patients. One 
commenter stated ONC should propose a new information blocking 
exception that specifically clarifies that a health IT developer's 
choice to not certify to an optional standard cannot be a practice that 
implicates information blocking.
    Response. We thank commenters for their support of the DS4P 
standard. While we understand commenters' concerns, we first reiterate 
the DS4P capability enables sensitive health information to be 
exchanged electronically with security tags in a standardized format. 
It does not enable the full segmentation of a patient's record within 
an EHR, which may be necessary when responding to a request for EHI. 
Second, we have revised the Infeasibility Exception in the information 
blocking section of this final rule to provide that an actor is not 
required to fulfill a request for access, exchange, or use of EHI if 
the actor cannot unambiguously segment the requested EHI from other 
EHI: (1) Because of a patient's preference or because the EHI cannot be 
made available by law; or (2) because the EHI is withheld in accordance 
with the Harm Exception in Sec.  171.201 (Sec.  171.204(a)(2)). For 
instance, an actor will be covered under this condition if the actor 
could not fulfill a request to access, exchange, or use EHI because the 
requested EHI could not be unambiguously segmented from patient records 
created by federally assisted programs (i.e., Part 2 Programs) for the 
treatment of substance use disorder (and covered by 42 CFR part 2) or 
from records that the patient has expressed a preference not to 
disclose. We refer readers to the Infeasibility Exception discussion in 
section VIII.D.1.d of this final rule.
    Comments. Many commenters noted a low level of adoption for these 
standards and concerns related to readiness expressing that the 
standard

[[Page 25705]]

utility is limited by lack of widespread developer implementation. 
Several commenters encouraged ONC to defer adoption of the DS4P 
criteria with a few commenters recommending that the optional 2015 
Edition criterion should be maintained with document level tagging only 
until practical implementations at scale have been demonstrated at this 
level. One commenter suggested that organic adoption by end-user 
providers will help spark innovation in this emerging standard while 
expressing concern that C-CDA level data tagging for privacy is largely 
untested in real world scenarios. Others encouraged ONC to provide 
additional guidance on the adoption of the DS4P standards and 
certification criteria and forgo the inclusion of this requirement 
until additional real world testing is available. They also indicated 
ONC should first conduct use test cases to demonstrate how this 
functionality will be effectively used across a variety of 
environments.
    Response. We appreciate the comments on the proposed criteria. In 
reference to the DS4P standard's maturity, we note that it is 
considered a ``normative'' standard from the HL7 perspective--a status 
which indicates the content has been enhanced and refined through trial 
use. While we recognize that to date the standard has not been widely 
adopted, the SAMHSA C2S application uses the standard to segment Part 2 
information. Likewise, the U.S. Department of Veterans Affairs (VA) and 
private companies across the country have used the DS4P standard to 
support behavioral health and pediatric care models. In addition, as of 
the fourth quarter of 2019, 34 individual Health IT Modules obtained 
certification to one of or both of the prior 2015 Edition certification 
criteria. Our intent for adopting the updates to these criteria is that 
in the absence of adoption of consensus driven standards there is 
increased risk that single-use-case, proprietary solutions will be 
developed, which may increase fragmentation, provider burden, and cost 
while limiting interoperability. Further, the purpose of adopting these 
criteria is to encourage the use of interoperable standards, in this 
case to use technical standards to compute and persist security tags 
upon exchange of a summary of care document in an interoperable manner. 
In addition, the certification criteria using the DS4P standard are 
voluntary and therefore our intent is, as commenters noted, to support 
organic adoption of technology certified to the criteria by providers 
seeking to implement health IT solutions to replace burdensome manual 
privacy workflows.
    Comments. Several commenters called for the need to increase 
conformity among Federal and State privacy provisions to achieve 
successful implementation of granular tagging. They noted the 
significant policy component involved with the successful 
implementation of the DS4P standard in practice, and in certain 
instances specifically noted support for HIPAA Privacy Rule and 42 CFR 
part 2 harmonization. Several commenters identified specific areas for 
technical development of IT supporting data segmentation for privacy 
based on Federal and State privacy provisions. One commenter indicated 
that ONC could map which clinical codes are associated with certain 
health conditions that receive special privacy protections in addition 
to the HIPAA Rules. Other commenters noted that mapping of privacy 
policy to technical specifications is not a sufficient or adequate 
approach given policy complexities. One commenter indicated a future 
approach should focus on development of criteria that support a data 
provenance driven method of sensitive data management as applicable 
under privacy laws.
    Response. As we have stated, the DS4P standard enables sensitive 
health information to be exchanged electronically with security tags in 
a standardized format and we encourage health IT developers to include 
DS4P functionality and pursue certification of their health IT to these 
criteria in order to help support their users' compliance with relevant 
State and Federal privacy laws that protect sensitive health 
information. We recognize that the current privacy law landscape is 
complex. In light of the complexities of the privacy law landscape, we 
believe that supporting a standard that allows for increased 
granularity in security tagging of sensitive health information would 
better allow for the interoperable exchange of this information to 
support a wide range of privacy related use cases.
    Comments. Many commenters offered an approach for next steps to 
advance the standard. To advance adoption and implementation of the 
standard, several commenters suggested that ONC work closely with 
clinicians, privacy subject matter experts and interoperability experts 
(notably the HL7 Privacy and Security workgroups) to develop a clear 
vision for implementing enhanced data segmentation. Many commenters 
specifically called for ONC to sponsor or lead a multidisciplinary 
workgroup of stakeholders to develop recommendations for industry 
adoption and implementation. One commenter in support of our proposal 
suggested such workgroup focus on including whether additional 
standards are needed, as well as data visualization of non-disclosed 
data and its utilization in clinical decision support algorithms. 
Several commenters cited existing work to help support potential new 
multidisciplinary efforts indicating that one SDO has already 
undertaken early work toward evolving DS4P implementation guidance via 
the HL7 V2 to FHIR mapping project sponsored by the HL7 Orders Work 
Group. One commenter, called for an ONC led public-private 
collaborative effort to reduce data entry burden. One commenter 
recommended that ONC stand up a multi-stakeholder workgroup to identify 
and define policy needs and functional requirements to address patient 
privacy and provider needs.
    Response. We thank commenters for their recommendations. ONC 
believes that data segmentation is an integral capability for 
exchanging sensitive health data. ONC first studied policy 
considerations regarding data segmentation in electronic health 
information exchange in 2010 and informed ONC's launch of the DS4P 
Standards and Interoperability Framework (S&I Framework) Initiative in 
2011.\59\ The initiative focused on the development of a DS4P technical 
specification that would allow highly sensitive health information to 
flow more freely to authorized users while improving the ability of 
users of health IT to meet their obligations under State and Federal 
privacy rules. Recommendations from the initiative called for the use 
of metadata security tags to demonstrate privacy and security 
obligations associated with patient health information. It also advised 
that patients and providers be able to share portions, or segments, of 
records in order to maintain patient privacy. Pilot projects conducted 
under the DS4P S&I Framework Initiative demonstrated ways to enable the 
sharing of information that is protected by Federal and State laws, 
including the substance use disorder treatment confidentiality 
regulations, 42 CFR part 2. ONC's prior Federal Advisory Committee, the 
HITPC, also focused on the health IT certification needed to enable 
exchange of behavioral health data.\60\ Additionally, ONC led a project 
on

[[Page 25706]]

patient choice where the exchange of sensitive data was addressed.\61\ 
ONC also led a project on the Behavioral Health Data Exchange (BHDE) 
Consortium. The purpose of the project was to facilitate and address 
barriers to the intra and interstate exchange of behavioral health 
data.\62\ Currently, ONC's Leading Edge Acceleration Projects (LEAP) in 
Health Information Technology (IT) program seeks to address well-
documented and fast emerging challenges inhibiting the development, 
use, and/or advancement of well-designed, interoperable health IT. In 
2019, one of the two LEAP awards issued by ONC focused on the 
standardization and implementation of the Fast Healthcare 
Interoperability Resources (FHIR[supreg]) Consent resource. Under this 
project, a FHIR[supreg] Consent Implementation Guide (IG) and package 
of open-source prototypes and content to assist partners in using the 
FHIR[supreg] Consent Resource will become available.\63\
---------------------------------------------------------------------------

    \59\ https://archive.healthit.gov/providers-professionals/ds4p-initiative.
    \60\ https://www.healthit.gov/topic/Federal-advisory-committees/health-it-policy-committee-recommendations-national-coordinator.
    \61\ https://www.healthit.gov/topic/patient-consent-electronic-health-information-exchange.
    \62\ https://www.healthit.gov/topic/health-it-health-care-settings/behavioral-health-data-exchange-primary-care-and-behavioral.
    \63\ https://www.healthit.gov/topic/leading-edge-acceleration-projects-leap-health-information-technology-health-it.
---------------------------------------------------------------------------

    Also, ONC actively participates in HL7 International (HL7[supreg]) 
Workgroups and standards-development activities related to data 
segmentation and consent management. It is critical for sensitive 
health information to be included in health information exchange and we 
are exploring opportunities for additional collaboration in the future.
    Comments. One commenter recommended a companion guide be developed 
to assist implementers with the standard. Another indicated ONC should 
provide guidance to facilitate adoption of the DS4P standards and 
certification criteria including dissemination of best practices to 
help ensure that providers can most effectively implement the standards 
and associated workflows. Another referred to a Query-Based Document 
Exchange IG which has further guidance on the ability to assert access 
policies and DS4P implementation considerations.
    Response. The HL7 Version 3 Implementation Guide: Data Segmentation 
for Privacy (DS4P), Release 1, Part 1: CDA R2 and Privacy Metadata 
Reusable Content Profile, May 16, 2014 standard \64\ Sec.  
170.205(o)(1) (HL7 DS4P standard) describes the technical means to 
apply security tags to a health record and data may be tagged at the 
document-level, the section-level, or individual data element-level. 
The HL7 DS4P standard also provides a means to express obligations and 
disclosure restrictions that may exist for the data. We appreciate 
commenters input on additional guidance beyond these certification 
requirements that may prove useful for developers. However, we 
reiterate that in this rule we address only that guidance that is 
required for those developers to voluntarily submit a Health IT Module 
for certification to our criteria. Additional guidance on best 
practices would be outside the scope of this rulemaking. However, as 
noted above, we are committed to continuing to work with stakeholders, 
including health IT developers and those involved in implementing 
privacy policy in the health care industry, to work toward 
interoperable solutions for privacy and consent management.
---------------------------------------------------------------------------

    \64\ https://www.hl7.org/implement/standards/product_brief.cfm?product_id=354.
---------------------------------------------------------------------------

    Comments. We received several comments seeking clarification on our 
proposal to remove the current 2015 Edition ``DS4P-send'' (Sec.  
170.315(b)(7)) and ``DS4P-receive'' (Sec.  170.315(b)(8)) certification 
criteria and to replace these two criteria with three new 2015 Edition 
DS4P certification criteria (two for C-CDA and one for a FHIR-based 
API). As examples, one commenter sought clarification on whether our 
proposal was for DS4P send and receive to become mandatory for the 
revised 2015 Edition certification, or if they will remain voluntary 
criteria. One commenter sought clarification on whether the data 
protections apply to FHIR transmissions. Another indicated that they 
believe the DS4P implementation guide only focuses on data segmentation 
for C-CDA documents and not for HL7 FHIR and sought ONC clarification 
regarding whether or not we intend to apply data segmentation labeling 
to the HL7 FHIR resources in support of the USCDI as well. Another 
commenter recommended that we require FHIR Release 4 version but 
commented that a consistent approach of USCDI across HL7 CDA, C-CDA and 
HL7 FHIR is not attainable at this time. One commenter stated a similar 
need for clarification indicating that the standard for DS4P should be 
HL7 standards for CDA Version 2 and FHIR security tagging and not be 
the SAMHSA C2S stating that ONC should clarify this misunderstanding. 
Another commenter sought clarification by ONC to indicate that the IG 
is for CCDS and not FHIR, and also indicated confusion regarding STU4. 
One commenter noted that the DS4P criteria are only effective for C-
CDA-based data exchange and recommended ONC add FHIR-based standard for 
tagging of sensitive data. Several commenters expressed concern over 
what they described as misalignment of this proposal with other ONC 
policies explaining that neither USCDI nor ARCH, nor HL7 FHIR US Core 
includes the FHIR Composition resource, which would be at the 
equivalent level of granularity as a C-CDA document.
    Response. We thank commenters for their input and we appreciate the 
need for clarity requested by commenters. In the Proposed Rule (84 FR 
7452), we proposed both to adopt an update to the HL7 DS4P standard for 
the existing 2015 Edition certification criteria to support security 
tagging of a C-CDA upon send and receive by removing DS4P-send (Sec.  
170.315(b)(7)) and DS4P-receive (Sec.  170.315(b)(8)) and replacing 
them with DS4P-send (Sec.  170.315(b)(12)) and DS4P-receive (Sec.  
170.315(b)(13)) and to also adopt a new criterion to support API 
exchange via consent management solutions using the FHIR standard. In 
other words, these were two separate proposals, the first to support 
security tags in summary of care documents and another to support 
consent management for specific use cases that leverage a FHIR-based 
API. As of this final rule, these criteria remain voluntary and not 
required under the definition of CEHRT or to participate in any HHS 
program. We proposed these several criteria in a single section of the 
Proposed Rule because of the relationship between them as two potential 
health IT tools that could be part of overarching solutions to manage 
privacy and consent in health information exchange. However, as stated 
earlier, we note that neither of these tools addresses the entirety of 
the scope of data segmentation for privacy. To address the comment on 
the DS4P implementation guide, we confirm that the HL7 DS4P standard in 
Sec.  170.205(o)(1) describes the technical means to apply security 
tags to a health record and data may be tagged at the document-level, 
the section-level, or individual data element-level in the C-CDA and 
not for FHIR. Currently, we do not intend to apply data segmentation 
labeling to the HL7 FHIR resources in support of the USCDI because all 
FHIR resources already include the capability to apply security tags to 
the resource as metadata. We appreciate the recommendation to require 
FHIR Release 4 for consent management but as discussed below, we have 
decided not to finalize the proposal for consent management for APIs in 
this final rule. For further

[[Page 25707]]

discussion of our FHIR-based consent management proposal, we direct 
readers to subsection b below.
    For the updates to the existing DS4P criteria, to support greater 
clarity requested by public comment, rather than removing the existing 
2015 Edition criteria and replacing them with new criteria as proposed, 
we instead finalized a simple update to the existing criteria to note 
the use of the full HL7 DS4P standard for tagging or applying security 
tags at the document, section, and entry level.
    We further note that these updated criteria remain voluntary, and 
that we have finalized modifications in Sec.  170.315(b)(7)(ii) and 
Sec.  170.315(b)(8)(i)(B) to our proposed effective date for this 
change to allow for a longer glide path for health IT developers to 
update Health IT Modules to the full standard to better support 
clinical and administrative workflows. While certification to the 
updated standards will be available after the effective date of this 
final rule upon successful testing, we have finalized that document-
level tagging remains applicable for up to 24 months after the 
publication date of this final rule. For certification and compliance 
of Health IT Modules certified after 24 months after the publication 
date of this final rule, only the full scope of the HL7 DS4P standard 
is applicable. We have finalized this 24 month period for the update 
for these criteria under the real world testing provisions in Sec.  
170.405(b)(6) as follows:
     Security tags. A health IT developer with health IT 
certified to Sec.  170.315 (b)(7) and/or Sec.  170.315 (b)(8) prior to 
June 30, 2020, must:
    [cir] Update their certified health IT to be compliant with the 
revised versions of the criteria adopted in Sec.  170.315(b)(7) and/or 
the revised versions of the criteria adopted in Sec.  170.315(b)(8); 
and
    [cir] Provide its customers of the previously certified health IT 
with certified health IT that meets paragraph (b)(6)(i) of this section 
by May 2, 2022,
    In addition, we have finalized these updated criteria with 
modifications to the criteria names to better describe the function the 
criteria support in interoperable health IT systems. The modifications 
to the criteria are as follows:
     Prior criterion: ``DS4P-send'' (Sec.  170.315(b)(7)) 
includes capabilities for creating a summary care record formatted to 
the C-CDA standard and document-level tagging as restricted (and 
subject to restrictions on re-disclosure) according to the DS4P 
standard.
     Revised criterion: ``Security tags--Summary of Care 
(send)'' (Sec.  170.315(b)(7)) includes capabilities for creating a 
summary of care record formatted to the C-CDA standard and that is 
tagged as restricted and subject to restrictions on re-disclosure 
according to the DS4P standard at the document, section, and entry 
(data element) level, or at the document-level for the period until May 
2, 2022.
     Prior criterion: ``DS4P-receive'' (Sec.  170.315(b)(8)) 
includes capabilities for receiving a summary care record formatted to 
the C-CDA standard and document-level tagged as restricted (and subject 
to restrictions on re-disclosure) according to the DS4P standard.
     Revised criterion: ``Security tags--Summary of Care 
(receive)'' (Sec.  170.315(b)(8)) includes capabilities for receiving a 
summary of care record formatted to the C-CDA standard and that is 
tagged as restricted and subject to restrictions on re-disclosure 
according to the DS4P standard at the document, section, and entry 
(data element) level, or at the document-level for the period until May 
2, 2022. We have finalized our proposal to include in the voluntary 
``Security tags--Summary of Care (receive)'' (Sec.  170.315(b)(8)) 
criterion as a requirement that the Health IT Module has the capability 
to preserve privacy markings to ensure fidelity to the tagging based on 
consent and with respect to sharing and re-disclosure restrictions as 
proposed.
b. Implementation With the Fast Healthcare Interoperability Resources 
(FHIR[supreg]) Standard
    In collaboration with ONC, SAMHSA developed the C2Sapplication to 
address the specific privacy protections for patients with substance 
use disorders whose treatment records are covered by the Federal 
confidentiality regulation, 42 CFR part 2. C2S is an open source 
application for data segmentation and consent management. It is 
designed to integrate with existing FHIR systems. SAMHSA created a FHIR 
implementation guide (the Consent2Share Consent Profile Design, 
hereafter referred to as ``Consent Implementation Guide'') that 
describes how the Consent2Share application and associated access 
control solution (C2S platform) uses the FHIR Consent resource to 
represent and persist patient consent for treatment, research, or 
disclosure.\65\ The implementation guide provides instructions for 
using the FHIR Consent resource to capture a record of a health care 
consumer's privacy preferences.
---------------------------------------------------------------------------

    \65\ The draft FHIR IG titled ``Consent2Share FHIR Profile 
Design.docx'' can be accessed through the Community- Based Care and 
Privacy (CBCP) HL7 workgroup, within the Package Name titled 
``BHITS_FHIR_Consent_IG,'' at https://gforge.hl7.org/gf/project/cbcc/frs/.
---------------------------------------------------------------------------

    In section VII.B.4 of this final rule, we discuss policies related 
to the implementation of a standardized API to support the exchange of 
health information between providers and patients and among members of 
a care team. In the Proposed Rule, we anticipated that the proposed 
2015 Edition ``standardized API for patient and population services'' 
certification criterion (Sec.  170.315(g)(10)) would result in a 
proliferation of APIs that will enable a more flexible and less 
burdensome approach to exchanging EHI. We stated our belief that the 
health care industry could leverage this API infrastructure to share 
segmented data in a secure and scalable manner. Therefore, we proposed 
to adopt a 2015 Edition certification criterion ``consent management 
for APIs'' in Sec.  170.315(g)(11) to support data segmentation and 
consent management through an API in accordance with the Consent 
Implementation Guide.
    Comments. Overall, the majority of commenters were supportive of 
the concept of consent management for APIs but many had concerns with 
the proposed criteria, specifically the adoption of the Consent 
Implementation Guide or the C2S platform as part of a certification 
criterion. Many commenters raised concerns that the Consent 
Implementation Guide has not been balloted as an HL7 standard and noted 
that C2S does not support a consenter's signature or specification to 
protect information content data requirements. A couple of commenters 
stated that the Consent Implementation Guide is a new emerging standard 
in pilot with feedback requested. Commenters also raised concern that 
the IG has not gone through an SDO process. Another commenter raised 
concern that SAMHSA no longer supports the C2S platform and the Consent 
Implementation Guide and it now lacks a steward. A couple of commenters 
suggested ONC defer the consent management criteria at least until an 
API FHIR standard version is finalized and the Consent Implementation 
Guide is revised to conform that to that version. One commenter 
supported the adoption of FHIR v3-based Consent resource, but urged ONC 
to also consider pediatric and geriatric use cases in its adoption. 
Other commenters stated that their understanding was that tagging will 
be

[[Page 25708]]

a feature of FHIR Release 4, but were unclear how the proposal to move 
to FHIR Release 2 would work. One commenter questioned how if there are 
no standards-based approaches for identifying what in the record is 
sensitive, how one could feasibly implement privacy-tagging and consent 
management via FHIR at the Resource level and that tagging at a more 
granular level is too cumbersome and unrealistic. A number of 
commenters stated that the standards were premature and if adopted 
could have unintended negative effects. Commenters were not supportive 
of having two versions of FHIR but instead recommended the use of FHIR 
Release 4. Commenters recommended ONC focus on driving real-world 
implementation experience before adopting the standards.
    On the other hand, a few commenters supported our proposal, and 
stated that the C2S platform and the Consent Implementation Guide is 
mature and already supports granular level security tagging and data 
segmentation and supports several API standards listed in the Proposed 
Rule. One commenter expressed support broadly for the C2S platform 
indicating that, though it was originally designed to satisfy 42 CFR 
part 2 consent for the substance use disorder data, it supports the 
other sensitive categories such as HIV and mental health. Several 
commenters stated that the criteria should be required in the Base EHR 
definition.
    Many providers called for patient education and for ONC to work 
with SAMHSA, OCR, and CMS. It was also suggested that ONC coordinate 
with SAMHSA to establish a public-private project to advance the C2S 
platform and the Consent Implementation Guide using an analogous 
process to that of the Da Vinci Project with transparency and with no 
membership fees. Finally, several commenters raised issues that are out 
of scope for this rule including concerns specifically with the HIPAA 
Rules or 42 CFR part 2 which are under the authority of OCR and SAMHSA 
respectively.
    Response. We appreciate the comments received and the insights into 
real world implementing challenges of consent management. We agree that 
there is continued work to be done to ballot and field test the C2S 
platform and the Consent Implementation Guide and also agree with 
commenters that identified this resource as having significant 
potential to support consent management for specific use cases such as 
42 CFR part 2, behavioral health, and pediatric care. We also note that 
we had included a series of questions in our Proposed Rule related to 
the alignment of FHIR releases and we appreciate comments received 
related to these questions. We direct readers to section VII.B.4.c for 
further discussion of our adoption in this rule the FHIR Release 4 
standard. We note that the Consent Implementation Guide is designed in 
FHIR Release 3 and that there is significant work to be done in 
standards development before the IG would be feasible with FHIR Release 
4. At this time, FHIR Release 4 version of FHIR consent resource is not 
normative and can change from version to version and therefore further 
development, review, balloting, and testing would be required for a 
FHIR Release 4 based IG to be a viable consensus standard for adoption 
in the Program. In consideration of comments, and the scope of the 
additional work required for readiness of an IG that could be adopted 
in our regulations, we have not finalized the proposed ``consent 
management for APIs'' certification criterion in Sec.  170.315(g)(11). 
We maintain, as stated above, that the C2S platform and the Consent 
Implementation Guide may still serve as a template for implementation 
of consent management workflows leveraging APIs and that it may be a 
part of health IT solutions to facilitate health information exchange 
of sensitive information. We will continue to monitor the development 
of the Consent Implementation Guide and other FHIR resources to support 
consent management and may consider including in a future rulemaking.
10. Auditable Events and Tamper-Resistance, Audit Reports, and Auditing 
Actions on Health Information
    Since adopting the Auditable events and tamper-resistance (Sec.  
170.315(d)(2)), Audit Reports (Sec.  170.315(d)(3)), and Auditing 
Actions on health information (Sec.  170.315(d)(10)) criteria in the 
2015 Edition, there has been an update to ASTM E2147--1 standard and 
has been replaced by a newer version. Given the older version has been 
deprecated and based on comments received, we have updated these 
criteria with the most up to date standard, ASTM E1247--18 in Sec.  
170.210(h). We have also updated the requirements to align with the new 
numbering sequence of the updated standard. In order to meet the 
minimum requirements for capturing and auditing electronic health 
information, we have specified, in Sec.  170.210(e)(1)(i), that the 
data elements in sections 7.1.1 through 7.1.3 and 7.1.6, through 7.1.9 
in ASTM E1247--18 are required. We believe that the updated standard 
reinforces what we have previously required and maintained with 
previous certification requirements and note that there is no 
substantial change to the standard.
    We further note that health IT developers must update Health IT 
Modules to these updated standards referenced in these criteria within 
24 months after the publication date of this final rule. We have added 
as a Maintenance of Certification requirement for the real world 
testing Condition of Certification requirement, that health IT 
developers are required to provide the updated certified health IT to 
all their customers with health IT previously certified to the 
identified criteria no later than 24 months after the publication date 
of the final rule. Developers would also need to factor these updates 
into their next real world testing plan as discussed in section VII.B.5 
of this final rule and in Sec.  170.405(b)(7).

C. Unchanged 2015 Edition Criteria--Promoting Interoperability Programs 
Reference Alignment

    In the FY 2019 IPPS/LTCH PPS proposed rule (83 FR 20516), CMS 
proposed scoring and measurement policies to move beyond the three 
stages of meaningful use to a new phase of EHR measurement with an 
increased focus on interoperability and improving patient access to 
health information. To reflect this focus, CMS changed the name of the 
Medicare and Medicaid EHR Incentive Programs, to the Medicare and 
Medicaid Promoting Interoperability (PI) Programs. To align with the 
renaming of the EHR Incentive Programs, we proposed to remove 
references to the EHR Incentive Programs and replace them with 
``Promoting Interoperability Programs'' in the updated 2015 Edition 
``automated numerator recording'' criterion in Sec.  170.315(g)(1) and 
the ``automated measure calculation'' criterion in Sec.  170.315(g)(2).
    Comments. We did not receive any comments on this proposal to 
remove references to the EHR Incentive Programs and replace them with 
``Promoting Interoperability Programs'' in the updated 2015 Edition 
``automated numerator recording'' criterion in Sec.  170.315(g)(1) and 
the ``automated measure calculation'' criterion in Sec.  170.315(g)(2).
    Response. We have removed references to the EHR Incentive Programs 
and replaced them with ``Promoting Interoperability Programs'' in the 
2015 Edition ``automated numerator recording'' criterion in Sec.  
170.315(g)(1) and the ``automated measure calculation'' criterion in 
Sec.  170.315(g)(2).

[[Page 25709]]

V. Modifications to the ONC Health IT Certification Program

A. Corrections

1. Auditable Events and Tamper Resistance
    We proposed to revise Sec.  170.550(h)(3) to require the End-User 
Device Encryption criterion in Sec.  170.315(d)(7) as appropriate, and 
exempt Health IT Modules from having to meet Sec.  170.315(d)(7) when 
the certificate scope does not require Sec.  170.315(d)(7) 
certification (see Sec.  170.315(d)(2)(i)(C)) (84 FR 7454). As noted in 
the Proposed Rule (84 FR 7454), paragraph 170.315(d)(2)(i)(C) was not 
applicable to the privacy and security testing and certification of a 
Health IT Module required by Sec.  170.550(h)(3)(iii), (v), (vii), and 
(viii), but we intended for it to also be exempted from the 
aforementioned paragraphs. We, therefore, proposed to revise Sec.  
170.550(h)(3)(iii), (v), (vii), and (viii) by removing references to 
paragraph 170.315(d)(2)(i)(C).
    Comments. One commenter expressed support of the proposals under 
section V (``Modifications of the ONC Health IT Certification 
Program'') of the Proposed Rule as a whole. However, we received no 
comments specific to this proposal.
    Response. We have finalized the revision as proposed. Certification 
can proceed for the audit log process without the Health IT Module 
demonstrating that it can record an encryption status in accordance 
with Sec.  170.315(d)(2)(i)(C). Paragraph Sec.  170.315(d)(2)(i)(C) is 
not applicable for the privacy and security testing and certification 
of a Health IT Module required by Sec.  170.550(h)(3)(iii), (v), (vii), 
and (viii). We had previously identified this error in guidance,\66\ 
and have now codified the correction to Sec.  170.550(h)(3)(iii), (v), 
(vii), and (viii) in regulation.
---------------------------------------------------------------------------

    \66\ https://www.healthit.gov/test-method/auditable-events-and-tamper-resistance.
---------------------------------------------------------------------------

2. Amendments
    We proposed to revise Sec.  170.550(h) to remove the ``amendments'' 
criterion's application to certain non-applicable clinical criteria 
including: ``Drug-drug, drug-allergy interaction checks for 
computerized provider order entry (CPOE)'' in Sec.  170.315(a)(4); 
``clinical decision support (CDS)'' in Sec.  170.315(a)(9); ``drug-
formulary and preferred drug list checks'' in Sec.  170.315(a)(10); and 
``patient-specific education resources'' in Sec.  170.315(a)(13) (84 FR 
7454). The ``amendments'' certification criterion Sec.  170.315(d)(4) 
is not necessarily indicated for health IT capabilities that may not 
have any patient data for which a request for an amendment would be 
relevant.
    Comments. One commenter expressed support of the proposals under 
section V (``Modifications of the ONC Health IT Certification 
Program'') of the Proposed Rule as a whole. However, we received no 
comments specific to this proposal.
    Response. We have finalized the proposal with modifications. Health 
IT Modules presented for certification to these criteria do not have to 
demonstrate the capabilities required by the revised 2015 Edition 
``amendments'' certification criterion (Sec.  170.315(d)(4)), unless 
the Health IT Module is presented for certification to another 
criterion that requires certification to the 2015 Edition 
``amendments'' criterion under the privacy and security (P&S) 
certification framework. We note that, because we have not finalized 
our proposal to remove the ``drug-formulary and preferred drug list 
checks'' criterion in Sec.  170.315(a)(10) and the ``patient- specific 
education'' criterion in Sec.  170.315(a)(13), but to only permit ONC-
ACBs to issue certificates for these criteria until January 1, 2022, we 
have not removed references to these criteria from the exemption in 
Sec.  170.550(h) at this time. This clarification has already been 
incorporated into sub-regulatory guidance,\67\ and is now codified in 
regulation.
---------------------------------------------------------------------------

    \67\ https://www.healthit.gov/test-method/drug-drug-drug-allergy-interaction-checks-cpoe; https://www.healthit.gov/test-method/clinical-decision-support-cds; https://www.healthit.gov/test-method/drug-formulary-and-preferred-drug-list-checks; and https://www.healthit.gov/test-method/patient-specific-education-resources.
---------------------------------------------------------------------------

3. View, Download, and Transmit to 3rd Party
    We proposed to remove Sec.  170.315(e)(1)(ii)(B), which includes a 
cross-reference to Sec.  170.315(d)(2) indicating that a Health IT 
Module may demonstrate compliance with active history log requirements 
if it is also certified to Sec.  170.315(d)(2) (84 FR 7454).
    Comments. One commenter expressed support of the proposals under 
section V (``Modifications of the ONC Health IT Certification 
Program'') of the Proposed Rule as a whole. However, we received no 
comments specific to this proposal.
    Response. We thank commenters for their support and have finalized 
the proposal to remove Sec.  170.315(e)(1)(ii)(B), which includes a 
cross-reference to Sec.  170.315(d)(2). As noted in the Proposed Rule 
(84 FR 7454), this cross-reference indicates that a Health IT Module 
may demonstrate compliance with activity history log requirements if it 
is also certified to the 2015 Edition ``auditable events and tamper-
resistance'' certification criterion (Sec.  170.315(d)(2)). However, we 
no longer require testing of activity history log when certifying for 
Sec.  170.315(d)(2). Therefore, this cross-reference is no longer 
applicable to meet certification requirements for the updated 2015 
Edition ``view, download, and transmit to 3rd party'' certification 
criterion (Sec.  170.315(e)(1)) activity history log requirements. 
Consequently, we have finalized our proposal to remove Sec.  
170.315(e)(1)(ii)(B).
4. Integrating Revised and New Certification Criteria Into the 2015 
Edition Privacy and Security Certification Framework
    We proposed to require the new certification criteria (Sec.  
170.315(d)(12) and (d)(13)) to apply to all Sec.  170.315 certification 
criteria (84 FR 7454). Therefore, given these and the other 
modifications discussed above, we proposed to revise the P&S 
Certification Framework as shown in Table 1 of the Proposed Rule (84 FR 
7455), noting that the P&S Certification Framework when finalized could 
differ depending on finalization of proposals in section III.B.4 of the 
Proposed Rule (84 FR 7436 and 7437) to remove certain 2015 Edition 
certification criteria.
    Comments. One commenter expressed support of the proposals under 
section V (``Modifications of the ONC Health IT Certification 
Program'') of the Proposed Rule as a whole. However, we received no 
comments specific to this proposal.
    Response. We thank the commenter for their input regarding our 
proposals under section V (``Modifications of the ONC Health IT 
Certification Program'') of the Proposed Rule. We have adopted the 
revisions as proposed with modifications. As noted in section IV.B.8.a, 
we have also adopted both proposed privacy and security transparency 
attestation criteria (Sec.  170.315(d)(12) and (d)(13)) with minor 
modifications. We have applied Sec.  170.315(d)(12) and (d)(13) to all 
certification criteria across the P&S Certification Framework. Table 2 
shows the final updated P&S Certification Framework, which includes all 
changes including the removal of certain 2015 Edition certification 
criteria as finalized in section III.B.4 of this final rule. We updated 
the P&S Certification Framework to reflect other changes made 
throughout this final rule. The privacy and security certification 
criteria applicable to a Health IT Module presented for certification 
is based on the other capabilities included in the Health IT Module and 
for which certification is sought (80 FR 62705). In this final rule, we 
have determined that

[[Page 25710]]

Sec.  170.315(b)(10) and, consistent with the rationale provided in the 
2015 Edition final rule, (g)(1) through (6) are exempt from the P&S 
Certification Framework due to the capabilities included in these 
criteria, which do not implicate privacy and security concerns (80 FR 
62707). We have revised Sec.  170.550(h) of this final rule to reflect 
these clarifications. We also corrected Table 2 to accurately reflect 
the regulatory text at Sec.  170.315(a)(3), (a)(14), and (a)(15). 
Sections 170.315(a)(3), (a)(14), and (a)(15), though included in the 
regulatory text, were erroneously deleted in the Proposed 2015 Edition 
Privacy and Security Certification Framework table and we corrected it 
in Table 2.

                       Table 2--2015 Edition Privacy and Security Certification Framework
----------------------------------------------------------------------------------------------------------------
                                        It will need to be certified to approach 1 or approach 2 for each of the
   If the Health IT Module includes          P&S certification criteria listed in the ``approach 1'' column
 capabilities for certification listed -------------------------------------------------------------------------
                under:                               Approach 1                           Approach 2
----------------------------------------------------------------------------------------------------------------
Sec.   170.315(a)(1) through (3), (5),  Sec.   170.315(d)(1)                 For each applicable P&S
 (12), (14), and (15).                   (authentication, access control,     certification criterion not
                                         and authorization), (d)(2)           certified using Approach 1, the
                                         (auditable events and tamper         health IT developer submits system
                                         resistance), (d)(3) (audit           documentation that is sufficiently
                                         reports), (d)(4) (amendments),       detailed to enable integration
                                         (d)(5) (automatic log-off), (d)(6)   such that the Health IT Module has
                                         (emergency access), (d)(7) (end-     implemented service interfaces for
                                         user device encryption) (d)(12)      each applicable P&S certification
                                         (encrypt authentication              criterion that enable the Health
                                         credentials) (d)(13) (multi-factor   IT Module to access external
                                         authentication).                     services necessary to meet the
                                                                              requirements of the P&S
                                                                              certification criterion.
Sec.   170.315(a)(4), (9), (10), and    Sec.   170.315(d)(1) through
 (13).                                   (d)(3), (d)(5) through (d)(7),
                                         (d)(12), and (d)(13).
Sec.   170.315(b)(1) through (3) and    Sec.   170.315(d)(1) through
 (6) through (9).                        (d)(3), (d)(5) through (d)(8)
                                         (integrity), (d)(12), and (d)(13).
Sec.   170.315(c).....................  Sec.   170.315(d)(1) through (d)(3)
                                         and (d)(5), (d)(12), and (d)(13) *.
Sec.   170.315(e)(1)..................  Sec.   170.315(d)(1) through
                                         (d)(3), (d)(5), (d)(7), (d)(9)
                                         (trusted connection), (d)(12), and
                                         (d)(13).
Sec.   170.315(e)(2) and (3)..........  Sec.   170.315(d)(1) through
                                         (d)(3), (d)(5), (d)(9), (d)(12),
                                         and (d)(13) *.
Sec.   170.315(f).....................  Sec.   170.315(d)(1) through
                                         (d)(3), (d)(7), (d)(12), and
                                         (d)(13).
Sec.   170.315(g)(7) through (g)(10)..  Sec.   170.315(d)(1) and (d)(9);
                                         (d)(2) or (d)(10) (auditing
                                         actions on health information),
                                         (d)(12), and (d)(13).
Sec.   170.315(h).....................  Sec.   170.315(d)(1) through
                                         (d)(3), (d)(12), and (d)(13) *.
----------------------------------------------------------------------------------------------------------------
An ONC-ACB must ensure that a Health IT Module presented for certification to any of the certification criteria
  that fall into each regulatory text ``first level paragraph'' category of Sec.   170.315 (e.g., Sec.
  170.315(a)) identified in Table 2 is certified to either Approach 1 (technically demonstrate) or Approach 2
  (system documentation).
In order to be issued a certification, a Health IT Module would only need to be tested once to each applicable
  privacy and security criterion identified as part of Approach 1 or Approach 2 so long as the health IT
  developer attests that such privacy and security capabilities apply to the full scope of capabilities included
  in the requested certification, except for the certification of a Health IT Module to Sec.   170.315(e)(1)
  ``view, download, and transmit to 3rd party.'' For this criterion, a Health IT Module must be separately
  tested to Sec.   170.315(d)(9) because of the specific capabilities for secure electronic transmission
  included in the criterion.
* Sec.   170.315(d)(2)(i)(C) is not required if the scope of the Health IT Module does not include end-user
  device encryption features.

B. Principles of Proper Conduct for ONC-ACBs

1. Records Retention
    We proposed to revise the records retention requirement in Sec.  
170.523(g) to include the ``life of the edition'' as well as three 
years after the retirement of an edition related to the certification 
of Complete EHRs and Health IT Modules (84 FR 7456). We also proposed 
to clarify that HHS has the ability to access certification records for 
the ``life of the edition,'' which begins with the codification of an 
edition of certification criteria in the Code of Federal Regulations 
through a minimum of three years from the effective date of the final 
rule that removes the applicable edition from the Code of Federal 
Regulations (CFR), not solely during the three-year period after 
removal from the CFR (84 FR 7456).
    Comments. Several commenters expressed support for ONC's proposal 
to revise the records retention requirement. Another commenter 
requested that ONC provide a separate posting or notice that lists the 
dates specific to when the ``life of the edition'' starts and dates 
specific to when the ``life of the edition'' and the minimum period of 
three years from the effective date that removes the applicable edition 
end.
    Response. We thank commenters for their input and have finalized 
this revision as proposed. Because the ``life of the edition'' begins 
with the codification of an edition of certification criteria in the 
CFR and ends on the effective date of the final rule that removes the 
applicable edition from the CFR, the start and end dates for the ``life 
of the edition'' are published in the Federal Register in the 
rulemaking actions that finalize them. The period of three years beyond 
the ``life of the edition'' begins on the effective date of the final 
rule that removes the applicable edition from the CFR, thus the three-
year period after removal from the CFR continues through three full 
calendar years following that date. For example, if the effective date 
of a hypothetical final rule removing an edition from the CFR were July 
1, 2025, then the three year period following the end of the life of 
this hypothetical edition would be June 30, 2028. We anticipate 
continuing to work with ONC-ACBs to provide guidance and information 
resources as necessary or appropriate to promote successful adherence 
to all Principles of Proper

[[Page 25711]]

Conduct (PoPC) applicable to their participation in the Program.
2. Conformance Methods for Certification Criteria
    The PoPC in Sec.  170.523(h) specified that ONC-ACBs may only 
certify health IT that has been tested by ONC-ATLs using tools and test 
procedures approved by the National Coordinator. We proposed to revise 
the PoPC in Sec.  170.523(h) in three ways (84 FR 7456).
    First, we proposed to revise this PoPC to additionally permit ONC-
ACBs to certify Health IT Modules that the ONC-ACB has evaluated for 
conformance with certification criteria without first passing through 
an ONC-ATL. However, we proposed that such methods to determine 
conformity must first be approved by the National Coordinator.
    Second, we proposed to revise the PoPC to clarify that 
certifications can only be issued to Health IT Modules and not Complete 
EHRs. We proposed to remove the 2014 Edition from the CFR (see section 
III.B.2 of this preamble) and Complete EHR certifications are no longer 
available for certification to the 2015 Edition (80 FR 62608; 79 FR 
54443). We also proposed to remove the provision that permits the use 
of test results from National Voluntary Laboratory Accreditation 
Program (NVLAP)-accredited testing laboratories under the Program 
because the regulatory transition period from NVLAP-accredited testing 
laboratories to ONC-ATLs has expired (81 FR 72447).
    Third, we proposed to remove the provision that permits the 
certification of health IT previously certified to an edition if the 
certification criterion or criteria to which the Health IT Module(s) 
was previously certified have not been revised and no new certification 
criteria are applicable because the circumstances that this provision 
seeks to address are no longer feasible with certification to the 2015 
Edition.
    Comments. One commenter sought clarification on whether the 
proposal to remove references to Sec.  170.545, which includes the 
ability to maintain Complete EHR certification, would impact Sec.  
170.550(k), which requires ONC-ACBs to accept requests for a newer 
version of a previously certified Health IT Module(s) to inherit the 
certified status of the previously certified Health IT Module(s) 
without requiring the newer version to be recertified. The commenter 
strongly urged ONC to allow ONC-ACBs to grant inherited certification 
status to updated versions of certified technology. Another commenter 
expressed support for ONC's proposal to revise the PoPC to clarify that 
certifications can only be issued to Health IT Modules and not Complete 
EHRs. The commenter also expressed support for ONC's proposal to remove 
the provision that permits the certification of health IT previously 
certified to an edition if the certification criterion or criteria to 
which the Health IT Module(s) was previously certified have not been 
revised and no new certification criteria are applicable because the 
circumstances that this provision seeks to address are no longer 
feasible with certification to the 2015 Edition.
    Response. We have finalized the proposal to revise the PoPC in 
Sec.  170.523(h). As noted in the Proposed Rule, the ability to 
maintain Complete EHR certification is only permitted with health IT 
certified to the 2014 Edition certification criteria (84 FR 7435). 
Because this concept was not continued in the 2015 Edition (84 FR 
7456), we proposed revisions to clarify that Complete EHR 
certifications are no longer available. We note that ONC-ACBs have 
discretion, and processes in place, to evaluate updates made to 
certified health IT and assess the need for additional testing. These 
ONC-ACB processes allow for efficient certification of upgraded version 
releases of previously certified health IT while ensuring its continued 
conformity with certification criteria and standards to which the prior 
version release of the same Module(s) had been certified. We have 
finalized this proposal.
    Comments. Multiple commenters expressed support for the use of 
conformance methods approved by the National Coordinator. One commenter 
noted that the opportunity would enable alternative testing methods and 
less costly testing. Another commenter noted that this proposal would 
reduce burden for EHR developers and for ONC-ATLs by leveraging 
certification programs and alternative test methods and specifically 
requested that ONC consider a specific proprietary certification 
related to e-prescribing functionalities for potential approval. While 
expressing appreciation for the flexibility offered by the proposed 
revision, one commenter expressed concern about certifications based on 
other ONC-approved conformance methods that are not specifically 
designed to test against the ONC criteria and stressed the importance 
of assessing conformance to technical standards before being deployed 
to end users. Another commenter questioned whether the ONC-ACB would be 
permitted to do all evaluation directly, thus eliminating the need for 
ONC-ATLs entirely. Two commenters sought clarity from ONC as to what 
metrics the National Coordinator will use to approve a conformance 
method. These commenters also sought clarification on ONC's plan to 
reduce the risk of developers seeking certification through fraudulent 
means. The commenters cited the example of two developers who are 
currently operating under corporate integrity agreements with the HHS 
Office of the Inspector General due to court cases brought against them 
in relation to conduct including, but not limited to, the process of 
seeking certification.
    Response. We thank commenters for their feedback. We have finalized 
the proposal to revise the PoPC in Sec.  170.523(h) to permit a 
certification decision to be based on an evaluation conducted by the 
ONC-ACB for Health IT Modules' compliance with certification criteria 
by use of conformity methods approved by the National Coordinator.
    We note that all certification criteria will continue to have some 
method of holding developers responsible for demonstrating conformity 
whether through ONC-ATL testing, developer self-declaration, or some 
other method assessed and approved by the National Coordinator. As 
noted in the Proposed Rule (84 FR 7456), ONC acknowledges that there is 
a broad spectrum of types of evidence of conformance, from laboratory 
testing with an ONC-ATL to developer self-declaration. Some of these 
types of evidence may be more appropriate than others in specific 
circumstances. Historically, it has been proven that, in some 
circumstances, the requirement for ONC-ATL testing has presented more 
administrative burden on health IT developers than benefits for 
assessing conformity. For example, under Sec.  170.315(a)(5) 
demographics certification criteria require only documentation or a 
visual inspection, and do not require testing by an ONC-ATL. We note 
that industry advancements have presented opportunities for improved 
efficiency for demonstrating conformity and this flexibility will allow 
the Program to advance as the state of the art for demonstrating 
conformance evolves. This flexibility addresses the current Program 
construct limitation of ONC-ACB certification only being permissible 
for health IT that has been tested by an ONC-ATL with ONC-approved test 
procedures. In some instances, such as developer self-declaration, 
there is no testing required and thus bypassing the ONC-ATL testing 
step reduces burden and enables a more streamlined and

[[Page 25712]]

efficient process. By adopting this flexibility, we may approve 
conformance methods that rely solely on ONC-ACB evaluation, and not 
ONC-ATL testing, when appropriate.
    We will follow the same process used for alternative test methods 
(76 FR 1280) for the submission of non-governmental developed 
conformance methods to the National Coordinator for approval. A person 
or entity may submit a conformance method to the National Coordinator 
to be considered for approval for use under the Program. The submission 
should identify the developer of the conformance method; specify the 
certification criterion or criteria that is/are addressed by the 
conformance method; and explain how the conformance method would 
evaluate a Health IT Module's or, if applicable, other type of health 
IT's, compliance with the applicable certification criterion or 
criteria. The submission should also provide information describing the 
process used to develop the conformance method, including any 
opportunity for the public to comment on the conformance method and the 
degree to which public comments were considered. In determining whether 
to approve a conformance method for purposes of the Program, the 
National Coordinator will consider whether it is clearly traceable to a 
certification criterion or criteria adopted by the Secretary; whether 
it is sufficiently comprehensive (i.e., assesses all required 
capabilities) for the assessment of Health IT Modules', or other type 
of health IT's, conformance to the certification criterion or criteria 
adopted by the Secretary; whether an appropriate public comment process 
was used during the development of the conformance method; and any 
other relevant factors. When the National Coordinator has approved a 
conformance method for purposes of the Program, we will publish a 
notice of availability in the Federal Register and identify the 
approved conformance method on the ONC website.
3. ONC-ACBs To Accept Test Results From Any ONC-ATL in Good Standing
    We proposed to add the PoPC for ONC-ACBs in Sec.  170.523(r) in 
order to address business relationships between ONC-ACBs and ONC-ATLs 
(84 FR 7456). To encourage market competition, we proposed to require 
ONC-ACBs to accept test results from any ONC-ATL that is in good 
standing under the Program and is compliant with its ISO/IEC 17025 
accreditation requirements. However, if an ONC-ACB has concerns about 
accepting test results from a certain ONC-ATL, the ONC-ACB would have 
an opportunity to explain the potential issues to ONC and NVLAP, and on 
a case-by-case basis, ONC could consider the facts and make the final 
determination.
    Comments. Multiple commenters expressed support for the proposed 
requirement that ONC-ACBs must accept test results from any ONC-ATL in 
good standing. One commenter expressed an opinion that this proposal 
has value in ensuring the credibility of the Program. Another commenter 
agreed that this proposal would encourage market competition and 
provide more options to developers. One commenter recommended that ONC-
ATLs should also be required to provide their results to any ONC-ACB to 
which the developer has chosen to present its health IT for 
certification, stating that this consistency across ONC-ACBs and ONC-
ATLs would ensure market competition.
    Response. We thank commenters for their input. We have finalized 
the PoPC for ONC-ACBs in Sec.  170.523(r) as proposed. While an ONC-ATL 
attempting to inappropriately restrict developers' choice of ONC-ACBs 
to those favored by the ONC-ATL would not support appropriate 
competition, we do not believe it would be practical to mandate direct 
transmission of ONC-ATL results to any ONC-ACB designated by the 
developer, in part because developers often do not initiate engagement 
with an ONC-ACB until after they have received and had a chance to 
review their ONC-ATL results. To date, we are not aware of substantial 
evidence that the standard practice of NVLAP-accredited testing 
laboratories providing test results to the client who engaged them to 
test their Health IT Modules is not serving as a sufficient safeguard 
against anti-competitive behavior on the part of ONC-ATLs in relation 
to their client developers' selection of ONC-ACBs.
4. Mandatory Disclosures and Certifications
    We proposed to revise the PoPC in Sec.  170.523(k) to remove Sec.  
170.523(k)(1)(ii)(B) because certifications can only be issued to 
Health IT Modules and not Complete EHRs (84 FR 7456). We also proposed 
to revise Sec.  170.523(k)(1)(iii)(A) to broaden the section beyond the 
Promoting Interoperability (PI) Programs. We proposed to revise the 
section to include a detailed description of all known material 
information concerning additional types of costs or fees that a user 
may be required to pay to implement or use the Health IT Module's 
capabilities, whether to meet provisions of HHS programs requiring the 
use of certified health IT or to achieve any other use within the scope 
of the health IT's certification.
    We also proposed to remove the provision in Sec.  170.523(k)(3) 
that requires a certification issued to a pre-coordinated, integrated 
bundle of Health IT Modules to be treated the same as a certification 
issued to a Complete EHR for the purposes of Sec.  170.523(k)(1), 
except that the certification must also indicate each Health IT Module 
that is included in the bundle (84 FR 7457).
    We proposed to revise Sec.  170.523(k)(4) to clarify that a 
certification issued to a Health IT Module based solely on the 
applicable certification criteria adopted by the ONC Health IT 
Certification Program must be separate and distinct from any other 
certification(s) based on other criteria or requirements (84 FR 7457).
    We also proposed changes related to transparency attestations and 
disclosures of limitations in section III.B.5 of the Proposed Rule 
preamble (84 FR 7437 and 7438). Additionally, we proposed other new 
PoPC for ONC-ACBs as discussed in sections VII.B.5 (84 FR 7501) and 
VII.D (84 FR 7506 and 7507) of the Proposed Rule preamble.
    Comments. Multiple commenters expressed support for ONC's proposal 
to include a detailed description of all known material information 
concerning additional types of costs or fees that a user may be 
required to pay to implement or use the Health IT Module's 
capabilities--whether to meet provisions of HHS programs requiring the 
use of certified health IT or to achieve any other use within the scope 
of the health IT's certification. One commenter endorsed the 
transparency that this proposal would provide, noting that it would 
help providers budget for their health IT, but also expressed concern 
that requiring developers to disclose how much they charge for a 
particular functionality may be impractical due to variations across 
contracts and over time, or potentially have unintended consequences on 
market pricing. Multiple commenters expressed support for our proposal 
to remove subsection Sec.  170.523(k)(1)(ii)(B). One commenter 
expressed support for ONC's proposed revisions to Sec.  170.523(k)(4). 
Another commenter was supportive of the proposal to remove the 
provision in Sec.  170.523(k)(3).
    Response. We thank commenters for their support. We have finalized 
the proposals, in their entirety, as proposed. To clarify, the 
finalized revision in Sec.  170.523(k) requires disclosure of a 
detailed description of all known material information concerning

[[Page 25713]]

additional types of costs or fees a user may be required to incur or 
pay to implement or use the Health IT Module's capabilities to achieve 
any use within the scope of the health IT's certification. We emphasize 
that (unless required elsewhere in CFR part 170) the requirement is for 
a description of the types of costs or fees, not predicted amounts of 
these costs or fees across the full array of probable implementation 
circumstances or over time. Among other considerations, we note that 
costs required to achieve some particular uses within the scope of some 
certifications may be for third-party services outside the control of 
the developer required to disclose the detailed description.

C. Principles of Proper Conduct for ONC-ATLs--Records Retention

    We proposed to revise the records retention requirement in Sec.  
170.524(f) to include the ``life of the edition'' as well as 3 years 
after the retirement of an edition related to the testing of Health IT 
Module(s) to an edition of certification criteria (84 FR 7457). The 
circumstances are the same as in section V.B.1 of the Proposed Rule 
preamble, as summarized above. Therefore, we proposed the same 
revisions for ONC-ATLs as we did for ONC-ACBs. We did not receive any 
comments specific to this proposed revision to the PoPC for ONC-ATLs. 
In light of the absence of comments, we have finalized the revisions as 
proposed.

VI. Health IT for the Care Continuum

    Health IT should help promote and support patient care when and 
where it is needed. This means health IT should help support patient 
populations, specialized care, transitions of care, and practice 
settings across the care continuum. In the Proposed Rule, we provided a 
history of the many actions we have taken since the inception of the 
ONC Health IT Certification Program through the Proposed Rule (84 FR 
7457). As stated in the Proposed Rule, section 4001(b)(i) of the Cures 
Act instructs the National Coordinator to encourage, keep, or 
recognize, through existing authorities, the voluntary certification of 
health IT under the Program for use in medical specialties and sites of 
service for which no such technology is available or where more 
technological advancement or integration is needed. This provision of 
the Cures Act closely aligns with our ongoing collaborative efforts 
with both Federal partners and stakeholders within the health care and 
health IT community to encourage and support the advancement of health 
IT for a wide range of clinical settings. These initiatives have 
included projects related to clinical priorities beyond those 
specifically included in the EHR Incentive Programs (now called the 
Promoting Interoperability Programs) including efforts in public 
health, behavioral health, and long-term and post-acute care. We noted 
in the Proposed Rule that these initiatives often include the 
development of non-regulatory informational resources to support the 
specific implementation goal and align with the technical 
specifications already available in the Program for certification. To 
advance these efforts, we also explained in the Proposed Rule that we 
generally consider a range of factors including: Stakeholder input and 
identification of clinical needs and clinical priorities, the evolution 
and adoption of health IT across the care continuum, the costs and 
benefits associated with any policy or implementation strategy related 
to care settings and sites of service, and potential regulatory burden 
and compliance timelines. Our goal was then and is now to support the 
advancement of interoperable health IT and to promote health IT 
functionality in care and practice settings across the care continuum 
(see 80 FR 62604). As stated in the Proposed Rule (84 FR 7458), 
generally, our approach can be summarized in three parts:
     First, we analyze existing certification criteria to 
identify how such criteria may be applicable for medical specialties 
and sites of service.
     Second, we focus on the real-time evaluation of existing 
and emerging standards to determine applicability to medical 
specialties and sites of service as well as to the broader care 
continuum, including the evaluation of such standards for inclusion in 
the ONC Interoperability Standards Advisory (ISA).\68\
---------------------------------------------------------------------------

    \68\ https://www.healthit.gov/isa/.
---------------------------------------------------------------------------

     Third, we may work in collaboration with stakeholders to 
support the development of informational resources for medical 
specialties and sites of service for which we identify a need to 
advance the effective implementation of certified health IT.
    We continue to believe this approach is economical, flexible, and 
responsive for both health care providers and the health IT industry. 
It is also in alignment with the provisions of section 4001(a) in the 
Cures Act related to burden reduction and promoting interoperability. 
We are committed to continuing to work with stakeholders to promote the 
adoption of health IT to support medical specialties and sites of 
service and to help ensure that providers have the tools they need 
(such as access to essential health information across care settings) 
to support patients at the point of care.

A. Health IT for Pediatric Setting

    Section 4001(b)(iii) of the Cures Act--``Health information 
technology for pediatrics'' requires:
     First, that the Secretary, in consultation with relevant 
stakeholders, shall make recommendations for the voluntary 
certification of health IT for use by pediatric health providers to 
support the health care of children, and
     Second, that the Secretary shall adopt certification 
criteria to support the voluntary certification of health IT for use by 
pediatric health providers to support the health care of children.
    In the Proposed Rule (84 FR 7458), we described our approach to 
stakeholder engagement, the analysis used to develop the 
recommendations, the specific 2015 Edition certification criteria that 
support each recommendation, and the voluntary certification of health 
IT for use by pediatric health providers to support the health care of 
children.
    Comments. We received several comments requesting further 
clarification on whether the pediatric health IT recommendations will 
be adopted as an independent certification program and/or certification 
criteria designated specifically for pediatric care. One commenter 
recommended that pediatric provisions should be formalized over time 
within what they refer to as the current pediatric program and not as a 
separate program, and that this future aligns with the 2015 Children's 
EHR Format. One commenter also sought clarification as whether ONC 
intends for other government agencies/programs such as CHIP, to develop 
conditions of participation or financial incentives around the adoption 
of certification criteria identified in this rulemaking. We also 
received several comments stating that since current EHRs have 
pediatric capabilities, there is no need to specify requirements in 
regulation, and that there is no value in having EHRs certified as 
``pediatric-friendly,'' only increased costs. We also received several 
comments stating that our approach reflects an attempt to retrofit the 
needs of pediatric patients by using adult requirements.
    Response. We thank commenters for their feedback. The comments we 
received suggests a need for greater clarity on our approach. We 
therefore reiterate that we did not propose to adopt care- or practice-
specific certification tracks, or additional

[[Page 25714]]

voluntary program(s), in parallel to the existing voluntary ONC Health 
IT Certification Program. In the Proposed Rule, we reiterated our 
statements from the 2015 Edition final rule, which explained that we 
did not intend to develop and issue separate regulatory certification 
``paths'' or ``tracks'' for particular care or practice settings (e.g., 
a ``long-term and post-acute care (LTPAC) certification'') because it 
would be difficult to independently construct such ``paths'' or 
``tracks'' in a manner that would align with other relevant programs 
and specific stakeholder needs. We further stated that stakeholders had 
indicated that separate certification pathways could have unintended 
consequences related to increasing burden on health care providers and 
health IT developers. We also stated that we would welcome the 
opportunity to work with HHS agencies, other agencies, and provider 
associations in identifying the appropriate functionality and 
certification criteria in the Program to support their stakeholders (80 
FR 62704). In response to the comments regarding our approach to 
implement section 4001(b) of the Cures Act, we clarify that the 2015 
Edition certification criteria identified for the voluntary 
certification of health IT for use by pediatric health providers are 
agnostic to the age of the patient (with the exception of the pediatric 
vital signs in the USCDI). Therefore, we believe our approach to 
fulfilling the Cures Act requirement for pediatric health care 
providers and settings, which involves identifying existing, new, or 
revised 2015 Edition criteria--as applicable to an identified clinical 
or interoperability priority--is appropriate across patient 
populations. We also note that our authority is limited to implementing 
the described requirements of the Cures Act related to pediatric 
settings. We cannot speak for the actions of other Federal agencies, 
but would note once again that we have taken a limited regulatory 
approach to implementing the pediatric provisions of the Cures Act.
    Comments. We received multiple comments requesting clarification on 
the intended use and functionality of the Certified Health IT Products 
List (CHPL) for pediatric certification, such as guidance on navigating 
the CHPL to identify relevant products based on pediatric care 
settings.
    Response. We thank stakeholders for their comments on the CHPL. We 
do not intend to have a separate tag functionality on the CHPL that 
identifies a product specifically for pediatric care. We did not 
propose, and do not intend, for there to be a separate certification 
pathway or a new ONC certification designation called pediatric 
certification. However, we recognize that beyond certification and 
testing there are certain implementation needs that are important for 
pediatric care and services. We agree with the overwhelming prior 
feedback from stakeholders stating that they should not have to 
purchase separate products that contain universally applicable 
functionality, such as the ``API functionality'' certification 
criteria. We are exploring options for non-regulatory informational 
resources on effective implementation of health IT for use by pediatric 
health providers to expand the availability of health IT products 
supporting the care of children.
    Comments. We received comments regarding how the approach for 
voluntary certification of health IT for use by pediatric health 
providers might be applicable to other medical specialties and use 
cases. One commenter noted that the pediatric experience is scalable 
and should be extended to other disciplines. Another commenter sought 
clarification if this model could be used for broad applicability to 
multiple medical specialties such as pathologists.
    Response. We thank these commenters for identifying the 
applicability of our approach to pediatrics to other medical 
specialties. We confirm that our approach for advancing health IT can 
be used for other use cases and medical specialties, and welcome the 
opportunity to engage with stakeholders representing a wide range of 
medical specialties or sites of service to provide insight into this 
process and to inform stakeholder-led efforts to improve clinically-
relevant health IT implementation across specialties and settings of 
care.
1. Background and Stakeholder Convening
    Over the past ten years, a number of initiatives have focused on 
the availability and use of effective health IT tools and resources for 
pediatric care. These have included a number of public-private 
partnerships including efforts between HHS, State agencies, and health 
systems for innovative projects that range from care coordination 
enterprise solutions to immunization information systems and to point 
of care solutions for specialty needs. In order to learn from and build 
upon these efforts, ONC has engaged with stakeholders in both the 
public and private sector including other Federal, State and local 
government partners, health care providers engaged in the care of 
children, standards developing organizations, charitable foundations 
engaged in children's health care research, and health IT developers 
supporting pediatric care settings. For example, significant work has 
been done by the Agency for Healthcare Research and Quality (AHRQ), 
CMS, the Health Resources and Services Administration (HRSA), and 
organizations around the Children's EHR Format (Children's Format), 
which is critical to any discussion of the pediatric health IT 
landscape.\69\
---------------------------------------------------------------------------

    \69\ Agency for Health Care Information and Technology. Health 
Information Technology. https://healthit.ahrq.gov/health-it-tools-and-resources/childrens-electronic-health-record-ehr-format. 
Accessed September, 2017.
---------------------------------------------------------------------------

    The Children's Format was authorized by the 2009 Children's Health 
Insurance Program Reauthorization Act (CHIPRA) \70\ and developed by 
AHRQ in close collaboration with CMS. It was developed to bridge the 
gap between the functionality present in most EHRs currently available 
and the functionality that could optimally support the care of 
children. Specifically, the Children's Format provides information to 
EHR system developers and others about critical functionality and other 
requirements that are helpful to include in an EHR system to address 
health care needs specific to the care of children. The final version 
of the Children's Format, released in 2015, consists of 47 high 
priority functional requirements in 19 topic areas that focus on 
improvements that would better support the safety and quality of care 
delivered to children. The Children's Format was intended as a starting 
point for developers, users, and purchasers for informing an approach 
for pediatric voluntary certification. We refer to the Voluntary 
Edition proposed rule for a description of our prior discussion around 
the Children's Format (79 FR 10930).
---------------------------------------------------------------------------

    \70\ Pub. L. 111-3, section 401 https://healthit.ahrq.gov/sites/default/files/docs/citation/children-ehr-format-enhancement-final-recommendation-report-abridged.pdf.
---------------------------------------------------------------------------

    In the summer of 2017, the American Academy of Pediatrics (AAP) 
reviewed the 2015 Children's Format using a robust analytical process 
and engagement with their members. The result was a prioritized list of 
eight clinical priorities to support pediatric health care (``Priority 
List''). In October 2017, we held a technical discussion with 
stakeholders titled ``Health IT for Pediatrics'' with the specific 
purpose of obtaining input from an array of stakeholders in an effort 
to draw correlations between the pediatric providers' clinical 
priorities identified in the Priority List with the detailed

[[Page 25715]]

technical requirements outlined in the Children's Format and the 
capabilities and standards that could be included in certified health 
IT. Through this collaborative approach, the meeting participants 
identified a set of priority needs for health IT to support pediatric 
care based upon those identified by the Priority List and the primary 
correlation to the Children's Format.
2. Recommendations for the Voluntary Certification of Health IT for Use 
in Pediatric Care
    To support the first part of section 4001(b) of the Cures Act, we 
considered the historical efforts on the Children's Format, the input 
from stakeholders, and our own technical analysis and review of health 
IT capabilities and standards to develop a set of recommendations for 
voluntary certification of health information technology for use by 
pediatric health providers to support the health care of children. 
These include eight recommendations related to the Priority List:
     Recommendation 1: Use biometric-specific norms for growth 
curves and support growth charts for children
     Recommendation 2: Compute weight-based drug dosage
     Recommendation 3: Ability to document all guardians and 
caregivers
     Recommendation 4: Segmented access to information
     Recommendation 5: Synchronize immunization histories with 
registries
     Recommendation 6: Age- and weight- specific single-dose 
range checking
     Recommendation 7: Transferrable access authority
     Recommendation 8: Associate maternal health information 
and demographics with newborn
    We also developed two additional recommendations beyond the 
Priority List, which relate to other items within the Children's Format 
that are considered important to pediatric stakeholders. These 
additional recommendations, which may be supported by certified health 
IT, are as follows:
     Recommendation 9: Track incomplete preventative care 
opportunities
     Recommendation 10: Flag special health care needs
    In order to implement the second part of section 4001(b) of the 
Cures Act for the adoption of certification criteria to support the 
voluntary certification of health IT for use by pediatric health care 
providers, we identified both the 2015 Edition certification criteria 
and the new or revised certification criteria proposed in the Proposed 
Rule that support the 10 recommendations for the voluntary 
certification of health IT for use by pediatric health providers to 
support the health care of children. In the Proposed Rule (84 FR 7459), 
we directed readers to the appendix of the Proposed Rule for a set of 
technical worksheets, which include a crosswalk of the various criteria 
specifically associated with each recommendation. These worksheets 
outlined the following information:
     The alignment of each recommendation to the primary 
Children's Format \71\ item identified by stakeholders
---------------------------------------------------------------------------

    \71\ https://healthit.ahrq.gov/health-it-tools-and-resources/childrens-electronic-health-record-ehr-format.
---------------------------------------------------------------------------

     The alignment of each recommendation to the 2015 Edition 
certification criteria and the new or revised criteria described in the 
Proposed Rule
     Supplemental items from the Children's Format for each 
recommendation and the related 2015 Edition certification criteria
    We also sought comment on the following:
    1. Relevant gaps, barriers, safety concerns, and resources 
(including available best practices, activities, and tools) that may 
impact or support feasibility of the recommendation in practice.
    2. Effective use of health IT itself in support of each 
recommendation as it relates to provider training, establishing 
workflows, and other related safety and usability considerations.
    3. If any of the 10 recommendations should not be included in ONC's 
final recommendations for voluntary certification of health IT for use 
by pediatric health providers to support the health care of children.
    4. Any certification criteria from the Program that is identified 
for the 10 recommendations that should not be included to support the 
specific recommendation.
    Comments. We received many comments asking for detailed guidance 
and/or implementation specifications post final rulemaking, with one 
commenter noting that the majority of recommendations require 
additional capabilities beyond the scope of any aligned existing or 
proposed certification criteria. We also received many comments 
providing implementation recommendations specific to the 10 ONC 
recommendations for the voluntary certification of health IT for use by 
pediatric health providers such as adding in developmental activity 
milestones, including what versions of growth charts should be 
supported, and including listings to clearly identify medical home 
providers. Several commenters also referenced concerns regarding the 
feasibility of implementing the content included as part of the 
pediatric health IT technical worksheet crosswalk analysis included in 
the Proposed Rule appendix for Recommendation 5 ``Synchronize 
immunization histories with registries.'' In this regard, several 
commenters noted that FHIR is not currently consistent with CDC/AIRA 
standards or practices for immunization data submission or query/
response, and that public health is not currently funded to provide 
this capability from IIS.
    Response. We thank commenters for their useful input regarding the 
technical worksheets in the appendix we included for the Proposed Rule. 
As we stated in the Proposed Rule, these comments, and the detailed 
insights received through stakeholder outreach, will inform the future 
development of a non-binding informational guide or informational 
resource to provide useful information for health IT developers and 
pediatric care providers seeking to successfully implement these health 
IT solutions in a clinical setting. To facilitate adoption of the ten 
recommendations, we are developing a Pediatric Health IT Developer 
Informational Resource and a Pediatric Health IT Provider Informational 
Resource to be available for respective use in 2020. As such, we 
appreciate the comments we received specific to implementation 
recommendations and will take them into account in the support of the 
creation of non-regulatory informational resources for health IT 
developers and other stakeholders. We plan to continue working with 
stakeholders as we further develop and consider technical and 
implementation recommendations we have received through solicited 
public comments, the Health Information Technology Advisory Committee 
(HITAC), and other engagements. We also direct readers to our 
``pediatrics health IT'' web page (www.healthIT.gov/pediatrics) for 
information on future work pertaining to health IT for pediatric care.
    Comments. We received several comments suggesting the use of 
pediatric-focused clinicians and settings to test EHR systems as part 
of these provisions, specifically recommending that we should require 
EHR developers to use pediatric-focused scenarios and mock pediatric 
patients when testing functionality, as well as requiring the

[[Page 25716]]

inclusion of pediatric clinicians as part of end-user testing.
    Response. We thank commenters for their input. We agree that it 
would be beneficial for health IT developers to include pediatric-
focused testing of their health IT especially with regards to ensuring 
patient safety. We note that we have established requirements for real 
world testing that requires health IT developers to real world test 
their health IT for the types of setting(s) in which it is intended for 
use (we refer readers to section VII.B.5 for more information on real 
world testing Condition and Maintenance of Certification requirements).
a. 2015 Edition Certification Criteria
    In order to implement the second part of section 4001(b) of the 
Cures Act to adopt certification criteria to support the voluntary 
certification of health IT for use by pediatric health providers to 
support the health care of children, we identified the following 
already adopted 2015 Edition certification criteria in the Proposed 
Rule that support the recommendations. The already adopted 2015 Edition 
criteria are as follows:
     ``API functionality'' criteria (Sec.  170.315(g)(7)-
(g)(9)) which address many of the challenges currently faced by 
patients and by caregivers such as parents or guardians accessing 
child's health information, including the ``multiple portal'' problem, 
by potentially allowing individuals to aggregate health information 
from multiple sources in a web or mobile application of their choice.
     ``Care plan'' criterion (Sec.  170.315(b)(9)) which 
supports pediatric care by facilitating the documentation of electronic 
health information in a structured format to improve care coordination 
(80 FR 62648 and 62649).
     ``Clinical decision support'' (CDS) criterion (Sec.  
170.315(a)(9)) which supports pediatric care by enabling interventions 
based on the capture of biometric data.
     ``Common Clinical Data Set'' (Sec.  170.315(b)(4) and 
Sec.  170.315(b)(5)) which includes optional pediatric vital sign data 
elements including as optional the reference range/growth curve for 
three pediatric vital signs--BMI percent per LOINC identifiers for age 
per sex, weight per length/sex, and head occipital-frontal 
circumference for children less than three years of age.
     ``Data segmentation for privacy'' send criterion and 
receive criterion (Sec.  170.315(b)(7) and Sec.  170.315(b)(8)) which 
provides the ability to: Create a summary record that is tagged at the 
document level as restricted and subject to re-disclosure; receive a 
summary record that is document-level tagged as restricted; separate 
the document-level tagged document from other documents received; and 
view the restricted document without having to incorporate any of the 
data from the document.
     ``Demographics'' criterion (Sec.  170.315(a)(5)) which 
supports pediatric care through the capture of values and value sets 
relevant for the pediatric health care setting as well as allowing for 
improved patient matching which is a key challenge for pediatric care.
     ``Electronic Prescribing'' criterion (Sec.  170.315(b)(3)) 
which includes an optional Structured and Codified Sig Format, which 
has the capability to exchange weight-based dosing calculations within 
the NCPDP SCRIPT 10.6 standard and limits the ability to prescribe all 
oral, liquid medications in only metric standard units of mL (i.e., not 
cc) important for enabling safe prescribing practices for children.
     ``Family health history'' criterion (Sec.  170.315(a)(12)) 
which supports pediatric care because it leverages concepts or 
expressions for familial conditions, which are especially clinically 
relevant when caring for children.
     ``Patient health information capture'' criterion (Sec.  
170.315(e)(3)) which supports providers' ability to accept health 
information from a patient or authorized representative. This criterion 
could support pediatric care through documentation of decision-making 
authority of a patient representative.
     ``Social, psychological, and behavioral data'' criterion 
(Sec.  170.315(a)(15)) which supports integration of behavioral health 
data into a child's record across the care continuum by enabling a user 
to record, change, and access a patient's social, psychological, and 
behavioral data based using SNOMED CT[supreg] and LOINC[supreg] codes.
     ``Transitions of care'' criterion (Sec.  170.315(b)(1)) 
which supports structured transition of care summaries and referral 
summaries that help ensure the coordination and continuity of health 
care as children transfer between different clinicians at different 
health care organizations or different levels of care within the same 
health care organization.
     ``Transmission to immunization registries'' criterion 
(Sec.  170.315(f)(1)) which supports the safe and effective provision 
of child health care through immunizations and registry linkages. This 
criterion also provides the ability to request, access, and display the 
evaluated immunization history and forecast from an immunization 
registry for a patient. Immunization forecasting recommendations allow 
for providers to access the most complete and up-to-date information on 
a patient's immunization history to inform discussions about what 
vaccines a patient may need based on nationally recommended 
immunization recommendations (80 FR 62662 through 62664).
     ``View, download, and transmit to 3rd party'' (VDT) 
criterion (Sec.  170.315(e)(1)) which supports transferrable access 
authority for the pediatric health care setting and provides the 
ability for patients (and their authorized representatives) \72\ to 
view, download, and transmit their health information to a 3rd party.
---------------------------------------------------------------------------

    \72\ The VDT criterion includes a ``patient-authorized 
representative'' concept that aligns with the use of the term under 
the EHR Incentive Program. A ``patient-authorized representative'' 
is defined as any individual to whom the patient has granted access 
to their health information (see also 77 FR 13720). However, consent 
is not needed for minors, for whom existing local, state, or Federal 
law grants their parents or guardians access (see also 77 FR 13720).
---------------------------------------------------------------------------

    We noted in the Proposed Rule (84 FR 7460) that some of these 
criteria may be updated based on proposals contained in the Proposed 
Rule (see further discussion below on new or revised certification 
criteria); and stated that we continue to believe that prior to any 
such updates, technology that is currently available and certified to 
these 2015 Edition criteria can make a significant impact in supporting 
providers engaged in the health care of children. We invited readers to 
use the technical worksheets in the appendix of the Proposed Rule to 
inform their public comment on the recommendations, the inclusion of 
specific items from the Children's Format, and the identified 2015 
Edition certification criteria as they relate specifically to use cases 
for pediatric care and sites of service.
b. New or Revised Certification Criteria
    In order to implement the second part of section 4001(b)(iii) of 
the Cures Act to adopt certification criteria to support the voluntary 
certification of health information technology for use by pediatric 
health providers to support the health care of children, we also 
identified new or revised 2015 Edition certification criteria (and 
standards) in the Proposed Rule (84 FR 7460) that support the 
recommendations. These proposed criteria and standards include:
     New API criterion (Sec.  170.315(g)(10)) which would serve 
to implement the Cures Act requirement to permit health information to 
be accessed, exchanged,

[[Page 25717]]

and used from APIs without special effort.
     New ``DS4P'' criteria (two for C-CDA ((Sec.  
170.315(b)(12)) and (Sec.  170.315(b)(13)) and one for FHIR (Sec.  
170.315(g)(11))) that would support a more granular approach to privacy 
tagging data for health information exchange supported by either the C-
CDA or FHIR-based exchange standards.
     New electronic prescribing certification criterion (Sec.  
170.315(b)(11)), which would support improved patient safety and 
prescription accuracy, workflow efficiencies, and increased 
configurability of systems including functionality that could support 
pediatric medication management.
     USCDI (Sec.  170.213) and USCDI-based criteria which 
enables the inclusion of pediatric vital sign data elements, including 
the reference range/scale or growth curve for BMI percentile per age 
and sex, weight for age per length and sex, and head occipital-frontal 
circumference. Each of the new or revised certification criteria and 
standards are further described in other sections of this final rule, 
including all final actions related to the criteria (some of which are 
described below in the response to comments).
    Comments. A majority of comments received supported our 
recommendations for the voluntary certification of health IT for use by 
pediatric health providers to support the health care of children along 
with the alignment with the Children's Format and 2015 Edition 
certification criteria. Several commenters suggested that the 10 
recommendations should only be the first step and encouraged future 
development of additional recommendations using the Children's Format. 
Commenters were also pleased with the 10 recommendations selected by 
ONC from the Children's Format stating that they represent a strong, 
positive step forward for improving EHRs used in the care of children. 
Many commenters stated that they support the continued alignment with 
the 2015 Edition recommendations.
    Response. We thank commenters for their support and feedback. As 
such, we have maintained the 10 recommendations for the voluntary 
certification of health IT for use by pediatric health providers to 
support the health care of children. We have finalized in this final 
rule the majority of the aligned proposed new 2015 Edition 
certification criteria that support the voluntary certification of 
health IT for use by pediatric health providers, with the exception of 
the proposed criterion for ``consent management'' in Sec.  
170.315(g)(11) since we did not finalize our proposal for the criterion 
in this final rule. The functionality of the proposed new ``DS4P'' 
criteria have been incorporated into the already adopted 2015 Edition 
DS4P criteria DS4P-send (Sec.  170.315(b)(7)) and DS4P-receive (Sec.  
170.315(b)(8)) now referred to as ``Security tags--Summary of Care- 
send'' and ``Security tags--Summary of Care--receive,'' respectively. 
The functionality of the proposed new e-Rx criterion was also 
incorporated in the already adopted e-Rx criterion (Sec.  
170.315(b)(3)). Last, we have removed the ``Common Clinical Data Set'' 
(Sec.  170.315(b)(4) and Sec.  170.315(b)(5)) from the 2015 Edition in 
this final rule.
    We note that we are aware that the NCPDP SCRIPT Standard Version 
2017071 Implementation Guide contains a number of requirements intended 
to improve accurate dosing and pediatric patient safety. One such 
requirement is the inclusion of the most recent patient height and 
weight in the Observation Segment on all new and renewal prescriptions 
sent from the prescriber to the pharmacy, along with the date 
associated with these measures, for all patients 18 years old and 
younger. We are also aware of the challenges that such a requirement 
may pose on specific providers and under certain circumstances where 
height and/or weight is not required or applicable for dosing of the 
product. We believe additional work must be done on refining this 
requirement, and will continue to monitor standards and industry 
advancements before proposing such a requirement. At this time, we 
recommend vital signs to be included in all electronic prescriptions 
for all patient populations when available and where applicable.
    The 10 recommendations and the aligned 2015 Edition certification 
criteria support the health IT needs of pediatric care providers. We 
believe further support can be provided through non-regulatory 
informational resources. These resources can help inform technical and 
implementation specifications for health IT developers and products for 
use by pediatric health providers to support the health care of 
children. We also agree with commenters that the 10 recommendations are 
a first step and welcome input and collaboration from the health IT 
industry and health care providers to continue efforts to develop and 
build a health IT infrastructure supporting pediatric care and other 
specialty care and sites of service across the continuum.

B. Health IT and Opioid Use Disorder Prevention and Treatment--Request 
for Information

    We identified a need to explore ways to advance health IT across 
the care continuum to support efforts to fight the opioid epidemic. For 
that purpose, in the Proposed Rule, we included a request for 
information (RFI) related to health IT and opioid use disorder 
prevention and treatment (84 FR 7461 through 7465). We received over 
100 comments in responses to this RFI, which included recommendations 
from the HITAC. We appreciate the feedback and recommendations provided 
by commenters and the HITAC taskforce, respectively. We plan to share 
this feedback with appropriate Department partners.

VII. Conditions and Maintenance of Certification Requirements for 
Health IT Developers

    Section 4002 of the Cures Act modifies section 3001(c)(5) of the 
Public Health Service Act (PHSA) to require the Secretary of HHS, 
through notice and comment rulemaking, to establish Conditions and 
Maintenance of Certification requirements for the Program. 
Specifically, health IT developers or entities must adhere to certain 
Conditions and Maintenance of Certification requirements concerning 
information blocking; appropriate exchange, access, and use of 
electronic health information; communications regarding health IT; 
application programming interfaces (APIs); real world testing; 
attestations regarding certain Conditions and Maintenance of 
Certification requirements; and submission of reporting criteria under 
the EHR Reporting Program under section 3009A(b) of the PHSA.

A. Implementation

    To implement section 4002 of the Cures Act, we proposed an approach 
whereby the Conditions and Maintenance of Certification requirements 
express initial certification requirements for health IT developers and 
their certified Health IT Module(s) as well as ongoing maintenance 
requirements that must be met by both health IT developers and their 
certified Health IT Module(s) under the ONC Health IT Certification 
Program (Program). If these requirements are not met, the health IT 
developer may no longer be able to participate in the Program and/or 
its certified health IT may have its certification terminated. We 
proposed to implement each Condition of Certification requirement with 
further specificity as it applies to

[[Page 25718]]

the Program. We also proposed to establish Maintenance of Certification 
requirements for certain Conditions of Certification requirements as 
standalone requirements. As we stated in the Proposed Rule, this 
approach would establish clear baseline technical and behavior 
Conditions of Certification requirements with evidence that the 
Conditions of Certification requirements are continually being met 
through the Maintenance of Certification requirements.
    Comments. We received comments expressing general support for the 
concept of requiring Conditions and Maintenance of Certification 
requirements. Commenters stated that these requirements are a step 
forward toward promoting transparency, improving usability, and 
achieving interoperability of health IT. We also received comments 
asserting that the Conditions and Maintenance of Certification 
requirements should only apply to developers of certified health IT.
    Response. We thank commenters for their support. We provide further 
details on each of the Conditions and Maintenance of Certification 
requirements within their respective subsections in this section of the 
final rule. However, to clarify our approach to the Conditions and 
Maintenance of Certification requirements in response to comments, the 
Conditions and Maintenance of Certification requirements, except for 
the ``information blocking'' and ``assurances'' Conditions and 
Maintenance of Certification requirements, apply only to actions and 
behaviors of health IT developers related to their certified health IT 
as well as to the certified health IT itself. For the ``information 
blocking'' and ``assurances'' Conditions and Maintenance of 
Certification requirements, consistent with the Cures Act provisions 
and our implementation of section 3022(a) (information blocking) of the 
PHSA, a health IT developer is also responsible to ensure that all of 
its health IT and related actions and behaviors do not constitute 
information blocking or inhibit the appropriate access, exchange, and 
use of electronic health information (EHI). We refer readers to section 
VIII of this preamble for further discussion of the information 
blocking regulations.

B. Provisions

1. Information Blocking
    The Cures Act requires that a health IT developer, as a Condition 
and Maintenance of Certification requirement under the Program, not 
take any action that constitutes ``information blocking'' as defined in 
section 3022(a) of the PHSA (see 3001(c)(5)(D)(i) of the PHSA). We 
proposed to establish this Information Blocking Condition of 
Certification in Sec.  170.401. We proposed that the Condition of 
Certification would prohibit any health IT developer who has at least 
one health IT product certified under the Program from taking any 
action that constitutes information blocking as defined by section 
3022(a) of the PHSA and proposed in Sec.  171.103. We clarified in the 
Proposed Rule that this proposed ``information blocking'' Condition of 
Certification and its requirements would be substantive requirements of 
the Program and would rely on the definition of ``information 
blocking'' established by section 3022(a) of the PHSA and proposed in 
Sec.  171.103 (84 FR 7465).
    We received no comments specifically about the Information Blocking 
Condition of Certification and have adopted the Condition of 
Certification as proposed. We received many comments regarding the 
information blocking provision, and have responded to those comments in 
the information blocking discussion in section VIII of this preamble. 
We also refer readers to section VII.D of this final rule for 
additional discussion of ONC's enforcement of this and other Conditions 
and Maintenance of Certification requirements.
2. Assurances
    The Cures Act requires that a health IT developer, as a Condition 
and Maintenance of Certification requirement under the Program, provide 
assurances to the Secretary, unless for legitimate purposes specified 
by the Secretary, that it will not take any action that constitutes 
information blocking as defined in section 3022(a) of the PHSA, or any 
other action that may inhibit the appropriate exchange, access, and use 
of electronic health information (EHI). We proposed to implement this 
Condition of Certification and accompanying Maintenance of 
Certification requirements in Sec.  170.402. As a Condition of 
Certification requirement, a health IT developer must comply with the 
Condition of Certification as recited here and in the Cures Act. We 
discussed in section VIII of the Proposed Rule the proposed reasonable 
and necessary activities specified by the Secretary, which constitute 
the exceptions to the information blocking definition.
    We also proposed to establish more specific Conditions and 
Maintenance of Certification requirements for a health IT developer to 
provide assurances that it does not take any action that may inhibit 
the appropriate exchange, access, and use of EHI. These proposed 
requirements serve to provide further clarity under the Program as to 
how health IT developers can provide such broad assurances with more 
specific actions.
    Comments. Most commenters agreed with the central premise of our 
proposal to adopt the ``assurances'' Condition and Maintenance of 
Certification requirement, requiring that a health IT developer provide 
certain assurances to the Secretary, including that, unless done for 
one of the ``legitimate purposes'' specified by the Secretary, it will 
not take any actions that constitutes information blocking as defined 
in section 3022(a) of the PHSA, or any other action that may inhibit 
the appropriate exchange, access, and use of electronic health 
information (EHI). Commenters stated that they support ONC's efforts to 
eliminate barriers that result in information blocking. One commenter 
stated that it is not clear what constitutes ``satisfactory to the 
Secretary'' as interpretations may change from Secretary to Secretary, 
and suggested removing the term ``Secretary.''
    Response. We thank commenters for their support. We have finalized 
our proposal to adopt the ``assurances'' Condition and Maintenance of 
Certification requirement subject to the clarifications and revisions 
discussed below. In response to the comment recommending we remove the 
term ``Secretary'' as Secretaries may change over time, it will not be 
removed as it is in the authorizing Cures Act statutory language. For 
clarification, future Secretaries may establish changes to the 
implementation of the Cures Act ``assurances'' Condition and 
Maintenance of Certification requirements through notice and comment 
rulemaking, as has been done with this rulemaking.
a. Full Compliance and Unrestricted Implementation of Certification 
Criteria Capabilities
    We proposed, as a Condition of Certification requirement, that a 
health IT developer must ensure that its health IT certified under the 
Program conforms to the full scope of the certification criteria to 
which its health IT is certified. This has always been an expectation 
of ONC and users of certified health IT and, importantly, a requirement 
of the Program. As stated in the Proposed Rule, we believe that by 
incorporating this expectation as an explicit Condition of 
Certification requirement under the Program, there

[[Page 25719]]

would be assurances, and documentation via the ``Attestations'' 
Condition and Maintenance of Certification requirements proposed in 
Sec.  170.406, that all health IT developers fully understand their 
responsibilities under the Program, including not to take any action 
with their certified health IT that may inhibit the appropriate 
exchange, access, and use of EHI. To this point, certification criteria 
are designed and issued so that certified health IT can support 
interoperability and the appropriate exchange, access, and use of EHI.
    We also proposed that, as a complementary Condition of 
Certification requirement, health IT developers of certified health IT 
must provide an assurance that they have made certified capabilities 
available in ways that enable them to be implemented and used in 
production environments for their intended purposes. More specifically, 
developers would be prohibited from taking any action that could 
interfere with a user's ability to access or use certified capabilities 
for any purpose within the scope of the technology's certification. 
Such actions may inhibit the appropriate access, exchange, or use of 
EHI and are therefore contrary to this proposed Condition of 
Certification requirement. While such actions are already prohibited 
under the Program (80 FR 62711), making these existing requirements 
that prohibit developers from taking any action that could interfere 
with a user's ability to access or use certified capabilities for any 
purpose within the scope of the technology's certification explicit in 
this Condition of Certification requirement will ensure that health IT 
developers are required to attest to them pursuant to the Attestations 
Condition of Certification requirement in Sec.  170.406, which will in 
turn provide additional assurances to the Secretary that developers of 
certified health IT support and do not inhibit appropriate access, 
exchange, or use of EHI.
    As discussed at 84 FR 7466 in our Proposed Rule, actions that would 
violate this Condition of Certification requirement include failing to 
fully deploy or enable certified capabilities; imposing limitations 
(including restrictions) on the use of certified capabilities once 
deployed; or requiring subsequent developer assistance to enable the 
use of certified capabilities, contrary to the intended uses and 
outcomes of those capabilities). The Condition of Certification 
requirement would also be violated were a developer to refuse to 
provide documentation, support, or other assistance reasonably 
necessary to enable the use of certified capabilities for their 
intended purposes. More generally, any action that would be likely to 
substantially impair the ability of one or more users (or prospective 
users) to implement or use certified capabilities for any purpose 
within the scope of applicable certification criteria would be 
prohibited by this Condition of Certification requirement. Such actions 
may include imposing limitations or additional types of costs, 
especially if these were not disclosed when a customer purchased or 
licensed the certified health IT.
    Comments. We received a comment recommending additional language to 
allow health IT developers to be able to provide an explanation of how 
their software conforms to the certification criteria requirements and 
how they enable the appropriate exchange, access, and use of EHI.
    Response. We thank the commenter for their input, but do not accept 
the recommendation. Health IT must comply with certification criteria 
as specified in regulation. We also refer readers to the 
``Attestations'' Condition of Certification requirement in this section 
of the preamble for more information regarding how we proposed to 
provide flexibilities, including a method for health IT developers to 
indicate their compliance, noncompliance, or the inapplicability of 
each Condition and Maintenance of Certification requirement as it 
applies to all of their health IT certified under the Program, as well 
as the flexibility to specify noncompliance per certified Health IT 
Module, if necessary. As such, we have finalized the Full Compliance 
and Unrestricted Implementation of Certification Criteria Capabilities 
Condition of Certification requirement as proposed that a health IT 
developer must ensure that its health IT certified under the Program 
conforms to the full scope of the certification criteria to which its 
health IT is certified, and that health IT developers would be 
prohibited from taking any action that could interfere with a user's 
ability to access or use certified capabilities for any purpose within 
the scope of the technology's certification. We note that because 
compliance with the information blocking section of this final rule 
(Part 171) is not required until six months after the publication date 
of the final rule, Sec.  170.402(a)(1) also has a six-month delayed 
compliance date.
    Comments. A couple of commenters requested clarification on whether 
requiring subsequent developer assistance to enable the use of certain 
certified capabilities would be considered noncompliance with the 
Condition of Certification requirement, such as managed services, 
hosting, connecting with exchange networks, or outsourced arrangements 
under agreement.
    Response. We clarify that the purpose of this Condition of 
Certification requirement is to make certified capabilities available 
in ways that enable them to be implemented and used in production 
environments for their intended purposes. As stated above, the 
Condition of Certification requirement would be violated were a 
developer to refuse to provide documentation, support, or other 
assistance reasonably necessary to enable the use of certified 
capabilities for their intended purposes (see 84 FR 7466). We do not 
believe that actions by health IT developers to provide their customers 
with education, implementation, and connection assistance to integrate 
certified capabilities for their customers would typically constitute 
actions that interfere with a customer's ability to use certified 
capabilities for their intended purposes, but in the absence of 
specific facts, we cannot say that whether there are scenarios that 
would result in the assistance interfering with a user's ability to 
access or use certified capabilities for any purpose within the scope 
of the health IT's certification. As such, education and other 
assistance may be offered, but care should be taken to do so in a 
manner that minds the Condition of Certification requirement standards.
    Comments. We received a comment asking that health IT developers be 
required to provide honest communication and expert advice as required 
by a user.
    Response. We appreciate the commenter's suggestion regarding honest 
communication and expert advice. However, such a requirement would not 
be consistent with this Condition of Certification requirement, which 
focuses on assurances that Health IT developers did not take actions 
that may inhibit the appropriate exchange, access, and use of 
electronic health information (EHI). We also believe it would be 
difficult to enforce such a requirement in terms of determining what 
constitutes an ``honest'' communication and ``expert advice.''
b. Certification to the ``Electronic Health Information Export'' 
Criterion
    We proposed that a health IT developer that produces and 
electronically manages EHI must certify their health IT to the 2015 
Edition ``EHI export'' criterion in Sec.  170.315(b)(10). As

[[Page 25720]]

a Maintenance of Certification requirement, we proposed that a health 
IT developer that produces and electronically manages EHI must provide 
all of its customers of certified health IT Modules with health IT 
certified to the functionality included in Sec.  170.315(b)(10) within 
24 months of a subsequent final rule's effective date or within 12 
months of certification for a health IT developer that never previously 
certified health IT to the 2015 Edition, whichever is longer. 
Consistent with these proposals, we also proposed to amend Sec.  
170.550 to require that ONC-ACBs certify health IT to the proposed 2015 
Edition ``EHI export'' certification criterion when the health IT 
developer of the health IT Module presented for certification produces 
and electronically manages EHI. As discussed in section IV.C.1 of the 
Proposed Rule, the availability of the capabilities in the ``EHI 
export'' certification criterion promote access, exchange, and use of 
health information to facilitate electronic access to single patient 
and patient population health information in cases such as a patient 
requesting their information, or a health care provider switching 
health IT systems. As such, health IT developers with health IT 
products that have health IT Modules certified to the finalized ``EHI 
export'' certification requirement must make this functionality 
available to customers and provide assurances that the developer is not 
taking actions that constitute information blocking or any other action 
that may inhibit the appropriate exchange, access, and use of health 
information. We discussed the EHI export functionality in section 
IV.B.4 of the Proposed Rule.
    Comments. A couple of commenters expressed their support for the 
Condition of Certification requirement, noting that certifying health 
IT to Sec.  170.315(b)(10) would provide greater EHI access to end 
users. Several commenters requested extending the implementation 
timeframe to 36 months stating that more time is needed for analysis, 
product development, and testing, with an additional 12 months for 
client adoption, testing, and training. A couple of commenters 
supported the 24-month timeframe, but stated that they did not support 
ONC dictating the adoption schedule for providers, and that the 
proposal does not consider the efforts required from providers to plan 
and execute effective implementation and adoption. One commenter stated 
that 24 months is not aggressive enough and that the rule should 
prioritize certain aspects of patient-directed exchange and make these 
available in 12 months or less. Another commenter suggested that we 
narrow the type of health IT developer that must certify health IT to 
Sec.  170.315(b)(10), noting that some Health IT Modules may manage 
data produced by other Health IT Modules, or received and incorporated 
from other sources. We did not receive any comments specific to our 
proposal to amend Sec.  170.550 to require that ONC-ACBs certify health 
IT to the proposed 2015 Edition ``EHI export'' criterion when the 
health IT developer of the health IT Module presented for certification 
produces and electronically manages EHI.
    Response. We thank the commenters for their support. In response to 
comments regarding scope of data export under this criterion, we have 
modified the proposed ``EHI export'' certification criterion and scope 
of data export. In doing so, we have also revised our Condition of 
Certification requirement, which we have finalized in Sec.  
170.402(a)(4), that a health IT developer of a certified Health IT 
Module that is part of a health IT product which electronically stores 
EHI must certify to the certification criterion in Sec.  
170.315(b)(10). Additionally, we clarify that in attesting to Sec.  
170.406, a health IT developer must attest accurately in accordance 
with Sec.  170.402(a)(4) and (b)(2) if the health IT developer 
certified a Health IT Module(s) that is part of a health IT product 
which can store EHI. The finalized criterion focuses on the Health IT 
Module's ability to export EHI for the health IT product's single and 
patient population, which encompasses the EHI that can be stored at the 
time of certification by the product, of which the Health IT Module is 
a part. To note, we do not require developers to disclose proprietary 
information about their products. Also, as clarified above and in Sec.  
170.315(b)(10)(iii), we do not require any specific standards for the 
export format(s) used to support the export functionality.
    In regards to when health IT developers must provide all of their 
users of certified health IT with health IT certified to the 
functionality included in Sec.  170.315(b)(10), we have removed the 
proposed language ``within 12 months of certification for a health IT 
developer that never previously certified health IT to the 2015 
Edition, whichever is longer.'' Our intention was to provide equity 
between existing and new health IT developers. However, we have 
concluded that new health IT developers will not be at a disadvantage 
to meet the same timeline considering all health IT developers will be 
aware of requirements necessary for certification when this final rule 
is published. We also acknowledge the concerns expressed regarding the 
24-month timeframe and have extended the compliance timeline to within 
36 months of the final rule's publication date, as finalized in Sec.  
170.402(b)(2)(i). With the narrowed scope of data export for the 
criterion, we believe health IT developers should be able to provide 
all of their customers of Health IT Modules certified to Sec.  
170.315(b)(10) with the export functionality included in Sec.  
170.315(b)(10) within 36 months. We have also finalized in Sec.  
170.402(b)(2)(ii) that on and after 36 months from the publication of 
this final rule, health IT developers that must comply with the 
requirements of Sec.  170.402(a)(4) must provide all of their customers 
of certified health IT with health IT certified to Sec.  
170.315(b)(10). From this milestone forward, a health IT developer's 
participation in the Certification Program obligates them to provide 
the technical capabilities expressed in Sec.  170.315(b)(10) when they 
provide such certified health IT to their customers. We will monitor 
ongoing compliance with this Condition and Maintenance of Certification 
through a variety of means including, but not limited to, developer 
attestations pursuant to Sec.  170.406, health IT developers real world 
testing plans, response to user complaints, and ONC-ACB surveillance 
activities.
    Consistent with the above revisions and in alignment with our 
proposal to amend Sec.  170.550, we have also amended Sec.  
170.550(g)(5) regarding Health IT Module dependent criteria for 
consistency with the requirements of Sec.  170.402(a)(4) and (b)(2) 
when a Health IT Module presented for certification is part of a health 
IT product which can store electronic health information. In addition, 
we have amended Sec.  170.550(m)(2) to only allow ONC-ACBs to issue 
certifications to Sec.  170.315(b)(6) until 36 months after the 
publication date of this final rule. Thus, ONC-ACBs may issue 
certificates for either Sec.  170.315(b)(6) or (b)(10) up until 36 
months after the publication date of this final rule, but on and after 
36 months they may only issue certificates for Health IT Modules in 
accordance with Sec.  170.315(b)(10). We note that ONC-ACBs are 
required by their ISO/IEC 17065 accreditation to have processes in 
place to meet the expectations and minimum requirements of the Program. 
Thus, ONC-ACBs are expected to have processes in place in order to 
effectively monitor these timeline requirements on and after 36 months 
after the

[[Page 25721]]

publication of this rule, and to additionally ensure that the health IT 
developer attests accurately to Sec.  170.402(a)(4) and (b)(2). Should 
a developer fail to comply, the ONC-ACB will follow its processes to 
institute corrective action and report to ONC in accordance with 
Program reporting requirements in 45 CFR 170.523(f)(1)(xxii). In the 
event the developer does not follow through with the corrective action 
plan established and approved with the ONC-ACB, the ONC-ACB must alert 
ONC of the health IT developer's failure to comply with the Conditions 
and Maintenance of Certification requirements.
    Comments. A commenter requested ONC add functionality to the CHPL 
(or in another format) that provides a list of the start and end dates 
of each previously certified Health IT Module.
    Response. We appreciate this suggestion and note that the CHPL 
already lists certification dates for certified Health IT Modules, 
including the dates the Health IT Module was last modified, 
decertified, or made inactive.
c. Records and Information Retention
    We proposed that, as a Maintenance of Certification requirement in 
Sec.  170.402(b)(1), a health IT developer must, for a period of 10 
years beginning from the date of certification, retain all records and 
information necessary to demonstrate initial and ongoing compliance 
with the requirements of the Program. In other words, records and 
information should be retained starting from the date a developer first 
certifies health IT under the Program and applies separately to each 
unique Health IT Module (or Complete EHR, as applicable) certified 
under the Program. This retention of records is necessary to verify 
health IT developer compliance with Program requirements, including 
certification criteria and Conditions and Maintenance of Certification 
requirements. As stated in the Proposed Rule, 10 years is an 
appropriate period of time given that many users of certified health IT 
participate in various CMS programs, as well as other programs, that 
require similar periods of records retention.
    In an effort to reduce administrative burden, we also proposed, 
that in situations where applicable certification criteria are removed 
from the Code of Federal Regulations before the 10 years have expired, 
records must only be kept for 3 years from the date of removal for 
those certification criteria and related Program provisions unless that 
timeframe would exceed the overall 10-year retention period. This ``3-
year from the date of removal'' records retention period also aligns 
with the records retention requirements for ONC-ACBs and ONC-ATLs under 
the Program.
    We encouraged comment on these proposals and whether the proposed 
requirements can provide adequate assurances that certified health IT 
developers are demonstrating initial and ongoing compliance with the 
requirements of the Program; and thereby ensuring that certified health 
IT can support interoperability, and appropriate exchange, access, and 
use of EHI.
    Comments. Some commenters requested clarification on what records 
and information are expected to be maintained and how this is different 
from the records ONC-ACBs and ONC-ATLs retain. A couple commenters 
requested clarification on when the records and information retention 
requirement would take effect. One commenter requested clarification 
regarding the role of health IT developers that no longer maintain a 
certified Health IT Module or have their certification suspended. One 
commenter recommended setting a retention period for record keeping in 
the event that a health IT developer removes a Health IT Module from 
market to ensure that potentially short lived Health IT Modules would 
inadvertently not have their documentation maintained.
    Response. We have adopted our proposal in Sec.  170.402(b)(1) 
without revisions. We continue to believe that 10 years is an 
appropriate period of time given that many users of certified health IT 
participate in various CMS programs, as well as other programs, that 
require similar periods of records retention. We also finalized that in 
situations where applicable certification criteria are removed from the 
Code of Federal Regulations, records must only be kept for 3 years from 
the date of removal for those certification criteria and related 
Program provisions unless that timeframe would exceed the overall 10-
year retention period. We clarify that health IT developers are best 
situated to determine what records and information in their possession 
would demonstrate their compliance with all of the relevant Program 
requirements. We note that it is our understanding that health IT 
developers are already retaining the majority of their records and 
information for the purposes of ONC-ACB surveillance and ONC direct 
review under the Program. We also refer readers to section VII.D of 
this final rule preamble for additional discussion of records necessary 
for the enforcement of the Conditions and Maintenance of Certification 
requirements. In regard to the requested clarification for the role of 
health IT developers that no longer maintain a certified Health IT 
Module or have their certification suspended, a health IT developer who 
does not have any certified Health IT Modules within the Program would 
no longer have any obligation to retain records and information for the 
purposes of the Program. However, we note that it may be in the health 
IT developer's best interest to retain their records and information. 
For example, records may be useful for health IT developers in any 
potential investigation or enforcement action taken outside of the ONC 
Health IT Certification Program such as by the HHS Office of the 
Inspector General (e.g., information blocking) or the U.S. Department 
of Justice (e.g., False Claims Act).
d. Trusted Exchange Framework and the Common Agreement--Request for 
Information
    In the Proposed Rule, we included a Request for Information (RFI) 
as to whether certain health IT developers should be required to 
participate in the Trusted Exchange Framework and Common Agreement 
(TEFCA) as a means of providing assurances to their customers and ONC 
that they are not taking actions that constitute information blocking 
or any other action that may inhibit the appropriate exchange, access, 
and use of EHI. We received 40 comments on this RFI. We appreciate the 
input provided by commenters and may consider them to inform a future 
rulemaking.
3. Communications
    The Cures Act requires that a health IT developer, as a Condition 
and Maintenance of Certification requirement under the Program, does 
not prohibit or restrict communication regarding the following 
subjects:
     The usability of the health information technology;
     The interoperability of the health information technology;
     The security of the health information technology;
     Relevant information regarding users' experiences when 
using the health information technology;
     The business practices of developers of health information 
technology related to exchanging electronic health information; and
     The manner in which a user of the health information 
technology has used such technology.
    The Cures Act established the broad communications protections 
delineated above (referred to hereafter as ``protected 
communications'') and we proposed in 84 FR 7467 to implement

[[Page 25722]]

this general prohibition against developers imposing prohibitions and 
restrictions on protected communications in Sec.  170.403.
    We also recognized that there are circumstances where it is both 
legitimate and reasonable for developers to limit the sharing of 
information about their health IT. As such, we proposed to allow 
developers to impose prohibitions or restrictions on protected 
communications in certain narrowly defined circumstances. In order for 
a prohibition or restriction on a protected communication to be 
permitted, we proposed in 84 FR 7467 that it must pass a two-part test. 
First, the communication that is being prohibited or restricted must 
not fall within a class of communications (hereafter referred to as 
``communications with unqualified protection'') that is considered to 
always be legitimate or reasonable--such as communications required by 
law, made to a government agency, or made to a defined category of 
safety organizations. Second, to be permitted, a developer's 
prohibition or restriction on communications must also fall within a 
category of communications (hereafter referred to as ``permitted 
prohibitions and restrictions'') for which it is both legitimate and 
reasonable for a developer to limit the sharing of information about 
its health IT. This would be because of the nature of the relationship 
between the developer and the communicator or because of the nature of 
the information that is, or could be, the subject of the communication. 
We proposed that a developer's restriction or prohibition that does not 
satisfy this two-part test would contravene the Communications 
Condition of Certification requirement. We note that this two-part test 
strikes a reasonable balance between the need to promote open 
communication about health IT and related business practices, and the 
need to protect the legitimate interests of health IT developers and 
other entities.
    Comments. The majority of public comments we received supported the 
proposed Communications Condition of Certification requirements, with 
many commenters expressing strong support. Commenters stated that the 
proposed requirements would enable better communication that would 
improve health IT and patient care. Some commenters who supported the 
proposed requirements sought clarification or had specific concerns, 
including regarding the proposed deadlines for contract modification. 
These matters are discussed in more detail below. Additionally, a 
handful of public comments strongly opposed the proposed requirements, 
primarily based on concerns regarding intellectual property (IP).
    Response. We appreciate the overall strong support for the 
Communications Condition of Certification requirements as proposed and 
have finalized with modifications in Sec.  170.403. We also recognize 
the need to provide clarification regarding some aspects of the 
requirements, including regarding the protections available for IP that 
are included in the Communications Condition and Maintenance of 
Certification requirements.
    We emphasize that, under section 3001(c)(5) of the PHSA, 
participation in the ONC Health IT Certification Program (Program) is 
voluntary. In other words, ONC cannot compel health IT developers to 
participate in the Program nor can ONC impose consequences (e.g., 
enforcement actions or penalties) on health IT developers who choose 
not to participate in the Program. The requirements of the Program are 
much like requirements for any other voluntary contract or agreement an 
entity would enter into with the Federal Government. Through the 
Conditions and Maintenance of Certification requirements, we have 
essentially offered developers terms for participation in the Program 
that we believe are appropriate based on: Our statutory instruction and 
interpretation of the Cures Act; the utility and necessity of using 
intellectual property, including screenshots, to communicate issues 
with usability, user experience, interoperability, security, or the way 
the technology is used (and relatedly, the real and substantial threat 
to public health and safety resulting from prohibitions and/or 
restrictions on the communication of screenshots); and the measured 
approach we have taken throughout the Communications Condition and 
Maintenance of Certification requirements (which is discussed in detail 
in this section). Because the Program is voluntary, developers have the 
option to agree to the terms we have offered or to choose not to 
participate in the Program. As such, we believe our policies concerning 
intellectual property, including the use of screenshots, are consistent 
with other laws and regulations that govern terms for voluntary 
contracts and agreements with the Federal Government. Further, we 
believe that the final provisions of this Condition of Certification 
include appropriate consideration of health IT developers' intellectual 
property rights.
    We further discuss the various aspects of the Communications 
Condition of Certification requirements, as well as the changes we have 
made to our proposals, in more detail below.
a. Background and Purpose
    The Communications Condition of Certification requirements address 
industry practices of certified health IT developers that can severely 
limit the ability and willingness of health IT customers, users, 
researchers, and other stakeholders to openly discuss and share their 
experiences and other relevant information about health IT performance, 
including about the ability of health IT to exchange health information 
electronically. These practices result in a lack of transparency that 
can contribute to and exacerbate patient safety risks, system security 
vulnerabilities, and health IT performance issues.
    We explained in the Proposed Rule that the challenges presented by 
health IT developer actions that prohibit or restrict communications 
have been examined for some time. The problem was identified in a 2012 
report by the Institute of Medicine of the National Academies (IOM) 
entitled ``Health IT and Patient Safety: Building Safer Systems for 
Better Care'' \73\ (IOM Report). The IOM Report stated that health care 
providers, researchers, consumer groups, and other health IT users lack 
information regarding the functionality of health IT.\74\ The IOM 
Report observed, relatedly, that many developers restrict the 
information that users can communicate about developers' health IT 
through nondisclosure clauses, confidentiality clauses, IP protections, 
hold-harmless clauses, and other boilerplate contract language.\75\ The 
report stressed the need for health IT developers to enable the free 
exchange of information regarding the experience of using their health 
IT, including the sharing of screenshots relating to patient 
safety.\76\
---------------------------------------------------------------------------

    \73\ IOM (Institute of Medicine), Health IT and Patient Safety: 
Building Safer Systems for Better Care (2012). Available at https://www.nationalacademies.org/hmd/Reports/2011/Health-IT-and-Patient-Safety-Building-Safer- Systems-for-Better-Care.aspx.
    \74\ Id. at 37.
    \75\ Id. at 36, 128.
    \76\ Id.
---------------------------------------------------------------------------

    Concerns have also been raised by researchers studying health 
IT,\77\ who emphasize that confidentiality and IP provisions in 
contracts often place broad and unclear limits on authorized uses of 
information related to health IT,

[[Page 25723]]

which in turn seriously impact the ability of researchers to conduct 
and publish their research.\78\
---------------------------------------------------------------------------

    \77\ See Hardeep Singh, David C. Classen, and Dean F. Sittig, 
Creating an Oversight Infrastructure for Electronic Health Record-
Related Patient Safety Hazards, 7(4) Journal of Patient Safety 169 
(2011). Available at https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3677059/.
    \78\ Kathy Kenyon, Overcoming Contractual Barriers to EHR 
Research, Health Affairs Blog (October 14, 2015). Available at 
https://healthaffairs.org/blog/2015/10/14/overcoming-contractual-barriers-to-ehr-research/.
---------------------------------------------------------------------------

    The issue of health IT developers prohibiting or restricting 
communications about health IT has been the subject of a series of 
hearings by the Senate Committee on Health, Education, Labor and 
Pensions (HELP Committee), starting in the spring of 2015. Senators on 
the HELP Committee expressed serious concern regarding the reported 
efforts of health IT developers to restrict, by contract and other 
means, communications regarding user experience, including information 
relevant to safety and interoperability.\79\
---------------------------------------------------------------------------

    \79\ Senate HELP Committee Hearing at 13 and 27 (July 23, 2015), 
available at https://www.help.senate.gov/hearings/achieving-the-promise-of-health-information-technology-information-blocking-and-potential-solutions.
---------------------------------------------------------------------------

    Developer actions that prohibit or restrict communications about 
health IT have also been the subject of investigative reporting.\80\ A 
September 2015 report examined eleven contracts between health systems 
and major health IT developers and found that, with one exception, all 
of the contracts protected large amounts of information from being 
disclosed, including information related to safety and performance 
issues.\81\
---------------------------------------------------------------------------

    \80\ D. Tahir, POLITICO Investigation: EHR gag clauses exist--
and, critics say, threaten safety, Politico, August 27, 2015.
    \81\ Id.
---------------------------------------------------------------------------

b. Condition of Certification Requirements
i. Protected Communications and Communicators
    We proposed in 84 FR 7468 that the protection afforded to 
communicators under the requirements of the Communications Condition of 
Certification in Sec.  170.403(a) would apply irrespective of the form 
or medium in which the communication is made. We proposed in 84 FR 7468 
that developers must not prohibit or restrict communications whether 
written, oral, electronic, or by any other method if they are 
protected, unless such prohibition or restriction is otherwise 
permitted by the requirements of this Condition of Certification. 
Similarly, we proposed that these Condition of Certification 
requirements do not impose any limit on the identity of the 
communicators that are able to benefit from the protection afforded, 
except that employees and contractors of a health IT developer may be 
treated differently when making communications that are not afforded 
unqualified protection under Sec.  170.403(a)(2)(i). For example, we 
proposed that this Condition of Certification's requirements are not 
limited to communications by health IT customers (e.g., providers) who 
have contracts with health IT developers.
    Comments. Many commenters addressed the scope of protected 
communications in their comments. Several commenters suggested that the 
proposed scope of protected communications was too broad. Other 
commenters stated that the scope should be clarified. One commenter 
suggested that the scope of private communications that can be shared 
should be limited and that ONC should require mutual consent for such 
communications to be made public.
    Response. We appreciate these comments. The Cures Act identifies a 
list of subject areas about which health IT developers cannot prohibit 
or restrict communications to meet the conditions for certification. 
The terms we proposed for the protected subject areas are taken from 
the language in section 4002 of the Cures Act and include:
     The usability of the health information technology;
     The interoperability of the health information technology;
     The security of the health information technology;
     Relevant information regarding users' experiences when 
using the health information technology;
     The business practices of developers of health information 
technology related to exchanging electronic health information; and
     The manner in which a user of the health information 
technology has used such technology.
    We continue to interpret the above statutory terms broadly, but 
within the limiting framework we proposed, which includes a distinction 
between communications entitled to unqualified protections and those 
communications not entitled to such protection. We have, however, 
finalized some provisions with further limiting and clarifying language 
as well as provided examples to improve understanding of the 
provisions.
    We decline to create a consent requirement as part of the 
requirements of this Condition of Certification because such a 
requirement could unnecessarily encumber vital communications protected 
by the Cures Act. As highlighted above, the Communications Condition of 
Certification requirements are intended to enable unencumbered 
communication about usability, interoperability, and other critical 
issues with health IT, and a consent requirement would chill the 
ability of users of health IT to engage in that communication as well 
as be contrary to section 4002 of the Cures Act.
    Comments. One commenter stated that the Communications Condition of 
Certification requirements should apply only to certified health IT, 
recommending that ONC clarify that the use of ``the health IT'' refers 
only to the developer's health IT that is certified under the ONC 
Health IT Certification Program. The commenter stated that the use of 
``the health IT'' in the Cures Act can only be reasonably interpreted 
as referring to the health IT for which a developer is seeking 
certification, not all of the developer's health IT. Another commenter 
stated that other health IT, such as billing systems, should be out of 
scope of this requirement and noted that to do otherwise would create a 
regulatory imbalance between developers of such health IT who also 
offer certified health IT and those who do not.
    Response. We appreciate these comments regarding restricting the 
applicability of the Communications Condition of Certification 
requirements to certified health IT. We clarify that, as with all of 
the Conditions of Certification requirements, the Communications 
Condition of Certification requirements apply to developers of health 
IT certified under the Program and to the conduct of such developers 
with respect to health IT certified under the Program. By way of 
example, if a developer had health IT certified under the Program and 
also had health IT that was not certified under the Program, then only 
those communications about the certified health IT would be covered by 
the Communications Condition of Certification requirements.
    Comments. We received one comment requesting more specificity on 
the definition of communicators covered by the Communications Condition 
of Certification requirements. The commenter expressed concern that the 
broad scope could impact the ability to maintain confidentiality in 
traditional business-to-business relationships.
    Response. We appreciate this comment and understand the concern 
noted by the commenter. As stated in the Proposed Rule and finalized in 
Sec.  170.403, the Communications Condition and Maintenance of 
Certification requirements generally do not impose any limit on the 
identity of communicators that are able to benefit from the protection 
afforded. We also note that there are limited exceptions

[[Page 25724]]

where communications by certain communicators can be restricted. 
Specifically, as finalized in Sec.  170.403(a)(2)(ii)(A), health IT 
developers can place limited restrictions on communications by 
employees and contractors. We believe this will enable traditional 
business-to-business relationships to continue without undue 
disruption, including allowing implementation of non-disclosure 
agreements or other contracts as necessary to maintain confidentiality.
ii. Protected Subject Areas
    Comments. We received several comments requesting that we clarify 
how the Communications Condition of Certification requirements would 
apply to communications regarding public health reporting, including 
communications made by public health authorities.
    Response. We emphasize that the Cures Act identified a list of 
subject areas about which we were required to forbid developers from 
prohibiting or restricting communications. Though public health 
reporting was not specifically covered by the Cures Act or our proposed 
regulations, it may be that certain public health communications will 
fall within the categories established by the statute. We also note 
that one of the ``communications with unqualified protection'' 
discussed later in this section is for communicating information about 
adverse events, hazards, and other unsafe conditions to government 
agencies, health care accreditation organizations, and patient safety 
organizations. Depending on the specific communication in question, a 
communication about public health reporting or a communication made to 
public health authorities could be a communication that could not be 
restricted in any way. We also emphasize that, subject to limited 
circumstances already discussed above, we do not impose any limit on 
the identity of the communicators that are able to benefit from 
protections afforded under the Communications Condition of 
Certification requirements. Communicators are broadly defined and could 
include public health agencies and authorities.
    Comments. Several commenters had concerns regarding how a developer 
may address communications that contain false claims or libelous 
statements. Commenters discussed the need to enable health IT 
developers to--for example--refute false claims, deal with anonymous 
claims, and restrict certain communications (such as false statements 
or communications protected by attorney-client privilege). Some of 
these comments emphasized that false communications such as libel 
should not be protected, nor should communications sent by someone who 
obtained them illegally, such as a hacker. Some of the commenters 
recommended adding a category of communications that would never be 
protected under the proposed framework, and such communications would 
not receive unqualified protection or necessitate permitted 
restrictions. This would allow a developer to--for example--prohibit or 
restrict communications that are false or deceptive, would violate a 
law or court order, or would result in a breach of contract.
    Response. We appreciate the concerns expressed by commenters 
regarding statements that may be false or misleading. However, 
developers already have legal means and remedies available to them to 
address such statements, and this rule does not change that. For 
example, each State has libel laws that address libelous or defamatory 
statements and provide remedies in situations where the specific facts 
in a damaging statement can be proven to be untrue. We believe that 
such statements are best addressed through those laws and that it is 
neither prudent nor practical for ONC to use the Program and the 
Communications Condition of Certification requirements to attempt to 
assess such statements and make determinations as to their veracity.
    Further, we note that the Communications Condition of Certification 
requirements only provide that such protected communications cannot be 
restricted or prohibited. It is up to the health IT developer whether 
and how they choose to respond to the protected communication once 
made. Therefore, we clarify that it is not a violation of the 
Communications Condition of Certification requirements for developers 
to respond to false or unlawful comments under applicable law, as they 
do now, and to pursue litigation or any other available legal remedy in 
response to any protected communications that are covered by the 
Communications Condition of Certification. For example, it would not be 
a violation of the Communications Condition of Certification for a 
health IT developer who restricts the communication of screenshots as 
permitted under Sec.  170.403(a)(2)(ii)(D) to pursue litigation for 
Copyright infringement or violation of contract if a ``protected 
communication'' disclosed more screenshots than the developer's 
restriction allowed.
    Comments. Several commenters requested that ``safety'' be added as 
a protected category or that ONC should include in the final rule a 
specific ban that prohibits any restrictions on communications about 
health IT-related patient safety. Additionally, several commenters 
noted that ONC should include specific reporting methods or standards 
in the final rule to improve safety reporting or add examples to help 
encourage reporting of safety and security issues. Several commenters 
also requested that ONC develop protocols for reporting safety issues, 
and one commenter recommended ONC develop a patient safety reporting 
system.
    Response. In implementing the Cures Act requirement that a health 
IT developer, as a Condition of Certification requirement under the 
Program, not restrict communications about health IT, we adhered to the 
list of protected subject areas identified by Congress in the Cures 
Act. Those subject areas include communications about ``usability,'' 
``relevant information regarding users' experiences when using the 
health information technology,'' and the ``manner in which a user of 
the health information technology has used such technology.'' We 
clarify that patient safety issues related to an interaction with the 
health IT could be covered in one or more of those categories. 
Additionally, we agree with commenters that safety-related 
communications should receive specific protections, and we emphasize 
that the communication of safety concerns is also addressed as a 
protected communication receiving ``unqualified protection.'' In the 
section of this final rule on ``Communications with Unqualified 
Protection,'' and in Sec.  170.403(a)(2)(i)(B), we state that 
communicating information about adverse events, hazards, and other 
unsafe conditions to government agencies, health care accreditation 
organizations, and patient safety organizations is a communication 
about which a developer would be prohibited from imposing any 
prohibition or restriction.
(A) Usability of Health Information Technology
    The term ``usability'' is not defined in the Cures Act, nor in any 
other relevant statutory provisions. We proposed in 84 FR 7469 that the 
``usability'' of health IT be construed broadly to include both an 
overall judgment on the ``usability'' of a particular certified health 
IT product by the user, as well as any factor that contributes or may 
contribute to usability. We proposed that the factors of usability that 
could be the subject of

[[Page 25725]]

protected communications include, but are not limited to, the 
following: The user interface (e.g., what a user sees on the screen, 
such as layout, controls, graphics and navigational elements); ease of 
use (e.g., how many clicks); how the technology supports users' 
workflows; the organization of information; cognitive burden; cognitive 
support; error tolerance; clinical decision support; alerts; error 
handling; customizability; use of templates; mandatory data elements; 
the use of text fields; and customer support.
    Comments. One commenter stated that ``usability'' is too broadly 
defined and should relate more specifically to judgments on the ease of 
use of the health IT, rather than factors related to usability.
    Response. We do not believe that ``usability'' is inaccurately 
defined nor too broadly defined. To define usability in the Proposed 
Rule, we referenced the NIST standard \82\ as well as principles 
recognized by the Healthcare Information and Management Systems Society 
(HIMSS). We also emphasized that there are a multitude of factors that 
contribute to any judgment about ``usability,'' including factors 
contributing to the effectiveness, efficiency, and performance of the 
health IT. We have finalized the scope of the protected subject area 
``usability of its health IT'' in Sec.  170.403(a)(1)(i) as proposed, 
providing that the ``usability'' of health IT be construed broadly to 
include both an overall judgment on the ``usability'' of a particular 
certified health IT product, as well as any of the many factors that 
could contribute to usability as described in the Proposed Rule. We 
also note that communications about the usability of health IT may 
include communications about features that are part of the certified 
health IT as well as communications about what is not in the certified 
health IT (e.g., the absence of alerts or features that a user believes 
would aid in usability or are related to the other subject areas 
identified by the Cures Act).
---------------------------------------------------------------------------

    \82\ See https://www.nist.gov/programs-projects/health-it-usability.
---------------------------------------------------------------------------

(B) Interoperability of Health Information Technology
    The Cures Act, as codified in section 3000(9) of the PHSA, provides 
a definition of ``interoperability'' that describes a type of health IT 
that demonstrates the necessary capabilities to be interoperable. For 
the purposes of the Communications Condition of Certification 
requirements, we proposed that protected communications regarding the 
``interoperability of health IT'' would include communications about 
whether certified health IT and associated developer business practices 
meet the interoperability definition described in section 3000(9) of 
the PHSA, including communications about aspects of the technology or 
developer that fall short of the expectations found in that definition. 
We stated that this would include communications about the 
interoperability capabilities of health IT and the practices of a 
health IT developer that may inhibit the access, exchange, or use of 
EHI, including information blocking. As previously noted, Congress did 
not define the terms used in the Communications Conditions of 
Certification requirements in section 4002(a) of the Cures Act and 
codified in section 3001(c)(5)(D)(iii) of the PHSA. We believe that 
``interoperability'' was appropriately defined in the Proposed Rule by 
using the interoperability definition that is located elsewhere in 
section 4003(a)(2) of the Cures Act and codified in section 3000(9) of 
the PHSA.
    We did not receive comments about this aspect of the Proposed Rule, 
and we have finalized the scope of the protected subject area 
``interoperability of its health IT'' in Sec.  170.403(a)(1)(ii) as 
proposed above.
(C) Security of Health IT
    The security of health IT is addressed by the HIPAA Security 
Rule,\83\ which establishes national standards to protect individuals' 
electronic protected health information (ePHI) that is created, 
received, maintained, or transmitted by a covered entity or business 
associate (as defined at 45 CFR 160.103). Covered entities and business 
associates must ensure the confidentiality, integrity, and availability 
of all ePHI; protect against any reasonably anticipated threats or 
hazards to the security or integrity of such information; and protect 
against any reasonably anticipated uses or disclosures of such 
information that are not permitted or required under the HIPAA Privacy 
Rule.\84\ The HIPAA Security Rule requires health IT developers, to the 
extent that they are business associates of covered entities, to 
implement appropriate administrative, physical, and technical 
safeguards to ensure the confidentiality, integrity, and availability 
of ePHI.\85\ We proposed in 84 FR 7469 that the matters that fall 
within the topic of health IT security should be broadly construed to 
include any safeguards, whether or not required by the HIPAA Security 
Rule, that may be implemented (or not implemented) by a developer to 
ensure the confidentiality, integrity, and availability of EHI 
(information that includes ePHI), together with the certified health 
IT's performance regarding security.
---------------------------------------------------------------------------

    \83\ 45 CFR part 160 and subparts A and C of part 164.
    \84\ 45 CFR part 160 and subparts A and C of part 164.
    \85\ Id.
---------------------------------------------------------------------------

    Comments. One commenter noted that it is important that developers 
are able to remove posts on a website or forum that could compromise 
the security of health IT and recommended that ONC explicitly allow 
developers to do so in the final rule.
    Response. We recognize the importance of protecting the security of 
EHI and health IT. We also recognize that our engagement with 
stakeholders, as well as the language in section 4002 of the Cures Act, 
emphasize the strong public interest in allowing unencumbered 
communications regarding the protected subject areas and communications 
with unqualified protection, which are discussed in more detail below 
and in Sec.  170.403(a)(2)(i). We emphasize that developers may respond 
to communications as allowed under applicable law and may pursue any 
appropriate legal remedy. Taking these factors into consideration, we 
decline at this time to explicitly allow developers to restrict 
communications regarding security as suggested by the commenter.
    Comments. One commenter requested that ONC consider narrowing the 
permitted communication of security elements in Sec.  
170.403(a)(1)(iii) that might be used to compromise a particular 
certified health IT's security, for example restricting the sharing of 
authentication credentials issued to a customer or user to access a 
system containing sensitive information such as PHI.
    Response. We do not believe it is necessary in this final rule to 
narrow or restrict the information that can be communicated where 
security elements are included in the communication. As stated above, 
we believe there is a strong public interest in allowing unencumbered 
communications regarding the protected subject areas and communications 
with unqualified protection. Further, assurances that access 
credentials and PHI communicated under these circumstances will not be 
shared inappropriately are addressed in the HIPAA Security Rule and 
relevant State laws, and this rule does not change those protections.
    Comments. One comment recommended that the Communications Condition 
of Certification requirements should protect communication

[[Page 25726]]

regarding the overall security posture that the health IT developer 
takes or makes the user take, including communications regarding a 
system with known and longstanding issues or bugs.
    Response. We appreciate this comment and clarify that 
communications related to the overall security posture taken by a 
health IT developer would be within the subject area of ``security of 
its health IT,'' and thus would be protected communications covered by 
the Communications Condition of Certification requirements. We have 
finalized the scope of the protected subject area ``security of its 
health IT'' in Sec.  170.403(a)(1)(iii) as proposed.
(D) User Experiences
    The phrases ``relevant information regarding users' experiences 
when using the health IT'' and ``user experience'' are not defined in 
the Cures Act nor any other relevant statutory provisions. We proposed 
in 84 FR 7470 to afford the term ``user experience'' its ordinary 
meaning. To qualify as a ``user experience,'' we proposed that the 
experience would have to have been one that is had by a user of health 
IT. However, beyond this, we did not propose to qualify the types of 
experiences that would receive protection under the Communications 
Condition of Certification requirements based on the ``user 
experience'' subject area. To illustrate the breadth of potential user 
experiences that would be protected by the proposed Communications 
Condition of Certification requirements, we proposed that 
communications about ``relevant information regarding users' 
experiences when using the health IT'' would encompass, for example, 
communications and information about a person or organization's 
experience acquiring, implementing, using, or otherwise interacting 
with the health IT. We also proposed that this would include 
experiences associated with the use of the health IT in the delivery of 
health care, together with administrative functions performed using the 
health IT. We proposed that user experiences would also include the 
experiences associated with configuring and using the technology 
throughout implementation, training, and in practice. Further, we 
proposed that user experiences would include patients' and consumers' 
user experiences with consumer apps, patient portals, and other 
consumer-facing technologies of the health IT developer. We clarified 
that a ``relevant user experience'' would include any aspect of the 
health IT user experience that could positively or negatively impact 
the effectiveness or performance of the health IT.
    Comments. One commenter stated that the most relevant aspect of a 
user's experience of a health IT system is whether that experience 
resulted in patient safety events and requested that ONC specify 
patient safety events that arise from the use, misuse, or failure of 
health IT systems as ``user experiences'' that cannot be covered by gag 
orders.
    Response. As previously noted in our response to patient safety 
comments above, we reiterate that a user experience resulting in a 
patient safety event would be covered under the Communications 
Condition of Certification requirements and that a communication about 
such an experience would be protected, subject to other applicable 
laws. Further, communications about ``adverse events, hazards, and 
other unsafe conditions to government agencies, health care 
accreditation organizations, and patient safety organizations'' receive 
unqualified protection as described in Sec.  170.403(a)(2)(i). We noted 
in the Proposed Rule that the Patient Safety and Quality Improvement 
Act of 2005 (PSQIA) provides for privilege and confidentiality 
protections for information that meets the definition of patient safety 
work product (PSWP). This means that PSWP may only be disclosed as 
permitted by the PSQIA and its implementing regulations. We clarified 
that to the extent activities are conducted in accordance with the 
PSQIA, its implementing regulation, and section 4005(c) of the Cures 
Act, no such activities shall be construed as constituting restrictions 
or prohibitions that contravene this Condition of Certification.
    We believe that ``user experience'' was appropriately defined in 
the Proposed Rule and have finalized the scope of the protected subject 
area ``relevant information regarding users' experiences when using its 
health IT'' in Sec.  170.403(a)(1)(iv) as proposed, with the 
clarification provided above regarding patient safety events and to 
clarify that any communications regarding consumer-facing technologies 
would need to be about certified consumer-facing technologies per our 
earlier clarification about the scope of this Condition of 
Certification being limited to certified health IT.
(E) Manner in Which a User Has Used Health IT
    We proposed in 84 FR 7470 that protected communications regarding 
the ``manner in which a user has used health IT'' would encompass any 
information related to how the health IT has been used. We also 
proposed that the terms used to describe the protected subject areas 
should be construed broadly. We noted in the Proposed Rule that this 
subject area largely overlaps with the matters covered under the ``user 
experience'' subject area but may include additional perspectives or 
details beyond those experienced by a user of health IT. We proposed 
that the types of information that would fall within this subject area 
include but are not limited to:
     Information about a work-around implemented to overcome an 
issue in the health IT;
     customizations built on top of core health IT 
functionality;
     the specific conditions under which a user used the health 
IT, such as information about constraints imposed on health IT 
functionality due to implementation decisions; and
     information about the ways in which health IT could not be 
used or did not function as was represented by the developer.
    We did not receive comments on this specific aspect of the Proposed 
Rule, and we believe the Proposed Rule appropriately outlined what 
would fall within the subject matter of the manner in which a user has 
used health IT. We have finalized the scope of the protected subject 
area ``manner in which a user of the health IT has used such 
technology'' in Sec.  170.403(a)(1)(vi) as proposed, with the 
clarification that ``used'' refers to any uses of the certified health 
IT by the user and is not limited to uses that involve direct patient 
care.
(F) Business Practices Related to Exchange
    We proposed in 84 FR 7470 that the subject matter of ``business 
practices of developers of health IT related to exchanging electronic 
health information'' should be broadly construed to include developer 
policies and practices that facilitate the exchange of EHI and 
developer policies and practices that impact the ability of health IT 
to exchange health information. We further proposed that the exchange 
of EHI would encompass the appropriate and timely sharing of EHI.
    We proposed that protected communications would include, but would 
not be limited to:
     The costs charged by a developer for products or services 
that support the exchange of EHI (e.g., interface costs, API licensing 
fees and royalties, maintenance and subscription fees, transaction or 
usage-based costs for exchanging information);

[[Page 25727]]

     the timeframes and terms on which developers would or 
would not enable connections and facilitate exchange with other 
technologies, individuals, or entities, including other health IT 
developers, exchanges, and networks;
     the developer's approach to participation in health 
information exchanges and/or networks;
     the developer's licensing practices and terms as it 
relates to making available APIs and other aspects of its technology 
that enable the development and deployment of interoperable products 
and services; and
     the developer's approach to creating interfaces with 
third-party products or services, including whether connections are 
treated as ``one off'' customizations, or whether similar types of 
connections can be implemented at a reduced cost.
    Importantly, we further proposed in 84 FR 7470 that information 
regarding ``business practices of developers of health IT related to 
exchanging electronic health information'' would include information 
about switching costs imposed by a developer, as we are aware that the 
cost of switching health IT is a significant factor impacting health 
care providers adopting the most exchange-friendly health IT available.
    Comments. One commenter stated that our proposed ``business 
practices'' is too broadly defined and should relate exclusively to 
interoperability elements of certified health IT, rather than to 
products and services that support exchange.
    Response. As discussed in the Proposed Rule, we believe the term 
``business practices of developers of health IT related to exchanging 
electronic health information'' should be broadly construed consistent 
with our interpretation of the Cures Act language regarding the 
Communications Condition of Certification requirements, but limited to 
those business practices that relate to the certified health IT as 
clarified previously in this Condition and Maintenance of Certification 
section. A wide variety of business practices could impact the exchange 
of EHI, including developer business strategies, pricing, and even 
fraudulent behavior. As such, we have finalized in Sec.  
170.403(a)(1)(v) our proposal that such business practices include 
developer policies and practices that impact or facilitate the exchange 
of EHI. They could also include costs charged by a developer not only 
specifically for interoperability elements of the certified health IT, 
but also for any products or services that support the exchange of EHI 
through the certified health IT. We reiterate that business practices 
related to exchange could include timeframes and terms on which 
developers facilitate exchange; the developer's approach to 
participating in health information exchanges and/or networks; the 
developer's licensing practices and terms as related to APIs and other 
interoperable services; and the developer's approach to creating 
interfaces with third-party services. As proposed in 84 FR 7473, this 
Communications Condition of Certification requirement will also apply 
to any communication concerning a Program requirement (e.g., a 
Condition or Maintenance of Certification requirement) related to the 
exchange of EHI or the information blocking provision.
    Comments. Several commenters had concerns regarding communications 
about prices and costs, with some commenters asserting that such 
communications should be protected and some others asserting that 
developers should be able to restrict communications about prices and 
costs, including switching costs. Additionally, one commenter had 
concerns about protecting communications regarding timeframes and terms 
as well as workarounds and customizations. One commenter also 
recommended that ONC seek guidance from the Antitrust Division of the 
FTC regarding economic impacts of regulating health IT developer terms, 
prices, and timeframes.
    Response. We continue to interpret costs, information regarding 
timeframes and terms, and information about health IT workarounds and 
customizations as protected communications under the ``Business 
Practices Related to Exchange'' provision of this condition. We believe 
that this type of information is frequently relied upon and necessary 
in order to optimize health IT for the exchange of EHI. We emphasize 
that the costs charged by a developer for certified health IT or 
related services that support the exchange of EHI are significant 
factors that can impact the adoption of interoperable certified health 
IT and should be protected communications. For example, pricing could 
include prohibitive costs that prevent or discourage customers from 
using certified health IT to interact with competing technologies. 
Likewise, information regarding timeframes and terms is the type of 
information considered and relied upon in the adoption of interoperable 
certified health IT and is a protected communication. We have also 
finalized in Sec.  170.403(a)(1)(vi) that information about certified 
health IT workarounds and customizations relates to important aspects 
of how a user has used certified health IT, including how the certified 
health IT can be used to achieve greater interoperability, and is a 
protected communication.
    In response to the comments recommending that we seek guidance from 
the FTC, we note that we are not regulating health IT developer terms, 
prices, and timeframes under this Communications Condition of 
Certification requirements, and therefore do not need to seek further 
guidance. Rather, the Communications Condition of Certification 
requirements would protect communications about health IT developer 
costs, terms, and timeframes as described above and ensure that such 
information could be shared. We have finalized the scope of the 
protected subject area ``business practices of developers of health IT 
related to exchanging electronic health information'' in Sec.  
170.403(a)(1)(v) as proposed.
iii. Meaning of ``Prohibit or Restrict''
    The terms ``prohibit'' and ``restrict'' are not defined in the 
Cures Act, nor in any other relevant statutory provisions. We discussed 
in the Proposed Rule that communications can be prohibited or 
restricted through contractual terms or agreements (e.g., non-
disclosure agreements or non-disparagement clauses) as well as through 
conduct, including punitive or retaliatory business practices that are 
designed to create powerful disincentives to engaging in communications 
about developers or their health IT. Therefore, we proposed in 84 FR 
7470 that the Communications Condition of Certification requirements 
would not be limited to only formal prohibitions or restrictions (such 
as by means of contracts or agreements) and would encompass any conduct 
by a developer that would be likely to restrict a communication or 
class of communications protected by the Communications Condition of 
Certification requirements. We explained that the conduct in question 
must have some nexus to the making of a protected communication or an 
attempted or contemplated protected communication.
(A) Prohibitions or Restrictions Arising by Way of Contract
    We explained in the Proposed Rule that the principal way that 
health IT developers can control the disclosure of information about 
their health IT is through contractual prohibitions or restrictions. We 
noted that there are different ways that contractual prohibitions or 
restrictions arise. In some instances, a contractual prohibition or 
restriction will be

[[Page 25728]]

expressed, and the precise nature and scope of the prohibition or 
restriction will be explicit in the contract or agreement. However, we 
also noted that a contract may also impose prohibitions or restrictions 
in less precise terms. We stated that a contract does not need to 
expressly prohibit or restrict a protected communication in order to 
have the effect of prohibiting or restricting that protected 
communication. The use of broad or vague language that obfuscates the 
types of communications that can and cannot be made may be treated as a 
prohibition or restriction if it has the effect of restricting 
legitimate communications about health IT.
    We stated that restrictions and prohibitions found in contracts 
used by developers to sell or license their health IT can apply to 
customers directly and can require that the customer ``flow-down'' 
obligations to the customer's employees, contractors, and other 
individuals or entities that use or work with the developer's health 
IT. We proposed that such contract provisions would not comply with the 
Communications Condition of Certification requirements and would be 
treated as prohibiting or restricting protected communications. We 
noted that prohibitions or restrictions on communications can also be 
found in separate nondisclosure agreements (NDAs) that developers 
require their customers--and in some instances the users of the health 
IT or third-party contractors--to enter into in order to receive or 
access the health IT. We proposed that such agreements are covered by 
the Communications Condition of Certification requirements.
    We did not receive comments on this specific aspect of the Proposed 
Rule and have finalized our interpretation proposed in FR 7471 
regarding prohibitions or restrictions arising by way of contract as 
stated above.
(B) Prohibitions or Restrictions That Arise by Way of Conduct
    We proposed in 84 FR 7471 that conduct that has the effect of 
prohibiting or restricting a protected communication would be subject 
to the Communications Condition of Certification requirements. We 
emphasized that the conduct in question must have some nexus to the 
making of a protected communication or an attempted or contemplated 
protected communication. As such, developer conduct that was alleged to 
be intimidating, or health IT performance that was perceived to be 
substandard, would not, in and of itself, implicate the Communications 
Condition of Certification requirements unless there was some nexus 
between the conduct or performance issue and the making of (or 
attempting or threatening to make) a protected communication.
    We did not receive comments on this specific aspect of the Proposed 
Rule and have finalized our interpretation proposed in 84 FR 7471 
regarding prohibitions or restrictions arising by way of conduct as 
stated above.
iv. Communications With Unqualified Protection
    We proposed in 84 FR 7472 a narrow class of communications--
consisting of five specific types of communications--that would receive 
unqualified protection from developer prohibitions or restrictions. 
With respect to communications with unqualified protection, a developer 
would be prohibited from imposing any prohibition or restriction. We 
proposed that this narrow class of communications warrants unqualified 
protection because of the strength of the public policy interest being 
advanced by the class of the communication and/or the sensitivity with 
which the identified recipient treats, and implements safeguards to 
protect the confidentiality and security of, the information received. 
We stated that a developer that imposes a prohibition or restriction on 
a communication with unqualified protection would fail the first part 
of the two-part test for allowable prohibitions or restrictions, and as 
such would contravene the Communications Condition of Certification 
requirements.
    Comments. One commenter recommended adding language specifying the 
types of entities that can receive communications with unqualified 
protection, noting that such specificity would help ensure that these 
communications go to the appropriate entities so that they can be 
addressed quickly. The commenter recommended that provisions around 
reporting to government entities should be limited to United States 
government entities.
    Response. We do not believe it is necessary to further specify the 
types of entities that can receive communications with unqualified 
protection. We intend for this protection to cover a wide variety of 
organizations, and further specifying the types of entities that can 
receive such communications, such as limiting communication to only 
United States government entities, would unnecessarily limit the scope 
of this protection and could be counter to the public policy interest 
to advance the ability of these communications to occur unencumbered. 
We have finalized in Sec.  170.403(a)(2)(i) our proposal to prohibit 
developers from imposing any prohibition or restriction on 
communications that fall into a narrow class of communications--
consisting of the five specific types of communications described 
below--that would receive unqualified protection.
(A) Disclosures Required by Law
    We proposed in 84 FR 7472 that where a communication relates to 
subject areas enumerated in proposed Sec.  170.403(a)(1) and there are 
Federal, State, or local laws that would require the disclosure of 
information related to health IT, developers must not prohibit or 
restrict in any way protected communications made in compliance with 
those laws. We noted that we expect most health IT contracts would 
allow for, or not prohibit or restrict, any communication or disclosure 
that is required by law, such as responding to a court or Congressional 
subpoena, or a valid warrant presented by law enforcement. We further 
proposed that if required by law, a potential communicator should not 
have to delay any protected communication under the Communications 
Condition of Certification requirements.
    We did not receive comments on this aspect of the Proposed Rule and 
have finalized in Sec.  170.403(a)(2)(i)(A) our approach regarding 
disclosures required by law as proposed.
(B) Communicating Information About Adverse Events, Hazards, and Other 
Unsafe Conditions to Government Agencies, Health Care Accreditation 
Organizations, and Patient Safety Organizations
    We proposed in 84 FR 7472 that there is an overwhelming interest in 
ensuring that all communications about health IT that are necessary to 
identify patient safety risks, and to make health IT safer, not be 
encumbered by prohibitions or restrictions imposed by health IT 
developers that may affect the extent or timeliness of communications. 
In addition to the public policy interest in promoting uninhibited 
communications about health IT safety, we proposed that the recognized 
communication channels for adverse events, hazards, and unsafe 
conditions provide protections that help ensure that any disclosures 
made are appropriately handled and kept confidential and secure. We 
proposed that the class of recipients to which the information can be 
communicated under this specific category of communications given 
unqualified protection should provide health IT developers with comfort 
that there is little risk of such communications prejudicing the 
developer's IP rights.

[[Page 25729]]

    We sought comment on whether the unqualified protection afforded to 
communications made to a patient safety organization about adverse 
events, hazards, and other unsafe conditions should be limited. 
Specifically, we sought comment on whether the unqualified protection 
should be limited by the nature of the patient safety organization to 
which a communication can be made, or the nature of the communication 
that can made.
    Comments. Several commenters stated that ONC should not place any 
limits on the unqualified protection afforded to communications made to 
patient safety organizations about adverse events, hazards, and other 
unsafe conditions.
    Response. We have finalized in Sec.  170.403(a)(2)(i)(B) as 
proposed regarding the unqualified protection afforded to 
communications about adverse events, hazards, and other unsafe 
conditions that are made to government agencies, health care 
accreditation organizations, and patient safety organizations. 
Additionally, we placed no limits or qualifiers on such communications, 
including those communications made to patient safety organizations.
(C) Communicating Information About Cybersecurity Threats and Incidents 
to Government Agencies
    We proposed in 84 FR 7472 that if health IT developers were to 
impose prohibitions or restrictions on the ability of any person or 
entity to communicate information about cybersecurity threats and 
incidents to government agencies, such conduct would not comply with 
the Communications Condition of Certification requirements.
    We sought comment on whether it would be reasonable to permit 
health IT developers to impose limited restrictions on communications 
about security issues to safeguard the confidentiality, integrity, and 
security of EHI. In the Proposed Rule, we asked if, for example, health 
IT developers should be permitted to require that health IT users 
notify the developer about the existence of a security vulnerability 
prior to, or simultaneously with, any communication about the issue to 
a government agency.
    Comments. Some commenters stated that users should never be 
required to notify the developer when reporting cybersecurity issues, 
as this would impose a burden on the user and a potential barrier to 
reporting. Other commenters recommended that developers should be 
allowed to require users to notify them simultaneously or prior to 
reporting such incidents, with one comment noting that this would 
enable developers to better address and respond to security threats 
prior to the knowledge of a threat becoming widespread. Some commenters 
recommended that ONC make it a violation for developers to not share 
cybersecurity vulnerabilities with providers, and that ONC work with 
DHS to mitigate issues around sharing such vulnerabilities. One 
commenter recommended changing the wording regarding communicating 
cybersecurity and security risks to include known vulnerabilities and 
health IT defects.
    Response. We strongly encourage users of health IT to notify 
developers as soon as possible when reporting security incidents and 
issues. However, it would not be appropriate to require this practice, 
which would impose an obligation on users of health IT that is outside 
the scope of this rule. It would also be outside the scope of this 
condition to implement additional requirements for developers regarding 
the sharing of cybersecurity vulnerabilities with health care 
providers. To be clear, we expect developers with Health IT Modules 
certified under the Program to share information about cybersecurity 
vulnerabilities with health care providers and other affected users as 
soon as feasible, so that these affected users can take appropriate 
steps to mitigate the impact of these vulnerabilities on the security 
of EHI and other PII in the users' systems. Thus, we have finalized the 
Communications Condition of Certification requirements in Sec.  
170.403(a)(2)(i)(C) as proposed. Developers must not place restrictions 
on communications receiving unqualified protections. We also clarify 
that known vulnerabilities and health IT defects would likely be 
considered types of ``adverse events, hazards, and other unsafe 
conditions'' that would receive ``unqualified protection,'' and thus a 
developer would not be able to restrict a health IT user from 
communicating about such issues in communications receiving unqualified 
protections under the Communications Condition of Certification 
requirements (see Sec.  170.403(a)(2)(i) as finalized). However, we 
note that in communications not receiving unqualified protection under 
the Communications Condition of Certification requirements, a security 
vulnerability that is not already public knowledge would be considered 
a non-user-facing aspect of health IT, about which developers are 
permitted to restrict communications (see Sec.  170.403(a)(2)(ii)(B) as 
finalized). Last, we note that we will continue to work with our 
Federal partners to mitigate and address cybersecurity threats and 
incidents.
(D) Communicating Information About Information Blocking and Other 
Unlawful Practices to a Government Agency
    We proposed in 84 FR 7473 that the public benefit associated with 
the communication of information to government agencies on information 
blocking, or any other unlawful practice, outweighs any concerns 
developers might have about the disclosure of information about their 
health IT. We noted that reporting information blocking, as well as 
other unlawful practices, to a government agency would not cause an 
undue threat to a health IT developer's IP.
    Comments. We received several comments regarding the lack of 
whistleblower protections in the Proposed Rule for individuals who 
report information blocking or other issues regarding certified health 
IT. These comments discussed the need to provide for whistleblower type 
protections for individuals who highlight information blocking 
practices, as well as to identify them to the appropriate authorities 
so that the individual is not subject to retaliatory action by the 
actor identified by the whistleblower.
    Response. We appreciate these comments and agree that it is 
extremely important for individuals to be able to report information 
blocking and violations of other Conditions of Certification without 
fear of retaliation. We note that the Communications Condition of 
Certification requirements provide protections against retaliation and 
intimidation by developers with respect to protected communications. We 
discussed in the Proposed Rule that the Communications Condition of 
Certification requirements cover communications that are prohibited or 
restricted through contractual terms or agreements (e.g., non-
disclosure agreements, non-disparagement clauses) between the health IT 
developer, or offeror of health IT, and the communicator, as well as 
through conduct, including punitive or retaliatory business practices 
that are designed to create powerful disincentives to engaging in 
communications about developers or their health IT. We clarify, 
however, that merely filing a lawsuit against the communicator 
regarding the making of

[[Page 25730]]

a communication would not be considered intimidating conduct in 
violation of this Condition. Any such determination would necessarily 
be fact-specific, and the health IT developer's lawsuit would have to 
be designed to intimidate a communicator in order to prevent or 
discourage that communicator from making a protected communication, 
rather than be designed to pursue a legitimate legal interest. We 
believe that the proposed broad interpretation of ``prohibit'' and 
``restrict'' is appropriate given the intention of the Cures Act, which 
placed no limitations on the protection of communications about the 
protected subject areas. We finalized this interpretation of 
``prohibit'' and ``restrict'' proposed in 84 FR 7470 and believe that 
the interpretation would provide significant protections for 
whistleblowers from retaliatory actions. Thus, retaliatory actions by a 
developer against a whistleblower would be in violation of this 
provision. We also emphasize that conduct by a developer that may be 
perceived as intimidating or punitive would not implicate the 
Communications Condition of Certification requirements unless that 
conduct was specifically designed to influence the making of a 
protected communication. In other words, punitive actions must have a 
nexus to the making of a protected communication, such as retaliation 
for reporting of information blocking, in order to violate the 
Communications Condition of Certification requirements in Sec.  
170.403(a)(1). Last, we refer readers to the discussion of 
``complaints'' under the information blocking section of this final 
rule, which details the confidentiality provided to information 
blocking complaints and complainants.
    We have finalized the Communications Condition of Certification 
requirements in Sec.  170.403(a)(2)(i)(D) as proposed.
(E) Communicating Information About a Health IT Developer's Failure To 
Comply With a Condition of Certification or Other Program Requirement
    We proposed in 84 FR 7473 that the benefits to the public and to 
users of health IT of communicating information about a health IT 
developer's failure to comply with a Condition of Certification 
requirement or other Program requirement (45 CFR part 170) justify 
prohibiting developers of health IT from placing any restrictions on 
such protected communications. We explained that information regarding 
the failure of certified health IT to meet any Condition of 
Certification requirement or other Program requirement is vital to the 
effective performance and integrity of the Program. Moreover, the 
failure of a certified health IT to meet such requirements could impact 
the performance of the certified health IT with respect to usability, 
safety, and interoperability. We stated that it is important to enable 
unencumbered reporting of such information and that such reporting is 
essential to the transparency that section 4002 of the Cures Act seeks 
to ensure. While the current procedures for reporting issues with 
certified health IT encourage providers to contact developers in the 
first instance to address certification issues, we noted that users of 
health IT should not hesitate to contact ONC-Authorized Certification 
Bodies (ONC-ACBs), or ONC itself, if the developer does not provide an 
appropriate response, or the matter is of a nature that should be 
immediately reported to an ONC-ACB or to ONC.
    We did not receive any comments on this aspect of the Proposed 
Rule. In consideration of the above, we have finalized this provision 
in Sec.  170.403(a)(2)(i)(E) as proposed.
v. Permitted Prohibitions and Restrictions
    We proposed in 84 FR 7473 that, except for communications with 
unqualified protection (Sec.  170.403(a)(2)(i)), health IT developers 
would be permitted to impose certain narrow prohibitions and 
restrictions on communications. Specifically, we proposed that, with 
the exception of communications with unqualified protection, developers 
would be permitted to prohibit or restrict the following 
communications, subject to certain conditions:
     Communications of their own employees;
     Disclosure of non-user-facing aspects of the software;
     Certain communications that would infringe the developer's 
or another person's IP rights;
     Publication of screenshots in narrow circumstances; and
     Communications of information that a person or entity 
knows only because of their participation in developer-led health IT 
development and testing.
    The proposed Communications Condition of Certification requirements 
delineated the circumstances under which these types of prohibitions 
and restrictions would be permitted, including certain associated 
conditions that developers would be required to meet. We emphasized 
that any prohibition or restriction not expressly permitted would 
violate the Communications Condition of Certification requirements. 
Additionally, we proposed that it would be the developer's burden to 
demonstrate to the satisfaction of ONC that the developer met all 
associated requirements. Further, as an additional safeguard, we 
proposed that where a developer sought to avail itself of one of the 
permitted types of prohibitions or restrictions, the developer must 
ensure that potential communicators are clearly and explicitly notified 
about the information and material that can be communicated, and that 
which cannot. We proposed this would mean that the language of health 
IT contracts must be precise and specific. We stressed that contractual 
provisions or public statements that support a permitted prohibition or 
restriction on communication should be specific about the rights and 
obligations of the potential communicator. We explained that contract 
terms that are vague and cannot be readily understood by a reasonable 
health IT customer would not benefit from the qualifications to this 
Condition of Certification requirement as outlined in the Proposed Rule 
and below.
(A) Developer Employees and Contractors
    We recognized in the Proposed Rule in 84 FR 7473 that health IT 
developer employees, together with the entities and individuals who are 
contracted by health IT developers to deliver products and/or services 
(such as consultants), may be exposed to highly sensitive, proprietary, 
and valuable information in the course of performing their duties. We 
also stated that we recognize that an employer should have the ability 
to determine how and when the organization communicates information to 
the public, and that employees owe confidentiality obligations to their 
employers. We noted that this would similarly apply to contractors of a 
developer. We proposed in 84 FR 7473 that on this basis, developers 
would be permitted to impose prohibitions or restrictions on the 
communications of employees and contractors to the extent that those 
communications fall outside of the class of communications with 
unqualified protection as discussed above.
    Comments. One commenter stated that this provision should be 
clarified and expanded to cover other third parties with whom the 
health IT developer shares its confidential information, including 
subcontractors, agents, auditors, suppliers, partners, co-sellers, and 
re-sellers, as well as

[[Page 25731]]

potential relationships for which a contract has not yet been signed in 
case information is shared during a pre-contract evaluation stage.
    Response. We reiterate that ``developer employees and contractors'' 
include health IT developer employees, together with the entities and 
individuals who are contracted by health IT developers to deliver 
health IT and/or services who may be exposed to highly sensitive, 
proprietary, and valuable information in the course of performing their 
duties. This functional description of employees and contractors could 
include subcontractors, agents, auditors, suppliers, partners, co-
sellers, and re-sellers, depending on the specific relationship and 
circumstances. We have finalized the proposed approach to describing 
employees and contractors in Sec.  170.403(a)(2)(ii)(A). We note that 
we did not expand this description to include ``potential 
relationships'' because such an addition would make the description 
overly broad, and it is unlikely that individuals who are not yet under 
contract would be exposed to highly sensitive, proprietary, and 
valuable information.
    Comments. We received one comment that self-developers should not 
be permitted to place restrictions on the communications of their 
employees who are using their certified health IT.
    Response. We agree that self-developers should not be allowed to 
restrict the communications of users of their certified health IT who 
are also employees or contractors. We have revised Sec.  
170.403(a)(2)(ii)(A) to clarify that the limited prohibitions 
developers may place on their employees or contractors under the 
Communications Condition of Certification requirements cannot be placed 
on users of a self-developer's certified health IT who are also 
employees or contractors of the self-developer. For example, a large 
health system with a self-developed EHR cannot restrict a health care 
provider, who is employed by that health system and using that EHR to 
provide services, from communicating about the EHR as a user based on 
the fact that the health care provider is also an employee of the 
health system. We note that the concept of ``self-developed'' refers to 
a Complete EHR or Health IT Module designed, created, or modified by an 
entity that assumed the total costs for testing and certification and 
that will be the primary user of the health IT (76 FR 1300).
(B) Non-User-Facing Aspects of Health IT
    We proposed in 84 FR 7474 that the Communications Condition of 
Certification requirements would permit health IT developers to impose 
prohibitions and restrictions on communications to the extent necessary 
to ensure that communications do not disclose ``non-user-facing aspects 
of health IT.'' We noted that, like all permitted prohibitions, such 
prohibitions and restrictions could only be put in place by developers 
if there is not an unqualified protection that applies. We proposed in 
84 FR 7474 that a ``non-user-facing aspect of health IT,'' for the 
purpose of this Condition of Certification, was an aspect of health IT 
that is not a ``user-facing aspect of health IT.'' We stated that 
``user-facing aspects of health IT'' would include the design concepts 
and functionality that is readily ascertainable from the health IT's 
user interface and screen display. We stated that they did not include 
those parts of the health IT that are not exposed to persons running, 
using, or observing the operation of the health IT and that are not 
readily ascertainable from the health IT's user interface and screen 
display, all of which would be considered ``non-user-facing'' concepts. 
We proposed in 84 FR 7474 that ``non-user-facing aspects of health IT'' 
would include source and object code, software documentation, design 
specifications, flowcharts, and file and data formats. We welcomed 
comments on whether these and other aspects of health IT should or 
should not be treated as user-facing.
    In the Proposed Rule, we noted that the terminology of ``non-user-
facing aspects of health IT'' is not intended to afford only health IT 
users with specific protections against developer prohibitions or 
restrictions on communications and is agnostic as to the identity of 
the communicator.
    Comments. Some commenters expressed concern regarding the broad 
scope of ``user-facing'' and, by extension, the scope of ``non-user-
facing.'' One commenter asked for clarification regarding the 
definition of ``software documentation'' with regards to non-user-
facing aspects of health IT and suggested that it applies to 
documentation that is for back-end components, not documents for 
normal-end use. Additionally, a couple of comments stated that 
administrative functions should not be considered user-facing, 
including one comment that the relevant users for the purpose of the 
Communications Condition of Certification requirements are ``end'' 
users, thus the non-user-facing provision should apply only to ``non-
end-user-facing'' aspects of health IT. Some commenters emphasized that 
administrative portions of health IT contain more insight into health 
IT systems and that administrative functions affect a limited number of 
users and are not the types of communications or subject matters 
contemplated by the Cures Act. One commenter stated that algorithms 
should be considered non-user-facing. Another commenter stated that ONC 
should clarify the status of diagrams and flowcharts.
    Response. We do not see a necessary or appreciable distinction 
between ``users'' and ``end users,'' as we have focused on the aspects 
of the health IT that are and are not subject to protected 
communications under this Condition of Certification. We also believe 
that there could be unintended consequences with the term ``end user,'' 
such as limiting certain users not specified under the ``permitted 
prohibitions and restrictions'' (e.g., developer employees and 
contractors) from making protected communications. Therefore, we 
believe ``non-user-facing'' best reflects the scope of the 
communications about health IT we seek to capture with these terms.
    We reiterate that ``non-user-facing aspects of health IT'' comprise 
those aspects of the health IT that are not readily apparent to someone 
interacting with the health IT as a user of the health IT, including 
source and object code, certain software documentation, design 
specifications, flowcharts, and file and data formats. We clarify that 
``non-user-facing aspects of health IT'' would also include underlying 
software that is utilized by the health IT in the background and not 
directly by a user of the health IT. For example, the programming 
instructions for proprietary APIs would be considered non-user-facing 
because they are not readily apparent to the individual users of the 
health IT. In addition, underlying database software that connects to 
health IT and is used to store data would be considered a non-user-
facing aspect of health IT because it serves data to the health IT, not 
directly to a user.
    We further clarify that algorithms would be considered ``non-user-
facing aspects of health IT'' as they are not readily apparent to 
persons using health IT for the purpose for which it was purchased or 
obtained. Thus, communications regarding algorithms (e.g., mathematical 
methods and logic) could be restricted or prohibited, while 
communications regarding the output of the algorithm and how it is 
displayed in

[[Page 25732]]

a health IT system could not be restricted as ``non-user-facing aspects 
of health IT.'' Similarly, we also clarify that certain ``software 
documentation'' that would be considered to be a non-user-facing aspect 
of health IT would include documentation for back-end components, again 
because it is not readily apparent to persons using health IT.
    Whether or not a communication would be considered a ``non-user-
facing aspects of health IT'' would be based on whether the 
communication involved aspects of health IT that would be evident to 
anyone running, using, or observing the operation of the health IT for 
the purpose for which it was purchased or obtained. With respect to 
administrative functions, where the communication at issue relates to 
aspects of the health IT that are not observable by users of the health 
IT, it would be considered ``non-user-facing'' for the purpose of this 
Condition of Certification requirement. For example, a communication 
regarding an input process delay experienced by an administrator of 
health IT that was caused by the underlying database software could be 
restricted if the communication discussed the underlying database 
software, which would be considered a non-user-facing aspect of the 
health IT. However, if the communication discussed the user screens and 
the delay experienced by the administrator, which would be considered 
user-facing aspects of health IT, it could not be restricted. 
Similarly, as long as diagrams or flowcharts do not include aspects of 
the health IT that are observable by users of the health IT, as 
described above, they would be considered communications about non-
user-facing aspects of health IT.
    We have finalized in Sec.  170.403(a)(2)(ii)(B) our proposed 
approach to the scope of ``non-user-facing aspects of health IT'' with 
the clarification provided above regarding scope.
(C) Intellectual Property
    We proposed in 84 FR 7474 that the Communications Condition of 
Certification requirements are not intended to operate as a de facto 
license for health IT users and others to act in a way that might 
infringe the legitimate IP rights of health IT developers or other 
persons. Indeed, we proposed in 84 FR 7474 that health IT developers 
are permitted to prohibit or restrict certain communications that would 
infringe their IP rights so long as the communication in question is 
not a communication with unqualified protection. We proposed in 84 FR 
7474 that any prohibition or restriction imposed by a developer must be 
no broader than legally permissible and reasonably necessary to protect 
the developer's legitimate IP interests. We also proposed in 84 FR 7474 
that health IT developers are not permitted to prohibit or restrict, or 
purport to prohibit or restrict, communications that would be a ``fair 
use'' of any copyright work comprised in the developer's health IT.\86\ 
``Fair use'' is a legal doctrine that allows for the unlicensed use of 
copyright material in certain circumstances, which could include 
circumstances involving criticism, commentary, news reporting, and 
research.\87\
---------------------------------------------------------------------------

    \86\ See 17 U.S.C. 107 (setting forth the four factors required 
to evaluate a question of fair use under the statutory framework).
    \87\ See https://www.copyright.gov/fair-use/more-info.html for 
more information on fair use.
---------------------------------------------------------------------------

    Comments. One commenter stated that fair use should not override 
other IP protections and stressed that relying on fair use could lead 
to uncertainty because it is determined on a case-by-case basis. 
Another commenter stated that because the fair use doctrine can be 
difficult to implement and can lead to uncertain results, ONC should 
expand the list of communications that would be explicitly protected as 
fair use to include news reporting, criticism, parody, and 
communications for educational purposes.
    Response. We disagree with commenters and believe that relying on 
the ``fair use'' doctrine for determining when a screenshot or other 
communication cannot be restricted should be allowed under the 
Communications Condition of Certification requirements. This doctrine 
presents a framework of analysis that is well-developed in case law and 
thus can be interpreted and applied consistently, even when materials 
are not formally copyrighted. Accordingly, we are retaining the concept 
of ``fair use'' in the final provision in Sec.  170.403(a)(2)(ii)(C). 
Developers and ONC will apply a fair use test to copyrighted materials 
and, by analogy, to materials that could be copyrighted, to determine 
whether developers may prohibit a communication that would infringe on 
IP rights.
    The Communication Condition of Certification requirements relate 
only to protected communications, thus developers can place 
restrictions on communications about subject matters outside of the 
protected communications categories without implicating the 
Communications Condition of Certification requirements. Also, as 
discussed earlier regarding developer employees and contractors in 
Sec.  170.403(a)(2)(ii)(A), developers may restrict communications by 
their employees, contractors, and consultants without implicating the 
Communications Condition of Certification requirements, provided they 
do not restrict communications with unqualified protections. Further, 
as described earlier regarding non-user-facing aspects of certified 
health IT in Sec.  170.403(a)(2)(ii)(B), developers may restrict 
communications that disclose non-user-facing aspects of the developer's 
certified health IT, provided they do not restrict communications with 
unqualified protections. We clarified in that section that screenshots 
or videos depicting source code would be considered communications of 
non-user-facing aspects of health IT and could be restricted under the 
Communications Condition of Certification requirements as long as they 
did not receive unqualified protection. We also clarify that this 
Condition does not prohibit health IT developers from enforcing their 
IP rights and that a lawsuit filed by a health IT developer in response 
to a protected communication regarding infringement of IP rights would 
not automatically be considered intimidation or retaliation in 
violation of this Condition.
    As discussed later in the pre-market testing and development 
section in Sec.  170.403(a)(2)(ii)(E), developers can place 
restrictions on communications related to pre-market health IT 
development and testing activities, which could include IP protections, 
provided they do not restrict communications with unqualified 
protections. Combined, these avenues allow for protecting IP in ways 
that would not implicate the Communications Condition of Certification 
requirements, thereby allowing developers to take a number of actions 
to protect and safeguard IP in their certified health IT.
    Comments. Several commenters requested clarity regarding how the 
proposed protections for IP would work. One commenter stated that the 
rule must allow developers to protect legitimate IP interests and asked 
for clarity on how ONC would determine whether a developer's 
restriction on the communication of a screenshot was an allowable 
protection of trade secrets or an impermissible restriction of 
protected communications. Several other commenters, who generally 
supported the Communications Condition of Certification requirements, 
requested clarification regarding how a

[[Page 25733]]

prohibition on communications that is designed to protect IP can be 
applied. Some commenters requested examples of the types of 
communications that can be restricted on the basis of IP and 
clarification of the standard ONC will use to determine what 
prohibitions are permissible.
    Response. We have finalized an approach in Sec.  
170.403(a)(2)(ii)(C) that allows developers to prohibit or restrict 
communications that involve the use or disclosure of intellectual 
property existing in the developer's health IT (including third-party 
intellectual property), provided that any prohibition or restriction 
imposed by a developer must be no broader than necessary to protect the 
developer's legitimate intellectual property interests and consistent 
with all other requirements under the ``permitted prohibitions and 
restrictions'' (Sec.  170.403(a)(2)(ii)) of this section. As discussed 
above, a restriction or prohibition would be deemed broader than 
necessary and inconsistent with the ``permitted prohibitions and 
restrictions'' (Sec.  170.403(a)(2)(ii)) if it would restrict or 
preclude a public display of a portion of a work subject to copyright 
protection (without regard to whether the copyright is registered) that 
would reasonably constitute a ``fair use'' of that work.
    Examples of the types of communications that could be restricted 
under the Communications Condition of Certification requirements might 
include a blog post describing a customization of a developer's health 
IT that includes the source code of the developer's health IT or a 
written review of an analytical feature of the developer's health IT 
that reveals the algorithms used. However, as mentioned above, the 
restriction must be no broader than necessary to protect the 
developer's legitimate IP interests, thus only the infringing portions 
of the communications could be restricted.
    Comments. One commenter recommended that a health IT developer must 
demonstrate that a communication was specifically designed to copy or 
steal a developer's IP in order for the developer to be allowed to 
prohibit the communication as an infringement on their IP rights.
    Response. We appreciate this comment, but decline to require that a 
developer demonstrate that a communication was designed to copy or 
steal IP in order for the developer to restrict the communication as 
one that would infringe on IP rights. We believe that the revised 
approach discussed above provides appropriate balance between 
protecting IP rights and enabling protected communications and do not 
believe that an ``intent'' element would be necessary. We have 
finalized the proposals regarding IP in Sec.  170.403(a)(2)(ii)(C), as 
amended above.
(D) Faithful Reproductions of Health IT Screenshots
    We proposed in 84 FR 7475 that health IT developers generally would 
not be permitted to prohibit or restrict communications that disclose 
screenshots of the developer's health IT. We proposed that the 
reproduction of screenshots in connection with the making of a 
communication protected by this Condition of Certification would 
ordinarily represent a ``fair use'' of any copyright subsisting in the 
screen display, and developers should not impose prohibitions or 
restrictions that would limit that fair use. Notwithstanding this, we 
proposed that health IT developers would be allowed to place certain 
restrictions of the disclosure of screenshots as specified in proposed 
Sec.  170.403(a)(2)(ii)(D).
    With respect to the limited allowable restrictions on screenshots, 
we proposed in 84 FR 7475 that developers would be permitted to prevent 
communicators from altering screenshots, other than to annotate the 
screenshot or to resize it for the purpose of publication. We also 
proposed that health IT developers could impose restrictions on the 
disclosure of a screenshot on the basis that it would infringe third-
party IP rights (on their behalf or as required by license). However, 
to take advantage of this exception, we proposed in 84 FR 7475 that the 
developer would need to first put all potential communicators on 
sufficient written notice of those parts of the screen display that 
contain IP and cannot be communicated, and would still need to allow 
communicators to communicate redacted versions of screenshots that do 
not reproduce those parts. Finally, we proposed in 84 FR 7475 that it 
would be reasonable for developers to impose restrictions on the 
communication of screenshots that contain PHI, provided that developers 
permit the communication of screenshots that have been redacted to 
conceal PHI, or where the relevant individual's consent or 
authorization had been obtained.
    We welcomed comments on whether an appropriate balance had been 
struck between protecting legitimate IP rights of developers and 
ensuring that health IT customers, users, researchers, and other 
stakeholders who use and work with health IT can openly discuss and 
share their experiences and other relevant information about the 
performance of health IT.
    Comments. A large number of commenters, particularly health care 
providers, supported our proposals regarding the communication of 
screenshots, with several stressing how helpful screenshots are when 
communicating usability and safety issues with health IT. One commenter 
noted that communication of screenshots can help different health care 
systems understand whether a proposed implementation of an EHR has 
introduced safety-related challenges at other locations, or help 
identify solutions to common problems, such as usability challenges. 
One other commenter stated that there is nothing novel displayed in 
health IT screenshots that would need to be protected.
    Response. We appreciate the many positive comments on our proposals 
regarding screenshots.
    Comments. Commenters stated that the scope of protected 
communications as proposed should exclude disclosure of the health IT 
itself, such as through screenshots. The commenter stressed that the 
Cures Act required that health IT developers not restrict 
communications about the certified health IT with respect to specific 
topic areas, while the Proposed Rule expands that restriction to 
include communication of the health IT itself. One commenter noted that 
the Cures Act does not mention screenshots and they should not be 
included in the Communications Condition of Certification requirements.
    Response. The Cures Act amended title XXX of the PHSA to establish 
this condition of certification, which applies to ``health information 
technology.'' Title XXX of the PHSA was previously added by the HITECH 
Act, which included the definition of ``health information 
technology.'' Section 3000(5) of the PHSA defines health information 
technology to mean hardware, software, integrated technologies or 
related licenses, IP, upgrades, or packaged solutions sold as services 
that are designed for or support the use by health care entities or 
patients for the electronic creation, maintenance, access, or exchange 
of health information. We emphasize both that this definition includes 
IP associated with the health information technology and that it 
applies to this condition of certification as this condition references 
communications regarding health information technology. We have also 
adopted this definition in Sec.  170.102.
    We disagree with the commenters' interpretation of the statutory 
provision. The statutory provision focuses on ``communications'' 
regarding

[[Page 25734]]

enumerated aspects of the health IT. Communications are not defined nor 
limited in the Cures Act, and we proposed to broadly define them. 
Verbal, written, and visual, as well other types of communications, are 
all covered under the Cures Act. A screenshot is a copy/picture of the 
user interface of the health IT, or a ``visual communication'' that is 
protected under this condition of certification. We have specifically 
defined ``communication'' for this section in Sec.  170.403(c) to mean 
any communication, irrespective of the form or medium. The term 
includes visual communications, such as screenshots and video.
    As we emphasized in the Proposed Rule in 84 FR 7475, the sharing of 
screenshots (with accompanying annotation and/or explanatory prose) is 
often a critical form of communication of issues with health IT related 
to--for example--usability, user experience, interoperability, 
security, or the way the technology is used. We believe screenshots are 
uniquely helpful as a form of visual communication that can non-
verbally illustrate the ``user's experiences when using the health 
information technology'' and the ``manner in which a user of the health 
information technology has used such technology'' as they relate 
intrinsically to both subject areas and capture those user experiences 
immediately and directly. Further, enabling screenshot sharing can 
allow for clearer, more immediate, and more precise communication on 
these pertinent issues, potentially helping a health system avoid 
costly, or even deadly, complications when implementing health IT. It 
is also our understanding that screenshots are often the only recourse 
a user in a network enterprise system has for capturing, documenting, 
and explaining their concerns. We clarify, however, that the sharing of 
a screenshot alone would not be considered a protected communication as 
it would need to be accompanied by an explanation of the issues or 
aspects of the health IT that the screenshot is meant to communicate or 
illustrate.
    Considering the value of communicating significant issues regarding 
health IT through screenshots, we have finalized our proposal to 
include screenshots as a protected communications under the Cures Act. 
However, as discussed in responses to other comments below, we have 
revised our final policy in multiple ways.
    Comments. One commenter recommended that screenshots should be 
defined broadly to include video and other media that can be helpful in 
demonstrating challenges with EHRs.
    Response. We agree with the recommendation that protections 
afforded to screenshots should extend to video. We clarify that, like 
screenshots, video is considered a form of visual communication. A 
video of a computer screen while a software program is in operation 
would capture the user experience of interacting with that program and 
essentially would show a number of screenshots from that program in 
rapid succession. We emphasize that video, similarly to individual 
screenshots, is a critical form of communication of issues with the 
health IT, including issues related to usability, user experience, 
interoperability, security, or the way the technology is used.
    As with screenshots, video is particularly useful in communicating 
a user's experience with health IT and the manner in which the user has 
used health IT. This is especially the case when issues of a temporal 
nature are involved. For example, video would be essential for 
illustrating a latency issue experienced during drug ordering that 
could not be communicated through screenshots or other forms of 
communication. Video also could be critical to demonstrating an issue 
with a clinical decision support alert that is designed to 
appropriately and timely notify the provider of a patient matter but 
fails to do so.
    Comments. Several commenters expressed concern regarding how a 
developer's IP may be impacted by the proposed Communications Condition 
of Certification requirements. Several commenters stated that the 
Proposed Rule goes beyond protecting communications for the purposes of 
patient safety and system improvement and would enable or require 
inappropriate sharing and disclosure of IP, potentially creating 
security risks, increased IP theft, and harming innovation and the 
marketplace for health IT. Several commenters stated that trade 
secrets, patent protections, and protections for confidential and 
proprietary information were not addressed or considered appropriately 
in the Proposed Rule, and that as a result it would be possible for bad 
actors to create pirated health IT based on the disclosure of 
screenshots and similar communications. Commenters stated that 
developers of health IT have successfully used licensing and 
nondisclosure agreements that apply to user-facing aspects of the 
technology to maintain the trade secret status of their health IT and 
that the Proposed Rule would impact their ability to do so and remain 
competitive in the market.
    Response. We appreciate the comments regarding how a developer's IP 
may be impacted by the Communications Condition of Certification 
requirements. As discussed earlier in this section, participation in 
the Program is voluntary; and developers have the option to agree to 
the terms we have offered or to choose not to participate in the 
Program. However, we recognize the need to properly balance the 
protection of a developer's IP with the need to advance visual 
communications (e.g., screenshot and video communications) under the 
Communications Condition and Maintenance of Certification requirements, 
which we believe is critical to addressing--among other things--the 
usability, interoperability, and security of health IT. As discussed 
throughout this section and in section (C) above, we believe that we 
have properly considered and addressed health IT developers' IP rights 
in this final rule in Sec.  170.403(a)(2)(ii)(C) by amending the 
proposed regulation as described above.
    We emphasize that the communication of screenshots is essential to 
protect public health and safety and that our final policies take a 
measured approach to responding to and addressing a real and 
substantial threat to public health and safety. The communication of 
screenshots enables providers, researchers, and others to identify 
safety concerns, share their experiences with the health IT, learn from 
the problems, and then repair dangers that could otherwise cause 
serious harm to patients. Our position is informed both by years of 
experience regulating health IT and overwhelming research and academia, 
which is discussed below.
    For instance, a study published in 2018 was performed to better 
characterize accessibility to EHRs among informatics professionals in 
various roles, settings, and organizations across the United States and 
internationally.\88\ To quantify the limitations on EHR access and 
publication rights, the researchers conducted a survey of informatics 
professionals from a broad spectrum of roles including practicing 
clinicians, researchers, administrators, and members of industry. The 
results were analyzed and levels of EHR access were stratified by role, 
organizational affiliation, geographic region, EHR type, and 
restrictions with regard to

[[Page 25735]]

publishing results of usability testing, including screenshots. Among 
faculty members and researchers, 72 percent could access the EHR for 
usability and/or research purposes, but, of those, fewer than 1 in 3 
could freely publish screenshots with results of usability testing and 
half could not publish such data at all. Across users from all roles, 
only 21 percent reported the ability to publish screenshots freely 
without restrictions.\89\
---------------------------------------------------------------------------

    \88\ Khairat, S, et al. 2018 Assessing the Status Quo of EHR 
Accessibility, Usability, and Knowledge Dissemination. eGEMs 
(Generating Evidence & Methods to improve patient outcomes), pp. 1-
11, https://doi.org/10.5334/egems.228.
    \89\ Id. at 1.
---------------------------------------------------------------------------

    The study explained that the patient safety implications of EHR 
publication censorship and restricted EHR access are multiple. First, 
limiting institutions from sharing usability research findings can 
prevent the correction of known problems. Second, without public 
dissemination, poor design practices will propagate to future 
iterations of existing vendor systems. Finally, research efforts are 
directed away from real-world usability problems at a time when EHR 
systems have become widely deployed and when an urgency exists to 
accelerate usability testing. The study referenced the 2011 Institute 
of Medicine report (as discussed in the Proposed Rule and in additional 
detail below), which identified contractual restrictions as a barrier 
to knowledge regarding patient safety risks related to health IT.\90\
---------------------------------------------------------------------------

    \90\ Id. at 2.
---------------------------------------------------------------------------

    The study emphasized that the result of this level of censorship is 
that a vast majority of scientists researching EHR usability are either 
prevented from publishing screenshots altogether or must first obtain 
vendor permission, thus impeding the free dialogue necessary in 
communities of investigation.\91\ The study argued that: (1) Lack of 
EHR access makes many critical EHR usability research activities 
impossible to conduct, and (2) publication censorship, especially 
regarding screenshots, means that even those usability studies which 
can be conducted may not have the impact they otherwise would. As a 
consequence, innovation can be stifled. As such, one of the 
recommendations made by the researchers was that there should be a 
mandate that screenshots and images from EHR systems be freely 
publishable without restrictions from copyright or trade secret 
constraints.\92\
---------------------------------------------------------------------------

    \91\ Id. at 7.
    \92\ Id. at 8.
---------------------------------------------------------------------------

    In the report by the Institute of Medicine that was noted above, 
entitled Health IT and Patient Safety: Building Safer Systems for 
Better Care,\93\ the Committee on Patient Safety and Health Information 
Technology (Committee) explained that a significant impediment to 
gathering safety data is contractual barriers (e.g., nondisclosure, 
confidentiality clauses) that can prevent users from sharing 
information about health IT-related adverse events. They further 
explained that such barriers limit users' abilities to share knowledge 
of risk-prone user interfaces, for instance through screenshots and 
descriptions of potentially unsafe processes. In addition, some vendors 
include language in their sales contracts and escape responsibility for 
errors or defects in their software (i.e., ``hold-harmless clauses''). 
The Committee concluded that these types of contractual restrictions 
limit transparency, which significantly contributes to the gaps in 
knowledge of health IT-related patient safety risks. Further, these 
barriers to generating evidence pose unacceptable risks to safety.\94\ 
Based on these findings, the committee recommended that the Secretary 
of HHS should ensure insofar as possible that health IT vendors support 
the free exchange of information about health IT experiences and issues 
and not prohibit sharing of such information, including details (e.g., 
screenshots) relating to patient safety.\95\
---------------------------------------------------------------------------

    \93\ Institute of Medicine 2012. Health IT and Patient Safety: 
Building Safer Systems for Better Care. Washington, DC: The National 
Academies Press, https://doi.org/10.17226/13269.
    \94\ Id. at 3.
    \95\ Id. at 7.
---------------------------------------------------------------------------

    Recently, the U.S. Food and Drug Administration (FDA) funded 
Brigham and Women's Hospital Center for Patient Safety Research and 
Practice to conduct an exploration of computerized prescriber order 
entry (CPOE)-related potential for errors in prescribing, particularly 
as these relate to drug name displays, and ordering and workflow design 
issues. The project investigated ways to better identify, understand, 
and prevent electronic ordering errors in the future.\96\ However, the 
researchers noted that one large vendor would not grant permissions to 
share requested screenshots necessary for the study. This refusal ran 
counter to both the FDA's task order initial precondition as well as 
multiple high-level panels' health IT safety recommendations. The FDA 
emphasized that it is hard to justify from a safety viewpoint why such 
permission was withheld, despite the vendors' proprietary concerns. FDA 
explained that identifying, preventing, and learning from errors and 
improving prescribing safety should be a priority and should take 
precedence over commercial considerations (and to the extent 
correctable problems can be identified, likely would result in an 
improved commercial CPOE product). In cases where the FDA sought to 
illustrate problems in the system, they drew generic screenshots to 
illustrate the issue in question.\97\
---------------------------------------------------------------------------

    \96\ U.S. Food & Drug Admin., UCM477419, Computerized Prescriber 
Order Entry Medication Safety: Uncovering and Learning from Issues 
and Errors, https://www.fda.gov/downloads/Drugs/DrugSafety/MedicationErrors/UCM477419.pdf.
    \97\ Id. at 44.
---------------------------------------------------------------------------

    Among their recommendations, the FDA recommended that vendors be 
required to share screenshots and error reports. The FDA emphasized 
that vendors should be required to permit the sharing of screenshots 
and information with the FDA and other institutions regarding other 
CPOE system issues of concern or that pose risk for errors. They 
stressed that the practice of prohibiting such sharing via copyright 
must be eliminated. Further, the FDA recommended that vendors should be 
required to disclose errors reported to them or errors identified in 
their products, analogous to the requirement that drug manufacturers 
report significant adverse drug effects.\98\
---------------------------------------------------------------------------

    \98\ Id. at 52.
---------------------------------------------------------------------------

    One of the co-authors of the FDA study recently wrote a law review 
article that discussed the significance of screenshots.\99\ The author 
noted that the results of the FDA study were remarkable and remarkably 
distressing, as they identified and took screenshots of over fifty 
different dangers in the health IT. He expressed frustration that it 
took up to two years of additional discussions with the vendors to get 
permission to share the screenshots publicly, and that even after these 
extended discussions, one vendor--``with more than a lion's share of 
the market''--prevented the study from displaying the screenshots, some 
of which were clearly dangerous or deadly. He explained that they had 
worked around that limitation by substituting the one vendor's screens 
with parallel screens taken from Harvard's homegrown, but by then 
superannuated, EHR. The author emphasized that those images and 
screenshots illustrated over fifty EHR risks caused by dangerous and 
confusing EHR interfaces. The author also emphasized that the study 
could have been even more helpful in identifying these risks if the FDA 
had been able to present the findings when first available, rather than 
haggle for a year or two, and if the study was able

[[Page 25736]]

to include all of the full images from each system they studied.\100\
---------------------------------------------------------------------------

    \99\ Ross Koppel, Uses of the Legal System That Attenuate 
Patient Safety, 68 DePaul L. Rev. (2019) Available at: https://via.library.depaul.edu/law-review/vol68/iss2/6.
    \100\ Id. at 280-81.
---------------------------------------------------------------------------

    Comments. A commenter recommended that ONC draw a distinction 
around purpose of use in relation to the fair use of screenshots and 
require that the discloser of a screenshot be responsible for ensuring 
the appropriateness of that purpose.
    Response. As discussed under section (C) above we have retained the 
concept of ``fair use'' as it applies to all health IT developer 
intellectual property covered under ``permitted prohibitions and 
restrictions'' (Sec.  170.403(a)(2)(ii)). As discussed throughout this 
section, we have placed certain restrictions on the sharing of 
screenshots responsive to the commenter.
    Comments. One commenter urged ONC to revise the proposed approach 
to screenshots by adopting a process that would allow developers to 
review and approve screenshots for publication for specific purposes, 
such as communications about safety and usability.
    Response. A pre-approval process could create potential or 
perceived barriers to communications and thus could discourage or delay 
the making of protected communications that are vital to patient safety 
or other important issues regarding certified health IT. For example, a 
user might be less willing to go through the process, the time the 
process takes could undermine the conveyance of the communications, and 
the objections raised during the process may not be valid or amenable 
to all parties.
    Comments. Several commenters had concerns regarding the volume of 
screenshots that could be shared under our proposal and potential harms 
that could occur. One commenter emphasized that sharing of screenshots 
could disclose information about how health IT works, including 
algorithms and workflows, and enable creation of duplicate software and 
theft of valuable IP. One commenter suggested that if a user of health 
IT published hundreds of screenshots of the health IT, a bad actor 
could theoretically deduce trade secrets based on the screenshots. 
Several additional commenters were also concerned that the Proposed 
Rule could allow communication of an unlimited number of screenshots of 
certified health IT, and one commenter suggested revising the proposed 
approach to include limiting sharing of screenshots to a reasonable 
number, such as seven.
    Response. We appreciate those comments expressing concerns 
regarding the volume of screenshots that could be shared and the 
potential negative consequences of allowing screenshots to be shared. 
In the Proposed Rule in 84 FR 7475, we proposed to allow developers to 
place limited restrictions on the sharing of screenshots. We stressed 
in the Proposed Rule that our goal with our proposals concerning 
screenshots was to enable communications that will address matters such 
as patient safety, system security vulnerabilities, health IT 
performance, and usability. Our intent was not to prevent developers 
from restricting the communication of screenshots for purposes outside 
the scope of the protected communications detailed in the Cures Act. 
Additionally, we believe that modern software design best practices 
uncouple screen design from underlying algorithms, and that limited use 
of screenshots for safety would not allow reverse engineering of large 
parts of the underlying code. However, we further emphasize that it was 
never our intention that screenshots (or other visual communications 
such as video) depicting source or object codes would be protected 
communications (see the non-user-facing aspects provision of this 
Condition of Certification), so long as such communications are not 
communications with unqualified protection.
    We reviewed comments that suggested establishing a set numerical 
limit for the sharing of screenshots. However, we have not finalized a 
requirement in Sec.  170.403(a)(2)(ii)(D) with a fixed numerical limit 
because there is no non-arbitrary way to determine what the ``right'' 
or ``appropriate'' number is in a one-size-fits-all way. That is 
because the number of screenshots or amount of video that would be 
needed to communicate about the health IT could vary, from one 
situation to the next, based on the specific issue and circumstances. 
For instance, an issue with health IT functionality regarding a 
particular process that involves the user viewing and making selections 
on several different screens may necessitate images of all of the 
screens involved in order to communicate the issue. However, an issue 
regarding how one value is being displayed in a particular context 
(e.g., a medication name being truncated) may only necessitate one 
screenshot in order to communicate the issue. Thus, we believe the best 
approach is to adopt a qualitative standard that is designed to be 
sufficiently flexible for the wide range of health IT issues that may 
arise and the varying visual communications that need to be 
communicated to demonstrate or display the issue.
    We have finalized provisions in Sec.  170.403(a)(2)(ii)(D)(2) and 
(3) that allow health IT developers to require persons who communicate 
screenshots to limit the sharing of screenshots to only the relevant 
number of screenshots and amount of video that are needed to 
communicate about the health IT regarding one or more of the six 
subject areas identified in the Cures Act and detailed in Sec.  
170.403(a)(1). Allowing developers to limit the sharing of screenshots 
to only the relevant number needed to communicate about the health IT--
regarding one or more of those six subject areas--places a limitation 
on the number of screenshots allowed to be shared under the 
Communications Condition of Certification requirements and requires 
that the screenshots are related to, and thus necessary in 
illustrating, the protected communication being made. In practice, this 
would mean that if a particular safety issue in the health IT could be 
communicated using three screenshots, the communicator should not share 
additional screenshots that are irrelevant or only potentially relevant 
to communicate the safety issue with the health IT. If the 
communication included additional screenshots that were not necessary 
to visually communicate about the particular safety issue with the 
health IT that falls within the usability category, the health IT 
developer would have grounds to seek redress.
    As with screenshots, we wish to be sensitive to concerns regarding 
protecting IP in health IT and allow developers to appropriately limit 
video communication in order to protect against harms that could occur 
due to unlimited sharing. Similar to screenshots, the amount of video 
that may be necessary to make a protected communication about health IT 
could vary, depending on the nature of the issue or aspect of the 
health IT being addressed. For example, a video meant to communicate a 
delay in order entry would need to be long enough to communicate the 
significance of the delay, but would not need to include video of the 
log-in process or other unrelated functionality of the health IT. We 
have finalized a provision in Sec.  170.403(a)(2)(ii)(D)(3) that allows 
health IT developers to place certain limitations on the communication 
of video. Under this provision, a health IT developer may require 
persons who communicate video to limit the sharing of video to: (1) The 
relevant amount of video needed to communicate about the health IT 
regarding one or more of the

[[Page 25737]]

subject areas identified in the Cures Act and detailed in Sec.  
170.403(a)(1); and (2) only videos that address temporal matters that 
the user reasonably believes cannot be communicated through screenshots 
or other forms of communications.
    In sum, any disclosure must be limited to the relevant number of 
screenshots or amount of video that is necessary to convey the matter 
that falls within one of the six subject areas, with video only being 
used to convey temporal matters that cannot be communicated through 
screenshots or other forms of communication. We believe these 
additional limitations on the communication of screenshots and video 
will further bolster protections for developer IP, while still allowing 
necessary and effective communication about health IT issues within the 
six subject areas.
    Comments. Several commenters stated that there should be a way to 
protect against doctored screenshots.
    Response. As proposed, communicators of screenshots must not alter 
the screenshots (or video), except to annotate the screenshots or 
resize the screenshots (Sec.  170.403(a)(2)(ii)(D)(1)). These 
restrictions similarly apply to video as well (Sec.  
170.403(a)(2)(ii)(D)(1)). We further note that, despite a lack of 
comments, on further reflection, we have elected to not finalize 
proposed limitations to allow developers to impose restrictions on the 
communication of screenshots that contain PHI. We have made this 
determination because we believe that most of the individuals or 
entities communicating the screenshots would be bound by other laws, 
including the HIPAA Rules and State privacy laws, which would be 
applicable to the PHI at issue. Therefore, we do not believe it is 
necessary to provide for developers policing the release of such data 
in the form of screenshots in this Condition of Certification.
    Comments. A number of commenters discussed the infeasibility of the 
proposed requirements regarding restricting communication of 
screenshots, and in particular, the requirement that health IT 
developers put all potential communicators on sufficient written notice 
of each aspect of its screen display that contains third-party content 
that cannot be communicated because it would infringe IP rights. Some 
commenters stated that the proposed language should be amended to 
require a list of third-party content that might appear in a screen or 
that the developer sublicenses, or to require a notice on the 
developer's website. Other commenters stated that the proposal should 
be removed. One commenter recommended ONC consider not making 
developers accountable for actions by health IT users regarding the 
disclosure of screenshots with third-party information. One commenter 
requested additional guidance from ONC for dealing with third-party, 
non-health IT content in health IT.
    Response. Where a health IT developer is prohibited by this rule 
from restricting the communication of a screenshot and allows a 
screenshot containing third-party content to be communicated, the 
health IT developer is acting as required by this final rule and 
enabling important communication regarding critical health IT issues to 
occur. Thus, we believe developers acting in accordance with this final 
rule should not be responsible for third-party content in screenshots 
that are communicated as required by the Communications Condition of 
Certification requirements. As such, in Sec.  170.403(a)(2)(ii)(D) we 
have removed from the requirements related to third-party IP rights 
proposed in 84 FR 7475.
(E) Testing and Development
    We discussed in the Proposed Rule in 84 FR 7475 that some health IT 
developers expose aspects of their health IT to health care providers 
and others for the purpose of testing and development prior to a 
product's ``general availability'' release. We stated that such 
disclosures may relate to beta releases that are shared with certain 
customers for testing prior to the software being made generally 
available to the market, or may be made as part of a joint-venture or 
cooperative development process. In these circumstances, we proposed in 
84 FR 7475 that a health IT developer would be justified in keeping 
information about its health IT confidential. We explained that this 
permitted prohibition or restriction would allow developers to seek 
appropriate IP protection and discuss novel, ``unreleased'' product 
features with their customer base, which has significant public policy 
benefits for research and innovation in the health IT industry.
    We proposed in 84 FR 7475 that this permitted restriction would be 
limited and would not apply to communications that are subject to 
unqualified protection as specified in proposed Sec.  170.403(a)(2)(i). 
We proposed that this permitted restriction would also not apply to 
communications about the released version of the health IT once the 
health IT has been released.
    We requested comment on whether we should limit the time this 
protection would apply for testing purposes. We also requested comment 
on whether we should set specific parameters for covered testing.
    Comments. A couple of commenters stated that there should be no 
limit on how long testing and development could last for the purpose of 
the restrictions that developers would be allowed to place on 
communications regarding products in development. These commenters 
stressed that any limit would be arbitrary and that until certified 
health IT is in live commercial use, health IT developers should be 
permitted to restrict communications about it.
    Response. We agree with the commenters and did not propose to add a 
time limit on testing and development phases for the purpose of this 
Condition of Certification requirement.
    Comments. A couple of commenters requested clarification that 
providers testing products in real-world environments would not be 
considered ``contractors'' of developers for the purpose of the 
Communications Condition of Certification requirements because such 
treatment could result in developers being allowed to place additional 
communication restrictions on employees and contractors under the 
Communication Condition of Certification requirements. One comment also 
stated that restrictions on communications by employees and contractors 
should not extend to their communications regarding product features 
and functionality that the employees and contractors were not involved 
in developing or testing.
    Response. The applicability of this allowable restriction to 
providers testing products would be determined by the particular facts 
at issue and whether or not the provider was an actual contractor, 
employee, or consultant for the developer. We also clarify that this 
final rule does not limit the restrictions a developer may place on an 
employee, contractor, or consultant with regard to protected 
communications, except to the extent that the communication is one with 
unqualified protection, in which case no such restrictions would be 
allowed.
    Comments. One commenter recommended that a health IT user must have 
used health IT in a real-world context before a communication by the 
user about the health IT can be protected.
    Response. We have finalized our proposal in Sec.  
170.403(a)(2)(ii)(E) that a health IT developer would be justified in 
keeping information about its health

[[Page 25738]]

IT confidential prior to a product's ``general availability'' release. 
We note that a health IT developer would also be justified in keeping 
information about a product update confidential because the update is 
not yet generally available. We do not place any limits on who the 
communicator has to be in order to be covered by the Communications 
Condition of Certification requirements, particularly since the 
protections in the Communications Condition of Certification 
requirements extend beyond users of certified health IT to cover 
researchers and other stakeholders who may experience certified health 
IT in a variety of settings and scenarios. As such, we have decided not 
to limit the communication protection to only those communications that 
are made by users of certified health IT in the real-world context.
c. Maintenance of Certification Requirements
    We proposed in 84 FR 7476 that to maintain compliance with the 
Communications Condition of Certification requirements, a health IT 
developer must not establish or enforce any contract or agreement 
provision that contravenes the Communications Condition of 
Certification requirements. We also proposed in 84 FR 7476 that a 
health IT developer must notify all entities or individuals with which 
it has a contract/agreement related to certified health IT that any 
communication or contract/agreement provision that contravenes the 
Communications Condition of Certification requirements will not be 
enforced by the health IT developer. We proposed in 84 FR 7476 that 
such notification must occur within six months of the effective date of 
the final rule. Further, we proposed in 84 FR 7476 that this notice 
would need to be provided annually up to and until the health IT 
developer amends the contract or agreement to remove or make void any 
contractual provision that contravenes the Communications Condition of 
Certification requirements. We further proposed as a Maintenance of 
Certification requirement in proposed Sec.  170.403(b)(2) that health 
IT developers must amend their contracts/agreements to remove or make 
void any provisions that contravene the Communications Condition of 
Certification requirements within a reasonable period of time, but not 
later than two years from the effective date of a final rule.
    In the event that a health IT developer cannot, despite all 
reasonable efforts, locate an entity or individual that previously 
entered into an agreement with the developer that prohibits or 
restricts communications protected by the Communications Condition of 
Certification requirements, we proposed in 84 FR 7476 that the 
developer would not be in contravention of the Communications Condition 
of Certification requirements so long as it takes no step to enforce 
the prohibition or restriction. We did not propose that health IT 
developers be required to furnish to ONC or their ONC-ACB copies of 
notices made to customers, or copies of contracts or agreements 
revised, in satisfaction of this Maintenance of Certification 
requirement, although we noted that those communications could be 
requested by ONC or an ONC-ACB in the usual course of business or to 
demonstrate compliance.
    Comments. A number of commenters expressed concerns regarding the 
proposed deadlines for complying with the requirements. Several 
commenters stated that the requirement to notify customers and others 
with whom the developer has contracts or agreements within six months 
was too long and recommended that the deadline be shortened. Regarding 
the deadline for amending contracts/agreements that contravene the 
Communications Condition of Certification requirements, most commenters 
stated that the deadline was too short, with several requesting that it 
be extended to five years. Some other commenters recommended that 
modification of any contracts/agreements to comply with the 
Communications Condition of Certification requirements should occur 
whenever such contracts/agreements are renewed, or at the earliest 
available time, without the need for a specific deadline. A couple of 
commenters recommended that a health IT developer not be held 
responsible for amending contracts within two years of the effective 
date of the final rule if it has made reasonable efforts to do so. 
Several comments recommended that ONC should allow alternative means of 
completing this requirement, such as posting relevant language on the 
developer's website. One commenter stated that it would be helpful to 
have a ``standard exception clause'' that developers could use in their 
contracts and agreements.
    Response. We appreciate the comments we received on this provision. 
We clarify in Sec.  170.403(b)(2)(i) that a developer may not include 
provisions that contravene the Communications Condition of 
Certification requirements in any new contract as of the effective date 
of the final rule. In consideration of comments, we have decided to 
modify the timeframe requirement proposed in 84 FR 7476 for amending 
contracts/agreements to be in compliance with this condition. While we 
considered extending the deadline to five years to allow developers to 
have additional time for compliance, we determined that a more flexible 
solution is appropriate. As such, we have modified the requirement in 
Sec.  170.405(b)(2)(ii) to state that any contracts/agreements in place 
as of the effective date of the final rule and containing language in 
contravention of the Communications Condition of Certification 
requirements must be revised to remove or void the contractual 
provision that contravenes the Communications Condition of 
Certification requirements whenever the contract is next modified for 
any reason. We clarify that where a contract automatically renews, the 
developer would still be prohibited under the Program from enforcing 
any agreement or contract provisions that contravene the Communications 
Condition of Certification requirements in Sec.  170.403(a) and the 
developer would also be responsible for sending an annual notice as 
described above until such provisions have been modified. To note, we 
decline to absolve a developer of the requirement to modify the 
contract solely because the developer has made a reasonable effort to 
do so.
    We finalized the notification requirements proposed in 84 FR 7476. 
A health IT developer must notify all entities and individuals with 
which it has a contract/agreement related to certified health IT that 
any communication or contract/agreement provision that contravenes the 
Communications Condition of Certification requirements will not be 
enforced by the health IT developer. However, we no longer require that 
such notification must occur within six months of the effective date of 
the final rule and annually thereafter until contravening provisions 
are amended. Instead, notification must only occur annually, beginning 
in calendar year 2020, and continue until all contravening provisions 
are amended. Given the timing of the publication of the final rule, 
health IT developers could have potentially been required to provide 
both initial notification and an annual notification in the same 
calendar year. We believe the removal of the six months notification 
deadline and retention of an annual requirement only, beginning with 
notification in calendar year 2020, will simplify compliance for health 
IT developers while still providing adequate notice and ensuring that 
initial notification is provided in a reasonable amount of time. 
Therefore

[[Page 25739]]

we have finalized the deadline for the notice requirement in Sec.  
170.403(b)(1) to be annually, beginning in calendar year 2020.
    Comments. Several commenters requested clarification that once the 
final rule goes into effect, contravening provisions in developer 
contracts prohibiting communications cannot be enforced. One of these 
commenters stated that developers would often include language in their 
contracts prohibiting communication on the part of end users and 
entities, thus preventing communication about issues with EHRs. Several 
commenters requested that ONC explicitly state that any permitted 
communication made following the effective date of the final rule be 
inadmissible as a violation of a contract/agreement regardless of 
whether the customer has been notified. One commenter requested that 
ONC clarify that, with respect to protecting communications regarding 
developer business practices, where the disclosure of certain 
information is prohibited by contract, the developer would not be 
liable for its inability to communicate such information.
    Response. We emphasize that as of the effective date of the final 
rule, contravening provisions in contracts or agreements cannot be 
enforced without the risk of losing certification for the developer's 
health IT or a certification ban for the developer under the Program, 
regardless of whether the customer was notified as required by the 
Communications Condition of Certification requirements. We clarify that 
provisions of contracts requiring that the health IT customer ``flow-
down'' obligations onto the customer's employees, contractors, and 
other users of the health IT that would restrict protected 
communications would be in contravention of this Condition of 
Certification. Such provisions could not be enforced after the 
effective date of the final rule without risking loss of certification 
as noted above for the developer under the Program.
    We appreciate commenters' concern regarding disclosing information 
that may be otherwise prohibited by contract. However, we clarify that 
the purpose of the Communications Condition of Certification 
requirements is to prevent developers from improperly restricting 
protected communications, including communications about a developer's 
practices and policies related to facilitating the exchange of health 
information. As discussed earlier in this section, costs, timeframes, 
licensing practices and terms, as well as the developer's approach to 
working with third-party services, could all be considered protected 
communications to the extent they relate to facilitating the exchange 
of health information. Thus, we reiterate that where a contract entered 
into by the developer would restrict a communication protected by the 
Communications Condition of Certification requirements, the developer 
may not enforce such a contract and may not restrict a protected 
communication in violation of the Communications Condition of 
Certification requirements after the effective date of the final rule 
without risking loss of certification. It is also important to note 
that not all contractual provisions related to communications would 
create a risk of de-certification. As noted above, the Communications 
Condition of Certification requirements in Sec.  170.403(a)(2)(ii) do 
allow for developers to place restrictions on certain communications as 
discussed above. Therefore, contractual provisions that appropriately 
address those allowances would not create a risk of de-certification 
under the Program.
    Comments. One commenter suggested that ``renew'' should be added to 
the maintenance requirement to not establish or enforce any contract or 
agreement that contravenes the Communications Condition of 
Certification requirements in Sec.  170.403(a).
    Response. We appreciate this comment and amended the proposed 
regulatory text in Sec.  170.403(b)(2)(i) to include ``renew.'' We 
clarify that where a contract auto-renews, the developer would still be 
prohibited under the Program from enforcing any agreement or contract 
provisions that contravene the Communications Condition of 
Certification requirements without risking loss of certification and 
would also be responsible for sending an annual notice as described 
above until such provisions have been modified.
    Comments. A couple of commenters expressed concern about developer 
efforts to re-negotiate other terms of a contract that are unrelated to 
protected communications as part of the contract modification process.
    Response. We stress that the contract modifications required as 
part of the Communications Condition of Certification requirements are 
strictly limited to removing any provisions of the relevant contract/
agreement that would restrict protected communications in contravention 
of the Communications Condition of Certification requirements and are 
not required to be done until the contract/agreement is modified for 
other purposes.
4. Application Programming Interfaces
    The API Condition of Certification requirement in Section 4002 of 
the Cures Act requires health IT developers to publish APIs that allow 
``health information from such technology to be accessed, exchanged, 
and used without special effort through the use of APIs or successor 
technology or standards, as provided for under applicable law.'' The 
requirement also states that a developer must, through an API, 
``provide access to all data elements of a patient's electronic health 
record to the extent permissible under applicable privacy laws.'' 
Additionally, the API Condition of Certification requirement of the 
Cures Act includes several key phrases and requirements for health IT 
developers that go beyond the technical functionality of the Health IT 
Modules they present for certification. In this section of the 
preamble, we outline the proposals we have adopted to implement the API 
Condition of Certification requirement of the Cures Act to provide 
compliance clarity for health IT developers.
    We have adopted new standards, new implementation specifications, a 
new certification criterion, Condition and Maintenance of Certification 
requirements, and modified the Base EHR definition. Health IT 
developers should consider these final requirements in the context of 
information blocking provisions described in section VIII of this 
preamble.
a. Statutory Interpretation and API Policy Principles
    Section 4002 of the Cures Act requires health IT developers 
certified to the Program to publish APIs that allow ``health 
information from such technology to be accessed, exchanged, and used 
without special effort through the use of APIs or successor technology 
or standards, as provided for under applicable law.'' To implement the 
Cures Act API requirements, we proposed a new 2015 Edition Cures Update 
``API'' certification criterion at 84 FR 7476 that included 
requirements for an API to have ``read'' capabilities that support two 
types of services: (1) Services for which a single patient's data is 
the focus; and (2) services for which multiple patients' data are the 
focus.
    We conveyed in the Proposed Rule our belief that ``without special 
effort'' requires APIs and the health care ecosystem in which they are 
deployed to be standardized, transparent, and pro-

[[Page 25740]]

competitive. Therefore, we noted that any Health IT Module certified to 
the new 2015 Edition Cures Update API criterion and a health IT 
developer's business practices would have to have these attributes.
b. API Standards and Implementation Specifications
i. Base Standard
    We proposed in Sec.  170.215(a)(1) at 84 FR 7477 to adopt 
HL7[supreg] FHIR[supreg] Draft Standard for Trial Use (DSTU) 2 for 
reference in the criterion proposed in Sec.  170.315(g)(10). 
Additionally, we requested comment in 84 FR 7478 and 7479 on four 
options to determine the best version of HL7 FHIR to reference for use 
in Sec.  170.315(g)(10): Option 1: FHIR DSTU 2, Option 2: FHIR DSTU 2 
and FHIR Release 3, Option 3: FHIR DSTU 2 and FHIR Release 4, and 
Option 4: FHIR Release 4 only. We requested commenters review the 
proposed certification criterion in Sec.  170.315(g)(10) and the 
accompanying Condition of Certification requirements attributed to the 
API certification criteria. Notably, we stated in the Proposed Rule at 
84 FR 7479 that if we adopted another FHIR Release in a final rule as 
an alternative to FHIR Release 2 for the proposed API criterion in 
Sec.  170.315(g)(10), then we would also adopt the applicable 
implementation specifications associated with the FHIR Release.
    Comments. We received overwhelming support for Option 4: Adopt 
solely FHIR Release 4 in the final rule for reference in Sec.  
170.315(g)(10). We received support for the adoption of FHIR Release 4 
across a broad array of stakeholders, including health IT developers, 
medical trade associations, software application developers, and 
payers. Commenters noted that FHIR Release 4 is the first FHIR release 
with normative FHIR resources and support for enhanced capabilities. 
Most commenters emphasized that Option 4 will allow the industry to 
unify and focus on a single baseline standard, rather than 
accommodating multiple releases proposed in Options 2 and 3. A minority 
of commenters suggested alternative or multiple versions, noting this 
would allow for flexibility, but the vast majority of commenters 
supported the adoption of FHIR Release 4 only.
    Response. We appreciate the feedback and agree with commenters that 
adoption of a single standard is the best option to align industry and 
enable widespread interoperability. We have adopted the latest version 
of the standard at the time of this final rule publication (FHIR 
Release 4.0.1) in Sec.  170.215(a)(1) and finalized its use in Sec.  
170.315(g)(10).
ii. United States Core Data for Interoperability
    We proposed in Sec.  170.215(a)(2) at 84 FR 7479 to adopt the API 
Resource Collection in Health (ARCH) Version 1 implementation 
specification, which listed a set of base HL7[supreg] FHIR[supreg] 
resources that Health IT Modules certified to the proposed criterion in 
Sec.  170.315(g)(10) would need to support.
    Comments. Most commenters were opposed to the adoption of the ARCH 
in the final rule. Commenters argued for the use of American National 
Standards Institute accredited standards, and suggested ONC work with 
standards developing organizations for standards development and 
maintenance.
    Several commenters noted that the ARCH has not gone through a 
formal balloting process, did not support ONC's proposal to rely upon 
the National Technology Transfer and Advancement Act's exception to 
adopt the ARCH in the final rule, and encouraged the use of technical 
standards developed or adopted by voluntary consensus standards bodies. 
Several commenters noted that requiring the ARCH in addition to the 
other adopted standards could create confusion. Commenters further 
emphasized the importance of maintaining ongoing consistency between 
the ARCH and the other adopted standards, and noted this would be 
challenging to achieve.
    Additional comments against the ARCH expressed concern with the 
proposed updates through the Standards Version Advancement Process, and 
with ONC over-regulating API functionality. Commenters also noted that 
ONC could encourage API access to specific data elements without 
creating a new implementation specification.
    Some commenters in favor of the ARCH implementation specification 
asked for data element revisions. Commenters also asked for clarity 
that EHRs will not need to provide the full set of data to modular 
applications, and asked for specificity on how much of this data would 
need to be mapped by the API Technology Supplier. Additionally, 
commenters asked for guidance on lab results, including application 
creation implementation guides that would ensure accuracy and 
compliance when incorporating lab data.
    Response. In response to commenters, we did not adopt the ARCH as 
an implementation specification in the final rule. Upon consideration 
of public comments and in an effort to consistently approach how we 
reference the United States Core Data for Interoperability (USCDI) with 
various content standards (e.g., C-CDA), we determined that having an 
implementation specification to map USCDI to HL7 FHIR could create more 
restrictions than we intended. We appreciate the concerns raised by 
stakeholders, and as we evaluated the ARCH in context of our other 
proposals, we determined that we could achieve our desired policy 
outcome to link the USCDI Data Elements to FHIR Resources without the 
ARCH. We refer commenters to the sections that follow for further 
clarity regarding the implementation of Data Elements included in the 
USCDI implementation specification (IV.B.1).
iii. US Core IG and Bulk IG
    We proposed in 84 FR 7480 in Sec.  170.215(a)(3) to adopt the 
Argonaut Data Query Implementation Guide version 1 (Argonaut IG) 
implementation specification, which specifies constraints for 13 of the 
HL7[supreg] FHIR[supreg] resources proposed in Sec.  170.215(a)(2). 
Additionally, we proposed in Sec.  170.215(a)(4) to adopt the Argonaut 
Data Query Implementation Guide Server implementation specification.
    Comments. Several commenters advocated for the adoption of the FHIR 
US Core Implementation Guide STU 3 Release 3.0.0 implementation 
specification instead of the Argonaut Implementation Guides. Commenters 
noted that the US Core Implementation Guide was built from the Argonaut 
Implementation Guides and has been balloted by the standards community.
    Response. We thank commenters for their feedback. We note that in 
the Proposed Rule at 84 FR 7479 we stated that if we were to adopt 
another FHIR Release in the final rule as an alternative to FHIR 
Release 2, then we would also adopt the applicable implementation 
specifications and FHIR profiles associated with the FHIR Release. 
Considering this and commenters' recommendations, we have adopted the 
HL7 FHIR US Core Implementation Guide STU 3.1.0 (US Core IG) 
implementation specification in Sec.  170.215(a)(2). We note that we 
adopted the latest version of the US Core IG at the time of the final 
rule publication. The US Core IG defines the minimum conformance 
requirements for accessing patient data using FHIR Release 4 (adopted 
in Sec.  170.215(a)(1)), including profiled resources, operations, and 
search parameters for the Data Elements required in the USCDI 
implementation specification (adopted in Sec.  170.213).

[[Page 25741]]

    We note that in the Proposed Rule at 84 FR 7479 we proposed to 
require that the ``Patient.address'' and ``Patient.telecom'' elements 
of the ``Patient'' resource must be supported. We note these 
requirements have since been subsumed by the US Core IG, given that 
``Patient.address'' and ``Patient.telecom'' elements are both flagged 
``must support'' for the ``Patient'' profile in the US Core IG. We also 
proposed to require that the ``Device.udi'' element follow the human 
readable representation of the unique device identifier found in the 
recommendation, guidance, and conformance requirements section of the 
``HL7 Version 3 Cross Paradigm Implementation Guide: Medical Devices 
and Unique Device Identification Pattern, Release 1.'' These 
requirements have also been subsumed by the US Core IG. Additional 
information can be found in the ``Device'' profile of the US Core IG 
adopted in Sec.  170.215(a)(2).
    We note that in the Proposed Rule we proposed in 84 FR 7480 that 
the clinical note text included in the ``DocumentReference'' resource 
would need to be represented in its ``raw'' text form, and further 
proposed in 84 FR 7480 that it would be unacceptable for the note text 
to be converted to another file or format (e.g., .docx, PDF) when it is 
provided as part of an API response. We clarify that the clinical note 
text included in any of the notes described in the ``Clinical Notes 
Guidance'' section of the US Core IG adopted in Sec.  170.215(a)(2) 
must be represented in a ``plain text'' form, and would be unacceptable 
for the note text to be converted to another file or format (e.g., 
.docx, PDF) when it is provided as part of an API response.
    We note that in the Proposed Rule we proposed in 84 FR 7480 to 
require that the ``Provenance.recorded'' and ``Provenance.agent.actor'' 
elements of the ``Provenance'' resource must be supported. We note 
these requirements have been subsumed by the US Core IG, given that 
``Provenance.recorded'' and ``Provenance.agent.who'' elements are both 
flagged ``must support'' for the ``Provenance'' profile in the US Core 
IG.
    As addressed under the header ``Standardized API for Patient and 
Population Services'' in the section V.B.4.c, we have finalized the 
adoption of the HL7 FHIR Bulk Data Access (Flat FHIR) (v1.0.0: STU 1) 
implementation specification (Bulk IG), including mandatory support for 
the ``group-export'' ``OperationDefinition'' in Sec.  170.215(a)(4).
iv. HL7 SMART IG and Backend Services Authorization
    We proposed in 84 FR 7481 in Sec.  170.215(a)(5) to adopt the 
HL7[supreg] SMART Application Launch Framework Implementation Guide 
Release 1.0.0 implementation specification, a profile of the OAuth 2.0 
specification.
    Comments. Most commenters expressed support for the HL7 SMART 
Application Launch Framework Implementation Guide Release 1.0.0 (SMART 
IG) implementation specification. Multiple commenters suggested that in 
addition to requiring support for ``refresh tokens,'' ``Standalone 
Launch,'' and ``EHR Launch'' capabilities from the SMART IG, ONC also 
require support for ``sso-openid-connect,'' ``launch-standalone,'' 
``launch-ehr,'' ``client-public,'' ``client-confidentialsymmetric,'' 
``context-ehr-patient,'' ``context-standalone-patient,'' ``permission-
patient,'' ``permission-user,'' and ``permission-offline'' 
capabilities.
    Response. We thank stakeholders for their comments. The ten 
optional capabilities commenters suggested are included in the ``SMART 
on FHIR Core Capabilities'' section of the SMART IG. The ``SMART on 
FHIR Core Capabilities'' suggested by commenters include ``sso-openid-
connect,'' which allows for support of the OpenID Connect profile in 
the SMART IG; ``client-public'' and ``client-confidential-symmetric,'' 
which allow for client authentication; ``context-ehr-patient'' and 
``context-standalone-patient,'' which provide context to apps at launch 
time; and ``permission-patient,'' ``permission-user,'' and 
``permission-offline,'' which allow support for patient-level scopes, 
user-level scopes, and refresh tokens, respectively. Other ``SMART on 
FHIR Core Capabilities'' that were not suggested by commenters include 
``context-banner'' and ``context-style,'' which provide basic context 
to apps at launch time, and ''context-ehr-encounter'' and ``context-
standalone-encounter,'' which provide encounter-level granularity to 
apps at launch time. Given the importance of these ``SMART on FHIR Core 
Capabilities,'' and in consideration of public comments and our own 
research, we have adopted the SMART IG, including mandatory support for 
the ``SMART on FHIR Core Capabilities'' in Sec.  170.215(a)(3). We 
explicitly require mandatory support of the ``SMART on FHIR Core 
Capabilities'' in Sec.  170.215(a)(3) because these capabilities are 
indicated as optional in the implementation specification. We further 
clarify these ``SMART on FHIR Core Capabilities'' are in scope for 
Program testing and certification. Additionally, we clarify that by 
requiring the ``permission-patient'' ``SMART on FHIR Core Capability'' 
in Sec.  170.215(a)(3), Health IT Modules presented for testing and 
certification must include the ability for patients to authorize an 
application to receive their EHI based on FHIR resource-level scopes. 
Specifically, this means patients would need to have the ability to 
authorize access to their EHI at the individual FHIR resource level, 
from one specific FHIR resource (e.g., ``Immunization'') up to all FHIR 
resources necessary to implement the standard adopted in Sec.  170.213 
and implementation specification adopted in Sec.  170.215(a)(2). This 
capability will give patients increased control over how much EHI they 
authorize applications of their choice to receive. For example, if a 
patient downloaded a medication management application, they would be 
able to use these authorization scopes to limit the EHI accessible by 
the application to only information contained in FHIR 
``MedicationRequest'' and ``Medication'' profile.
    Comments. Some commenters noted concerns for privacy and security 
of APIs. Specifically, one commenter explained the threat of cross-site 
request forgery (CSRF), and suggested we take action to mitigate that 
risk, including by requiring the use of both OAuth 2.0 and OpenID 
Connect Core 1.0.
    Response. We appreciate the concerns expressed by commenters 
regarding the privacy and security of APIs. The OAuth 2.0 standard 
defined at Request For Comment (RFC) 6749 \101\ describes that ``[The 
OAuth 2.0 authorization] framework was designed with the clear 
expectation that future work will define prescriptive profiles and 
extensions necessary to achieve full web-scale interoperability.'' The 
SMART IG serves as a ``prescriptive profile'' as described in RFC 6749. 
Thus, consistent with commenters' recommendations, we have adopted a 
profile of the OAuth 2.0 standard (SMART IG) in Sec.  170.215(a)(3). 
Additionally, we have adopted OpenID Connect Core 1.0 incorporating 
errata set 1 in Sec.  170.215(b), and require conformance with the 
relevant parts of this standard as part of testing and certification. 
CSRF is a well-documented security threat in OAuth 2.0, which can be 
prevented with adequate security practices. We encourage implementers 
to adhere to industry best practices to mitigate CSRF and other known 
security threats. Relatedly, we note that the HL7 community has 
developed an

[[Page 25742]]

``Implementer's Safety Check List,'' \102\ a guide of security best 
practices for implementing FHIR-based APIs. We encourage stakeholders 
to consult this guide during development and implementation of Sec.  
170.315(g)(10)-certified Health IT Modules to minimize security risks.
---------------------------------------------------------------------------

    \101\ https://tools.ietf.org/html/rfc6749.
    \102\ https://www.hl7.org/FHIR/safety.html.
---------------------------------------------------------------------------

    For backend services authorization, as addressed under the header 
``Standardized API for Patient and Population Services'' in the section 
V.B.4.c, we have finalized the adoption of the HL7 FHIR Bulk Data 
Access (Flat FHIR) (v1.0.0: STU 1) implementation specification (Bulk 
IG), which includes the ``Backend Services Authorization Guide'' in 
Sec.  170.215(a)(4).
v. OpenID Connect
    We proposed in 84 FR 7480 through 7481 in Sec.  170.215(b) to adopt 
OpenID Connect Core 1.0 including errata set 1.
    Comments. We received few comments regarding the adoption of OpenID 
Connect Core 1.0 including errata set 1, however, commenters generally 
supported the adoption of this standard.
    Response. We thank commenters for their feedback. Given their 
support, we have finalized the adoption of OpenID Connect Core 1.0 
including errata set 1 as proposed in Sec.  170.215(b). We clarify that 
only the relevant parts of the OpenID Connect Core 1.0 including errata 
set 1 adopted in Sec.  170.215(b) that are also included in the 
implementation specification adopted in Sec.  170.215(a)(3) will be in-
scope for testing and certification.
c. Standardized API for Patient and Population Services
    We proposed in 84 FR 7481 to adopt a new certification criterion, 
Sec.  170.315(g)(10), to replace Sec.  170.315(g)(8), and we proposed 
in 84 FR 7495 to update the 2015 Edition Base EHR definition, as 
referenced in Sec.  170.102. The proposed certification criterion would 
require Health IT Modules to support API-enabled ``read'' services for 
single and multiple patients. ``Read'' services include those that 
allow authenticated and authorized third-party applications to view EHI 
through a secure API. These services specifically exclude ``write'' 
capabilities, where authenticated and authorized third-party 
applications would be able to create or modify EHI through a secure 
API.
    Comments. Commenters supported the proposed adoption of a new 
certification criterion, Sec.  170.315(g)(10), to replace Sec.  
170.315(g)(8).
    Response. We appreciate the support from commenters. As a result, 
we have adopted a new certification criterion in Sec.  170.315(g)(10), 
to replace Sec.  170.315(g)(8) and made several revisions to address 
public comment as discussed further below. Although the certification 
criteria finalized at Sec.  170.315(g)(10) will replace Sec.  
170.315(g)(8), we note that Sec.  170.315(g)(8) is not removed from 
regulation. We maintain Sec.  170.315(g)(8) and have finalized in Sec.  
170.550(m) that ONC-ACBs can issue certificates for Sec.  170.315(g)(8) 
during the transition period to Sec.  170.315(g)(10) for 24 months 
after the publication date of the final rule.
    Comments. Commenters suggested dividing the Sec.  170.315(g)(10) 
criterion into two separate criteria for single and multiple patients.
    Response. We appreciate the feedback. We decline to split the 
certification criterion into two criteria. In consideration of comments 
and for clarity, we have improved the organization of the final 
certification requirements for API-enabled ``read'' services for single 
and multiple patients by separating the criterion into distinct 
sections in the regulation text.
    Comments. Several commenters supported referencing a standard for 
API-enabled ``read'' services for multiple patients, including the 
HL7[supreg] FHIR[supreg] Bulk Data Access Implementation Guide Release 
1.0.0. Commenters felt that omitting a standard in the criterion would 
undermine interoperability for API-enabled ``read'' services for 
multiple patients.
    Response. We thank commenters for their feedback. To enable 
consistent health IT implementation of API-enabled ``read'' services 
for multiple patients, we have finalized the adoption of the Bulk IG, 
including mandatory support for the ``group-export'' 
``OperationDefinition'' in Sec.  170.215(a)(4). As part of the Program, 
we require Health IT Modules presented for testing and certification to 
conform to the Bulk IG implementation specification finalized in Sec.  
170.215(a)(4). The adoption of an implementation specification for API-
enabled ``read'' services for multiple patients in Sec.  170.215(a)(4) 
is responsive to stakeholder concerns and further supports our intent 
to prevent ``special effort'' for the use of APIs as mandated in 
section 4002 of the Cures Act. Furthermore, based on our analysis, we 
believe the ``group-export'' ``OperationDefinition,'' as defined in the 
Bulk IG implementation specification is essential to fulfill the use 
cases envisioned for API-enabled ``read'' services for multiple 
patients. The ``group-export'' ``OperationDefinition'' will allow 
application developers interacting with Sec.  170.315(g)(10)-certified 
Health IT Modules to export the complete set of FHIR resources as 
constrained by the US Core IG adopted in Sec.  170.215(a)(2) and USCDI 
adopted in Sec.  170.213 for a pre-defined cohort of patients. We 
appreciate commenters' recommendations, and agree that coalescing 
around a common implementation specification will advance 
interoperability of API-enabled ``read'' services for multiple 
patients. We provide further discussion of the supported search 
operations, data response, and authentication and authorization 
requirements for API-enabled ``read'' services for multiple patients in 
the sections below.
    Comments. Commenters requested clarification that API-enabled 
``read'' services for multiple patients are not intended for patient 
end users and that health IT developers and health care providers are 
therefore not expected to supply a patient-facing mechanism for these 
requests.
    Response. We appreciate the feedback from commenters. API-enabled 
``read'' services for multiple patients are not intended for patient 
end users because API-enabled ``read'' services for multiple patients 
allow for the disclosure of multiple patients' records, and individual 
patients only have the right to access their own records or records of 
patients to whom they are the personal representative (45 CFR 
164.502(f)(1)). Health IT Modules are not required to support patient-
facing API-enabled ``read'' services for multiple patients for the 
purposes of this certification criterion.
    Comments. One commenter suggested we modify the language that 
defines the purpose of this section to provide more clarity, 
specifically the term ``services.'' The commenter also requested we 
include the scope of cohorts we intended to address in ``population 
services.''
    Response. We appreciate the feedback from commenters. The term 
``services'' includes all Sec.  170.315(g)(10)-related technical 
capabilities included in a Health IT Module presented for testing and 
certification. The API-enabled ``read'' services for single patients is 
intended to support EHI requests and responses for individual patient 
records and the API-enabled ``read'' services for multiple patients is 
intended to support EHI requests and responses for multiple patients' 
records. The scope of patient cohorts for ``population services'' can 
include various groups defined at the

[[Page 25743]]

discretion of the user of the API-enabled ``read'' services for 
multiple patients, including, for example, a group of patients that 
meet certain disease criteria or fall under a certain insurance plan. 
We have adopted the Bulk IG in Sec.  170.215(a)(4) to support this 
function as discussed further below. The technical capabilities 
expected of API-related Health IT Modules presented for testing and 
certification are included in Sec.  170.315(g)(10).
    Comments. Commenters requested clarification for information 
blocking policies and health care provider obligations for API-enabled 
``read'' services for multiple patients.
    Response. We appreciate the request for clarification from 
commenters. We clarify that the criteria finalized in Sec.  
170.315(g)(10) includes the technical capabilities that must be met by 
API-related Health IT Modules presented for testing and certification. 
The information blocking policies in this rule do not compel health 
care providers to implement Health IT Modules certified to requirements 
in 170.315(g)(10). We note that other programs, like CMS value-based 
programs, may require the use of this technology. We refer commenters 
to the information blocking section (VIII) for additional 
clarification.
    Comments. Commenters asked us to clarify the relationship between 
the API-enabled ``read'' services for single and multiple patients in 
Sec.  170.315(g)(10) and the ``EHI export'' criterion in Sec.  
170.315(b)(10).
    Response. We thank commenters for this request. The API criterion 
in Sec.  170.315(g)(10) is separate from the ``EHI export'' criterion 
in Sec.  170.315(b)(10). While both criteria aim to advance health IT 
in alignment with the Cures Act's goal of ``complete access, exchange, 
and use of all electronically accessible health information'' for both 
single and multiple patients, the criteria specifications and Condition 
and Maintenance of Certification requirements are distinct.
    The ``EHI export'' criterion focuses on a Health IT Module's 
ability to electronically export EHI, as defined in Sec.  171.102, that 
can be stored at the time of certification by the product, of which the 
Health IT Module is a part. In contrast, the finalized API criterion in 
Sec.  170.315(g)(10) focuses on ``read'' services for single and 
multiple patients for the USCDI (adopted in Sec.  170.213) Data 
Elements and US Core IG (adopted in Sec.  170.215(a)(2)) FHIR profiles. 
Additionally, the ``EHI export'' criterion finalized in Sec.  
170.315(b)(10) does not mandate conformance to standards or 
implementation specifications, whereas the criterion finalized in Sec.  
170.315(g)(10) requires conformance to several standards and 
implementation specifications, as described further below. We refer to 
the finalized ``EHI export'' criterion in Sec.  170.315(b)(10) for 
additional information.
    Comments. Several commenters supported requiring Health IT Modules 
to support API-enabled ``write'' services for single patients, either 
in this rule or in a future rulemaking. One commenter suggested 
including a subset of data classes for ``write'' services for single 
patients, including ``patient goals,'' ``patient-generated health 
data'' (including patient-reported outcomes, patient generated device 
data, and questionnaires), and ``care plans.'' Another commenter 
suggested adding a list of required operations (``read'' and ``write'') 
to USCDI elements, limited to ``read'' for this rulemaking.
    Response. We appreciate the feedback from commenters. While we 
support the interest in API-enabled ``write'' services, we have not 
adopted such requirements. We do not believe API-enabled ``write'' 
services have reached a level of a maturity to warrant the addition of 
regulatory conformance requirements within the Program. We encourage 
industry to consider all the implications and implementation 
requirements for API-enabled ``write'' services, and perform additional 
API-enabled ``write'' pilot implementations to demonstrate the 
readiness for API-enabled ``write'' services in the testing and 
certification of Health IT Modules. Additionally, we encourage industry 
to expand existing profiles like the US Core IG to support ``write'' 
services.
    Comments. Commenters recommended including a requirement for event 
logging for ``read'' services for single and multiple patients.
    Response. We appreciate the recommendation from commenters. The 
2015 Edition Privacy and Security Certification Framework requires that 
if a Health IT Module includes capabilities for certification under 
Sec.  170.315(g)(10) it needs to be certified to several privacy and 
security certification criteria including auditable events in Sec.  
170.315(d)(2) or auditing actions on health information in Sec.  
170.315(d)(10).
    Comments. Commenters noted that references to APIs focus 
exclusively on RESTful query and ignore ``push'' elements of the FHIR 
API, such as ``POST,'' ``PUT,'' and FHIR messaging.
    Response. We appreciate the feedback from commenters. While we 
support the interest in the ``push'' operations of the FHIR standard, 
including ``POST,'' ``PUT,'' and FHIR messaging, we have not adopted 
such requirements for the Program. We encourage industry stakeholders 
to further consider all the requirements and implications for the 
``push'' operations of the FHIR standard, develop use cases, perform 
additional API-enabled ``push'' pilot implementations, create or expand 
implementation profiles to support ``push'' services, and demonstrate 
the utility of the ``push'' operations of the FHIR standard for future 
potential inclusion in the Program.
i. Data Response
    We proposed in 84 FR 7482 in Sec.  170.315(g)(10)(i) that Health IT 
Modules presented for testing and certification must be capable of 
responding to requests for data on single and multiple patients in 
accordance with proposed standards and implementation specifications 
adopted in Sec.  170.215(a)(1) (HL7[supreg] FHIR[supreg] DSTU 2 
(v1.0.2-7202)), specified in the proposed Sec.  170.215(a)(2) (API 
Resource Collection in Health (ARCH) Version 1), and consistent with 
the proposed specifications in Sec.  170.215(a)(3) (Argonaut Data Query 
Implementation Guide Version 1.0.0). We clarified that all data 
elements indicated as ``mandatory'' and ``must support'' by the 
proposed standards and implementation specifications must be supported 
and would be in scope for testing.
    Comments. Commenters expressed concern with fully enforcing 
``mandatory'' and ``must'' support requirements of the referenced 
specifications and implementation guides, explaining that developers 
may be required to support requirements that are not applicable to the 
stated intended use of the Health IT Module(s).
    Response. We appreciate the concerns expressed by commenters. We 
clarify that the standards and implementation specifications adopted 
and required for this certification criterion were created by standards 
developing organizations to support a wide range of health care use 
cases.
    We have finalized in Sec.  170.315(g)(10)(i)(A) that Health IT 
Modules presented for testing and certification must be capable of 
responding to requests for a single patient's data according to the 
standard adopted in Sec.  170.215(a)(1) and implementation 
specification adopted in Sec.  170.215(a)(2), including the mandatory 
capabilities described in ``US Core Server CapabilityStatement,'' for 
each of the Data Elements included in the standard adopted in Sec.  
170.213. This requirement will enable Health IT Modules to support US 
Core IG

[[Page 25744]]

operations for each of the Data Elements included in the USCDI.
    Additionally, we have finalized in Sec.  170.315(g)(10)(i)(B) that 
Health IT Modules presented for testing and certification must be 
capable of responding to requests for data on multiple patients as a 
group according to the standard adopted in Sec.  170.215(a)(1) and 
implementation specifications adopted in Sec.  170.215(a)(2) and Sec.  
170.215(a)(4), for each of the Data Elements included in the standard 
adopted in Sec.  170.213. Finally, we clarify that the use of the 
``SMART Backend Services: Authorization Guide'' section of the 
implementation specification adopted in Sec.  170.215(a)(4) is required 
for API ``read'' services for multiple patients as finalized in Sec.  
170.315(g)(10)(i)(B) and described above.
    For requests for data on multiple patients, we note that the 
implementation specification adopted in Sec.  170.215(a)(4) has 
optional parameters which can be used to filter results to a period of 
time, or one or several specified FHIR resources. While these 
parameters are not required for testing and certification, we encourage 
health IT developers to adopt these parameters and other 
``OperationDefinitions'' to enhance the utility of requests for data on 
multiple patients.
ii. Search Support
    We proposed in 84 FR 7482 in Sec.  170.315(g)(10)(ii) that Health 
IT Modules presented for testing and certification must be capable of 
responding to all of the ``supported searches'' specified in the 
proposed implementation specification in Sec.  170.215(a)(4) (Argonaut 
Data Query Implementation Guide Server). We reiterated that Health IT 
Modules presented for testing and certification and as implemented must 
support all search capabilities for single and multiple patients in 
accordance with the proposed implementation specification in Sec.  
170.215(a)(4). We also requested comments on the minimum ``search'' 
parameters that would need to be supported for the 
''DocumentReference'' and ``Provenance'' HL7[supreg] FHIR[supreg] 
resources.
    Comments. Most commenters supported this proposal. One commenter 
recommended only requiring the ``target'' query parameter for the 
``Provenance'' FHIR resource, and ``patient'' and ``date'' query 
parameters for the ``DocumentReference'' FHIR resource. One commenter 
suggested deferring this certification requirement until a standard is 
published by HL7.
    Response. We appreciate the feedback from commenters. Since we have 
not finalized the adoption of the ARCH as proposed in Sec.  
170.215(a)(2), and instead rely on the search parameters specified in 
the US Core IG finalized in Sec.  170.215(a)(2) and Bulk IG finalized 
in Sec.  170.215(a)(4), the comments related to the specific 
``Provenance'' and ``DocumentReference'' FHIR resources are no longer 
applicable. We have finalized in Sec.  170.315(g)(10)(ii)(A) that 
Health IT Modules presented for testing and certification must support 
all search capabilities for single patients according to the 
implementation specification adopted in Sec.  170.215(a)(2), including 
support for all mandatory capabilities included in the ``US Core Server 
CapabilityStatement.'' Additionally, we have finalized in Sec.  
170.315(g)(10)(ii)(B) that Health IT Modules presented for testing and 
certification must respond to search requests for multiple patients' 
data consistent with the search criteria included in the implementation 
specification adopted in Sec.  170.215(a)(4). We clarify that the scope 
of data available in the data responses defined in Sec.  
170.315(g)(10)(i) must be supported for single and multiple patient 
searches via the supported search operations finalized in Sec.  
170.315(g)(10)(ii). Additionally, we clarify for the requirements 
finalized in Sec.  170.315(g)(10)(i) and (ii) that all data elements 
indicated as ``mandatory,'' ``must support,'' by the standards and 
implementation specifications must be supported and are in scope for 
testing.
iii. Application Registration
    We proposed in 84 FR 7483 in Sec.  170.315(g)(10)(iii) that Health 
IT Modules presented for testing and certification must be capable of 
enabling apps to register with an ``authorization server.'' As 
proposed, this would have required an API Technology Supplier to 
demonstrate its registration process, but would not have required 
conformance to a standard. We requested comment at 84 FR 7483 on 
whether to require the OAuth 2.0 Dynamic Client Registration Protocol 
(RFC 7591) \103\ standard as the sole method to support registration 
for the proposed certification criterion in Sec.  170.315(g)(10), and 
requested comment on whether we should require its support as part of 
the final rule's certification criterion. Additionally, we requested 
comment at 84 FR 7483 on whether to include application registration in 
the testing and certification of apps executed within an API Data 
Provider's clinical environment.
---------------------------------------------------------------------------

    \103\ https://tools.ietf.org/html/rfc7591.
---------------------------------------------------------------------------

    Comments. Commenters generally supported that Health IT Modules 
presented for testing and certification must enable apps to register 
with an authorization server. Some commenters supported excluding 
application registration from the testing and certification of apps 
executed within an API Data Provider's clinical environment.
    Response. We appreciate the feedback from commenters. Given the 
overwhelming support, we have finalized in Sec.  170.315(g)(10)(iii) 
that Health IT Modules presented for testing and certification must 
enable apps to register with an authorization server. We clarify that 
Health IT Modules presented for testing and certification must support 
application registration regardless of the scope of patient search 
utilized by the application (e.g., single or multiple). This 
certification criterion requires a health IT developer, as finalized in 
the Condition of Certification requirements section below, to 
demonstrate its registration process, but does not require conformance 
to a standard. Additionally, we expect that apps executed within an 
implementer's clinical environment will be registered with an 
authorization server, but we do not require a health IT developer to 
demonstrate its registration process for these ``provider-facing'' 
apps. We reiterate that we believe implementers of Sec.  
170.315(g)(10)-certified Health IT Modules should have the discretion 
to innovate and execute various methods for application registration 
within a clinical environment.
    Comments. Commenters provided a mix of support and opposition for 
requiring the OAuth 2.0 Dynamic Client Registration Protocol (RFC 7591) 
standard as the sole method of application registration. Some 
commenters felt that the Program should require dynamic client 
registration in the context of patient-access scenarios only, and 
others felt the standard is not ready for mandated adoption in the 
Program. Commenters opposed to requiring the OAuth 2.0 Dynamic Client 
Registration Protocol (RFC 7591) felt that not specifying a standard 
would allow flexibility for different innovative registration 
approaches to be used and developed. Other commenters suggested there 
should be an option for data holders to support dynamic client 
application registration if the data holder prefers that approach, 
including support for dynamic application registration via trusted 
networks.

[[Page 25745]]

    Response. We appreciate the feedback from commenters. We have not 
adopted a requirement for Health IT Modules presented for testing and 
certification to support the OAuth 2.0 Dynamic Client Registration 
Protocol (RFC 7591) standard. We agree with commenters and believe that 
requiring registration without a mandated standard will allow 
registration models to develop further. We encourage health IT 
developers to coalesce around the development and implementation of a 
common standard for application registration with an API's 
authorization server.
    Comments. Commenters suggested permitting implementers of Sec.  
170.315(g)(10)-certified Health IT Modules to undertake a review of 
third-party applications prior to permitting them to connect to the 
implementers' deployed APIs.
    Response. We appreciate the suggestion from commenters. The 
requirement that health IT developers must enable an application to 
register with the Sec.  170.315(g)(10)-certified Health IT Module's 
authorization server only applies for the purposes of demonstrating 
technical conformance to the finalized certification criterion and 
Condition and Maintenance of Certification requirements. The practices 
by all parties (including implementers of Health IT Modules) other than 
developers of certified Health IT Modules are not in scope for this 
certification criterion nor the associated Condition and Maintenance of 
Certification requirements. All other practices associated with third-
party application review or ``vetting'' by implementers must not 
violate the information blocking provision described in section VIII of 
this preamble and applicable laws and regulations. In general, an 
implementer of Sec.  170.315(g)(10)-certified Health IT Modules (e.g., 
health care providers) would be allowed to review third-party 
applications the implementer intends to use for its own business use 
(e.g., a third-party decision-support application used by the health 
care provider in the course of furnishing care) prior to permitting the 
third-party applications to connect to the implementer's deployed APIs 
within its enterprise and clinical users' workflow. However, 
implementers of Sec.  170.315(g)(10)-certified Health IT Modules (e.g., 
health care providers) are not permitted to review or ``vet'' third-
party applications intended for patient access and use (see section 
VII.C.6 of this preamble). We clarify that the third-party application 
registration process that a health IT developer must meet under this 
criterion is not a form of review or ``vetting'' for purposes of this 
criterion.
    Comments. Commenters requested clarity on whether the ``EHR 
Launch'' scenario was out of scope for testing during registration with 
an authorization server.
    Response. Commenters referred to the ``EHR Launch'' scenario, which 
is the ``launch-ehr'' ``SMART on FHIR Core Capability'' included in the 
implementation specification adopted in Sec.  170.215(a)(3). Health IT 
Modules presented for testing and certification must enable all apps 
that utilize the SMART IG ``launch-standalone'' ``SMART on FHIR Core 
Capability'' to register with an authorization server. We reiterate 
that the application registration requirement finalized in Sec.  
170.315(g)(10)(iii) does not require conformance to a standard or 
implementation specification. We envision that apps using only the 
SMART IG ``launch-ehr'' ``SMART on FHIR Core Capability'' will be 
tightly integrated with Sec.  170.315(g)(10)-certified Health IT 
Modules deployed by implementers, and will be able to accommodate 
registration processes that best suit the needs of those implementers. 
Additionally, while we do not require conformance to a standard or 
implementation specification for application registration, we clarify 
that Health IT Modules presented for testing and certification are 
required to support application registration functions to enable 
authentication and authorization as finalized in Sec.  
170.315(g)(10)(v).
iv. Secure Connection
    We proposed in 84 FR 7483 in Sec.  170.315(g)(10)(iv) that Health 
IT Modules presented for testing and certification must be capable of 
establishing a secure and trusted connection with an application 
requesting patient data in accordance with the proposed Sec.  
170.215(a)(5) (HL7 SMART Application Launch Framework Implementation 
Guide Release 1.0.0), including mandatory support for ``Standalone 
Launch'' and ``EHR Launch'' modes.
    Comments. Commenters asked for clarification around where 
``Standalone Launch'' and ``EHR Launch'' capabilities are required, 
suggesting that ``Standalone Launch'' support be used exclusively for 
patient access and ``EHR Launch'' support be used exclusively for 
provider/clinician access. They also noted that testing and 
certification of ``Standalone Launch'' would not be a valid use case 
and should be excluded from the certification criterion.
    Response. We appreciate the feedback from commenters. The SMART IG 
``Standalone Launch'' and ``EHR Launch'' modes can be used by both 
provider- and patient-facing applications. We refer to the adopted 
implementation specification in Sec.  170.215(a)(3) for clarification 
of certification requirements for the SMART IG. We have finalized in 
Sec.  170.315(g)(10)(iv)(A) that Health IT Modules presented for 
testing and certification must demonstrate the ability to establish a 
secure and trusted connection with an application requesting data for a 
single patient in accordance with the implementation specifications 
adopted in Sec.  170.215(a)(2) and (a)(3). We amended this text from 
the Proposed Rule by adding the US Core IG implementation specification 
adopted in Sec.  170.215(a)(2) because the US Core IG specifically 
requires Transport Layer Security 1.2 (RFC 5246) \104\ or higher for 
all transmissions not taking place over a secure network connection. 
Pursuant to this adopted implementation specification, we will test 
Health IT Modules for support for all ``SMART on FHIR Core 
Capabilities'' including both ``launch-ehr'' and ``launch-standalone.''
---------------------------------------------------------------------------

    \104\ https://tools.ietf.org/html/rfc5246.
---------------------------------------------------------------------------

    Additionally, we have finalized in Sec.  170.315(g)(10)(iv)(B) that 
Health IT Modules presented for testing and certification must 
demonstrate the ability to establish a secure and trusted connection 
with an application requesting data for multiple patients in accordance 
with the implementation specification adopted in Sec.  170.215(a)(4). 
The implementation specification adopted in Sec.  170.215(a)(4) has 
several sections, but for testing and certification to this criterion, 
we specifically require conformance to, but not limited to, the ``SMART 
Backend Services: Authorization Guide.''
v. Authentication and Authorization
    We proposed in 84 FR 7483 in Sec.  170.315(g)(10)(v) that Health IT 
Modules presented for testing and certification must demonstrate the 
ability to perform user authentication, user authorization, and issue a 
refresh token valid for a period of at least 3 months during its 
initial connection with an application to access data for a single 
patient in accordance with the proposed standard in Sec.  170.215(b) 
(OpenID Connect Core 1.0 incorporating errata set 1) and the proposed 
implementation specification in Sec.  170.215(a)(5) (HL7[supreg] SMART 
Application Launch Framework Implementation Guide Release 1.0.0).

[[Page 25746]]

Additionally, we proposed in Sec.  170.315(g)(10)(vi) that Health IT 
Modules presented for testing and certification must demonstrate the 
ability of an application to access data for a single patient and 
multiple patients during subsequent connections of applications capable 
of storing a client secret, in accordance with the proposed 
implementation specification in Sec.  170.215(a)(5) (HL7 SMART 
Application Launch Framework Implementation Guide Release 1.0.0), 
without requiring the user to re-authorize and re-authenticate when a 
valid refresh token is supplied. Additionally, we proposed in 84 FR 
7483 that Health IT Modules presented for testing and certification 
must demonstrate it can issue a new refresh token to an application, 
valid for a period of at least 3 months.
    Comments. A majority of commenters supported that Health IT Modules 
presented for testing and certification must demonstrate the ability to 
perform user authentication, user authorization, and issue a refresh 
token valid for a period of at least 3 months. Some commenters noted 
that the OAuth 2.0 implementation guide does not recommend servers 
provide refresh tokens to public/non-confidential applications.
    Response. We thank commenters for their feedback. Given the general 
support and in response to these comments, we have consolidated the 
proposed requirements in Sec.  170.315(g)(10)(v) and Sec.  
170.315(g)(10)(vi) as a revised set of requirements finalized in Sec.  
170.315(g)(10)(v). Specifically, we have finalized requirements for 
authentication and authorization for patient and user scopes in Sec.  
170.315(g)(10)(v)(A) and requirements for authentication and 
authorization for system scopes in Sec.  170.315(g)(10)(v)(B). We have 
focused the revised requirements around authentication and 
authorization scopes to remove any confusion associated with 
requirements for single and multiple patients. We have finalized 
authentication and authorization requirements for first time 
connections for patient and user scopes in Sec.  
170.315(g)(10)(v)(A)(1). This include the requirement finalized in 
Sec.  170.315(g)(10)(v)(A)(1)(i) that Health IT Modules presented for 
testing and certification must demonstrate that authentication and 
authorization occurs during the process of granting access to patient 
data in accordance with the implementation specification adopted in 
Sec.  170.215(a)(3) and standard adopted in Sec.  170.215(b). It also 
includes the requirement finalized in Sec.  170.315(g)(10)(v)(A)(1)(ii) 
that an application capable of storing a client secret must be issued a 
refresh token valid for a period of no less than three months. 
Additionally, we have finalized authentication and authorization 
requirements for subsequent connections for patient and user scopes in 
Sec.  170.315(g)(10)(v)(A)(2). This includes the requirements finalized 
in Sec.  170.315(g)(10)(v)(A)(2)(i) that Health IT Modules presented 
for testing and certification must demonstrate that access is granted 
to patient data in accordance with the implementation specification 
adopted in Sec.  170.215(a)(3) without requiring re-authorization and 
re-authentication when a valid refresh token is supplied by the 
application. It also includes the requirements finalized in Sec.  
170.315(g)(10)(v)(A)(2)(ii) that an application capable of storing a 
client secret must be issued a new refresh token valid for a new period 
of no less than three months.
    Additionally, we have finalized requirements for authentication and 
authorization for system scopes in Sec.  170.315(g)(10)(v)(B), which 
require that Health IT Modules presented for testing and certification 
must demonstrate that authentication and authorization occurs during 
the process of granting an application access to patient data in 
accordance with the ``SMART Backend Services: Authorization Guide'' 
section of the implementation specification adopted in Sec.  
170.215(a)(4) and the application must be issued a valid access token. 
We note that for system scopes, applications will likely be authorized 
via a prior authorization negotiation and agreement between 
applications and Health IT Modules.
    For clarity, we use the term ``an application capable of storing a 
client secret'' to refer to ``confidential clients.'' In the definition 
at RFC 6749, ``confidential'' clients are ``clients capable of 
maintaining the confidentiality of their credentials (e.g., client 
implemented on a secure server with restricted access to the client 
credentials), or capable of secure client authentication using other 
means.'' RFC 6749 also defines ``public'' clients as ``clients 
incapable of maintaining the confidentiality of their credentials 
(e.g., clients executing on the device used by the resource owner, such 
as an installed native application or a web browser-based application), 
and incapable of secure client authentication via any other means.'' We 
clarify that the term ``an application capable of storing a client 
secret'' specifically excludes ``public'' clients.
    Additionally, we clarify that Health IT Modules will be explicitly 
tested for US Core IG operations using authentication and authorization 
tokens acquired via the process described in the implementation 
specification adopted in Sec.  170.215(a)(3), and Health IT Modules 
will be explicitly tested for Bulk IG operations using authentication 
and authorization tokens acquired via the process described in the 
implementation specification adopted in Sec.  170.215(a)(4).
    Comments. One commenter recommended that ONC introduce a Condition 
of Certification requirement to ensure that implementers of Sec.  
170.315(g)(10)-certified Health IT Modules can obtain automated system-
level access to all API calls from the API servers offered by the 
Certified Health IT Developers (e.g., via the SMART Backend Services 
authorization guide), with ``system/*.*'' scopes.
    Response. We decline to accept the recommendation to require 
``system/*.*'' scopes as a certification requirement in Sec.  
170.315(g)(10). Insofar as the commenter requested that Health IT 
Modules make available automated system-level scopes for the purposes 
of an ``all information export,'' we have finalized a similar 
requirement in Sec.  170.315(b)(10), and refer the commenter to that 
section for additional detail. Additionally, we have finalized in Sec.  
170.315(g)(10)(v)(B) that Health IT Modules must perform authentication 
and authorization during the process of granting an application access 
to patient data using system scopes in accordance with the ``SMART 
Backend Services: Authorization Guide'' section of the implementation 
specification adopted in Sec.  170.215(a)(4). We recognize that the 
capabilities supported by ``SMART Backend Services: Authorization 
Guide'' could be used for many other use cases that are currently not 
required by the criterion. We clarify that implementers of Health IT 
Modules are not prohibited from configuring Health IT Modules to 
support the backend ``system'' scope described in the ``SMART Backend 
Services: Authorization Guide'' section of the Bulk IG adopted in Sec.  
170.215(a)(4) for API-enabled ``read'' services defined in the US Core 
IG. Indeed, we strongly encourage health IT developers to support these 
use cases as they develop in order to make full use of the certified 
functions of Health IT Modules and advance the state of the industry.
    Comments. Commenters suggested specifying that refresh tokens apply 
exclusively to patient access scenarios, noting that there are too many 
security risks to allow persistent tokens for provider-facing 
applications.

[[Page 25747]]

Additionally, commenters suggested permitting Health IT Modules to 
support the revocation of refresh tokens in appropriate scenarios to 
address legitimate security concerns.
    Response. We appreciate the feedback from commenters. We do not 
agree that there are too many security risks to allow refresh tokens to 
be used for provider-facing applications. Refresh tokens are commonly 
used in health care and other industries to provide seamless 
integration of systems with other applications while reducing the need 
for the burdensome process of re-authentication and re-authorization. 
We expect implementers of Sec.  170.315(g)(10)-certified Health IT 
Modules to have the capability of revoking refresh tokens where 
appropriate. Additionally, we clarify that implementers of Sec.  
170.315(g)(10)-certified Health IT Modules are not prohibited from 
changing the length of refresh tokens for users of the API including 
patients and providers to align with their institutional policies. 
However, implementers of Sec.  170.315(g)(10)-certified Health IT 
Modules should be mindful of information blocking provisions applicable 
to them and that requiring patients to re-authenticate and re-authorize 
at a high frequency could inhibit patient access and implicate 
information blocking.
    Comments. Commenters suggested amending the time from three months 
to 12 months. One commenter agreed that the patient token should be 
valid for three months, but suggested the provider token be limited to 
24 hours. One commenter suggested requiring re-authentication every 
time information is sought via APIs.
    Response. We appreciate the feedback from commenters. We believe a 
refresh token valid for a period of three months is sufficient to 
balance persistent access and security concerns. Moreover, for 
subsequent connections of applications capable of storing a client 
secret, Health IT Modules are required to issue a new refresh token 
valid for a new period of no shorter than three months per the API 
certification criterion requirement finalized in Sec.  
170.315(g)(10)(v)(A)(2)(ii). Given this requirement, we anticipate that 
the user's application will renew its refresh token (valid for a new 
period of three months) every time the user actively engages with the 
application. We believe this justifies a refresh token length for a 
moderate period of no shorter than three months rather than a long 
period of 12 months suggested by commenters. Additionally, as stated 
above, implementers of Sec.  170.315(g)(10)-certified Health IT Modules 
are not prohibited from changing the length of refresh tokens for users 
of the API, including patients and providers, to align with their 
institutional policies. Further, implementers of Sec.  170.315(g)(10)-
certified Health IT Modules are not prohibited from implementing their 
Sec.  170.315(g)(10)-certified Health IT Modules in accordance with 
their organizational security policies and posture, including by 
instituting policies for re-authentication and re-authorization (e.g., 
providers and/or patients could always be required to re-authenticate 
and re-authorize after a set number of refresh tokens have been 
issued). We also note that we have finalized a requirement in Sec.  
170.315(g)(10)(vi) that a Health IT Module's authorization server must 
be able to revoke an authorized application's access at a patient's 
direction. This required capability will enable patients to 
definitively revoke an application's authorization to receive their EHI 
until reauthorized, if ever, by the patient.
    Comments. Commenters suggested creating a more robust assessment 
process for identity management, including adding additional criteria 
for identity proofing, authentication, and authorization, and ensuring 
software developers do not act in a way that could inhibit patient 
control of their data.
    Response. We appreciate the feedback and suggestions. Although we 
agree that identity proofing is an important practice, we did not 
include requirements for identity proofing in the Proposed Rule, and 
have not finalized requirements for identity proofing in response to 
this comment. We note that the certification criterion finalized in 
Sec.  170.315(g)(10) only applies to health IT developers. Given the 
scope of the Program, we believe that mandating identity proofing, 
which are generally business practices performed by organizations and 
other entities, is not something appropriate to require of health IT 
developers. We note that per the requirements of the 2015 Edition 
Privacy and Security Certification Framework, health IT developers with 
Health IT Modules certified to Sec.  170.315(g)(7) through (g)(10) are 
required to certify to Sec.  170.315(d)(1), which includes requirements 
for authentication, access control, and authorization. Additionally, 
authentication and authorization for use of Sec.  170.315(g)(10)-
certified Health IT Modules are included in the requirements finalized 
in Sec.  170.315(g)(10)(v). We appreciate the sentiment expressed by 
commenters, and have created thorough and rigorous requirements to 
ensure adequate privacy and security capabilities are present in Sec.  
170.315(g)(10)-certified Health IT Modules. Regarding the request for 
certification requirements to ensure that software developers do not 
act in a way that could inhibit patient control of their data, we refer 
to the requirement finalized in Sec.  170.315(g)(10)(A), which requires 
that patients have the ability to grant applications authorization to 
access their EHI using granular FHIR Resources of their choice to 
comply with the adopted implementation specification in Sec.  
170.215(a)(3), and requirement in Sec.  170.315(g)(10)(vi), which 
requires that a Health IT Module's authorization server must be able to 
revoke an authorized application's access at a patient's direction.
    Comments. Several commenters suggested that patients be able to 
specify refresh token length, if desired, and revoke a third-party 
application's access at any time. Commenters suggested that clear 
information be provided to patients whether authorized access is one-
time or ongoing.
    Response. We appreciate the feedback from commenters. Refresh 
tokens are an OAuth 2.0 concept, and are largely opaque to the end 
user. However, we clarify that patients are not prohibited from 
changing the length of refresh tokens to the degree this option is 
available to them. Additionally, pursuant to these comments, and to 
ensure patients have the ability to revoke an application's access to 
their EHI at any time, we have finalized an additional certification 
requirement in Sec.  170.315(g)(10)(vi) which requires that a Health IT 
Module's authorization server must be able to revoke an authorized 
application's access at a patient's direction. We have finalized this 
as a functional requirement to allow health IT developers the ability 
to implement it in a way that best suits their existing infrastructure 
and allows for innovative models for authorization revocation to 
develop. Additionally, per the requirement finalized in Sec.  
170.315(g)(10)(v)(A), Health IT Modules must perform authorization 
conformant with the implementation specification adopted in Sec.  
170.215(a)(3), including all ``SMART on FHIR Core Capabilities.'' The 
``permission-offline'' ``SMART on FHIR Core Capability'' includes 
support for the ``offline_access'' scope. Importantly, the 
implementation specification adopted in Sec.  170.215(a)(3) requires 
that patients have the ability to explicitly enable the 
``offline_access'' scope during authorization. If the 
``offline_access'' scope is not enabled by patients, patients will be 
required to re-

[[Page 25748]]

authenticate and re-authorize an application's access to their EHI 
after the application's access token expires.
    Comments. Commenters suggested providing the ability for 
implementers of Sec.  170.315(g)(10)-certified Health IT Modules to 
perform token introspection using services enabled by health IT 
developers to ensure that additional resource servers can work with the 
same access tokens and authorization policies as the resource servers 
provided by API Technology Suppliers.
    Response. We appreciate the feedback from commenters. Based on 
feedback, we have finalized in Sec.  170.315(g)(10)(vii) that Health IT 
Modules presented for testing and certification must demonstrate the 
ability to receive and validate a token issued by its authorization 
server, but we did not specify a standard for this requirement. Token 
introspection will allow implementers of Sec.  170.315(g)(10)-certified 
Health IT Modules to use API authorization servers and authorization 
tokens with various resource servers. This functionality has the 
potential to reduce complexity for implementers of Sec.  
170.315(g)(10)-certified Health IT Modules authorizing access to 
several resource servers and reduces the overall effort and subsequent 
use of Sec.  170.315(g)(10)-certified Health IT Modules consistent with 
the goals of section 4002 of the Cures Act to enable the use of APIs 
without ``special effort.'' Although we do not specify a standard for 
token introspection, we encourage industry to coalesce around using a 
common standard, like OAuth 2.0 Token Introspection (RFC 7662).\105\
---------------------------------------------------------------------------

    \105\ https://tools.ietf.org/html/rfc7662.
---------------------------------------------------------------------------

    Comments. One commenter expressed concerns with the privacy and 
security of APIs, and nefarious actors posing as legitimate health 
facilities.
    Response. Regarding the privacy and security of APIs, the 
Standardized API for Patient and Population Services certification 
criterion finalized in Sec.  170.315(g)(10) requires Health IT Modules 
presented for testing and certification to implement the implementation 
specification adopted in Sec.  170.215(a)(3), which is based on the 
OAuth 2.0 security standard that is widely used in industry. The 
implementation of OpenID Connect paired with OAuth 2.0 allows health 
care providers to securely deploy and manage APIs consistent with their 
organizational practices. Health care providers retain control over how 
their workforce and patients authenticate when interacting with the 
API. For example, a patient may be required to use the same credentials 
(e.g., username and password) they created and use to access their EHI 
through a patient portal as they do when authorizing an application to 
access their data. Since patients complete the authentication process 
directly with their health care provider, no application will have 
access to their credentials. There is little protection software can 
provide to protect against nefarious actors posing as legitimate health 
facilities, however, we believe that implementing the security controls 
and safeguards described above, along with the privacy and security 
requirements required under the 2015 Edition Privacy and Security 
Certification Framework, will help to protect Health IT Modules against 
nefarious actors. Additionally, the protections required for ePHI in 
Health IT Modules offered by health IT developers acting as business 
associates of health care providers remain unchanged.
vi. Technical Documentation
    We proposed in 84 FR 7484 in Sec.  170.315(g)(10)(vii) that an API 
Technology Supplier needed to provide complete documentation via a 
publicly accessible hyperlink, without additional access requirements, 
for all aspects of its Sec.  170.315(g)(10)-certified API, especially 
for any unique technical requirements and configurations, including API 
syntax, function names, required and optional parameters supported and 
their data types, return variables and their types/structures, 
exceptions and exception handling methods and their returns, the 
software components and configurations necessary for an application to 
successfully interact with the API and process its response(s), and all 
applicable technical requirements and attributes necessary for an 
application to be registered with an authorization server. 
Additionally, we proposed in 84 FR 7484 to remove the ``terms of use'' 
documentation provisions in the API certification criteria adopted in 
Sec.  170.315(g)(7) through (g)(9) in order to reflect the Condition of 
Certification requirements and not be duplicative of the terms and 
conditions transparency Condition of Certification requirements 
proposed in 84 FR 7485.
    Comments. Commenters generally supported the requirements for this 
criterion as proposed. Some commenters suggested technical 
documentation should be limited to descriptions of how the API differs 
from the utilized standards and implementation specifications, like 
HL7[supreg] FHIR[supreg] and the SMART IG.
    Response. We appreciate the feedback from commenters. We did not 
make substantive changes to the requirements proposed in Sec.  
170.315(g)(10)(vii). We have finalized these requirements Sec.  
170.315(g)(10)(viii). We recognize that our formal adoption of the HL7 
FHIR standard and the associated implementation specifications 
referenced in Sec.  170.315(g)(10) would be consistent across all 
Health IT Modules presented for certification. As a result, there may 
be minimal additional documentation needed for these capabilities 
beyond what is already documented in adopted standards and 
implementation specifications. We expect health IT developers to 
disclose any additional data their Sec.  170.315(g)(10)-certified 
Health IT Module supports in the context of the adopted standards and 
implementation specifications. The content of technical documentation 
required to meet this certification criteria are described in 
requirements finalized in Sec.  170.315(g)(10)(viii)(A). We expect 
these and any additional documentation relevant to the use of a health 
IT developer's Sec.  170.315(g)(10)-certified Health IT Module to be 
made available via a publicly accessible hyperlink without 
preconditions or additional steps to meet the requirement as finalized 
in Sec.  170.315(g)(10)(viii)(B).
d. API Condition of Certification Requirements
i. Key Terms
    We proposed in 84 FR 7477 to adopt new definitions for ``API 
Technology Supplier,'' ``API Data Provider,'' and ``API User'' in Sec.  
170.102 to describe the stakeholders relevant to our proposals.
    Comments. The majority of commenters recommended updating 
definitions and providing examples for the key terms, including API 
User. Most commenters recommended dividing ``API User'' into two 
categories: ``First-Order Users,'' to include patients, health care 
providers, and payers that use apps/services that connect to API 
technology, and ``Third-Party Users,'' to include third-party software 
developers, and developers of software applications used by API Data 
Providers.
    Response. We thank commenters for their feedback. We note that in 
this section we use the terms proposed in Sec.  170.102 that we 
finalized in Sec.  170.404(c) with added quotation marks for emphasis 
and clarity. We considered separating the term ``API User'' into 
distinct terms for developers of software applications and other users, 
such as patients and health care providers. However, we determined that 
this distinction was unnecessary from a regulatory perspective. 
Narrowing our

[[Page 25749]]

definitions to distinct subgroups could exclude unforeseen stakeholders 
that emerge in a future API ecosystem. The term ``API User'' was 
intended to describe stakeholders that interact with the certified API 
technology either directly (e.g., to develop third-party apps/services) 
or indirectly (e.g., as a user of a third-party app/service).
    Based on suggestions to revise the proposed key terms, we have 
renamed the term ``API Data Provider'' to ``API Information Source'' 
finalized in Sec.  170.404(c) to make clear which party is the source 
and responsible for the EHI (as in ``the source of the information is 
the health care provider''), and ``API Technology Supplier'' to 
``Certified API Developer'' finalized in Sec.  170.404(c) to more 
clearly refer to health IT developers with Health IT Modules certified 
to any of the API criteria under the Program. Rather than keeping ``API 
technology'' an undefined term, we renamed it to ``certified API 
technology'' and finalized a definition in Sec.  170.404(c). 
Additionally, we amended the definition of ``API User'' for clarity in 
Sec.  170.404(c) to ``API User means a person or entity that creates or 
uses software applications that interact with the `certified API 
technology' developed by a `Certified API Developer' and deployed by an 
`API Information Source.''' Additionally, we did not include the non-
exhaustive list of examples of ``API User'' in the definition finalized 
in Sec.  170.404(c). Instead, we rely on preamble to provide guidance 
for examples of ``API Users'' rather than appearing to limit the 
regulatory definition to these examples. We interpret that ``API 
Users'' can include, but are not limited to, software developers, 
patients, health care providers, and payers. We simplified the 
definition of ``API Information Source'' in Sec.  170.404(c) to ``API 
Information Source means an organization that deploys `certified API 
technology' created by a `Certified API Developer.''' We revised the 
definition of ``Certified API Developer'' in Sec.  170.404(c) to 
``Certified API Developer means a health IT developer that creates the 
`certified API technology' that is certified to any of the 
certification criteria adopted in Sec.  170.315(g)(7) through (10).'' 
We added the definition of ``certified API technology'' in Sec.  
170.404(c) as ``certified API technology means the capabilities of 
Health IT Modules that are certified to any of the API-focused 
certification criteria adopted in Sec.  170.315(g)(7) through (10).'' 
For ease of reference and to clarify that these terms only apply to the 
Condition and Maintenance of Certification requirements, we have 
finalized these revised definitions in Sec.  170.404(c). In this and 
other sections of the rule, we use the original proposed terms in the 
proposal and comment summaries, and the finalized terms in our 
responses.
    Comments. Some commenters suggested ONC allow flexibility for 
instances where stakeholders may meet the definition of more than one 
key term, and others recommended restricting stakeholders from meeting 
the definition of more than one key term. Commenters expressed concern 
with the complexity of key terms in the Proposed Rule, and confusion 
with the interaction of these terms with other criteria within the 
rule.
    Response. We thank commenters for expressing their concern about 
stakeholders being able to serve more than one role under the 
definitions proposed in Sec.  170.102 that we have finalized in Sec.  
170.404(c). We do not believe it is practical to restrict persons or 
entities to just one definition. We anticipate situations where a 
person or entity can serve more than one role. For example, a large 
health care system could purchase and deploy ``certified API 
technology'' as an ``API Information Source'' and have ``API Users'' on 
staff that create or use software applications that interact with the 
``certified API technology.'' Additionally, a health IT developer could 
serve as a ``Certified API Developer'' that creates ``certified API 
technology'' for testing and certification and as an ``API User'' when 
it creates software applications that connect to ``certified API 
technology.'' We clarify that a stakeholder will meet a role defined in 
Sec.  170.404(c) based on the context in which they are acting. For 
example, only health IT developers (when acting in the context of a 
``Certified API Developer'') are required to comply with these API 
Condition and Maintenance of Certification requirements.
    Comments. Commenters expressed concern that ONC exceeded its 
regulatory authority by implicating physicians in the definition of 
``API Data Providers.''
    Response. We remind commenters that these definitions were created 
to describe relationships between key API stakeholders and to help 
describe the Condition and Maintenance of Certification requirements. 
We clarify that health care providers are not covered by the Condition 
and Maintenance of Certification requirements to which the definitions 
apply in Sec.  170.404(c) unless they are serving the role of a 
``Certified API Developer.
ii. Scope and Compliance
    We proposed in 84 FR 7485 that the Condition and Maintenance of 
Certification requirements proposed in Sec.  170.404 apply to API 
Technology Suppliers with Health IT Modules certified to any API-
focused certification criteria adopted in the proposed Sec.  
170.315(g)(7) through (11).
    Comments. Commenters agreed that the proposed applicability for the 
Condition of Certification requirements proposed in Sec.  170.404 
should be limited to health IT developers certified to any API-focused 
criteria adopted in the proposed Sec.  170.315(g)(7) through (11). One 
commenter requested clarification whether non-certified internally 
developed laboratory systems would be subject to this requirement.
    Response. We thank stakeholders for their comments. We have 
generally finalized the scope and compliance for the Condition and 
Maintenance of Certification requirements as proposed in Sec.  170.404 
with one modification. Given that we have not adopted the certification 
criterion proposed for adoption in Sec.  170.315(g)(11), the scope of 
the Condition and Maintenance of Certification requirements apply only 
to health IT developers with Health IT Modules certified to any of the 
API-focused criteria finalized in Sec.  170.315(g)(7) through (10). The 
Condition and Maintenance of Certification requirements finalized in 
Sec.  170.404 do not apply to health IT developers not seeking 
certification, nor do they apply to health IT developers certified to 
solely non-API-focused criteria. Additionally, we clarify that the 
Condition and Maintenance of Certification requirements only apply to 
practices of Certified API Developers with respect to the capabilities 
included in Sec.  170.315(g)(7) through (10). In other words, the 
Condition and Maintenance of Certification requirements would not apply 
to practices of Certified API Developers with respect to non-certified 
capabilities or practices associated with, for example, the 
immunization reporting certification criterion in Sec.  170.315(f)(1), 
because that criterion is not one of the API-focused criteria finalized 
in Sec.  170.315(g)(7) through (10). However, health IT developers 
should understand that other requirements in this final rule, 
especially those related to information blocking, could still apply to 
its business practices associated with non-API-focused certification 
criteria.
iii. General
    We proposed in 84 FR 7485 in Sec.  170.404(a)(1) to adopt the Cures 
Act's

[[Page 25750]]

API Condition of Certification requirement stating that an API 
Technology Supplier must, through an API, ``provide access to all data 
elements of a patient's electronic health record to the extent 
permissible under applicable privacy laws.'' We then subsequently 
proposed in 84 FR 7485 to interpret ``all data of a patient's 
electronic health record'' for the purposes of the scope of this API 
Condition of Certification requirement to include the proposed ARCH 
standard, its associated implementation specifications, and the policy 
expressed around the data elements that must be supported by Sec.  
170.315(g)(10)-certified APIs.
    Comments. Commenters supported our adoption of the Cures Act's API 
Condition of Certification requirement. For the purposes of the scope 
of data covered under this API Condition of Certification requirement, 
most commenters recommended defining ``all data elements'' as the Data 
Elements referenced by the USCDI and the FHIR resources in the FHIR US 
Core Implementation Guide STU 3 (US Core IG) for FHIR Release 4. We 
received comments recommending additional data elements to be included 
that we discuss in our comment summary for the ARCH in the ``API 
Standards, Implementation Specifications, and Certification Criterion'' 
section of this final rule.
    Response. We appreciate stakeholder feedback. The Sec.  
170.315(g)(10) certification criterion requirement and associated 
standards and implementation specifications will enable secure, 
standards-based API access to a specific set of information. We have 
finalized that a Certified API Developer must publish APIs, and must 
allow EHI from such technology to be accessed, exchanged, and used 
without special effort through the use of APIs or successor technology 
or standards, as provided for under applicable law, including providing 
access to all data elements of a patient's electronic health record to 
the extent permissible under applicable privacy laws, in Sec.  
170.404(a)(1). Additionally, for the purposes of meeting this portion 
of the Cures Act's API Condition of Certification requirement, we 
clarify the data required and that must be supported to demonstrate 
conformance to the final Sec.  170.315(g)(10) certification criterion 
(including all of its associated standards and implementation 
specifications) constitutes ``all data elements of a patient's 
electronic health record to the extent permissible under applicable 
privacy laws.'' Regarding the recommendation by commenters that the 
scope of ``all data elements'' include the Data Elements of the 
standard adopted in Sec.  170.213 and FHIR resources referenced by the 
implementation specification adopted in Sec.  170.215(a)(2), we note 
that both the standard and implementation specification are included in 
the interpretation of ``all data elements of a patient's electronic 
health record to the extent permissible under applicable privacy laws'' 
above. We note that this specific interpretation does not extend beyond 
the API Condition and Maintenance of Certification requirements 
finalized in Sec.  170.404 and cannot be inferred to reduce the scope 
or applicability of other Cures Act Conditions of Certification or the 
information blocking policies, which include a larger scope of data.
iv. Transparency Conditions
    We proposed in 85 FR 7485 and 7486 in Sec.  170.404(a)(2)(i) to 
require API Technology Suppliers make available complete business and 
technical documentation via a publicly accessible hyperlink, including 
all terms and conditions for use of its API technology. Additionally, 
we proposed that API Technology Suppliers must make clear to the public 
the timing information applicable to their disclosures in order to 
prevent discrepancies between an API Technology Supplier's public 
documentation and its direct communication to customers. Additionally, 
we requested comment at 84 FR 7486 on whether the expectation for API 
Technology Suppliers to make necessary changes to transparency 
documentation should be finalized in regulation text, or whether this 
would be standard practice as part of making this documentation 
available.
    Comments. We received overall support from commenters for the need 
to make complete business and technical documentation available via a 
publicly accessible hyperlink. We did not receive public comment on 
whether we should formally include public disclosure requirements for 
regular updates to business and technical documentation in regulatory 
text.
    Response. We thank commenters for their support to make complete 
business and technical documentation available via a publicly 
accessible hyperlink. We have finalized in Sec.  170.404(a)(2)(i) that 
a Certified API Developer must publish complete business and technical 
documentation, including the documentation described in Sec.  
170.404(a)(2)(ii), via a publicly accessible hyperlink that allows any 
person to directly access the information without any preconditions or 
additional steps. We made small adjustments to Sec.  170.404(a)(2)(i) 
to reflect the changes in API definitions finalized in Sec.  
170.404(c).
    Given that we did not receive public comment on whether we should 
formally include public disclosure requirements for regular updates to 
business and technical documentation in regulatory text, so we have 
finalized in 170.404(a)(4)(iii)(B) that a Certified API Developer must 
provide notice and a reasonable opportunity for API Information Sources 
and API Users to update their applications to preserve compatibility 
with certified API technology and to comply with applicable terms and 
conditions. We note that notice could include a public notice made 
available on a website, but also encourage Certified API Developers to 
contact API Information Source customers and registered API Users 
(application developers) directly prior to updating business and 
technical documentation.
(A) Terms and Conditions
    We proposed in 84 FR 7485 in Sec.  170.404(a)(2)(ii)(A) that API 
Technology Suppliers must publish all terms and conditions for its API 
technology, including any restrictions, limitations, obligations, 
registration process requirements, or other similar requirements that 
would be needed to: Develop software applications to interact with the 
API technology; distribute, deploy, and enable the use of software 
applications in production environments that use the API technology; 
use software applications, including to access, exchange, and use EHI 
by means of the API technology; use any EHI obtained by means of the 
API technology; and register software applications. Additionally, we 
proposed in Sec.  170.404(a)(2)(ii)(B) that any and all fees charged by 
an API Technology Supplier for the use of its API technology must be 
described in detailed, plain language, including the persons or classes 
of persons to whom the fee applies; the circumstances in which the fee 
applies; and the amount of the fee, which for variable fees must 
include the specific variable(s) and methodology(ies) that will be used 
to calculate the fee.
    Comments. We received support from stakeholders regarding the 
transparency of ``all terms and conditions'' associated with the use of 
API technology.
    Response. We thank commenters for their support. We believe this 
terms and conditions transparency requirement would ensure that API 
Information Sources and API Users do not experience ``special effort'' 
in the form

[[Page 25751]]

of unnecessary costs or delays in obtaining the terms and conditions 
for certified API technology. Furthermore, we believe full transparency 
is necessary to ensure that API Users have a thorough understanding in 
advance of any terms or conditions that might apply to them once they 
have committed to developing software that interacts with certified API 
technology. We have finalized in Sec.  170.404(a)(2)(ii)(A) that 
Certified API Developers must publish all terms and conditions for its 
certified API technology, including any fees, restrictions, 
limitations, obligations, registration process requirements or other 
similar requirements as enumerated in Sec.  170.404(a)(2)(ii)(A)(1) 
through (6). We made small adjustments to Sec.  170.404(a)(2)(ii)(A) to 
reflect the changes in API definitions finalized in Sec.  170.404(c). 
Additionally, we moved ``App developer verification'' from its proposed 
location in Sec.  170.404(a)(2)(ii)(C) and finalized it in Sec.  
170.404(b)(1) to improve organization. We added the phrase ``Used to 
verify the authenticity of API Users'' to the regulation text finalized 
in Sec.  170.404(a)(2)(ii)(A)(5) for consistency with our proposed 
policy. We also moved the phrase ``Register software applications'' 
from its proposed location in Sec.  170.404(a)(2)(ii)(A)(5) to the 
finalized location in Sec.  170.404(a)(2)(ii)(A)(6) and revised the 
phrase for consistency. Additionally, we made small changes to the 
regulation text finalized in Sec.  170.404(a)(2)(ii)(A)(1) through 
Sec.  170.404(a)(2)(ii)(A)(6) for clarity.
    Comments. We received both support and disagreement for the 
requirement to publish transparency documentation on API fees. Some 
commenters felt transparency documentation of API fees should be 
limited to value-added services, because those are the only permitted 
fees applicable to API Users, and the other permitted fees applicable 
to API Data Providers (usage-based fees and fees to recover costs for 
development, deployment, and upgrades) would be included in contractual 
documentation with their customers.
    Response. We recognize that some commenters had concern with making 
documentation on permitted fees publicly available. We believe that 
transparent documentation of all permitted fees is necessary to 
maintain a competitive marketplace and ensure that fees are reasonably 
related to the development, deployment, upgrade, and use of certified 
API technology. Fee transparency will also enable API Information 
Sources and API Users to shop for certified API technology and related 
services that meet their needs. We have finalized in Sec.  
170.404(a)(2)(ii)(B) that any and all fees charged by a Certified API 
Developer for the use of its certified API technology must be described 
in detailed, plain language, including all material information 
described in Sec.  170.404(a)(2)(ii)(B)(1) through (3). Additionally, 
we made small adjustments to Sec.  170.404(a)(2)(ii)(B) to reflect the 
changes in API definitions finalized in Sec.  170.404(c).
    Comments. Multiple stakeholders expressed the need to include 
consumer protections in the terms and conditions documentation with an 
explanation about how EHI will be used.
    Response. This provision of the Condition of Certification 
requirements does not prohibit additional content or limit the type of 
content a Certified API Developer may include in its terms and 
conditions. A Certified API Developer would be permitted to include 
consumer protections in their terms and conditions documentation. 
Additionally, we clarify these API Conditions of Certification 
requirements only apply to Certified API Developers. As such, API 
Information Sources and API Users are not required by the API Condition 
of Certification requirements to publish any terms and conditions, 
including those that apply to consumer protections.
v. Fees Conditions
(A) General Fees Prohibition
    We proposed in Sec.  170.404(a)(3)(i)(A) that API Technology 
Suppliers would be prohibited from imposing fees associated with API 
technology as a Condition of Certification requirement. In establishing 
this general prohibition, ONC was mindful of the need for API 
Technology Suppliers to recover their costs and to earn a reasonable 
return on their investments in providing API technology that has been 
certified under the Program. Accordingly, we identified categories of 
``permitted fees'' in 84 FR 7487 that API Technology Suppliers would be 
permitted to charge and still be compliant with the Condition of 
Certification and Program requirements. These include the proposed 
Sec.  170.404(a)(3)(ii) (permitted fee for developing, deploying, and 
upgrading API technology), proposed Sec.  170.404(a)(3)(iii) (permitted 
fee to recover costs of supporting API usage for purposes other than 
patient access), and proposed Sec.  170.404(a)(3)(iv) (permitted fee 
for value-added services). We also proposed in 84 FR 7487 that API 
Technology Suppliers would not be permitted to impose fees on any 
person in connection with an API Technology Supplier's work to support 
the use of API technology to facilitate a patient's ability to access, 
exchange, or use their EHI. We also clarified that while the proposed 
permitted fees set the boundaries for the fees API Technology Suppliers 
would be permitted to charge and to whom those permitted fees could be 
charged, the proposed regulations did not specify who could pay the API 
Technology Supplier's permitted fee. Rather, we proposed general 
conditions that an API Technology Supplier's permitted fees must 
satisfy in Sec.  170.404(a)(3)(i)(B)(1) through (4), and requested 
comment in 84 FR 7488 on these conditions and whether they sufficiently 
restrict fees from being used to prevent access, exchange, and use of 
EHI through APIs without special effort. We include detailed 
discussions of permitted fees and related conditions below.
    Comments. Some commenters supported the clear prohibition on API 
fees outside those fees permitted in Sec.  170.404(a)(3)(ii) through 
(iv), expressing that the language in the rule would prevent confusion 
regarding allowable and restricted fees. Some commenters noted that 
prohibiting fees would enable patients to exercise their HIPAA right of 
access without experiencing cost barriers, and remove cost barriers to 
hospitals and health care facilities using APIs for interoperability. 
Commenters noted that the proposals addressed many of the access and 
pricing practices that API Technology Suppliers engaged in to limit 
data exchange and gain a competitive advantage. Commenters noted that 
API Technology Supplier pricing practices often create barriers to 
entry and competition for apps that health care providers seek to use. 
Some commenters supported the proposal that prohibits API Technology 
Suppliers from charging fees to API Users.
    Response. We thank stakeholders for their support of and feedback 
on our proposal. We have finalized in Sec.  170.404(a)(3)(i)(A) that 
all fees related to certified API technology not otherwise permitted by 
Sec.  170.404(a)(3) are prohibited from being imposed by a Certified 
API Developer. Additionally, we have modified and reorganized these 
Condition of Certification requirements for clarity. We have renamed 
the title for the section from the Proposed Rule to ``Fees conditions'' 
because the requirements include both permitted and prohibited fees. We 
have updated the terminology used in this section to reflect changes 
made to the terminology used throughout the API Condition of

[[Page 25752]]

Certification requirements and finalized in Sec.  170.404(c). We 
finalized a requirement in Sec.  170.404(a)(3)(i)(A) that permitted 
fees in paragraphs Sec.  170.404(a)(3)(ii) and Sec.  170.404(a)(3)(iv) 
may include fees that result in a reasonable profit margin in 
accordance with the information blocking Costs Exception provision 
finalized in Sec.  170.302. We clarify that any fee that is not covered 
by those exceptions would be suspect under the information blocking 
provision, and would equally not be permitted by this API Condition of 
Certification requirement.
    This general prohibition on fees as finalized in Sec.  
170.404(a)(3)(i)(A) is meant to ensure that Certified API Developers do 
not engage in pricing practices that create barriers to entry and 
competition for apps and API-based services that health care providers 
seek to use. Such activities are inconsistent with the goal of enabling 
API-based access, exchange, and use of EHI by patients and other 
stakeholders without special effort. As finalized, this general 
prohibition allows for three categories of permitted fees (Sec.  
170.404(a)(3)(ii) through (iv)) to allow Certified API Developers to 
recover their costs and to earn a reasonable return on their 
investments in providing certified API technology while being compliant 
with the Condition of Certification and Program requirements.
    Comments. Some commenters were critical of our proposals, 
expressing concerns that the proposed policies may stifle relationships 
between API Technology Suppliers and application developers. Others 
expressed concern that the proposed fee structure would place undue 
burden on API Data Providers, and that ONC should instead consider 
regulations that allow fee sharing across stakeholders. Some commenters 
stated that ONC should remove all prohibitions, and allow for market 
pricing and revenue sharing.
    Several commenters, many of whom were providers and provider 
organizations, requested additional clarity and guidance regarding the 
API fees that can be charged under the Condition of Certification 
requirements. Some commenters requested clarification regarding whether 
an API Data Provider can transfer costs to API Users. Other commenters 
requested clarification regarding when it is (and is not) appropriate 
for an API User to be charged a fee in connection with use of API 
technology. A few commenters requested that ONC provide a chart that 
lists all actors, all types of costs, and who can charge whom.
    Response. We appreciate this feedback from commenters. These 
``general conditions,'' as finalized in Sec.  170.404(a)(3)(i) and 
discussed above, will facilitate API-based access, exchange, and use of 
EHI by patients and other stakeholders without special effort. We 
disagree with commenters that the permitted fee policies will stifle 
relationships between Certified API Developers and API Users. 
Cumulatively, these final policies create guardrails to protect against 
anti-competitive practices and reinforce the independence that we 
believe API Information Sources should have to establish relationships 
with API Users. Furthermore, we believe these fee policies are 
necessary in light of the potential for Certified API Developers to use 
their market position and control over certified API technology to 
engage in discriminatory practices that create special effort and 
barriers to the use of certified API technology. We continue to receive 
evidence that some Certified API Developers are engaging in practices 
that create special effort for the use of certified API technology. 
These practices include fees that create barriers to entry or 
competition as well as rent-seeking and other opportunistic behaviors. 
For example, we have received feedback that some Certified API 
Developers are conditioning access to technical documentation on 
revenue sharing or royalty agreements that bear no plausible relation 
to the costs incurred by the Certified API Developer to provide or 
enable the use of certified API technology. We are also aware of 
discriminatory pricing policies that have the purpose or effect of 
excluding competitors from the use of APIs and other interoperability 
elements despite the fact that the API Information Source would like to 
partner with and use these competitive, best-of-breed services. These 
practices from Certified API Developers close off the market to 
innovative applications and services that could empower patients and 
enable providers to deliver greater value and choice to health care 
consumers and other service providers.
    We note that Certified API Developers and API Users have the 
ability to collaborate and form relationships, so long as these 
relationships do not conflict with any of the provisions of this final 
rule or other applicable Federal and State laws and regulations. 
Further, we clarify that while the permitted fees set the boundaries 
for the fees Certified API Developers are permitted to charge and to 
whom those permitted fees can be charged, they do not prohibit who may 
pay the Certified API Developer's permitted fee. In other words, these 
conditions limit the party from which a Certified API Developer may 
require payment, but they do not speak to who may pay the fee. For 
example, a permitted practice under these conditions could include a 
relationship or agreement where an API User or other party offered to 
pay the fee owed by the API Information Source to a Certified API 
Developer. This is an acceptable practice because the fee is first 
agreed upon between the Certified API Developer and API Information 
Source and subsequently paid by the API Information Source directly or 
by a third party on behalf of the API Information Source. We note that 
fees charged for ``value-added services'' can arise between an API 
Information Source and Certified API Developer or API User. As a 
general matter, we note that stakeholders should be mindful of other 
Federal and State laws and regulations that could prohibit or limit 
certain types of relationships involving remuneration.
    We provide additional clarity and guidance regarding the API fees 
that can be charged under the Condition of Certification requirements 
in the sections that follow. Additionally, we appreciate commenters' 
requests for clarification, including a chart of actors and costs. We 
will take this comment into consideration as we develop educational 
materials to help explain the permitted fees conditions finalized in 
Sec.  170.404(a)(3).
    Comments. Commenters suggested that one way to clarify the limits 
on API fees would be to require API Technology Suppliers provide fee 
information to ONC and for ONC to make this information publicly 
available, including information on individual pricing transactions.
    Response. We appreciate the recommendation from commenters to 
require Certified API Developers to provide fee information to ONC. We 
view fee transparency as a responsibility that a Certified API 
Developer can fulfill without having to send a listing of its API fees 
to ONC. We have finalized the provision in Sec.  170.404(a)(2)(ii) that 
a Certified API Developer must publish all terms and conditions for its 
certified API technology, including any fees. Specifically, we have 
finalized in Sec.  170.404(a)(2)(ii)(B) that any and all fees charged 
by a Certified API Developer for the use of its certified API 
technology must be described in detailed plain language, including the 
persons or classes of persons to whom the fee applies; the 
circumstances in which the fee applies; and the amount of the fee, 
which for variable fees must include the specific variable(s) and

[[Page 25753]]

methodology(ies) that will be used to calculate the fee.
(B) Certified API Developer Permitted Fees Conditions
    We proposed general conditions in Sec.  170.404(a)(3)(i)(B)(1) 
through (4) that an API Technology Supplier's permitted fees must 
satisfy in order for such fees to be expressly permitted.
    Comments. We received support for the general conditions for 
permitted fees from commenters. Some commenters expressed appreciation 
for the guardrails and transparency of the permitted fees. Under the 
first condition, commenters sought clarity on the nature and extent of 
some of the permissible fees an API Technology Supplier can charge and 
how to model such fees, specifically regarding the ``objective and 
verifiable'' criteria. Another commenter supported the second condition 
that fees must be reasonably related to API Technology Supplier's costs 
of supplying and, if applicable, supporting the API technology to the 
API Data Provider, especially in situations where physicians may also 
develop APIs or support apps.
    However, some commenters expressed concern with the third condition 
to reasonably allocate fees across all customers of the API. Commenters 
explained that fees could not be reasonably allocated across all 
customers of the API, because the number of customers will change over 
time. We received no comments on the fourth condition that API 
Technology Suppliers must ensure that fees are not based on whether the 
requestor or other person is a competitor who will be using the API 
technology in a way that facilitates competition. In addition to the 
general permitted fees proposed, some commenters recommended clear fee 
exemption for any health information provided or reported by a practice 
for the purpose of meeting reporting requirements.
    Response. We appreciate feedback from commenters. We have finalized 
these general conditions for permitted fees in Sec.  
170.404(a)(3)(i)(B) with some modifications as described further below. 
We have finalized that for all permitted fees, a Certified API 
Developer must: (1) Ensure that such fees are based on objective and 
verifiable criteria that are uniformly applied to all similarly 
situated API Information Sources and API Users; (2) Ensure that such 
fees imposed on API Information Sources are reasonably related to the 
Certified API Developer's costs of supplying certified API technology 
to, and if applicable, support certified API technology for, API 
Information Sources; (3) Ensure that such fees for supplying, and if 
applicable, supporting certified API technology are reasonably 
allocated among all similarly situated API Information Sources; and (4) 
Ensure that such fees are not based on whether API Information Sources 
or API Users are competitors, potential competitors, or will be using 
the certified API technology in a way that facilitates competition with 
the Certified API Developer. We have revised the term ``substantially 
similar'' to ``similarly situated'' in Sec.  170.404(a)(3)(i)(B)(1) for 
clarity and to align with changes made in Sec.  171.302. Additionally, 
in response to comments and to align with changes made in Sec.  171.302 
and Sec.  170.404(a)(3)(i)(B)(1), we have revised the term 
``substantially similar'' to ``similarly situated'' in Sec.  
170.404(a)(3)(i)(B)(3). We emphasize that this provision is meant to 
prevent one customer or a specific group of customers to whom the 
certified API technology is supplied or for whom it is supported from 
bearing an unreasonably high cost compared to other customers, which 
could lead to ``special effort'' for accessing and using APIs. We 
believe the final policy achieves the same goal as proposed and 
provides clearer guidelines for the regulated community to follow. 
Additionally, we have revised the phrase ``classes of persons and 
requests'' to ``API Information Sources and API Users'' in Sec.  
170.404(a)(3)(i)(B)(1) to clearly express the actors being charged fees 
by Certified API Developers. Additionally, we have revised the sentence 
structure and grammar in Sec.  170.404(a)(3)(i)(B)(2) through (4) for 
simplification.
    In response to comments requesting clarity on the nature and extent 
of permissible fees a Certified API Developer can charge and how a 
Certified API Developer should model such fees, specifically regarding 
the ``objective and verifiable'' requirement finalized in Sec.  
170.404(a)(3)(i)(B)(1), we emphasize that there will be significant 
variability in the fee models and specific fees charged by each 
Certified API Developer. Our goal with the requirement that fees be 
``objective and verifiable'' is to require Certified API Developers to 
apply fee criteria that, among other things, will lead the Certified 
API Developer to come to the same conclusion with respect to the 
permitted fee's amount each time it administers a fee to an API 
Information Source or API User. Accordingly, the fee cannot be based on 
the Certified API Developer's subjective judgment or discretion.
    Comments. A few commenters suggested that ONC allow API Data 
Providers the ability to recoup the costs for upgrading technology.
    Response. This comment appears to misunderstand the scope and 
applicability of ONC's authority with respect to these Condition of 
Certification requirements. We clarify that these Condition of 
Certification requirements apply only to Certified API Developers. We 
note that similar to any IT investment, API Information Sources (as 
``health care providers'') would generally be expected to recover these 
costs through fees administered while delivering health care services. 
Additionally, if an API Information Source were to recoup such costs 
they would need to do so consistent with the information blocking 
exceptions and other applicable laws and regulations.
    Comments. Some commenters requested that ONC conduct evaluations 
after the implementation of the rule and use the results to drive 
future policy. Some commenters recommended a study to evaluate the 
real-world cost of APIs used by health systems in areas such as 
clinical decision support, payments, machine learning, and precision 
medicine. Commenters also suggested ONC conduct a study on whether 
these regulations improve patient access to their EHI.
    Response. We appreciate the evaluation recommendations. We will 
consider these suggestions as we implement and administer the Program.
(C) Certified API Developer Prohibited Fees
    We proposed in 84 FR 7595 in Sec.  170.404(a)(3)(iii)(B) that 
permitted fees would not include costs associated with intangible 
assets (including depreciation or loss of value), except the actual 
development or acquisition costs of such assets. Additionally, we 
proposed in Sec.  170.404(a)(3)(iii)(C) that permitted fees would not 
include opportunity costs, except for the reasonable forward-looking 
cost of capital.
    Comments. We did not receive any comments specific to the proposal 
for costs associated with intangible assets other than actual 
development or acquisition costs of such assets.
    Response. We moved the proposed Sec.  170.404(a)(3)(iii)(B) and (C) 
to the general conditions for permitted fees finalized in Sec.  
170.404(a)(3)(i)(C)(1) and (2), respectively, because they are general 
conditions on permitted fees rather than conditions for ``Recovering 
API usage costs.'' We did not make

[[Page 25754]]

other changes to the proposed regulation text in these two sections 
other than updating terms to the finalized definitions in Sec.  
170.404(c).
    Additionally, in the discussion of the Fees Exception in this final 
rule (VIII.D.2.b), we discussed that one commenter expressed concern 
that the overlap between the Fees Exception and the Licensing Exception 
creates the potential for actors to recover the same costs twice. The 
commenter explained that licensing of IP is intended to recoup the 
costs of development of that IP, so where the IP is an interoperability 
element, the costs reasonably incurred for its development should be 
incorporated into the royalty rate. The commenter recommended that we 
be clearer that, in these circumstances, only a single recovery is 
permitted. In order to address this comment and align the API permitted 
fees with related provisions finalized in the Fees Exception (Sec.  
170.302(a)(2)(vi)) and Licensing Exception (Sec.  170.303(b)(2)(iv)), 
we have added and finalized Sec.  170.404(a)(3)(i)(C)(3), which states 
that the permitted fees in this section cannot include any costs that 
that led to the creation of IP if the actor charged a royalty for that 
IP pursuant to Sec.  170.303 and that royalty included the development 
costs for the creation of the IP. We refer readers to the ``Basis for 
Fees Condition'' sub-section within section VIII.D.2.b for a more 
detailed discussion of the rationale for this addition.
(i) General Examples of Prohibited Fees
    As discussed in the Proposed Rule in 84 FR 7481 and finalized in 
Sec.  170.404(a)(3)(i)(A), any API-related fee imposed by a Certified 
API Developer that is not expressly permitted is prohibited. In the 
Proposed Rule, we provided the following non-exhaustive examples of 
fees for services that Certified API Developers would be prohibited 
from charging, and reiterate them here in the final rule for clarity:
    (1) Any fee for access to the documentation that a Certified API 
Developer is required to publish or make available under this Condition 
of Certification requirement.
    (2) Any fee for access to other types of documentation or 
information that a software developer may reasonably require to make 
effective use of certified API technology for any legally permissible 
purpose.
    (3) Any fee in connection with any services that would be essential 
to a developer or other person's ability to develop and commercially 
distribute production-ready applications that use certified API 
technology. These services could include, for example, access to ``test 
environments'' and other resources that an application developer would 
need to efficiently design and develop apps. The services could also 
include access to distribution channels if they are necessary to deploy 
production-ready software and to production resources, such as the 
information needed to connect to certified API technology (e.g., 
service base URLs) or the ability to dynamically register with an 
authorization server.
    Comments. At least one commenter expressed concern about the open-
ended nature of the examples of prohibited fees we provided in the 
Proposed Rule. In particular, that any fee in connection with any 
services that would be essential to a developer or other person's 
ability to develop and commercially distribute production-ready 
applications that use API technology would be prohibited. They stated 
that if the example were not more clearly defined and scoped, it could 
be used by API Users to create requirements for API Technology 
Suppliers beyond what would normally be considered necessary to 
successfully deploy apps in production. They requested ONC more clearly 
define ``essential services'' in final rulemaking or withdraw the 
reference.
    Response. We appreciate the feedback from commenters. We disagree 
with commenters that the examples are too broad. We believe that in 
some cases they need to be general because of the diverse and varied 
practices that could be used by Certified API Developers to create 
special effort to use certified API technology. While we understand 
that the generality of the example regarding ``essential services'' may 
at first appear difficult for Certified API Developers to follow and, 
per the commenter, could be creatively used by an API User to request 
more support than necessary, we offer the following as additional 
guidance: A Certified API Developer is best positioned to know what an 
API User, for example, needs to have access to and do programmatically 
in order for the API User's application to be developed and 
commercially distributed as production-ready for use with certified API 
technology. From a Certified API Developer's perspective, if that 
requires any number of mandatory steps (e.g., passing tests in sandbox/
test environment, conducting a demo, submitting documentation or 
paperwork) in order for the application to be production-ready for use 
with certified API technology, then fees associated with those 
mandatory steps are prohibited. Conversely, fees for requirements 
beyond what a Certified API Developer considers necessary to 
successfully deploy applications in production are considered 
supplemental to the development, testing, and deployment of software 
applications that interact with certified API technology, and are 
permitted fees for value added services as finalized in Sec.  
170.404(a)(3)(iv).
(D) Record-Keeping Requirements
    We proposed in Sec.  170.404(a)(3)(v) that API Technology Suppliers 
must keep for inspection detailed records of all API technology fees 
charged, all costs incurred to provide API technology to API Data 
Providers, methodologies used to calculate such fees, and the specific 
costs to which such fees are attributed. We requested comment in 84 FR 
7492 on whether these requirements provide adequate traceability and 
accountability for costs permitted under this API Condition of 
Certification and whether to require more detailed accounting records 
or prescribe specific accounting standards.
    Comments. A majority of commenters expressed concerns with the 
level of granularity proposed for record keeping in Sec.  
170.404(a)(3)(v). These commenters stated that the required 
recordkeeping would exceed documentation performed for any other 
purpose. Some commenters stated that the requirement for health IT 
developers to track who pays fees and how fees enter the system will 
cause significant administrative burden, especially on smaller vendors 
or vendors with business models that require less operational overhead. 
Additionally, they stated that the requirement for clients to maintain 
and potentially publicly disclose records of fees for inspection would 
place a burden on IT providers, and could potentially allow bigger 
companies to engage in practices such as predatory pricing. Commenters 
suggested ONC have a more scaled-back method, and simply allow patients 
the ability to access their EHI without charge. These commenters 
recommended focusing on a good conduct approach rather than 
prescriptive requirements.
    Response. We thank commenters for their feedback and perspective. 
We moved Sec.  170.404(a)(3)(v) to 170.404(a)(3)(i)(D) for better 
organization because this provision applies to the permitted fee 
Condition of Certification requirements finalized in Sec.  
170.404(a)(3)(ii) through (iii). We have finalized in Sec.  
170.404(a)(3)(i)(D) that Certified API Developers must keep detailed 
records for inspection of all fees charged, all costs incurred to 
provide certified API technology to API Information Sources, 
methodologies

[[Page 25755]]

used to calculate such fees, and the specific costs to which fees are 
attributed. Considering the feedback on perceived burden, we believe 
transparency and documentation of API fees is necessary to mitigate 
unfair pricing practices that may stifle innovation or otherwise create 
barriers to the goals of enabling API-based access, exchange, and use 
of EHI without special effort. Further, we believe that the accounting 
practices already used by health IT developers will largely support the 
health IT developer to meet this requirement. Examples of these 
practices by health IT developers include the methods used to track 
their own investments, determine how to bill and issue invoices to 
their customers, document receipt of payment, and to maintain overall 
accurate financial records of business transactions. We find it 
difficult to believe, as some commenters appeared to indicate, that 
health IT developers are not already keeping such financial records and 
that this requirement would create substantial new documentation burden 
for Certified API Developers. The record-keeping requirements finalized 
in 170.404(a)(3)(i)(D) foster transparency and promote accountability 
in the Program. In response to the comments received, we have not added 
additional requirements for accounting records or standards.
(E) Permitted Fee for Development, Deployment, and Upgrades
    We proposed in Sec.  170.404(a)(3)(ii) to permit an API Technology 
Supplier to charge API Data Providers reasonable fees for developing, 
deploying, and upgrading Health IT Modules certified to Sec.  
170.315(g)(7) through (g)(11).
    Comments. Many commenters applauded the permitted fee related to 
development, deployment, and upgrading API technology. The majority 
supported the proposal that fees would not be permitted if they 
interfere with an API User's ability to efficiently and effectively 
develop and deploy production-ready software. A few commenters 
expressed concern that our proposals regarding development, deployment, 
and upgrade fees were not restrictive enough. Commenters noted that API 
Technology Suppliers will use the allowable fees, such as for program 
upgrades, as a barrier to providing interoperability between systems or 
other applications and a means to eliminate competitive threats. Some 
of these commenters recommended that ONC explicitly prohibit API 
Technology Suppliers from charging any fees for implementing APIs and 
for facilitating the interoperable exchange of EHI and that this 
blanket prohibition apply to all new and updated API technology. A few 
commenters noted that it is possible that API Technology Suppliers will 
bundle or upcharge service fees to recoup API technology development 
costs and API Technology Suppliers should not be allowed to charge 
costs for development or impose surcharges for product feature 
development. They noted that product feature development should be 
considered a cost of doing business and can be amortized as a one-time 
capital expense across the vendor's entire customer base without the 
need for recovering costs from API Users. They emphasized that API 
access and use prices need to be transparent as the intent of Congress 
was to have APIs be made easily available and at no or low cost, not to 
be a source of revenue for profit. Other commenters noted that the 
development of the APIs themselves should be regarded as part of the 
license fee and the API Technology Suppliers should not be permitted to 
charge an additional license fee to either the API Data Provider or API 
User for what is an inherent part of the software. Another commenter 
requested that consideration be applied toward potential additional 
hidden integration fees.
    Response. We appreciate the support, concerns, and recommendations 
from commenters. We finalized this proposal in Sec.  170.404(a)(3)(ii) 
as proposed with updated terms based on the revised finalized 
definitions in Sec.  170.404(c). We refer to the discussions below and 
84 FR 7488 for additional details on what Certified API Developer fees 
for ``developing,'' ``deploying,'' and ``upgrading'' certified API 
technology comprise. We also note that the nature of the costs charged 
under this category of permitted fees depends on the scope of the work 
to be undertaken by a Certified API Developer (i.e., how much or how 
little labor an API Information Source requires of the Certified API 
Developer to deploy and upgrade the certified API technology).
    We sincerely thank commenters for the various recommendations to 
prohibit or restrict fees regarding certified API technology. In order 
to reconcile the recommendations specific to Sec.  170.404(a)(3)(ii) 
and other conditions in this final rule, we have aligned related 
conditions to address concerns and mitigate potential fee practices 
that could limit API-based access, exchange, and use of EHI by patients 
and other stakeholders without special effort. As finalized, we believe 
the fees permitted in Sec.  170.404(a)(3)(ii) and Sec.  
170.404(a)(3)(i)(B), transparency requirements in Sec.  170.404(a)(2), 
and openness and pro-competitive conditions in Sec.  170.404(a)(4) will 
ensure that fees permitted for upgrade costs will not be used as a 
barrier to providing interoperability between systems or other 
applications, or as a means to eliminate competitive threats. 
Additionally, the transparency requirements regarding the publication 
of fees finalized in Sec.  170.404(a)(2)(ii)(B) will help prevent 
hidden integration fees cited by commenters.
    We thank commenters for recommending and noting that development of 
the APIs themselves should be regarded as part of a license fee and 
that Certified API Developers should not be permitted to charge an 
additional license fee for what is an inherent part of the software. In 
response to this recommendation, we have added a provision in Sec.  
170.404(a)(3)(i)(C)(3) that states that permitted fees in Sec.  
170.404(a)(3)(ii) through (iv) may not include any costs that led to 
the creation of IP, if the actor charged a royalty for that IP pursuant 
to the information blocking Licensing Exception (Sec.  171.303). This 
provision aligns with similar provisions included in the information 
blocking section and will ensure that Certified API Developers cannot 
earn a double recovery in instances described by the commenter.
    We will continue to work with stakeholders to advance policies that 
promote interoperability and deter practices that may stifle innovation 
or present barriers to the access, exchange, and use of EHI through 
APIs. Subject to the general conditions in Sec.  170.404(a)(3)(i), our 
final policies support the ability of Certified API Developers to 
recover the full range of reasonable costs associated with developing, 
deploying, and upgrading API technology over time. It is important that 
Certified API Developers be able to recover these costs and earn a 
reasonable return on their investments so that they have adequate 
incentives to make continued investments in these technologies. In 
particular, we anticipate Certified API Developers will need to 
continually expand the data elements and upgrade the capabilities 
associated with certified APIs as the USCDI and HL7[supreg] 
FHIR[supreg] standard and associated implementation specifications 
mature. We refer readers to the information blocking section of this 
preamble (VIII) for additional information on activities that may 
constitute information blocking and for discussion about how the fees 
provisions in this Condition of Certification and within the 
information blocking section support innovation.

[[Page 25756]]

    Comments. Some developers expressed concern regarding balancing and 
distributing costs with regard to the permitted fee for developing, 
deploying, and upgrading technology. The commenters noted ONC proposed 
that the cost for development be distributed among those who will use 
it, which they felt was problematic in many ways, but most 
fundamentally because it suggests a serious misconception about how 
software development is funded, priced, and sold. The commenters 
emphasized that requiring development costs to be divided among clients 
purchasing the API necessitates new and complex business processes and 
creates unsolvable scenarios that could easily create business 
conflicts between API Technology Suppliers and their clients. At least 
one commenter suggested that ONC should consider balancing the costs 
associated with API development and deployment across both API Data 
Providers and certain API Users to ensure that third-party software 
application developers also bear some of the financial burden, since 
they stand to generate revenue from the use of their apps. Commenters 
asked ONC clarify why it believes it is inappropriate to pass 
development, deployment, and upgrade costs on to API Users. Other 
commenters noted that the costs for updating information systems and 
Health IT Modules to the new standards and requirements should not be 
passed on to physicians and patients.
    Response. We appreciate the feedback from commenters. We proposed 
and finalized this permitted fee for development, deployment, and 
upgrade costs because we believe that these costs should be negotiated 
solely between the Certified API Developer that supplies the 
capabilities and the API Information Source that implements them in 
their production environment. In our view, it is inappropriate for 
Certified API Developers to go around the API Information Source to 
directly impose financial cost burdens on API Users for the benefit of 
working with or connecting to the API Information Source. Based on our 
experience, the practice of a Certified API Developer going around its 
customer (the API Information Source) to also charge API Users erodes 
an API Information Source's choice and the independence of their 
relationship with API Users. As such, that kind of business practice 
would be something that we would consider creating special effort on 
the part of the API Users if they had to continue to face additional 
fees just for permission to work with or connect to an API Information 
Source's certified API technology.
    While the development, deployment, and upgrade permitted fee is 
limited between the Certified API Developer and API Information Source 
as a way to recoup a Certified API Developer's costs to supply 
certified API technology to a particular API Information Source, we 
again reiterate that the value added services permitted fee providers 
Certified API Developers a wide range of options to make additional 
revenue related to their certified API technology.
    Should API Users stand to generate revenue from the use of their 
apps, any fee an API Information Source may impose would not be in 
scope for this Condition of Certification but would be likely be 
covered by information blocking. Accordingly, we emphasize that such 
stakeholders should take care to ensure they are compliant with other 
Federal and State laws and regulations that may prohibit or limit 
certain types of relationships involving remuneration.
    In response to comments suggesting that costs for updating 
information systems and Health IT Modules to the new standards and 
requirements would be passed on to physicians and patients, we 
disagree. We emphasize that most of the information contained in a 
patient's electronic record has been documented during the practice of 
medicine or has otherwise been captured in the course of providing 
health care services to patients. In our view, patients have 
effectively paid for this information, either directly or through their 
employers, health plans, and other entities that negotiate and purchase 
health care items and services on their behalf, and should be able to 
access the information via certified API technology without fees.
    Comments. Some developers suggested that API Technology Suppliers 
should be able to charge fees for access to a test environment and 
requested clarification as to whether an API Technology Supplier can 
charge for the use of sandboxes by API Users.
    Response. We appreciate the feedback from commenters. As detailed 
in the ``General Examples of Prohibited Fees'' section of the preamble 
text and included in the general prohibition finalized in Sec.  
170.404(a)(3)(i)(A), Certified API Developers are prohibited from 
charging fees in connection with any services essential to a developer 
or other person's ability to develop and commercially distribute 
production-ready applications for use with certified API technology. In 
general, if a test environment or sandbox is required to be used by a 
Certified API Developer and is essential for an application to be 
developed in order to be considered production-ready by the Certified 
API Developer for use with its certified API technology, then fees 
associated with that kind of test environment would be prohibited as 
they would impose special effort. However, we note that this 
prohibition is not globally applicable. If instead, the purpose of the 
testing environment was to provide specific testing above-and-beyond 
production-readiness for use with certified API technology, then fees 
could be charged for such testing as part of the value-added services 
permitted fee.
    Comments. A few commenters requested guidance on how ONC expects 
API Technology Suppliers to account for the costs incurred to develop, 
deploy, and upgrade the API technology, which is part of, and not 
necessarily separable from, the broader EHR product. Several commenters 
opposed the prohibition against charging for work to upgrade the 
broader EHR product, expressing that this is essential work needed to 
modernize their solutions as broader technologies evolve. One commenter 
noted that the Proposed Rule does not set specific guidelines on what 
constitutes an upgrade or how much the fee could be, and it is the 
commenter's experience that EHR systems often charge fees for such 
services as integrating with a clinical data registry or using outside 
or non-preferred software.
    Response. We thank stakeholders for their comments. While we 
understand that there is overlap between features of the certified API 
technology and the ``broader EHR product,'' we refer specifically to 
development, deployment, and upgrades made to ``certified API 
technology'' as defined in Sec.  170.404(c). Namely, development, 
deployment, and upgrades made to the capabilities of certified Health 
IT Modules that fulfill the API-focused certification criteria adopted 
at Sec.  170.315(g)(7) through (10). In response to commenters 
concerned that EHR developers often charge fees for services such as 
integrating with a clinical data registry or using outside or non-
preferred software, we note that, as described in Sec.  
170.404(a)(3)(i)(A), Certified API Developers are prohibited from 
imposing fees associated with certified API technology unless included 
as a permitted fee in Sec.  170.404(a)(3)(ii) through (iv). We do not 
include specific price information for permitted fees to develop, 
deploy, or upgrade API technology, because these costs are subject to 
change over time with new technology and varying development, 
deployment, and upgrade

[[Page 25757]]

efforts. Instead, we allow Certified API Developers to recover their 
costs (including costs that result in a reasonable profit margin for 
permitted fees in Sec.  170.404(a)(3)(ii) and Sec.  170.404(a)(3)(iv)) 
in providing certified API technology while being compliant with the 
Condition and Maintenance of Certification and Program requirements. We 
include descriptions of fees for developing, deploying, and upgrading 
API technology in the sections that follow, in which we offer 
additional clarity, as discussed in the Proposed Rule at 84 FR 7488, on 
the fees for developing, deploying, and updating API technology.
(i) Fees for Developing Certified API Technology
    Fees for ``developing'' certified API technology comprise the 
Certified API Developer's costs of designing, developing, and testing 
certified API technology. In keeping with our discussion at 84 FR 7488, 
fees for developing certified API technology must not include the 
Certified API Developer's costs of updating the non-API related 
capabilities of the Certified API Developer's existing Health IT 
Modules, including its databases, as part of its development of the 
certified API technology. As we further discussed in 84 FR 7488 in our 
Proposed Rule, these costs are connected to past business decisions 
made by the Certified API Developer and typically arise due to Health 
IT Modules being designed or implemented in nonstandard ways that 
unnecessarily increase the complexity, difficulty or burden of 
accessing, exchanging, or using EHI. The recovery of costs associated 
with updating a Certified API Developer's non-API related Health IT 
Modules capabilities would be inconsistent with the Cures Act 
requirement that API technology be deployed ``without special effort.''
(ii) Fees for Deploying Certified API Technology
    Certified API Developer's fees for ``deploying'' certified API 
technology comprise the Certified API Developer's costs of 
operationalizing certified API technology in a production environment. 
Such fees include, but are not limited to, standing up hosting 
infrastructure, software installation and configuration, and the 
creation and maintenance of API Information Source administrative 
functions. We discussed in our Proposed Rule that a Certified API 
Developer's fees for ``deploying'' certified API technology does not 
include the costs associated with managing the traffic of API calls 
that are used to access the certified API technology, which a Certified 
API Developer can only recover under the permitted fee for usage 
support costs (Sec.  170.404(a)(3)(iii)). We emphasize that for the 
purpose of this Condition of Certification, we consider that certified 
API technology is ``deployed'' by the customer--the API Information 
Source--that purchased or licensed it.
(iii) Fees for Upgrading Certified API Technology
    The Certified API Developer's fees for ``upgrading'' certified API 
technology comprise the Certified API Developer's costs of supplying an 
API Information Source with an updated version of certified API 
technology. Such costs would include the costs required to bring 
certified API technology into conformity with new requirements of the 
Program, upgrades to implement general software updates (not otherwise 
covered by development fees or under warranty), or developing and 
releasing newer versions of the certified API technology at the request 
of an API Information Source. The nature of the costs that can be 
charged under this category of permitted fees depends on the scope of 
the work undertaken by a Certified API Developer (i.e., how much or how 
little labor an API Information Source requires of the Certified API 
Developer to upgrade the certified API technology being supplied from 
one version or set of functions to the next).
(F) Permitted Fee to Recover Costs of Supporting API Usage
    We proposed in 84 FR 7489 in Sec.  170.404(a)(3)(iii) to permit an 
API Technology Supplier to charge API usage-based fees to API Data 
Providers to recover the API Technology Supplier's reasonable 
incremental costs for purposes other than facilitating the access, 
exchange, or use of EHI by patients or their applications, 
technologies, or services. We considered ``usage-based'' fees to be the 
fees imposed by an API Technology Supplier to recover the costs that 
would typically be incurred supporting API interactions at increasing 
volumes and scale within established service levels. Additionally, in 
84 FR 7489 under Sec.  170.404(a)(3)(iii), we proposed that any usage-
based fees associated with API technology be limited to the recovery of 
the API Technology Supplier's ``incremental costs.'' Additionally, we 
proposed in Sec.  170.404(a)(3)(iii)(A) that the permitted fee would 
not include any costs incurred by the API Technology Supplier to 
support uses of the API technology that facilitate a patient's ability 
to access, exchange, or use their EHI. Finally, we proposed in Sec.  
170.404(a)(3)(iii)(B)-(C) restrictions for permitted fees that were 
moved to the general permitted fees section finalized in Sec.  
170.404(a)(3)(i)(C).
    Comments. Commenters generally supported our proposal to permit an 
API Technology Suppliers to charge usage-based fees to API Data 
Providers to the extent that the API technology is used for purposes 
other than facilitating the access, exchange, or use of EHI by patients 
or their applications, technologies, or services.
    Response. We appreciate support from commenters and have finalized 
this proposal in Sec.  170.404(a)(3)(iii) with some modification. We 
amended the title of the regulation text for clarity in Sec.  
170.404(a)(3)(iii) to ``Permitted fee--Recovering API usage costs.'' 
Additionally, we amended the regulation text to focus on usage-based 
fees and Certified API Developer's reasonable incremental costs. We did 
not finalize the specific prohibition on permitted fees proposed in 
Sec.  170.404(a)(3)(iii)(A) that the ``permitted fee does not include 
costs incurred by the API Technology Supplier to support uses of the 
API technology that facilitate a patient's ability to access, exchange, 
or use electronic health information.'' We did not finalize this aspect 
of the provision because upon further consideration of this cost and 
the fee prohibition included in information blocking related to patient 
access, we determined that these fees remain necessary in order to 
allow Certified API Developers to recover incremental costs reasonably 
incurred during the process of hosting certified API technology on 
behalf of the API Information Source. We reiterate that a Certified API 
Developer's ``incremental costs'' comprise the Certified API 
Developer's costs that are directly attributable to supporting API 
interactions at increasing volumes and scale within established service 
levels. A Certified API Developer should ``price'' its costs of 
supporting access to the certified API technology by reference to the 
additional costs that the Certified API Developer would incur in 
supporting certain volumes of API use. For comments and responses 
related to the proposed provisions in Sec.  170.404(a)(3)(iii)(B) and 
(C), we refer readers to the header ``Certified API Developer 
Prohibited Fees.''
    Comments. We received a few comments focused on volume thresholds 
and incremental costs. A few commenters supported a reasonable cap for 
API call fees. Several recommended changing the parameters around API 
usage-based fees to focus on volume

[[Page 25758]]

thresholds being included in any contractual language related to these 
fees, to ensure that any incremental costs attributable to supporting 
API interactions at increasing volumes and scale are addressed 
appropriately. Commenters noted that if an API Technology Supplier is 
receiving fees to develop, deploy, and upgrade API technology, it is 
unlikely that they would also need to charge for usage of the APIs, as 
long as their usage remains under a pre-determined volume threshold. A 
few commenters noted that the volume of requests that will be pinging 
APIs may compromise the performance of data retrieval and effective 
user experience. In order to protect against denial of service attacks 
whether intentional or inadvertent, they stated ONC should consider an 
additional throttling or rate-limiting layer or capability onto the API 
in order for the API to accept and digest the data being entered or 
extracted. A few commenters noted that our proposal could create 
loopholes that would enable certain organizations to charge highly 
burdensome, excessive fees to clinical registries to access their data.
    A few commenters expressed concern that this proposal is not 
restrictive enough. Some commenters requested that ONC provide more 
definitive guidance, including a range of prices based on examples from 
the current marketplace, to ensure providers are not charged 
unreasonable fees by API Technology Suppliers and can reasonably charge 
API Users for the cost of accessing their API technology.
    Response. We appreciate the feedback from commenters. This 
Condition of Certification requirement offers the flexibility necessary 
to accommodate reasonable pricing methodologies and will allow 
Certified API Developers to explore innovative approaches to recovering 
the costs associated with supporting the use of certified API 
technology with a permitted fee. As described in the Proposed Rule (84 
FR 7489), ``usage-based'' fees are fees imposed by a Certified API 
Developer to recover costs typically incurred for supporting API 
interactions at increasing volumes and scale within established service 
levels. That is, ``usage-based'' fees recover costs incurred by a 
Certified API Developer due to the actual use of the certified API 
technology once it has been deployed (e.g., costs to support a higher 
volume of traffic, data, or number of apps via the certified API 
technology). Certified API Developers can adopt a range of pricing 
methodologies when charging for the support of API usage. We appreciate 
commenters' request to establish a reasonable cap for API usage-based 
fees, but the focus of our policy is to identify usage fees as a type 
of permitted fee and not to dictate a singular fee model, which we 
believe could limit Certified API Developers ability to create 
innovative fee models that serve to benefit themselves and API 
Information Sources. We decline to include a price cap for API usage-
based fees or a range of prices for API fees based on examples from the 
current marketplace because we anticipate the cost of technology will 
change over time and so too will the way in which usage costs are 
calculated. Additionally, while we understand and expect that Certified 
API Developers and API Information Sources will deploy particular 
security methods to mitigate the risk of denial of service attacks and 
other impacts on API availability, these types of technology layers are 
separate from the focus of our policy on permitted API usage fees.
    Comments. Several commenters requested that ONC further clarify 
that API Technology Suppliers should not attempt to charge different 
fees for different API transactions as they frequently do today.
    Response. We appreciate this information and feedback from 
commenters. We clarify that Certified API Developers are permitted to 
charge ``usage-based'' fees to recover the costs that would typically 
be incurred supporting API transactions at increasing volumes and scale 
within established service levels. To clarify, usage-based fees recover 
costs incurred by a Certified API Developer related to the actual use 
of certified API technology once it has been deployed (e.g., costs to 
support a higher volume of traffic, data, or number of apps via the API 
Technology). We acknowledge that Certified API Developers could adopt a 
range of pricing methodologies when charging for the support of API 
usage, including potentially charging higher prices for some API 
transactions that incur relatively higher costs than others. However, 
in combination with this flexibility, Certified API Developers will 
still need to be mindful of not violating any overarching information 
blocking policies. We refer readers to a discussion in the Proposed 
Rule in 84 FR 7489 for additional discussions on usage-based fees.
    Comments. Some commenters emphasized that it is unreasonable to 
presume that API User-driven data overages should be the responsibility 
of the API Data Provider. While other commenters expressed concern that 
our proposal will leave providers, who are mandated to use certified 
EHRs that include API technology and provide patients with access to 
data via those APIs, responsible for a variety of unwarranted costs 
with little recourse to recover those costs.
    Response. While we understand the perspective from which these 
concerns arise, especially regarding unpredictable overuse of certified 
API technology, an API Information Source has financial responsibility 
for its overall technology infrastructure. This accountability is no 
different for certified API technology than it is for non-certified 
APIs and other interfaces that may also create costs for the API 
Information Source (i.e., health care provider). Given that API Users 
can also include an API Information Source's own employees/internal 
tools and 3rd party partners' tools, an API Information Source is best 
positioned and generally accountable for its financial commitments. 
Again, as noted above, we do not limit who may pay for the charges an 
API Information Source incurs. An API Information Source should have 
full knowledge and ability to assess what employees, internal 
applications, and 3rd party services it has granted access to use and 
interact with its certified API technology. With respect to potential 
overages as a result of patient access, as we have stated before, we 
believe patients have effectively paid for this information, either 
directly or through their employers, health plans, and other entities 
that negotiate and purchase health care items and services on their 
behalf, and believe they should not be charged.
    Additionally, as stated in the Proposed Rule (84 FR 7489) and 
finalized here, usage fees for certified API technology will only apply 
when the Certified API Developer acts on behalf of the API Information 
Source to deploy its certified API technology. In scenarios where the 
API Information Source, such as a large hospital system, assumes full 
responsibility for the technical infrastructure necessary to deploy and 
host the certified API technology it has acquired, the volume and scale 
of its usage would be the API Information Source's sole responsibility, 
and a Certified API Developer would not be permitted to charge usage-
based fees. Instead, the Certified API Developer would be limited to 
charge fees under the ``development, deployment, upgrade'' permitted 
fee in Sec.  170.404(a)(3)(ii). Additionally, the costs recovered under 
``usage-based'' fees can only reflect ``post-deployment'' costs. As 
such, ``usage-based'' fees cannot include any costs necessary to 
prepare and ``get the certified API technology up, running, and ready 
for use,'' which are costs that must be

[[Page 25759]]

recovered as part of the deployment services delivered by the Certified 
API Developer if permitted under Sec.  170.404(a)(3)(ii).
    Comments. Several commenters supported ONC's efforts to bolster 
patient access, noting that the capacity to offer a patient's access to 
all elements of their electronic medical record, through an API, 
without cost, is well-supported in the Proposed Rule. One commenter 
noted that the proposed provisions regarding fees supports uses of the 
API technology that facilitate a patient's ability to access, exchange, 
or use their EHI. The commenters noted that the clear language in the 
Proposed Rule will prevent any potential confusion or friction in the 
future.
    A few commenters expressed concern that application developers will 
attempt to leverage the patient access fee limitations by claiming to 
be patient facing. One commenter suggested that the proposed fee 
limitations regarding patient access applied only with respect to fees 
API Technology Providers impose on API Data Providers, should also 
apply to fees charged to consumer-facing application developers who in 
the past have been charged high fees by CEHRT developers. One commenter 
recommended making it clear that provider organizations and health IT 
developers cannot charge patients, or the apps that they use, for using 
patient-facing APIs. At least one commenter requested that ONC clarify 
that permitted usage-based fees do not apply to patients or patient 
designees.
    Response. We thank commenters for their support for restricting 
API-related fees. As noted above, we have reconfigured the permitted 
fee for usage costs in response to public comments and our assessment 
of the intersection of API permitted fees policies and information 
blocking policies. We have finalized an approach that permits Certified 
API Developers to recover incremental usage costs reasonably incurred 
during the process of hosting certified API technology on behalf of an 
API Information Source, which could include fees to the API Information 
Source for providing and supporting patient access. However, the 
Certified API Developers and API Information Sources cannot recover 
these costs from patients or the developers of applications that 
facilitate access to and receipt of patients' EHI. Patients have 
already effectively paid for their EHI, either directly or through 
their employers, health plans, and other entities that negotiate and 
purchase health care items and services on their behalf. We refer 
readers to the Fees Exception in the information blocking section of 
this final rule in VII.D.2.b, which applies to health IT developers and 
a broader set of actors than these Condition and Maintenance of 
Certification requirements, for a discussion of the restrictions on 
charging patients for access to their EHI.
    Comments. Several commenters requested that ONC provide further 
guidance on the types of costs that a developer could charge to permit 
API Data Suppliers to offer population-level queries to API Users. They 
requested ONC clarify that such usages fees must relate to the costs 
associated with actual hardware (e.g., server space) needed to support 
the increased volume of queries for non-patients and not the cost of 
implementing the population-level query functionality itself.
    Response. We clarify that API usage fees related to API ``read'' 
services for multiple patients would be calculated using a similar 
methodology to calculate API usage fees related to API ``read'' 
services for single patients. These ``usage-based'' fees are fees 
imposed by a Certified API Developer to recover the costs typically 
incurred to support API interactions for API ``read'' services for 
multiple patients once these services have been deployed. This could 
include, but not be limited to, costs to support a higher volume of 
traffic, data, or number of apps via the certified API technology 
(which could include higher costs for hardware, including server 
space). We appreciate the recommendation from commenters; however, we 
have not prescribed the centralization of all of this content.
    Comments. Some commenters suggested that API Technology Suppliers 
publish their fees on the same website as their API documentation so 
there is full transparency and an API Data Supplier and API User can 
easily understand costs before embarking upon development.
    Response. We appreciate the recommendation and support from 
commenters. As finalized under Sec.  170.404(a)(2)(ii)(B), a Certified 
API Developer must publish all terms and conditions for its certified 
API technology, including any fees. Any and all fees charged by a 
Certified API Developer for the use of its certified API technology 
must be described in detailed, plain language, including the persons or 
classes of persons to whom the fee applies; the circumstances in which 
the fee applies; and the amount of the fee, which for variable fees 
must include the specific variable(s) and methodology(ies) that will be 
used to calculate the fee.
    Comments. Some commenters stated that usage-based fees may not be 
appropriate. They stated that, in the case of TEFCA, HIEs and providers 
must be responsive to inbound requests to broadcast data and should not 
be charged a fee for responding to such requests. They explained that 
such an arrangement could be used maliciously between market 
participants seeking to increase the operational expenses of their 
competitors.
    Response. We appreciate this comment, but we continue to believe 
that that usage-based fees should be permitted subject to the 
conditions described in Sec.  170.404(a)(3)(iii). We have addressed 
commenter's concern regarding potential anticompetitive behavior 
through the final provisions in Sec.  170.404(a)(3)(i)(B). 
Specifically, in Sec.  170.404(a)(3)(i)(B)(1), a Certified API 
Developer must ensure that fees are based on objective and verifiable 
criteria that are uniformly applied for all similarly situated classes 
of persons and requests. In addition, under Sec.  
170.404(a)(3)(i)(B)(4), a Certified API Developer must ensure that fees 
are not based in any part on whether the requestor or other person is a 
competitor, potential competitor, or will be using the certified API 
technology in a way that facilitates competition with the Certified API 
Developer.
    Comments. Several commenters expressed concern about incremental 
costs that can be recovered by actors supporting the use of APIs for 
purposes other than patient access. They requested ONC clarify that 
recovery of incremental costs for these other purposes should not be 
allowed, because they believed the incremental costs do not add any 
efficiency to the health care system, do not benefit patients, and do 
not serve any other procompetitive purpose.
    Response. We appreciate these comments, but continue to believe 
that ``incremental costs'' should be allowed. A Certified API 
Developer's ``incremental costs'' comprise the Certified API 
Developer's costs that are directly attributable to supporting API 
interactions at increasing volumes and scale within established service 
levels. We believe a Certified API Developer should ``price'' its costs 
of supporting access to the certified API technology by reference to 
the additional costs that the Certified API Developer would incur in 
supporting certain volumes of API use. In practice, we expect that this 
means that a Certified API Developer will offer a certain number of 
``free'' API calls based on the fact that, up to a certain threshold, 
the Certified API Developer will not incur any material costs in 
supporting certified API technology in addition to the costs recovered 
for

[[Page 25760]]

deployment services. However, after this threshold is exceeded, we 
expect that the Certified API Developer will impose usage-based costs 
commensurate to the additional costs that the Certified API Developer 
must incur to support certified API technology use at increasing 
volumes and scale.
    We expect that Certified API Developers will charge fees that are 
correlated to the incremental rising of costs required to meet 
increased demand. For example, if, at a certain volume of API calls, 
the Certified API Developer needed to deploy additional server 
capacity, the associated incremental cost of bringing an additional 
server online could be passed on to the API Information Source because 
the certified API technology deployed on behalf of the API Information 
Source was the subject of the higher usage. In this example, up until 
the point that the threshold is reached, the additional server capacity 
is not required, so the Certified API Developer would not be permitted 
to recover the costs associated with it. Moreover, the additional 
server capacity would support ongoing demand up to a certain additional 
volume, so the Certified API Developer would not be permitted to 
recover the costs of further additional server capacity until the 
existing capacity was exhausted.
(G) Permitted Fee for Value-Added Services
    We proposed in 84 FR 7490 and 7491 in Sec.  170.404(a)(3)(iv) to 
permit an API Technology Supplier to charge fees to API Users for 
value-added services supplied in connection with software that can 
interact with the API technology. We also clarified in 84 FR 7491 that 
a fee will only be permitted if it relates to a service that an API 
User, such as a software developer, can elect to purchase, but is not 
required to purchase in order to develop and deploy production-ready 
apps for API technology.
    Comments. Several commenters supported our proposal to permit an 
API Technology Supplier to charge fees to API Users for value-added 
services supplied in connection with software that can interact with 
certified API technology. Some commenters requested certain 
clarifications regarding our proposal. One commenter requested that we 
clarify within the discussion of value-added services, that references 
to ``app stores'' and ``listing processes'' for software applications 
that register to connect with the API technology are solely intended as 
examples to illustrate when a fee would or would not qualify as a 
``value-added service,'' and are not meant to convey a requirement or 
expectation that API Technology Suppliers provide an app store with 
application listing free of charge. A few commenters requested that ONC 
clarify that EHR developers can charge value-add fees without 
triggering the information blocking provision. A couple other 
commenters requested additional examples of what constitutes a ``value-
added'' service for which an API Technology Supplier can charge fees to 
an API User.
    Response. We thank commenters for the feedback. We have finalized 
Sec.  170.404(a)(3)(iv) as proposed, with the exception of updating 
terms based on the definitions finalized in Sec.  170.404(c). Our final 
policy permits Certified API Developers to charge fees, including a 
reasonable profit margin, to API Users for value-added services related 
to certified API technology, so long as such services are not necessary 
to efficiently and effectively develop and deploy production-ready 
software that interacts with certified API technology. We clarify that 
the value-added services need to be provided in connection with and 
supplemental to the development, testing, and deployment of production-
ready software applications that interact with certified API 
technology. A fee is permitted if it relates to a service that a 
software developer can elect to purchase from a Certified API 
Developer, but is not required to purchase in order to develop and 
deploy production-ready apps for certified API technology.
    In response to comments for clarity, we note that examples used to 
illustrate when a fee would or would not qualify as a ``value-added 
service,'' such as app store listing, are demonstrative, but not 
required unless otherwise noted in the regulation text. Under this 
condition, we permit fees for services associated with the listing and 
promotion of apps beyond basic application placement so long as the 
Certified API Developer ensures that basic access and listing in the 
app store is provided free of charge (if an application developer 
depended on such listing to efficiently and effectively develop and 
deploy production-ready apps for use with certified API technology). 
Fees charged for additional/specialized technical support or promotion 
of the API User's application beyond basic access and listing services 
would be examples of permitted value-added services. We caution health 
IT developers not to over-interpret the scope of this Condition of 
Certification, which is focused on certified API technology. To the 
degree that a health IT developer administers an ``app store'' and 
offers value-added services associated with certified API technology, 
the Condition of Certification covers its practices related to 
certified API technology only. Conversely, this Condition of 
Certification would not apply to any practices that do not involve 
certified API technology. However, health IT developers would need to 
be mindful of any applicable information blocking rules that may apply 
to their app store practices given applicable facts and circumstances. 
Regarding the request for specific value-added fees that would not 
constitute information blocking, we refer readers to the information 
blocking section (VIII) of this preamble.
(H) Request for Comment on Sec.  170.404(a)(3)
    We requested comment at 84 FR 7491 on any additional specific 
``permitted fees'' not addressed in our Proposed Rule (84 FR 7491) that 
commenters felt API Technology Suppliers should be able to recover in 
order to assure a reasonable return on investment. Furthermore, we 
requested comment on whether it would be prudent to adopt specific, or 
more granular, cost methodologies for the calculation of the permitted 
fees. We encouraged commenters to consider, in particular, whether the 
approach we described would be administrable and appropriately balance 
the need to ensure that stakeholders do not encounter unnecessary costs 
and other special effort with the need to provide adequate assurance to 
API Technology Suppliers, investors, and innovators that they will earn 
a reasonable return on their investments in API technology. We welcomed 
comments on whether the approach adequately balances these concerns and 
achieves our stated policy goals. We also welcomed comments on 
potential revisions or alternative approaches. We encouraged detailed 
comments that included, where possible, economic justifications for 
suggested revisions or alternative approaches.
    Comments. Commenters suggested we alter our approach to APIs so 
that it is tiered fee structure. They suggested that ONC could 
establish categories where the technology requirements designate the 
fees: (1) A ``no fee'' category would limit API Technology Suppliers 
from charging API Data Providers or API Users any fees for exchanging 
data in compliance with Federal requirements; (2) an ``at cost'' 
category would allow API Technology Suppliers to charge API Data 
Providers or API Users the cost of interfacing APIs with a non-API 
Technology Supplier's commercial technology; and (3) a ``cost plus 
reasonable profit'' category would allow

[[Page 25761]]

API Technology Suppliers to charge API Data Providers or API Users a 
reasonable profit when conducting legitimate custom API development or 
creating custom apps.
    Response. We appreciate the recommendation from commenters, but we 
have not adopted a tiered fee structure in the final rule because it 
would require unnecessary specificity and prescribe a particular method 
that could have unintended effects of limiting the market's evolution 
over time. We believe the current structure for prohibited and 
permitted fees allows for the adequate cost recovery and reasonable 
profit by Certified API Developers while also establishing the 
guardrails around which API access can be enabled without special 
effort.
    Comments. Many commenters expressed concerns related to the effect 
our proposals regarding API fees would have on innovation and business. 
Several commenters noted that the structure of permitted fees could 
have unintended consequences that will ultimately work to impede 
innovation, increase administrative burden, and focus on cost recovery 
rather than creation of novel ways to improve data access.
    Several developers stated that the proposed fee structure 
specifically works to sever business relationships between API 
Technology Providers and API Users for anything other than ``value 
added services'' and effectively eliminates the ability for API Users 
to work directly with API Technology Suppliers to innovate and 
accelerate API development, and to achieve truly integrated and 
supported products throughout the product lifecycle. They suggested 
that a better model would be one that gives API Data Providers rights 
to leverage APIs ``without special effort,'' while supporting the 
ability for API Technology Suppliers and API Users to voluntarily 
engage in direct business relationships under mutually agreeable terms 
that are fair and equitable. Some developers stated that the market 
should determine permitted fees. They stated that in order to maintain 
a vigorously competitive market, API Technology Suppliers must be 
adequately compensated for their work to create and deploy non-standard 
APIs and support expanding standards. They explained that without this 
compensation, there will be far fewer entrants into the certified 
health IT space and current participants will depart.
    A couple of developers recommended that ONC allow revenue-sharing 
models for certain components of certified APIs. The commenters 
suggested that ONC should view revenue sharing arrangements as a type 
of market-based compensation that will ultimately benefit innovation 
and competition. Conversely, one commenter stated that it is essential 
that API Technology Suppliers be expressly prohibited from conditioning 
access to API technology on charging revenue-sharing or royalty 
agreements to API Data Providers or API Users outside of actual usage 
costs incurred. The commenter noted this rent-seeking behavior is anti-
competitive in nature and can have a significant impact on squelching 
any new market entrants and allow existing health IT actors to prevent 
all the positive outcomes that could arise from the ONC's proposed 
rules. Some developers stated that the prohibition against health IT 
developers charging for work to update their code structure is 
unreasonable, emphasizing that this is important work that is necessary 
for companies to be able to modernize their solutions as broader 
technologies evolve.
    Response. We appreciate these comments, but disagree with 
commenters regarding the potential negative effect of the final 
permitted fee structure on innovation. We also note that the value-
added services permitted fee does permit a direct relationship between 
Certified API Developers and API Users. What is generally prohibited 
and what we noted presented ``special effort'' in the Proposed Rule 
were Certified API Developer practices that required an API Information 
Source to seek permission to use its own certified API technology from 
the Certified API Developer.
    We reiterate that complying with the requirements of this permitted 
fee and the information blocking exception will generally not prevent 
an actor from making a reasonable profit in connection with the access, 
exchange, or use of EHI. To be responsive to comments, we have added a 
provision in Sec.  171.404(a)(3)(i)(A) to clarify this point. This 
final provision states that certain permitted API fees (Sec.  
170.404(a)(3)(ii) and Sec.  170.404(a)(3)(iv)) may include fees that 
result in a reasonable profit margin in accordance with the Costs 
Exception (Sec.  171.302). We believe that the allowance of reasonable 
profits is necessary to incentivize innovation and allow innovators to 
earn returns on the investments they have made to develop, maintain, 
and update innovations that ultimately improve health care delivery and 
benefit patients. Our finalized approach to API fees strikes the 
appropriate balance of addressing the rent-seeking and exclusionary 
pricing practices noted by the commenters while enabling and supporting 
innovation.
    We also emphasize that a majority of the EHI has been generated and 
recorded in the course of furnishing health care services paid with 
public dollars through Federal programs, including Medicare and 
Medicaid, or directly subsidized through the tax preferences for 
employer-based insurance. Yet, this EHI is not readily available where 
and when it is needed. We believe the overwhelming benefits of 
publishing certified APIs that allow EHI from such technology to be 
accessed, exchanged, and used without special effort far outweigh the 
potential burden on Certified API Developers and API Information 
Sources.
    Comments. A few commenters requested that ONC clarify whether API 
Data Suppliers would be allowed to recoup costs from API Users in light 
of the information blocking provisions. A few commenters expressed 
confusion that fees are addressed under the API Condition and 
Maintenance of Certification and information blocking. The commenters 
suggested that ONC address fees in one consolidated section.
    Response. We appreciate this comment and refer readers to the 
information blocking section of this rule. We do not believe that a 
discussion of fees should be consolidated in one section for a couple 
of reasons. First, the information blocking provision has a much 
broader reach than the Condition and Maintenance of Certification 
requirements and regulates conduct of health IT developers of certified 
Health IT Modules, health care providers, health information networks, 
and health information exchanges. The Condition and Maintenance of 
Certification requirements only relate to conduct by health IT 
developers of certified Health IT Modules. Second, the API Condition of 
Certification covers a much narrower scope of potential fees, as the 
fees in this section are specific to certified API technology only 
while fees in the information blocking section generally relate to the 
access, exchange, or use of EHI regardless of the particular technology 
used.
    We emphasize that we have finalized a provision in Sec.  171.302(c) 
that if the actor is a health IT developer subject to the Condition of 
Certification requirements in Sec.  170.402(a)(4) (Assurances), Sec.  
170.404 (API), or both, the actor must comply with all requirements of 
such conditions for all practices and at all relevant times. Under this 
provision, health IT developers of certified Health IT

[[Page 25762]]

Modules subject to the API Condition of Certification requirements may 
not charge certain types of fees and are subject to more specific cost 
accountability provisions than apply generally under the Costs 
Exception. We explain in the Costs Exception that a failure of 
developers to comply with these additional requirements would impose 
impediments to consumer and other stakeholder access to EHI without 
special effort and would be suspect under the information blocking 
provision.
vi. Openness and Pro-Competitive Conditions
    We proposed in 84 FR 7595 in Sec.  170.404(a)(4) that an API 
Technology Supplier must grant API Data Providers the sole authority 
and autonomy to permit API Users to interact with the API technology 
deployed by the API Data Provider in a non-discriminatory manner; 
provide all reasonably necessary support and other services to enable 
the effective development, deployment, and use of API technology by API 
Data Providers and its API Users to access, exchange, and use EHI in 
production environments; not impose collateral terms or agreements that 
could interfere with the use of API technology; and provide reasonable 
notice prior to making changes to its API technology or terms and 
conditions.
    Comments. The majority of commenters supported the proposed 
openness and pro-competitive conditions. Several commenters requested 
clarification about API Data Providers' rights and responsibilities 
when providing access to an application of a patient's choice. 
Specifically, they sought clarification on whether they can vet, deny, 
or limit access by applications that are using the API technology 
inappropriately. Another commenter proposed that app developers be 
required to obtain a business associate agreement (BAA) with providers 
prior to the application developer gaining access to a patient's EHI on 
behalf of a patient.
    Response. We appreciate the feedback from commenters. Based on the 
support from commenters, we have finalized that a Certified API 
Developer must grant API Information Sources the independent ability to 
permit API Users to interact with the certified API technology deployed 
by the API Information Source in Sec.  170.404(a)(4).
    Under the HIPAA Privacy Rule, a business associate relationship 
exists if an entity creates, receives, maintains, or transmits ePHI on 
behalf of a covered entity (directly or through another business 
associate) to carry out the covered functions of the covered entity. 
HIPAA does not require a covered entity (e.g., API Information Source) 
or its business associate (e.g., API Technology Supplier) to enter into 
a business associate agreement with an app developer that does not 
create, receive, maintain, or transmit ePHI on behalf of or for the 
benefit of the covered entity (whether directly or through another 
business associate). However, if the app was developed to create, 
receive, maintain, or transmit ePHI on behalf of the covered entity 
(API Information Source), or was provided by or on behalf of the 
covered entity (directly or through its API Technology Supplier, acting 
as the covered entity's business associate), then a business associate 
agreement would be required.\106\ In such cases, API Information 
Sources have the ability to conduct whatever ``vetting'' they deem 
necessary of entities (e.g., app developers) that would be their 
business associates under the HIPAA Rules before granting access and 
use of EHI to the entities. In this regard, covered entities must 
conduct necessary vetting in order to comply with the HIPAA Security 
Rule.
---------------------------------------------------------------------------

    \106\ https://www.hhs.gov/hipaa/for-professionals/privacy/guidance/access-right-health-apps-apis/.
---------------------------------------------------------------------------

    For third-party applications chosen by individuals to facilitate 
their access to their EHI held by actors, there would not be a need for 
a BAA as discussed above. There would also generally not be a need for 
``vetting'' on security grounds and such vetting actions otherwise 
would be an interference. Please see our discussion of ``vetting'' in 
the ``Interference Versus Education When an Individual Chooses 
Technology to Facilitate Access'' discussion in the Information 
Blocking section of the preamble (Section VIII). We also refer readers 
to our discussion of ``vetting'' versus verifying an app developer's 
authenticity under the API Condition of Certification later in this 
section of the preamble.
    Comments. Several commenters requested clarification about the 
types of business relationships permitted between API Technology 
Suppliers and API Users and requested examples of permitted activities 
and responsibilities under each role. These comments expressed concern 
about prohibiting API Technology Suppliers from being able to form 
direct relationships with API Users for the purpose of joint 
development and commercialization of their products. Other commenters 
requested clarifications about relationships that existed prior to the 
involvement of an API Data Provider.
    Response. We appreciate the feedback from commenters. Based on the 
general support, we have finalized in Sec.  170.404(a)(4)(i)(A) that a 
Certified API Developer must provide certified API technology to API 
Information Sources on terms that are no less favorable than it 
provides to itself and its own customers, suppliers, partners, and 
other persons with whom it has a business relationship. Additionally, 
we have finalized in Sec.  170.404(a)(4)(i)(B) that the terms on which 
a Certified API Developer provides certified API technology must be 
based on objective and verifiable criteria that are uniformly applied 
to all substantially similar or similarly situated classes of persons 
and requests. Furthermore, we have finalized in Sec.  
170.404(a)(4)(i)(C) that a Certified API Developer must not offer 
different terms or services on the basis of: Competition or potential 
for competition and revenue or other value the other party receiving 
the services may receive from using the certified API technology. We 
note that we slightly modified the finalized requirements in Sec.  
170.404(a)(4)(i) based on the revised definitions finalized in Sec.  
170.404(c). We clarify that this rule does not prohibit Certified API 
Developers from forming business relationships with API Users. To the 
degree that a Certified API Developer seeks to charge an API User for 
particular services associated with its certified API technology, it 
would need to do so pursuant to the ``value-added services'' permitted 
fee.
    Comments. Commenters requested clarification about how ``the sole 
authority and autonomy to unilaterally permit connections to their 
health IT through certified API technology'' applies to application 
registration. Specifically, they asked whether API Users are required 
to register once with the API Technology Supplier, or several times 
with each instance of API technology deployed by API Data Providers.
    Response. We appreciate the feedback from commenters. We refer 
commenters to Sec.  170.315(g)(10)(iii) for the application 
registration requirements for Health IT Modules presented for 
certification. In general, we do not prescribe the registration 
paradigm that Certified API Developers create for themselves and their 
customers. Thus, in different scenarios, an API User may only be 
required to register once with an Certified API Developer, or several 
times with each instance of a Sec.  170.315(g)(10)-certified Health IT 
Module deployed by an API Information Source. When it comes to apps 
that focus on the ``launch-ehr'' ``SMART on FHIR Core Capability'' from 
the

[[Page 25763]]

implementation specification adopted in 170.215(a)(3), such an approach 
will be tightly integrated with the Health IT Modules deployed by API 
Information Sources. Because of the tight integration between API 
Information Sources and Health IT Modules, registration for these apps 
could more often fall to the API Information Source. When it comes to 
apps that enable patient access, registration could be handled 
centrally by Certified API Developers or in a distributed manner with 
each API Information Source, especially in cases where API Information 
Sources take full responsibility for administering their Sec.  
170.315(g)(10)-certified Health IT Modules.
    Regarding ``the sole authority and autonomy to unilaterally permit 
connections to their health IT through certified API technology,'' we 
have finalized in 170.404(a)(4)(ii)(A) that Certified API Developer 
must have and, upon request, must grant to API Information Sources and 
API Users all rights that may be reasonably necessary to (1) access and 
use certified API technology in a production environment; (2) develop 
products and services that are designed to interact with the Certified 
API Developer's API technology; and (3) market, offer, and distribute 
products and services associated with the Certified API Developer's 
certified API technology.
    Additionally, we have finalized in Sec.  170.404(a)(4)(ii)(B) that 
a Certified API Developer must not condition any of the rights 
described in Sec.  170.404(a)(4)(ii)(A) on: (1) Receiving a fee, 
including but not limited to a license fee, royalty, or revenue-sharing 
arrangement; (2) agreeing to not compete; (3) agreeing to deal 
exclusively with the Certified API Developer; (4) Obtaining additional 
services that are not related to the certified API technology; (5) 
sharing intellectual property with the Certified API Developer; (6) 
meeting any Certified API Developer-specific testing or certification 
requirements; and (7) providing the Certified API Developer or 
technology with reciprocal access to application data. We slightly 
modified the conditions from the Proposed Rule for what we finalized in 
Sec.  170.404(a)(4)(ii)(B) for clarity, and amended terms to the 
revised definitions finalized in Sec.  170.404(c). Additionally, we 
clarify that while Certified API Developers are not permitted to 
condition the rights described in Sec.  170.404(a)(4)(ii)(A) on 
receiving a fee, Certified API Developers are permitted to charge fees 
compliant with the permitted fees described in Sec.  170.404(a)(3). We 
also clarify that ``meeting any Certified API Developer-specific 
testing or certification requirements'' would include preconditions 
like registering and testing in a testing environment prior to moving 
to production, and meeting Certified API Developer-created 
certification requirements.
    Comments. Commenters expressed concern about software applications 
maintaining compatibility when upgrading API technology, and 
highlighted the importance of adopting backwards-compatible standards.
    Response. We appreciate the feedback from commenters. We share the 
concern expressed by commenters. We specifically consider features of 
standards like backwards compatibility when proposing and finalizing 
testing and certification requirements for the Program. As mentioned 
above, we have finalized the standard adopted in Sec.  170.215(a)(1) as 
the base standard for the certification criterion adopted in Sec.  
170.315(g)(10) Standardized API for Patient and Population Services. We 
note that the standard adopted in Sec.  170.215(a)(1) includes many 
FHIR resources that need to retain their compatibility over time, which 
will help as upgrades to newer standards occur. Additionally, we have 
finalized in Sec.  170.404(a)(4)(iii) the service and support 
obligations required by a Certified API Developer, including the 
requirements that a Certified API Developer must provide all support 
and other services reasonably necessary to enable the effective 
development, deployment, and use of certified API technology by API 
Information Sources and API Users in production environments. These 
include requirements for changes and updates to API technology 
finalized in Sec.  170.404(a)(4)(iii)(A), where Certified API 
Developers must make reasonable efforts to maintain the compatibility 
of its certified API technology and to otherwise avoid disrupting the 
use of certified API technology in production environments, and 
requirements for changes to terms and conditions finalized in Sec.  
170.404(a)(4)(iii)(B), where Certified API Developers must provide 
notice and reasonable opportunity for its API Information Source 
customers and registered API Users to update their applications to 
preserve compatibility with API technology and to comply with 
applicable terms and conditions.
e. API Maintenance of Certification Requirements
i. Authenticity Verification
    We proposed in 84 FR 7486 in Sec.  170.404(a)(2)(ii)(C) to permit 
API Technology Suppliers to verify the authenticity of application 
developers, limited to a duration of no greater than five business days 
of receipt of a request to register an application developer's software 
with the API technology. We noted the authenticity verification process 
would need to be objective, apply to the application developer and not 
their software, and be the same for all application developers. We 
sought comment in 84 FR 7486 on factors that would enable registration 
with minimal barriers, including options and associated trade-offs. 
Additionally, we sought comment at 84 FR 7486 on other timing 
considerations for application developer authenticity verification.
    Comments. Commenters asked for a longer timeframe to complete the 
authenticity verification process of application developers. Some 
commenters asked to extend the authenticity verification timeframe to 
ten business days. Commenters suggested adding ``and any receipt of any 
additional requested information needed in order to verify the 
developer's authenticity'' to ``within five business days of receipt of 
an application developer's request to register their software 
application with the API technology provider's authorization server.''
    Commenters suggested various methods for verifying the authenticity 
of application developers and applications, including by proposing 
required registration information, or required attestation to model 
privacy guidelines or industry best practices. Other commenters 
suggested various approaches for verifying application developers and 
applications, including by working with industry to establish a 
verification body, privacy and security trust or certification 
framework, and other more detailed recommendations. Several commenters 
suggested requiring application developers to attest to providing a 
model privacy notice to patients. Commenters suggested mandating terms 
and conditions and consent requirements as part of the registration 
process.
    Response. We appreciate feedback from commenters. To improve the 
organization of these Condition and Maintenance of Certification 
requirements, we moved the requirements proposed in Sec.  
170.404(a)(2)(ii)(C) to the finalized Sec.  170.404(b)(1)(i) under the 
combined Sec.  170.404(b)(1), ``Authenticity verification and 
registration for production use.'' We accept commenters' requests to 
establish a longer time period for this permitted, but not required, 
process to verify the authenticity of application developers

[[Page 25764]]

who seek to register their software application for use with the 
Certified API Developer's certified API technology. We have adopted ten 
business days as the timeframe by which this process would need to be 
completed and as a result find it unnecessary to add the text 
contemplating a back and forth between the Certified API Developer and 
API User. We recommend that Certified API Developers who elect to 
institute a verification process implement a process that is as 
automated as possible to ensure they remain in compliance with our 
final policy. Given that we combined authenticity verification and 
registration for production use in one requirement finalized in Sec.  
170.404(b)(1), we reduced the scope of these requirements to Certified 
API Developers with a Health IT Module certified to the certification 
criterion adopted in Sec.  170.315(g)(10) to remain consistent with the 
scope of applicability of registration for production use from the 
Proposed Rule.
    We also note that authenticity verifications would likely occur 
more frequently for patient-facing applications that are not sponsored 
by API Information Sources. We anticipate that an API Information 
Source (e.g., a health care organization) that is a HIPAA covered 
entity would vet and enter into a HIPAA business associate agreement 
with a provider-facing application developer prior to using the 
application within their internal technical enterprise. In comparison, 
a patient-facing application is likely to connect to an API Information 
Source's resource server using a public service base URL of a Sec.  
170.315(g)(10)-certified Health IT Module in service to the patient's 
HIPAA Privacy Rule right of access (45 CFR 164.524) or based on a 
patient's HIPAA authorization (45 CFR 164.508) without first 
establishing a relationship with the API Information Source. For 
patient-facing applications, and to the comments suggesting we require 
various modes of attestation to privacy guidelines in such contexts, we 
refer commenters to the information blocking provisions in section VIII 
for a discussion of permitted behaviors regarding privacy attestations.
    Comments. Commenters suggested including a warning by the API Data 
Provider that the application developer selected by the patient or 
patient-designee is untrusted.
    Response. We thank commenters for their feedback. An API 
Information Source would not be prohibited from showing a warning to 
patients as part of the patient authorization for an application to 
receive their EHI from an API Information Source. This could include a 
warning that an application attempting to access data on behalf of a 
patient is untrusted. We refer commenters to the information blocking 
provisions in section VIII for additional information about providing 
warnings to patients.
ii. Registration for Production Use
    We proposed in 84 FR 7494 in Sec.  170.404(b)(1) to require API 
Technology Suppliers to register and enable all applications for 
production use within one business day of completing its verification 
of an application developer's authenticity.
    Comments. Commenters generally supported the proposed registration 
requirements. Most commenters suggested extending the registration 
timeframe to five business days.
    Response. We appreciate the feedback from commenters. We have 
reorganized this section of the regulation text for readability by 
combining ``Authenticity verification'' with ``Registration for 
production use'' under the heading ``Authenticity verification and 
registration for production use'' in Sec.  170.404(b)(1). We accepted 
the recommendation from commenters to extend the registration timeline 
and have finalized in Sec.  170.404(b)(2)(ii) a requirement for 
Certified API Developers with Health IT Modules certified to the 
certification criterion finalized in Sec.  170.315(g)(10) to register 
and enable all applications for production use within five business 
days of completing its verification of an application developer's 
authenticity pursuant to requirements finalized in Sec.  
170.404(b)(1)(i).
iii. Service Base URL Publication
    We proposed in 84 FR 7595 in Sec.  170.404(b)(2) to require an API 
Technology Supplier to support the publication of service base URLs for 
all of its customers, and make such information publicly available, in 
a computable format, at no charge.
    Comments. A majority of commenters supported the proposal requiring 
API Technology Suppliers to publish service base URLs for all of its 
customers. Several commenters recommended the creation of a single, 
publicly available repository to maintain all client endpoints. Some 
stakeholders recommended ONC require additional facility information be 
published with the service base URL. Commenters who disagreed with this 
proposal stated that health IT developers cannot publish client 
information without their consent, and that API Data Providers should 
have the sole authority to publish their endpoints.
    Response. We thank commenters on their feedback on our proposal 
requiring a Certified API Developer to publish service base URLs for 
all of its customers. The public availability and easy accessibility of 
this information is a central necessity to assuring the use of 
certified API technology without special effort, particularly for 
patient-facing applications. We agree with the points made by 
commenters on the need for a single or multiple publicly available 
repositories that maintain provider service base URLs. We encourage 
industry to coalesce around the development of a public resource from 
which all stakeholders could benefit. We believe this would help scale 
and enhance the ease with which service base URLs could be obtained and 
used. While we support the concept of repositories for service base 
URLs, we do not believe that creating a requirement under the Program 
is the appropriate mechanism to foster industry support around this 
concept at this time.
    We acknowledge that stakeholders expressed concern about Certified 
API Developers publishing client service base URLs and revised our 
approach to focus on service base URLs necessary to support patient 
access. We anticipate that many services related to certified API 
technology will be developed and made available and do not believe it 
is appropriate to burden Certified API Developers with publishing all 
service base URLs for these services for all of their customers. We 
considered several options, including requiring Certified API 
Developers to publish service base URLs for only those API Information 
Source customers for whom they manage/host an authorization server 
centrally. However, we determined that alternative options would not 
meet our policy interests and would lead to unnecessarily complex and 
burdensome approaches and would not achieve the Cures Act's goals of 
enabling EHI to be accessed, exchanged, and used without special 
effort. Additionally, we considered requiring that all Certified API 
Developers with certified API technology, that is, health IT developers 
with a Health IT Module certified to Sec.  170.315(g)(7) through (10), 
meet this requirement. However, we determined that it would be more 
beneficial to allow health IT developers to focus energy and resources 
on upgrading their technology to the certification criterion finalized 
in Sec.  170.315(g)(10). Therefore, we have finalized in Sec.  
170.404(b)(2) that a Certified API Developer must publish service base 
URLs for all Health IT

[[Page 25765]]

Modules certified to Sec.  170.315(g)(10) that can be used by patients 
to access their EHI. We further require that a Certified API Developer 
must publicly publish service base URLs for all customers in a machine-
readable format at no charge regardless of whether the Health IT 
Modules certified to Sec.  170.315(g)(10) are centrally managed by the 
Certified API Developer or locally deployed by an API Information 
Source. We note our focus for this criterion on ``service base URLs for 
Health IT Modules certified to Sec.  170.315(g)(10) that can be used by 
patients to access their EHI.'' We believe that Certified API 
Developers will have adequate relationships with API Information 
Sources in the process of providing Health IT Modules certified to 
Sec.  170.315(g)(10) and will be able to collect and publish all 
service base URLs that support patient access on behalf of their 
customers. Furthermore, we note that API Information Sources would be 
obligated to share such service base URLs with Certified API Developers 
to avoid violating the Technical Interference Information Blocking 
provisions as discussed further in section VIII. Certified API 
Developers must make available appropriately scoped service base URLs 
that can be used by patients to access their EHI for Health IT Modules 
certified to Sec.  170.315(g)(10).
iv. Providing (g)(10)-Certified APIs to API Data Providers
    We proposed in 84 FR 7494 in Sec.  170.404(b)(3) that an API 
Technology Supplier with Health IT Modules previously certified to 
Sec.  170.315(g)(8) must provide all API Data Providers Health IT 
Modules certified to Sec.  170.315(g)(10) within 24 months of this 
final rule's effective date.
    Comments. The majority of comments received urged ONC to extend the 
timeline beyond the 24 months proposed. Many commenters requested 
separate timelines for developers and providers. Several commenters 
recommended 36 months. Some commenters offered alternatives ideas for 
timelines, including a stepwise approach, or ONC only determining 
technical timelines, and allowing CMS to cover provider timelines. Only 
a few commenters encouraged faster adoption.
    Response. We appreciate commenters' feedback on our proposal. Given 
the reduced scope of the overall updates required by this final rule, 
our belief that the industry is well-prepared to meet this 
certification criterion's requirements once the final rule is 
published, and the Cure's Act expectation that secure, standards-based 
APIs would be made available in a timely manner, we have retained a 24 
month compliance timeline, which will start from the publication date 
of the final rule. At that point, it will be approximately five years 
since the Cures Act's passage and we believe its implementation should 
not be delayed any further. We also remind stakeholders that this is 
within 24 months of this rule's publication compliance date for 
supplying all API Information Sources with Health IT Modules certified 
to Sec.  170.315(g)(10) enables Certified API Developers (based on 
their client base and IT architecture) to determine the most 
appropriate timeline for development, testing, certification, and 
product release cycles. Thus, we have finalized in Sec.  170.404(b)(3) 
that a Certified API Developer with certified API technology previously 
certified to the certification criterion at Sec.  170.315(g)(8) must 
provide all API Information Sources with such certified API technology 
deployed with certified API technology certified to the certification 
criterion in Sec.  170.315(g)(10) within 24 months of the publication 
date of the final rule.
v. Compliance for Existing Certified API Technology
    We proposed in 84 FR 7486 that API Technology Suppliers with Health 
IT Modules certified to Sec.  170.315(g)(7), (8), or (9) must revise 
their existing API documentation within six months from the final 
rule's effective date.
    Comments. Some commenters supported the requirement to revise 
existing API documentation within six months of the final rule's 
effective date. Others requested more time to allow documentation and 
all other websites to come into alignment before enforcement of this 
Condition of Certification requirement. One commenter requested 
clarification on which documentation requires revision within the six-
month timeframe.
    Response. In order to align the API Condition of Certification 
requirements policies, we have broadened the scope of the provision 
finalized in Sec.  170.404(b)(4) to apply to all API Condition of 
Certification requirements finalized in Sec.  170.404(a), including 
Sec.  170.404(a)(1) through (4). Given the change of scope, we renamed 
this section to ``Compliance for existing certified API technology.'' 
We considered commenters' request for more time, but given the already 
delayed effective date of Part 170 we believed the proposed time of six 
months sufficient to enable Certified API Developers to become 
compliant with the Condition of Certification requirements finalized in 
Sec.  170.404(a). This additional time provides Certified API 
Developers with Health IT Modules already certified to Sec.  
170.315(g)(7), (8), or (9) a total of eight months from the final 
rule's publication to update their policies and documentation to comply 
with the requirements finalized in Sec.  170.404(a). We did not allow a 
longer time period than six months in Sec.  170.404(b)(4) due to the 
fact that we have finalized our proposal in Sec.  170.404(b)(3) to 
require Certified API Developers with Health IT Modules previously 
certified to the certification criterion in 170.315(g)(8) to provide 
Sec.  170.315(g)(10)-certified APIs to API Information Sources within 
24 months of final rule's publication date. These policies finalized in 
Sec.  170.404(b)(4) provide API Information Sources with Health IT 
Modules certified to Sec.  170.315(g)(8) with 18 months of updated 
documentation before the new requirements finalized in Sec.  
170.404(b)(3) become effective. Setting a more delayed compliance date 
than the one finalized in Sec.  170.404(b)(4) would have unreasonably 
delayed and ultimately diminished the benefits of the Program 
requirements we have finalized in this rule. In summary, we finalized 
in Sec.  170.404(b)(4) that Certified API Developers with Health IT 
Modules certified to Sec.  170.315(g)(7), (8), or (9) must comply with 
Sec.  170.404(a) no later than six months after this final rule is 
published in the Federal Register, including by revising their existing 
business and technical API documentation and making such documentation 
available via a publicly accessible hyperlink that allows any person to 
directly access the information without any preconditions or additional 
steps.
5. Real World Testing
    The Cures Act requires, as Condition and Maintenance of 
Certification requirements under the Program, that health IT developers 
successfully test the real world use of the technology for 
interoperability \107\ in the type of setting in which such technology 
would be marketed. As discussed in the Proposed Rule (84 FR 7495), the 
objective of real world testing is to verify the extent to which 
certified health IT deployed in production contexts continues to 
demonstrate conformance to the full scope of applicable certification 
criteria and functions with the intended use cases as part of the 
overall maintenance

[[Page 25766]]

of a health IT's certification. Real world testing should assess that 
the certified health IT is meeting the intended use case(s) of the 
certification criteria to which it is certified within the workflows, 
system architectures, and type(s) of care setting(s) for which it is 
marketed (advertised, promoted, or sold).
---------------------------------------------------------------------------

    \107\ Defined in statute in section 3000 of the Public Health 
Service Act (as modified by section 4003 of the Cures Act) and 
defined in regulation at 45 CFR 170.102.
---------------------------------------------------------------------------

    For the purpose of this Condition of Certification requirement, in 
Sec.  170.405(a), we proposed (84 FR 7495) that successful real world 
testing means:
     The certified health IT continues to be compliant to the 
full scope of the certification criteria to which it is certified, 
including the required technical standards and vocabulary codes sets;
     The certified health IT is exchanging electronic health 
information in the care and practice settings for which it is intended 
for use; and
     Electronic health information is received by and used in 
the certified health IT.
    To fully implement the real world testing Condition of 
Certification requirement, we proposed Maintenance of Certification 
requirements that would require health IT developers to submit publicly 
available prospective annual real world testing plans and retrospective 
annual real world testing results for the certification criteria 
focused on interoperability to which each of its Health IT Modules is 
certified (84 FR 7496).
    Comments. Comments on the whole support the establishment of a 
robust process of real world testing. Several commenters expressed 
concerns regarding the quality and usability of health IT. 
Specifically, commenters indicated that issues related to health IT 
usability may be contributing to clinician burn-out or impacting 
patient safety, noting that they therefore strongly support the 
inclusion of robust real world testing requirements.
    Response. We appreciate all comments, and have finalized real world 
testing Condition and Maintenance of Certification requirements in 
Sec.  170.405(a) and (b) as proposed, with minor adjustments to due 
dates and clarifications of several points in response to specific 
comments as discussed below.
    Comments. Commenters indicated that additional clarification of the 
real world testing requirements would make these Condition and 
Maintenance of Certification requirements less burdensome to implement. 
These commenters specifically sought additional guidance around the 
expectations for an appropriate testing plan and method of execution. 
One commenter recommended that ONC provide more guidance around what 
care settings must be covered by test plans, and establish a minimum 
number of settings and test sites that are applicable for certified 
Health IT Modules.
    Response. In response to comments requesting additional guidance 
around expectations and acceptable methods for real world testing, we 
provide below additional discussion, explanation, and illustrative 
examples. At this time, we have decided not to establish a minimum 
number of settings or minimum percentage or fraction of production 
instances of the developer's applicable certified Health IT Modules 
that must be included in the developer's annual real world testing 
activities. While health IT developers are not required to test their 
certified health IT in each and every setting in which it is intended 
for use, we would expect a developer's real world testing plan to 
address each type of clinical setting for which their health IT is 
marketed. Developers must address in their real world testing plans 
their choice of care and/or practice settings to test and provide a 
justification for their chosen approach. We also remind developers that 
although we are not requiring testing in every setting for which the 
certified health IT is marketed, we encourage real world testing in as 
many specific settings as feasible within each type of setting for 
which the certified health IT is marketed.
    Comments. Some commenters expressed a view that there has been too 
much focus on the export capabilities of systems and not enough 
attention paid to providers being able to ingest data received in 
standardized formats--such as the Continuity of Care Document (CCD) 
standard--from other providers, including other providers who use the 
same developer's Health IT Modules certified to produce exports in 
conformance with the standards.
    Response. The interoperability focused criteria listed in Sec.  
170.405(a) include required capabilities for receiving and 
incorporating data in accordance with referenced standards and 
implementation specifications adopted by the Secretary in part 170 
subpart B. We believe this appropriately aligns requirements for real 
world testing of Health IT Modules' ability to ingest data with the 
capabilities their certifications address.
    Comments. A commenter recommended that, for real world testing of 
Health IT Modules certified to the API criterion, the final rule 
require health IT developers to provide a testing environment (or 
``developer sandbox'') and require the use of a testing platform and 
test scripts that validate the ability of the API to meet the 
underlying requirements for the version of FHIR[supreg] to which Health 
IT Module(s) are certified, any applicable FHIR[supreg] profiles, and 
implementation guides.
    Response. As discussed in the Proposed Rule (84 FR 7496), we 
believe health IT developers are in the best position to design and 
facilitate implementation of real world testing approaches that balance 
the burdens of this statutory requirement with its intended assurances 
that certified health IT as deployed in the types of clinical settings 
for which it is marketed (advertised, promoted, or sold) continues to 
meet the Program requirements, including but not limited to 
interoperability performance, applicable under the certification it 
holds. While we recognize that testing environments can be useful for a 
variety of purposes, and would not generally discourage developers from 
offering test platforms specific to their products or participating in 
the development and use of open-source testing platforms, the purpose 
of real world testing is to demonstrate that Health IT Modules continue 
to perform in conformance to their certification when and as they are 
deployed in production environments supporting the types of clinical 
settings for which the Health IT Modules are marketed. Thus, real 
patient data and real production environments will in most cases best 
meet that need and should be first considered when developing real 
world testing plans. Mandating creation or use of testing environments 
for real world testing would compete for developers' time and effort 
with the focus on innovative ways to best serve the purpose of the real 
world testing Conditions and Maintenance of Certification requirements 
at the least burden on their customers and end users. We have therefore 
not required health IT developers to provide a testing environment (or 
``developer sandbox'') nor have we required the use of a testing 
platform or test scripts in order to satisfy real world testing 
Condition and Maintenance of Certification requirements.
    Comments. Several commenters requested that ONC be mindful of the 
burdens this testing could place on health care providers in terms of 
time and cost and take all necessary steps to minimize such burdens. 
Commenters specifically stated real world testing would require 
significant work by providers for whom, in the commenters' stated view, 
there is no incentive to

[[Page 25767]]

participate in real world testing. Some commenters specifically 
recommended that HHS incentivize providers to participate, stating that 
without providers' participation, this proposal would become an 
untenable requirement. One commenter requested HHS clarify whether a 
developer would be permitted to compensate its customers for the time 
the customer spends supporting the developer's real world testing 
activities.
    Response. We thank commenters for their feedback noting the 
potential for health IT developers' real world testing activities to 
impose burden on providers. We do appreciate the importance of 
recognizing that providers engage directly and actively in various 
types of activities supporting advancement of health IT. The fact that 
many of these activities could be included in robust real world testing 
regimes suggests that we should provide developers with extensive 
flexibility to develop innovative real world testing plans. We have 
therefore built into our real world testing policy flexibility that 
offers the developer a substantial opportunity to design real world 
testing approaches that minimize burden and fully optimize value of the 
real world testing activities and results to current and prospective 
customers. We do not believe that HHS incentives to providers 
participating in real world testing would be the most effective means 
of alleviating burdens on health care providers specifically 
attributable to developers' real world testing activities. Rather, the 
flexibility of our policy allows for, and encourages, developers to 
approach real world testing in an innovative mode so that they can 
maximize efficiency and minimize burden of real world testing for both 
the developer and its customers. A wide range of practical strategies 
are available for developers to potentially consider in creating such 
optimized solutions for real world testing of their specific health IT 
with their particular customer base. Examples of this range of 
practical strategies include, but are not necessarily limited to: 
Avoiding some activities that satisfy only the real world testing 
Maintenance of Certification requirements by including in its overall 
real world testing plans the testing typically associated with 
confirming functionality of new installations and upgrades of their 
software; and innovating methods of measuring products' performance in 
real time use through system metadata and/or feedback from health 
information networks and other exchange partners of their customers.
    In response to the recommendation that developers be allowed to 
compensate their customers for participating in the developer's real 
world testing activities, we note that nothing in our proposed or 
finalized policy under part 170 would prohibit that. In the event a 
developer concludes that its real world testing approach imposes on its 
customers directly participating in real world testing activities a 
burden that the developer would like to offset for those customers, we 
would not discourage the developer from considering whether there may 
be opportunities within the bounds of other applicable laws or 
regulations for developers of certified health IT to offer customers 
some types of burden-offsetting compensation or other incentive for 
real world testing participation. Analysis, interpretation, or changes 
to such other law or regulation is outside the scope of this particular 
rulemaking action. Moreover, outside the rulemaking process, developers 
should be aware that ONC is not in a position to provide general 
guidance on Federal laws specific to compensation arrangements or 
advice specific to any particular circumstances or contemplated conduct 
related to developers compensating providers for participating in 
developers' real world testing activities. However, if developers or 
providers may be contemplating a potential compensation arrangement 
related to offsetting providers' cost or burden of engagement in 
developers' real world testing, we offer as a point of information that 
one publicly stated purpose of the HHS Office of the Inspector General 
advisory opinion process is to provide meaningful advice about of the 
applicability of the anti-kickback statute or other OIG sanction 
statutes in specific factual situations.\108\
---------------------------------------------------------------------------

    \108\ For more information about HHS Office of the Inspector 
General advisory opinions and advisory opinion process, please 
visit: https://oig.hhs.gov/compliance/advisory-opinions/index.asp.
---------------------------------------------------------------------------

    Comments. One commenter expressed concern that developers with 
small customer bases will have smaller pools of participants willing to 
undergo a lengthy process which will require significant resources and 
suggested developers submit results from a more limited scope of 
testing only every three years.
    Response. We reiterate that the policy we have finalized includes 
substantial flexibility for developers to assess how to meet the real 
world testing Condition and Maintenance of Certification requirements 
in a way that appropriately minimizes burden on the current users of 
their certified health IT.
    Comments. A commenter expressed concern that health care providers 
might be unwilling to use health IT that had not yet been certified, 
and that this could make real world testing of Health IT Modules prior 
to certification impractical.
    Response. In our Proposed Rule (84 FR 7429), we proposed in Sec.  
170.405(a) to limit the applicability of this Condition of 
Certification to health IT developers with Health IT Modules that are 
certified to one or more 2015 Edition certification criteria focused on 
interoperability and data exchange. We also proposed that the real 
world testing Condition of Certification would be met through meeting 
the real world testing Maintenance of Certification requirements in 
Sec.  170.405(b). We have finalized this proposal as proposed. Thus, 
the real world testing Condition and Maintenance of Certification 
requirements do not mandate testing real world use of a Health IT 
Module in actual production environments before it is certified.
a. Unit of Analysis at Which Testing Requirements Apply
    Comments. One commenter requested confirmation if real world 
testing is required per CHPL listing, per product, or per company.
    Response. The real world testing Condition and Maintenance of 
Certification requirements apply to each developer that has at least 
one Health IT Module certified to at least one of the interoperability 
and exchange focused criteria listed in Sec.  170.405(a), because 
Condition and Maintenance of Certification requirements apply to the 
developer of certified health IT. However, each developer of certified 
health IT to which the real world testing Condition and Maintenance of 
Certification requirements apply must conduct real world testing for 
each criterion within the scope of real world testing (Sec.  
170.405(a)) to which each developer presents for certification a Health 
IT Module that is part of a health IT product to be listed on the CHPL 
are certified. A health IT developer with multiple products that are 
listed on the CHPL and that include one or more Health IT Module(s) 
certified to one or more of the criteria listed in Sec.  170.405(a) 
need only submit one real world testing plan, and one real world 
testing results report, for any given annual cycle of real world 
testing, but the real world testing plan and results report must 
address each of the developer's products that is listed on the CHPL. 
Health IT developers with multiple health IT products that may include 
the same Health IT Module(s) certified to one or

[[Page 25768]]

more of the criteria listed in 170.405(a) have discretion to design 
their real world testing plans in a way that efficiently tests a 
combination of products that include Health IT Modules certified 
criteria listed in Sec.  170.405(a) so long as testing plans and 
results are traceable to specific certified Health IT Modules and each 
criterion to which the Health IT Module(s) are certified, and address 
the types of settings for which the products are marketed. Because the 
purpose of real world testing is to test health IT products as they are 
deployed in production, developers of health IT products deployed 
through the cloud who offer their products for multiple types of 
clinical settings will be required to test the same capability for 
those different types of settings even if it uses a single instance of 
the deployed capability to serve all of those types of settings.
b. Applicability of Real World Testing Condition and Maintenance of 
Certification Requirements
    We proposed (84 FR 7495) to limit the applicability of the real 
world testing Condition of Certification requirement to health IT 
developers with Health IT Modules certified to one or more of the 
certification criteria focused on interoperability and data exchange or 
availability listed in (then-proposed) Sec.  170.405(a):
     The care coordination criteria in Sec.  170.315(b);
     The clinical quality measures (CQMs) criteria in Sec.  
170.315(c)(1) through (c)(3);
     The ``view, download, and transmit to 3rd party'' 
criterion in Sec.  170.315(e)(1);
     The public health criteria in Sec.  170.315(f);
     The application programming interface criteria in Sec.  
170.315(g)(7) through (g)(10); and
     The transport methods and other protocols criteria in 
Sec.  170.315(h).
    We solicited comment on whether to also include the ``patient 
health information capture'' certification criteria in Sec.  
170.315(e)(3), including the value of real world testing these 
functionalities compared to the benefit for interoperability and 
exchange (84 FR 7496). We also solicited comment on whether any other 
2015 Edition certification criteria should be included or removed from 
the applicability list (to be codified at 170.405(a)) for this 
Condition of Certification requirement.
    Comments. The vast majority of commenters addressing this proposal 
were in support of the specific criteria proposed to be within the 
scope of real world testing and expressed agreement that required 
testing should be limited to Health IT Modules certified to one or more 
of the certification criteria listed in Sec.  170.405(a) as proposed.
    Response. We appreciate all feedback received. The list of criteria 
to which real world testing Condition and Maintenance of Certification 
requirements apply is finalized in Sec.  170.405(a) as proposed.
    Comments. We received one comment supporting and two comments 
opposing the addition of patient health information capture criterion 
in Sec.  170.315(e)(3) to the scope of real world testing. One 
commenter specifically recommended against including the patient health 
information capture criterion in Sec.  170.315(e)(3) in real world 
testing because of the significant variability in how health IT 
certified to this criterion is implemented. They stated that this 
variability in the real world could make cross-implementation 
comparisons difficult, and stated that testing for this criterion could 
present a particular challenge based on difficulty they anticipated 
would be encountered in securing needed engagement from patients as 
well as the exchange partners who would presumably receive the data as 
a result of the patient using the ``transmit'' functionality. 
Commenters opposed to addition of this criterion to the real world 
testing Condition and Maintenance of Certification requirements also 
stated this addition would add cost to the developer which would then 
flow down to end users and be burdensome to clinician practices.
    Response. On balance, the comments received do not support 
expansion of the scope of real world testing requirements to include 
the patient health information capture criterion in Sec.  170.315(e)(3) 
at this time. In developing the proposed list of criteria to which real 
world testing Condition and Maintenance of Certification requirements 
would apply, we concluded an initial focus on those particular criteria 
would strike an appropriate balance between the magnitude of the 
challenge represented by the new real world testing requirements and 
the potential benefits of their broader application. The concerns 
raised by the commenters recommending against adding the patient health 
information capture criterion in Sec.  170.315(e)(3) to the scope of 
real world testing requirements at this time, combined with other 
comments more generally recommending against a broader scope at this 
time, tend to support the conclusion that the scope we proposed strikes 
an appropriately practical balance until we and the industry have 
benefit of experience and innovation in real world testing. Thus, the 
finalized list of criteria to which real world testing requirements 
apply (Sec.  170.405(a)) does not include the patient health 
information capture criterion in Sec.  170.315(e)(3).
    Comments. A few commenters suggested expanding the scope of real 
world testing requirements to include the proposed ``EHI export'' 
criterion in Sec.  170.315(b)(10).
    Response. We appreciate the confirmation that commenters supported 
inclusion of the ``EHI export'' criterion in Sec.  170.315(b)(10) 
alongside the rest of the care coordination criteria in Sec.  
170.315(b). We have finalized the criteria listed in Sec.  170.405(a) 
including, as proposed, all criteria within Sec.  170.315(b).
    Comments. One commenter expressed an opinion that the initial scope 
of criteria is more expansive than the commenter would suggest for an 
introductory set, and asked that fewer criteria be required for the 
initial rollout of real world testing, delaying application of the 
requirement to more interoperability focused criteria until experience 
has been amassed with real world testing for a narrower selection of 
criteria than we had proposed.
    Response. Noting that the majority of comments received were 
supportive of the scope as proposed, we also balance suggestions such 
as that offered by this commenter against the Program's needs and the 
purpose of the real world testing Condition and Maintenance of 
Certification requirements. We do not believe it would be in the best 
interest of the Program or the health care providers and patients who 
rely on certified health IT to meet their needs for interoperable 
health IT to narrow the applicability of the real world testing 
Condition and Maintenance of Certification requirements further than we 
proposed. We have, therefore, finalized the criteria listed in Sec.  
170.405(a) as proposed.
    Comments. Some commenters advocated expanding the scope of the real 
world testing requirement to include select functionally-based 
``clinical'' criteria within Sec.  170.315(a) that are included in the 
base EHR definition.
    Response. As explained in the Proposed Rule (84 FR 7495), we did 
not propose to include in the scope of real world testing functionally-
based criteria, administrative criteria, or other criteria that do not 
focus on interoperability and exchange or availability of data. The 
``clinical'' certification criteria in Sec.  170.315(a) were noted in 
the Proposed Rule as an

[[Page 25769]]

example of criteria not proposed because they require only that the 
health IT enable the provider to record, change, and access specific 
types of data within the Health IT Module being certified (or within a 
product that includes the Health IT Module being certified to the 
particular criteria). However, real world testing of health IT's 
ability to exchange the types of data these clinical criteria reference 
is addressed through the inclusion of the USCDI in the 
interoperability-focused criteria listed in Sec.  170.405(a) as 
proposed, which is finalized as proposed. In order to successfully 
exchange interoperable EHI, the health IT must be able to access it, 
and in order to incorporate a type of data, the health IT must be able 
to record it.
    Comments. The majority of comments received specifically 
referencing the proposed inclusion of public health criteria in the 
real world testing requirement in Sec.  170.405(a) support the 
importance and inclusion of the public health criteria in the scope of 
real world testing requirements. One commenter questioned the inclusion 
of the public health criteria in Sec.  170.315(f), stating the 
commenter's perception that extensive variation between registries 
would make this a challenging functionality to demonstrate.
    Response. Variations in system configurations across different 
public health agencies' infrastructures may suggest different real 
world testing strategies may be most appropriate, or most relevant to 
customers, compared to what might be the case for some other criteria 
within the scope of real world testing. However, as noted below about 
testing tools, we are aware of a wide variety of resources and 
opportunities to test real world interoperability performance of Health 
IT Modules certified to the public health criteria in Sec.  170.315(f). 
Because interoperability performance in actual production environments 
is an important feature of health IT certified to the public health 
criteria in Sec.  170.315(f), and noting the support for its inclusion 
expressed by most commenters, and we have determined that the most 
appropriate course is to finalize the inclusion of the public health 
criteria inSec.  170.315(f) in the scope of real world testing in Sec.  
170.405(a).
    Comments. One commenter expressed concern that some of the criteria 
proposed for inclusion in Sec.  170.405(a) be re-examined because they 
do not include all three of the characteristics our Proposed Rule 
described as being demonstrated through real world testing. Examples 
offered included that some criteria proposed for inclusion in Sec.  
170.405(a) require exporting but do not require receipt and use of 
electronic health information by the certified health IT.
    Response. We appreciate commenters' bringing to our attention that 
additional discussion about the requirements would be helpful to the 
community. For the criteria proposed and finalized in the real world 
testing scope in Sec.  170.405(a), such real world testing needs to 
address the interoperability characteristics and all other 
functionalities and capabilities applicable based on the specific 
criteria to which the Health IT Module is certified. For example, even 
if a Health IT Module is not certified to any criterion that 
specifically requires it to demonstrate, in order to be certified, that 
the Health IT Module has the capability to incorporate and use data 
received directly from sources outside the production environment in 
which it is deployed, that Health IT Module will still need to 
demonstrate conformance to the full scope of each criterion to which it 
is certified. This includes, though it is not limited to, the technical 
standards and vocabulary codes sets included in each criterion to which 
it certified.
c. Testing Plans, Methods, and Results Reporting
    We proposed (84 FR 7496) that a health IT developers must submit an 
annual real world testing plan to its ONC-ACB via a publicly accessible 
hyperlink no later than December 15, of each calendar year for each of 
its certified Health IT Modules that include certification criteria 
specified for this Condition of Certification. We proposed (84 FR 7497) 
that a health IT developer must submit an annual real world testing 
plan to its ONC-ACB via a publicly accessible hyperlink no later than 
January 31, of each calendar year for the preceding calendar year's 
real world testing.
    We proposed that the real world testing plan, which will be 
required to be available to ONC and the public via the CHPL no later 
than December 15 of each year once this final rule is effective, will 
need to address the health IT developer's real world testing that will 
be conducted the upcoming calendar year and must include, for each of 
the certification criteria in scope for real world testing in Sec.  
170.405(a) and each Health IT Module certified to one or more of these 
criteria (84 FR 7496):
     The testing method(s)/methodology(ies) that will be used 
to demonstrate real world interoperability, including a mandatory focus 
on scenario- and use case-focused testing;
     The care and practice setting(s) that will be tested for 
real world interoperability, including conformance to the full scope of 
the certification criteria requirements, and an explanation for the 
health IT developer's choice of care setting(s) to test; \109\
---------------------------------------------------------------------------

    \109\ We do not specifically define or limit the care settings 
and leave it to the health IT developer to determine. As an example, 
health IT developers can consider categories, including but not 
limited to, those used in the EHR Incentive Programs (https://www.cms.gov/Regulations-and-Guidance/Legislation/EHRIncentivePrograms/Downloads/UserGuide_QNetHospitalObjectivesCQMs.pdf); long-term and post-acute 
care; pediatrics; behavioral health; and small, rural, and 
underserved settings.
---------------------------------------------------------------------------

     The timeline and plans for voluntary updates to standards 
and implementation specifications that ONC has approved (further 
discussed below);
     A schedule of key real world testing milestones;
     A description of the expected outcomes of real world 
testing;
     At least one measurement/metric associated with the real 
world testing for each certification in scope; and
     A justification for the health IT developer's real world 
testing approach.
    We sought comment (84 FR 7497) on whether we should specify a 
minimum ``core'' set of metrics/measurements and examples of suggested 
metrics/measurements as well as on the timing of required real world 
testing results reporting. We also invited comment on the annual 
frequency and timing of required real world testing results reporting.
    Comments. Most comments received supported the proposed requirement 
for Health IT Modules to undergo real world testing. In addition, 
commenters indicated that real world testing should occur on a regular 
basis to ensure various types of changes in the Health IT Modules or 
production environments have not affected functionality required by the 
certification. Several commenters recommended development of more 
specific minimum requirements for test plans and measurement of 
results. They further recommended that ONC provide additional guidance 
about what will constitute a minimally acceptable testing plan with 
explicit content depicting the minimum requirements for each component 
of the testing plan.
    Response. We thank commenters for their feedback. As discussed in 
the Proposed Rule and above, we believe health IT developers are in the 
best position to design and facilitate implementation of real world 
testing approaches that balance the burdens of this statutory 
requirement with its intended assurances that certified health

[[Page 25770]]

IT meets Program requirements, including interoperability performance, 
applicable under the certification it holds. We have therefore 
finalized requirements in Sec.  170.405(b)(1) designed to avoid the 
risk of a ``one size fits all'' set of testing tools (discussed at 84 
FR 7496) that might not fully address the concerns raised or provide 
the assurances of interoperability performance sought across the 
various types of care settings. By establishing in Sec.  
170.405(b)(1)(iii) the topics and considerations every developer must 
address in its required real world testing plan but not specifying how 
they must address these required aspects we have provided health IT 
developers with a requirement that at the same time provides them with 
the flexibility to develop and implement successful real world testing 
plans that will best balance burden and value for the customers of each 
of their products. The ONC-ACBs will be responsible for assessing real 
world testing plans and results reports for completeness in comparison 
to what Sec.  171.405(b)(1) requires the plan and results reports to 
include or address, but will otherwise not be formally evaluating the 
testing approach for quality as a testing approach. We note for clarity 
that while ONC-ACB's will not be judging a developer's real world 
testing approaches as planned or as executed, the contents of a 
developer's publicly available real world testing results could be used 
by an ONC-ACB as part of its ongoing surveillance of certified health 
IT. Additionally, we have finalized our proposed requirement in Sec.  
170.405(a) and (b) that requires developers subject to the real world 
testing Condition and Maintenance of Certification requirements (see 
Sec.  170.405(b)(2)(i)) who discover in the course of their real world 
testing any non-conformities with the standards, functionalities, or 
other requirements of any certification criterion under the Program, to 
address these non-conformities in order for their Health IT Modules to 
remain certified. This requirement will apply in the same manner to 
Health IT Modules certified under the SVAP flexibility in Sec.  
170.405(b)(8) or (9) as to Health IT Modules not certified under the 
SVAP flexibility. Thus, developers who discover non-conformity to any 
Program requirement(s) will be required to report those non-
conformities to their ONC-ACB(s). In order to provide a clear threshold 
for determining whether a developer has acted on this requirement in a 
timely manner, we have finalized the requirement to report non-
conformities within 30 days of discovering them (see Sec.  
170.405(b)(2)(i)). We believe 30 days is an appropriate timeframe to 
allow developers the opportunity to gather all facts and report to 
their ONC-ACBs the details and nature of the non-conformity. 
Furthermore, we believe more than the 30 days would extend beyond the 
timeframe by which a non-conformity should be investigated by an ONC-
ACB and corrective action implemented, if necessary.
    We are aware that by choosing not to specify particular methods, 
tools, or checklists of activities that must be included in real world 
testing, and providing instead extensive flexibility for developers to 
select tools and design overall methodologies based on their knowledge 
of their products and customers, we are asking developers to apply 
innovation and problem solving skills to their real world testing. We 
believe that the alternative of developing a catalog of detailed 
specifications and checklists, as some commenters suggested, would be 
undesirably complex, less supportive of ongoing innovation in the 
market, and not ultimately less burdensome for developers or their 
customers. As we have noted in the context of prior Program rulemaking 
actions, we often make additional information resources and non-binding 
guidance regarding real world testing available through familiar 
communications channels, such as the HealthIT.gov website.
    Comments. Several commenters expressed concerns about the burden of 
real world testing in specific reference to ONC-ACB processes for in-
the-field surveillance of certified products' continued conformance to 
applicable certification criteria. Some comments raised concerns about 
the burden that could be placed on developers' customers should 
developers choose to rely heavily on the procedures used by ONC-ACBs 
for randomized or reactive in-the-field surveillance. Some comments 
indicated concern that ONC would expect, encourage, or view more 
favorably real world testing approaches that rely heavily or 
exclusively on use of ONC-ACB in-the-field surveillance protocols.
    Response. In the Proposed Rule, we stated that ``developers may 
consider working with an ONC-ACB and have the ONC-ACB oversee the 
execution of the health IT developer's real world testing plans, which 
could include in-the-field surveillance per Sec.  170.556, as an 
acceptable approach to meet the requirements of the real world testing 
Condition of Certification'' requirement (84 FR 7497). Having 
considered all comments received, we have decided not to finalize the 
flexibility for developers to use ONC-ACBs' in-the-field surveillance 
as part of the developer's real world testing plan. We do not believe 
that use or replication of methods or protocols used by ONC-ACBs for 
in-the-field surveillance of certified Health IT Modules would be the 
most effective or the least burdensome approach available to health IT 
developers and are concerned accepting real world testing approaches 
that rely on ONC-ACB in-the-field surveillance could slow rather than 
accelerate development of more innovative approaches to real world 
testing. We are also concerned that inclusion of ONC-ACB execution of 
in-the-field surveillance within a developer's real world testing 
approach could lead to confusion as to whether the organization that is 
an ONC-ACB was applying in-the-field surveillance protocols in its 
capacity as an ONC-ACB as part of its oversight responsibilities on 
behalf of ONC or in its private capacity on behalf of the health IT 
developer. We believe it is important, to protect HIPAA covered health 
care providers and other HIPAA covered entities and their business 
associates from inadvertently violating requirements related to 
disclosure of health information, to maintain a clear distinction of 
when an organization that is an ONC-ACB is acting in the ONC-ACB 
capacity and when it is acting in its private capacity. We note and 
emphasize this because, in the event a developer may choose to engage 
services in support of developing or implementing the developer's real 
world testing plans from an organization or entity that also happens to 
be an ONC-ACB, all activities undertaken by the organization or entity 
to develop, execute, or support the development or execution of the 
developer's real world testing plan would be activities outside the 
ONC-ACB role. In such circumstances, the organization that is an ONC-
ACB would be acting in a separate, private capacity. Note that an 
organization providing such private services that involve ePHI would 
likely be characterized under the HIPAA Rules as a business associate 
to the health care provider and subject to the HIPAA Rules. The 
oversight authorities attached to its ONC-ACB role would not apply to 
the organization's requests to gain access to health care provider 
facilities or to EHI for purposes of providing these separate support 
services to health IT developers for conduct of the developers' real 
world testing.

[[Page 25771]]

    Comments. Several commenters sought confirmation that a test server 
could be used for real world testing instead of a production 
environment, given the permissible use of synthetic data.
    Response. After considering the totality of comments received, we 
have decided to finalize that a test server could be used for real 
world testing and provide the flexibility included in the Proposed Rule 
that allows for real world testing to occur in a production setting 
using real patient data in accordance with applicable laws as well as 
in an environment that mirrors a specific production environment used 
in a type of clinical setting for which the health IT is marketed. We 
have also decided to finalize the flexibility for the developer to use 
synthetic patient data in lieu of or in addition to real patient data 
in real or simulated/test scenarios executed in environments that 
mirror production environments where the health IT is deployed. 
However, we emphasize that the purpose of real world testing is to 
demonstrate that the Health IT Module(s) work as expected in real-life 
clinical settings. We note, as a point of potential interest for such 
consideration, that real world testing plans that meet the Program 
requirement might include observation or measurement of the health IT's 
interoperability performance while actual scenarios and use cases are 
executed by end users on real patient data in actual operational 
contexts. If a developer chooses to use synthetic data, non-production 
(mirrored) environments, or a combination of real and synthetic data or 
production and mirrored environments, to complete any portion of their 
annual real world testing requirements, the developer must include in 
their real world testing plan and results submissions a specific 
explanation justifying how the synthetic data, mirrored environment, or 
both are appropriate and adequate to meet the real world testing 
requirement(s) for which they will be or were used.
    Comments. Several commenters sought confirmation that a product 
serving multiple care settings could complete a single test relevant to 
all settings and ask ONC to provide a list of eligible care settings 
for reference.
    Response. The finalized real world testing Condition and 
Maintenance of Certification requirements include testing each 
criterion listed in Sec.  170.405(a) to which any Health IT Module(s) 
within the product are certified, and testing in each type of setting 
to which it is marketed. To satisfy these Condition and Maintenance of 
Certification requirements as finalized, a single testing plan, 
protocol, or approach must address all the types of settings to which 
the product, with all its included Health IT Module(s), is marketed and 
do so with traceability to each Health IT Module of its real world 
performance in each type of setting for which it is marketed. We 
believe it is possible to construct a real world use scenario or use 
case that tests more than one type of setting applicable to the Health 
IT Module, and confirm that a developer is not required to develop 
unnecessarily or artificially separate scenarios or use cases across 
multiple types of settings to which a given developer markets its 
applicable Health IT Module(s). With respect to the types of settings 
required to be addressed by a given developer's plan, we do not believe 
that additional specification is necessary because we believe each 
developer is well situated to know for what types of settings the 
developer (or its authorized resellers) has marketed, is marketing, or 
intends to market its Health IT Modules. For purposes of this Condition 
and Maintenance of Certification requirement as finalized, there is no 
exclusion for settings or health care provider types based on their 
inclusion or lack of inclusion in, or eligibility or ineligibility for, 
and particular Federal health care program or initiative. Therefore, 
the types of settings eligible to be addressed in a developer's real 
world testing plan for a given year include all those to which 
product(s) including one or more Health IT Modules certified to one or 
more of the criteria listed at Sec.  170.405(a) as of August 31 of the 
year in which that specific annual real world testing plan is due have 
been or are marketed when the real world testing plan is submitted, 
and/or the types of settings for which the developer anticipates 
marketing such product(s) in time to include them in a specific year's 
real world testing activities.
    Comments. Several commenters requested ONC ensure that real world 
testing requirements do not create infrastructure for testing of public 
health transactions without public health involvement. Several 
commenters noted that public health organizations and many public 
health agencies already offer resources and processes used in 
onboarding processes for public health reporting connections and 
suggested these resources and processes could be used more broadly to 
test health IT's real world performance on public health 
interoperability criteria rather than requiring creation of new or 
different tools.
    Response. We would tend to agree that relying for specific use 
cases on testing infrastructures developed without appropriate 
involvement of key participants in the use case would not be an optimal 
approach. Also, we reiterate that we encourage developers to consider a 
variety of options and approaches before finalizing their annual real 
world testing plans. We would encourage developers to consider the real 
world testing potential of resources, tooling, and infrastructure 
already offered by public health organizations and agencies before 
embarking on efforts to develop additional tooling. We also note that, 
for the interoperability-focused public health criteria, alternatives 
that would avoid both overuse of simulation environments and asking 
public health agencies to engage in work unique to developers' real 
world testing plans might include structured observation and 
measurement of interoperability performance in actual public health 
data reporting/exchange as well as the testing ordinarily conducted for 
onboarding/confirming connectivity of newly deployed/upgraded 
implementations to public health data exchange infrastructures.
    Comments. A number of commenters expressed support of requiring the 
use of metrics/measurements for real world testing. One commenter 
stated that ONC should not allow just one measurement to suffice for 
real world testing of interoperability of a Health IT Module. Several 
commenters recommended ONC include a description of ``measurement,'' 
provide clarity on the role of measurement, and provide a ``sample'' or 
suggested set of metrics/measurements to help foster alignment of 
reporting around meaningful common metrics/measurements across 
developers. Some commenters recommended ONC identify a core set of 
metrics/measures that developers would be required to include, or from 
which developers would be required to select specific metrics/measures 
to include, in their real world testing plans. Other commenters 
advocated against developers being required to submit testing results 
for a minimum ``core'' set of general metrics, providing the rationale 
that not all metrics will be available to all systems uniformly and 
suggesting that many metrics are retained in the provider's locally 
integrated production systems and unavailable to the developer of any 
given Module(s) without considerable effort to retrieve the data. One 
commenter recommended requiring that each developer's real world test 
plan include measures addressing all of the domains of the NQF report:

[[Page 25772]]

Measurement Framework to Assess Nationwide Progress Related to 
Interoperable Health Information Exchange to Support the National 
Quality Strategy.\110\
---------------------------------------------------------------------------

    \110\ https://www.qualityforum.org/Projects/i-m/Interoperability_2016-2017/Key_Informant_Summary_Report.aspx (last 
accessed 12/17/2019).
---------------------------------------------------------------------------

    Response. The comments on real world testing did not show clear, 
widespread support for any specific subset of available metrics as a 
``core'' set or catalog that a significant portion of the affected 
communities (health IT developers, health care providers, and public 
health agencies) would generally agree should be consistently used 
across all developers' real world testing plans. Thus, we have 
finalized the real world testing plan requirements (see Sec.  
170.405(b)(1)(iii) and real world testing results reporting 
requirements (see Sec.  170.405(b)(2)(ii)) without identifying a 
minimum set of measures that must be used or a catalog of suggested 
measures from which a developer would be expected to choose in 
constructing its real world testing plans. We reiterate that each 
developer must choose a measurement approach, including at least one 
measurement/metric per applicable criterion, for use in each year's 
real world testing and explain the selection and relevance of its 
selected measures/metrics within its justification for its real world 
testing approach in that year's plan and results report.
    Comments. Comments were received on the frequency and timing of 
real world testing. One commenter stated the policy should not require 
annual testing if the capability certified for a given criterion 
remains unchanged year to year, offering the example that if a Health 
IT Module is certified for both Sec.  170.315(b)(1) and (b)(2) and the 
developer is planning to release material updates to the capabilities 
specific to Sec.  170.315(b)(1), but not make any material changes 
specific to the Module's certification to Sec.  170.315(b)(2), this 
commenter would prefer that the Health IT Module would need to submit a 
testing plan and subsequent results addressing only the Sec.  
170.315(b)(1) criterion for the year the change is made. Another 
commenter expressed skepticism regarding the value of annual real world 
testing requirements, expressing a preference for an approach that 
developers would, after an initial cycle of post-certification real 
world testing of a Health IT Module, be required to re-test only when 
updating to National Coordinator-approved newer versions of adopted 
standards included in applicable criteria or when making major 
functional updates to the certified Health IT Module. One commenter who 
was overall not supportive of the real world testing requirement stated 
that developers would need a two-year cycle instead of a one-year cycle 
in order to adequately demonstrate compliance with full functionality 
testing. One commenter specifically expressed support for the annual 
frequency and timing of required real world testing results reporting.
    Response. We thank the commenters for their feedback regarding the 
frequency and timing of real world testing. We have finalized the 
requirement for annual testing in Sec.  170.405(b)(1). Ongoing annual 
testing is needed to ensure that Health IT Module(s) continue to 
perform as intended in the types of settings where patients and health 
care providers continue to rely on it to meet their interoperability 
needs.
    Comments. Several commenters expressed support of the proposed real 
world testing plan requirements and requested we strengthen this 
provision to require that developers test their products within each 
clinical specialty to which the technology would be marketed. One 
commenter requested that we define with more particularity what is 
expected of developers during the testing to account for the differing 
conditions under which Health IT Modules are deployed, and how for 
example, the system works particular conditions like server 
degradation. Several other commenters suggested we provide a 
standardized template for use in developing test plans. Commenters 
described a template would include all required testing elements and 
promote greater consistency in the way the test plans are written by 
the various developers.
    Response. For reasons stated in the Proposed Rule (84 FR 7496) and 
above, we do not believe a centrally developed or standardized approach 
for real world testing plans is the most appropriate solution at this 
time. By centrally mandating or endorsing a single template in the 
interest of consistently formatted documentation, we are concerned that 
we might inadvertently discourage innovation in both testing approaches 
and their communication to the customer community. What the plan must 
include or address for each applicable criterion to which the 
developer's Health IT Module(s) are certified is outlined in Sec.  
170.405(b)(1)(iii), as finalized by this rule. We believe the plan 
requirements finalized in the plan requirements in Sec.  170.405(b) are 
specific enough to ensure the plans can be completed by developers and 
effectively reviewed for completeness by ONC-ACBs, and that both the 
substance and clarity or efficacy of presentation can both be examined 
and considered by any interested parties--from health care providers to 
informatics and interoperability researchers. Because individual 
circumstances and needs may vary even within the same type of setting 
or clinician specialty, it would be not be possible at this time to 
define a real world testing regime that eliminated all of the 
variability developers may have in implementing their real world 
testing plans.
    Comments. One commenter sought clarification on the total minimum 
number of metrics required for a developer's real world testing plan to 
be considered complete and in compliance with the requirement.
    Response. A developer's real world testing plan must include at 
least one metric for each applicable certification criteria. To ensure 
that we are providing clear guidance, we offer the following 
illustrative example: A developer with one Health IT Module that is 
certified to five criteria would need to include in its real world 
testing plan at least one specific measurement/metric associated with 
the real world testing for each of those five criteria. Depending on 
the specific criteria and the developer's real world testing approach, 
this could call for up to five different measurements/metrics, or could 
be addressed with fewer different measurements/metrics but a specific 
measurement/metric would need to be identified/attributed within the 
plan to each of the applicable certification criteria.
    Comments. A few commenters stated concerns regarding our mandatory 
focus on scenario- and use case-focused testing. One commenter 
expressed a view that this would be expensive and time consuming, 
stating that this expense limits scenario- and use case-focused testing 
in the number of settings that can realistically be tested in any given 
year. One commenter noted that as more settings are tested, fewer 
scenarios can be run per setting. Two commenters sought more 
information on the mandatory scenario- and use case-focused testing 
that will be required, recommending that Health Information Service 
Providers (HISPs) be able to attest to the relevant use cases and 
provide the proper evidence of testing associated to those scenarios.
    Response. In light of comments received, we can see how our use of 
terms that are also used in the context of ONC-ATL laboratory or ONC-
ACB surveillance testing, and our reference in one instance to in-the-
field

[[Page 25773]]

surveillance, could have led to an inference that our use of these 
terms implied we would expect to see the same or similar testing 
protocols used in real world testing. However, we did not propose that 
real world testing would require developers to set up and execute 
artificial scenarios or activities solely for purposes of testing. In 
fact, we do not encourage use of the laboratory testing or ONC-ACB in-
the-field surveillance protocols to conduct real world testing, as 
those particular test methods, tools, and surveillance protocols were 
not designed and should not be relied upon for real world testing. The 
testing methods/methodologies need to address realistic scenarios, use 
cases, and workflows associated with interoperability, and we do expect 
developers to consider such factors as the size of the organization 
that production systems support, the type of organization and setting, 
the number of patient records and users, system components and 
integrations, and the volume and types of data exchange in planning for 
real world testing.
    Comments. One commenter expressed agreement that the developer is 
best situated to determine the most effective real world testing plan 
for their products. One commenter requested developers be allowed to 
work together with their customers to define what real world tests are.
    Response. The requirements we proposed and finalized provide 
developers the opportunity to identify, potentially in partnership with 
their customers, the real-life scenarios, use cases, and work flows 
applicable to the customer's day-to-day use of the Health IT Module(s) 
to meet their interoperability needs in their production environments.
d. Submission Dates
    We proposed that a health IT developer must submit an annual real 
world testing plan to its ONC-ACB via a publicly accessible hyperlink 
for availability to ONC and the public no later than December 15, of 
each calendar year, and that the plan must address all of its Health IT 
Modules certified to the 2015 Edition certification criteria listed in 
proposed in Sec.  170.405(a) and (84 FR 7496). We proposed requiring 
that prior to submission to the ONC-ACB, the plan will need to be 
approved by a health IT developer authorized representative capable of 
binding the health IT developer for execution of the plan and include 
the representative's contact information. We proposed that the plan due 
in any given year will need to include all health IT certified to the 
2015 Edition through August 31 of that year (in other words, the August 
31 that immediately preceded the December 15 due date).
    We further proposed that a health IT developer would submit annual 
real world testing results to their ONC-ACBs via a publicly accessible 
hyperlink no later than January 31 of each calendar year for the real 
world testing conducted in the preceding calendar year (84 FR 7497). We 
proposed that real world testing results for each certification 
criterion listed in Sec.  170.405(a) would be required to address the 
elements required in the previous year's testing plan, describe the 
outcomes of real world testing with any challenges encountered, and 
provide at least one measurement or metric associated with the real 
world testing.
    Comments. Some commenters expressed concerns that the annual real 
world testing plan due date falls in December, noting that in addition 
to multiple holidays widely celebrated in the U.S., December can be a 
busy time for many health IT developers due to various year-end 
requirements and necessary preparations to support customers' quality 
measurement data submissions for CMS programs.
    Response. We understand the commenters' concern that the proposed 
real world testing plan publication due date falls in the preparatory 
run-up to year-end deadlines, including for many developers completing 
preparations to support their customers' successful clinical quality 
measurement data submission during CMS program windows that typically 
open on the first Federal business day in January. In consideration of 
comments received, we have made edits to the phrasing of the CFR text 
in Sec.  170.405(b) to convey with more precise clarity that under the 
policy we have finalized, the developer is required to submit its real 
world testing plans so that the ONC-ACB can conduct its completeness 
review and publish the plan hyperlink on CHPL no later than December 15 
of each year. This allows for the ONC-ACB and developer to identify and 
agree on the date by which the developer will actually submit its plan 
to the ONC-ACB, which could be well in advance of December. One 
practical implication of the single-deadline feature of the policy as 
proposed is that in order for the plans to be submitted to ONC and made 
publicly available by the single deadline, the ONC-ACB's requirement to 
review plans for completeness per Program requirements will in many 
cases mean that the ONC-ACB will need the developer to submit the plan 
to the ONC-ACB in advance of the single deadline. We have finalized the 
December 15 due date for real world testing plan publication on CHPL as 
proposed. We have also made clarifying edits to the finalized 
regulation text (see Sec.  170.405(b)(1)) in comparison to the proposed 
text to more explicitly recognize the practical implication that the 
developers' and ONC-ACBs' responsibility for a single publication date 
for the plans means that the plan must be submitted by the developer to 
the ONC-ACB on a date agreed between them that allows for publication 
by the deadline. We encourage developers and ONC-ACBs to consider 
allowing at least one calendar month so that the December 15 due date 
for ONC-ACBs' publication of real world testing plans will be 
consistently met. We also note that nothing in Sec.  170.405 as 
finalized precludes a developer and ONC-ACB from agreeing on the 
developer submitting its annual real world testing plan to the ONC-ACB 
more than one month prior to December 15. We have finalized the single 
plan publication deadline as proposed.
    We did not receive comments specific to August 31 as the annual 
date when a Health IT Module must be certified by in order to be 
required to be included in the real world testing plan due that year. 
We have finalized this aspect of our policy as proposed in Sec.  
170.405(b)(1)(ii). Thus, developers can submit their real world testing 
plans as early as September 1 and on a rolling basis thereafter for 
products in scope for the following year, which also addresses 
commenter concerns.
    We did not receive comments specific to this point, but have 
removed from Sec.  170.405(b) as finalized the language that would have 
specifically required the initial submission of the plan to the ONC-ACB 
by the developer must be by a publicly accessible hyperlink. While this 
remains an option, and could be the most efficient one for developers 
and ONC-ACBs in many instances, we believe this is an unnecessarily 
limiting specification of the manner of interaction between developers 
and ONC-ACBs in these instances. The URL or hyperlink in CHPL will not 
be published on CHPL until the ONC-ACB takes action to publish it, and 
the ONC-ACB is required to review the plan and ensure it is complete 
before publishing the plan link on CHPL.
    Comments. We received some comments that appeared to construe our 
intent to be that real world testing for all Health IT Modules 
certified as of August 31 of a given year would need to be planned, 
conducted, and reported within five months of that date. Comments that 
appeared to be based on this interpretation also expressed

[[Page 25774]]

concern that this would be too much to accomplish on such an annual 
schedule.
    Response. We proposed that each developer's annual real world 
testing plan required to be published by December 15 of a given year 
would need to address all of the developer's Health IT Modules 
certified to criteria listed in Sec.  170.405(a) as of August 31 of 
that year (84 FR 7496). We also proposed that this annual real world 
testing plan would pertain to real world testing activities to be 
conducted in the year following the December 15 plan publication due 
date. In light of comments received, we can see how we might have been 
more precise in how we stated that the annual results report would be 
due early in the year following the year in which the testing it 
reported was conducted. The full cycle of real world testing for a 
given year was never specifically proposed to be contained within a 
single year, considering that the plan is due in the year prior and the 
results report was proposed to be due in the year following the one in 
which a given annual round of real world testing activity occurs.
    Comments. Comments raised concerns that the January 31 publication 
deadline might not leave enough time for developers who do not or 
cannot complete their annual testing activities until late in the 
testing year to submit their results reports, and ONC-ACBs complete 
their required reviews, prior to the publication deadline. One 
commenter raised a specific concern that the proposed January 31 due 
date for real world testing results falls in the submission window for 
several CMS programs for which developers' customers need to submit 
their clinical quality measurement data for the preceding year. One 
commenter recommended leveraging the existing quarterly update 
attestation process and asking developers to conduct real world testing 
on those items identified as major changes.
    Response. As with the plan due date, the practical implication of 
this proposal is that each developer will need to submit their results 
reports to their ONC-ACB sufficiently in advance of the due date for 
publication for the ONC-ACB to be able to complete its pre-publication 
responsibilities for all of the results reports and still publish no 
later than that due date. In theory, this means that in some cases 
developers could complete their real world testing relatively early in 
a given testing year and submit their results report for that year 
before the CMS submission window for that year's measurement data even 
opens for the developer's customers. However, considering the comments 
received, we do recognize it is possible developers may for various 
reasons not be able to complete their annual real world testing 
activities until fairly late in any given testing (calendar) year. We 
also recognize that the data submission window for CMS programs can be 
a busy time for developers, and would not wish to disadvantage newer or 
smaller developers who may not have separate resources available to 
finalize a report of real world testing not concluded until late in the 
testing year while simultaneously supporting customers' data 
submissions. In light of these comments, we have decided to finalize a 
deadline for publication on the CHPL of the publicly accessible 
hyperlink to developers' report of real world testing conducted in the 
prior year at March 15 of each year (see Sec.  170.405(b)(2)(ii)). This 
finalized date gives an additional six weeks for finalization and 
submission by developers compared to the date originally proposed. It 
also implements a single deadline, to which the developers and ONC-ACBs 
are mutually accountable, in parallel to the annual real world testing 
plan submission requirement in Sec.  170.405(b)(1). We believe this 
strikes an appropriate balance between timely availability of annual 
real world testing results and recognition that some developers may 
need to devote a substantial amount of focus to the CMS quality 
measures data submission windows at the beginning of each year. 
Although we have opted not to mandate developers submit their results 
reports to their ONC-ACBs by a date providing a minimum required lead 
time for ONC-ACBs' required review of the report, we would suggest that 
ONC-ACBs and developers consider the potential merits of allowing at 
least one calendar month between the developer's initial submission of 
their real world testing results report to the ONC-ACB and the March 15 
publication deadline.
e. Real World Testing Pilot Year
    We acknowledged in the Proposed Rule that a subsequent final rule 
for that may not provide sufficient time for health IT developers to 
develop and submit plans for a full year of real world testing in 2020 
(84 FR 7497). Therefore, we indicated in the Proposed Rule that we 
expected to provide an appropriate period of time for developers to 
submit their plans, and potentially treat 2020 as a ``pilot'' year for 
real world testing. We expected that the pilot testing of real world 
testing would match up to the fullest extent practicable with our 
proposed real world testing requirements (e.g., same criteria but for a 
shorter duration and without the same consequences for noncompliance). 
We welcomed comments on this potential approach.
    Comments. The majority of comments specifically addressing this 
point were in support of 2020 being treated as a pilot year. One 
commenter agreed that deferring the implementation or constructing a 
pilot year for the Program would be appropriate and stated their belief 
that 2020 may be too early even to conduct a pilot.
    Response. We thank commenters for their thoughts on potential 
piloting of real world testing and the timing of initiating real world 
testing requirements. In consideration of the timing of the final rule, 
we have decided not to finalize 2020 as a pilot year since developers 
will now have the majority of calendar year 2020 to develop a 
prospective plan for real world testing that would begin in 2021. 
However, we recognize that this first ``performance'' year of real 
world testing in 2021 presents unique challenges with respect to the 
development of initial plans, and we fully intend to approach both the 
submission of initial plans and submission of retrospective testing 
results for those plans (i.e., 2021 real world testing results) as 
learning experiences for developers that can be used to inform future 
iterations of real world test plans. As noted in the proposed rule (84 
FR 7497), the due date for the first annual real world testing plan 
would be finalized based in part on the timing of the final rule. 
Because this final rule is publishing well in advance of the December 
15 annual due date for publication of developers' plans of real world 
testing activities to be conducted in the following year, we have 
concluded it is reasonable to require the first annual real world 
testing plan be published via a publicly accessible hyperlink on the 
CHPL no later than December 15, 2020. This initial real world testing 
plan must address any and all of the developer's Health IT Modules that 
hold a current, valid certificate under the Program as of August 31, 
2020. The real world testing plan due to be published in December 2020, 
will need to address the real world testing activities that will occur 
during calendar year 2021. The report of results for this initial 
(2021) annual real world test cycle will be due to be published on the 
CHPL no later than March 15, 2022.
f. Health IT Modules Certified But Not Yet Deployed
    We proposed (84 FR 7497) that even if a health IT developer does 
not have customers or has not deployed their

[[Page 25775]]

certified Health IT Module(s) at the time the real world testing plan 
is due, the health IT developer would still need to submit a plan that 
prospectively addresses its plans for real world testing that would 
occur in the coming year for those Health IT Modules that had been 
certified on or before August 31 of the calendar year in which the plan 
is due (the calendar year immediately preceding the calendar year 
during which testing addressed by any given annual real world testing 
plan will take place). If a health IT developer has not yet deployed 
their certified Health IT Module to any real world users when the 
annual real world testing results are due for that module, we proposed 
that the developer would need to report as such to meet the proposed 
Maintenance of Certification requirement.
    Comments. We received no comments on this proposal.
    Response. We have finalized this proposal. Any Health IT Module 
certified to at least one criterion within the scope of real world 
testing as of August 31 of a given year must be addressed by its 
developer's real world testing plan for the subsequent year that must 
be published via publicly accessible hyperlink on the CHPL by the 
December 15 due date (see Sec.  170.405(a)). This requirement applies 
regardless of whether that Health IT Module is in actual real world use 
prior to December 15 (or the earlier date by which the developer and 
ONC-ACB agree the developer will submit its annual real world testing 
plan to the ONC-ACB to ensure the developer and ONC-ACB meet single, 
December 15, deadline for the plan to have been reviewed for 
completeness and published on CHPL). To ensure precise clarity about 
the effect of the August 31 reference date for purposes of real world 
testing requirements, we reiterate that if a developer has at least one 
Health IT Module certified to at least any one criterion within the 
real world testing scope of applicability as of August 31 of a given 
year, the real world testing Condition and Maintenance of Certification 
requirements apply to that developer and the developer must submit an 
annual real world testing plan for that year, addressing each of their 
Health IT Module(s) certified to any (one or more) criteria listed in 
Sec.  170.405(a) and that plan must meet the requirements in Sec.  
170.405(b)(1)(iii) for each module and criterion. Only developers who 
have no Health IT Module(s) certified to any criterion within the real 
world testing scope of applicability as of August 31 of a given year 
need not submit a real world testing plan that year and would not be 
required to perform real world testing in the subsequent year.
g. Standards Version Advancement Process (SVAP)
    As discussed in the Proposed Rule (84 FR 7497), as newer versions 
\111\ become available for adopted standards and implementation 
specifications included in the certification criteria subject to the 
real world testing Condition and Maintenance of Certification 
requirements, we believe that a health IT developer's ability to 
conduct ongoing maintenance on its certified Health IT Module(s) to 
incorporate these newer versions of Secretary-adopted standards and 
implementation specifications (``standards'') is essential to support 
interoperability in the real world. Updated versions of standards 
reflect insights gained from real-world implementation and use. They 
also reflect industry stakeholders' interests to improve the capacity, 
capability, and clarity of such standards to meet new, innovative 
business needs, which earlier standards versions cannot support. 
Therefore, as part of the real world testing Condition of 
Certification, we proposed a Maintenance of Certification flexibility 
that we refer to as the Standards Version Advancement Process 
(SVAP).\112\ This flexibility would permit health IT developers to 
voluntarily use in their certified Health IT Modules newer versions of 
adopted standards so long as certain conditions are met. As we stated 
in the Proposed Rule, these conditions are not limited to but notably 
include successful real world testing of the Health IT Module using the 
new version(s) subsequent to the inclusion of these newer standards and 
implementation specification versions in the Health IT Module's 
certification. We proposed to establish the SVAP not only to meet the 
Cures Act's goals for interoperability, but also in response to the 
continuous stakeholder feedback that ONC has received through prior 
rulemakings and engagements, which requested that ONC establish a 
predictable and timely approach within the Program to keep pace with 
the industry's standards development efforts.
---------------------------------------------------------------------------

    \111\ We note that standards developing organizations and 
consensus standards bodies use various nomenclature, such as 
``versions'' or ``releases,'' to identify updates to standards and 
implementation specifications.
    \112\ Regulation text implementing the real world testing 
Condition and Maintenance of Certification requirement was proposed 
in Sec.  170.405, including but not limited to SVAP-specific 
provisions proposed in Sec.  170.405(b)(5). The SVAP-specific 
provisions have now been finalized in Sec.  170.405(b)(8) and (9) 
(see section VII.B.5.g of this final rule).
---------------------------------------------------------------------------

    The SVAP we proposed, with corresponding proposed revisions for 
Sec. Sec.  170.500 and 170.555, introduces two types of administrative 
flexibility for health IT developers participating in the Program (84 
FR 7498). First, for those health IT developers with existing certified 
Health IT Module(s), such Health IT Modules could be upgraded to a new 
version of an adopted standard within the scope of the certification 
and have support for that updated version of the standard reflected on 
the Health IT Module's certificate so long as: Such version was 
approved by the National Coordinator for use in the Program; and the 
developer satisfied all requirements of the SVAP including 
demonstration of conformance through an acceptable means (84 FR 7498 
through 7500). For purposes of the SVAP as applied to updates to Health 
IT Modules with certificates to criteria listed in Sec.  170.405(a) 
that include prior version(s) \113\ of the standards, acceptable means 
of demonstrating conformance include but are not necessarily limited to 
self-declaration of conformance, as proposed in 84 FR 7499 and 
finalized in this final rule. Second, for those health IT developers 
presenting health IT for certification to a criterion listed in Sec.  
170.405(a), a National Coordinator-approved newer version of a standard 
included in one of these criteria could be used in lieu of or in 
addition to the version of that standard incorporated by reference in 
Sec.  170.299 (84 FR 7498). However, for purposes of the SVAP as 
applied to health IT that is presented for certification to any 
criterion listed in Sec.  170.405(a), developer self-declaration is an 
acceptable means of demonstrating conformance only where there is not 
yet another conformance method available that can be validly used for 
that version of that standard (84 FR 7499 through 7500). The regulation 
text codifying requirements for health IT developers to avail 
themselves of each of the proposed types of administrative flexibility 
was proposed (84 FR 7595 through 7596) in Sec.  170.405(b)(5). 
Corresponding revisions to Sec.  170.550 and Sec.  170.555 were 
proposed in 84 FR 7598.
---------------------------------------------------------------------------

    \113\ Prior versions for this purpose could include those 
incorporated by reference in Sec.  170.299, National Coordinator 
approved newer versions, or a mix of such versions for any or all of 
the standards adopted by the Secretary in subpart B of part 170 that 
are included in a given criterion.
---------------------------------------------------------------------------

    We proposed that the SVAP would be available only for National 
Coordinator-approved newer versions of standards and implementation 
specifications (``standards'') that have already been

[[Page 25776]]

adopted into the Program by the Secretary through rulemaking in 
accordance with applicable law including the Administrative Procedures 
Act (5 U.S.C. 553) and sections 3001 and 3004 of the Public Health 
Service Act (PHSA) (42 U.S.C. 300jj-1 and 42 U.S.C. 300jj-11) (84 FR 
7498). We have finalized this aspect of the standards version 
advancement flexibility as proposed. Under current law and the 
finalized SVAP flexibility, a standard must be initially adopted by the 
Secretary through rulemaking before the National Coordinator can 
approve the use of newer updated versions of that standard in the 
Program.
    We also proposed that a health IT developer would be able to choose 
which of the updated standards versions approved by the National 
Coordinator for use in certification to include in its updated 
certified Health IT Module and would be able to do so on an itemized 
basis (84 FR 7499).
    We stated in the Proposed Rule that we welcomed comments on any and 
all aspects of our proposed SVAP as an option available to developers 
through maintenance requirements as part of the real world testing 
Condition and Maintenance of Certification requirements (84 FR 7500). 
We also invited comments on our proposal to allow in conjunction with 
this maintenance flexibility the opportunity for developers to elect to 
present health IT for initial testing and certification either to more 
advanced versions or to the prior adopted versions of the standards 
included in regulatory text as of the date the Health IT Modules are 
presented for certification.
    Comments. Comments were strongly supportive of the SVAP. Several 
commenters recommended the description of this process include 
recognition of the fact that developers and systems might need to 
maintain operational support for previously adopted versions of 
standards to avoid potential adverse effects on data access, exchange, 
and use.
    Response. We have finalized the SVAP in Sec.  170.405(b)(8) and (9) 
to provide the flexibility for which stakeholders' comments expressed 
support. This flexibility includes the option for a Health IT Module to 
be certified to the standards versions incorporated by reference in 
Sec.  170.299 and/or one or more National Coordinator-approved updated 
versions of standards included in the criteria listed in Sec.  
170.405(a). Thus, once the National Coordinator has approved for use in 
the Program more advanced version(s) of any standard(s) applicable to 
any of the criteria listed in Sec.  170.405(a), a health IT developer 
will have flexibility to choose on an itemized basis which of the 
National Coordinator-approved updated standards versions they wish to 
have included in their Health IT Module certification(s). Using the 
SVAP flexibility does not require a developer cease supporting prior 
version releases of standards referenced by applicable certification 
criteria.
    Comments. Several commenters expressed concerns about the effect of 
an uneven pace of advanced version implementation across health IT 
developers and products within and outside the Program. Several of 
these commenters recommended that, as developers voluntarily seek to 
support newer versions of standards and specifications through the 
SVAP, they also be required to maintain support for the adopted version 
of the standard listed in the Code of Federal Regulations (45 CFR part 
170, subpart B) for the applicable criteria until HHS conducts 
rulemaking that would require all certified health IT upgrade to the 
newer version of the standard and sunset older versions of the standard 
from the Program on a mandatory, coordinated timeline.
    Response. We do recognize the importance of ensuring that updated 
versions of standards are approved and available for use in the Program 
only when such use is consistent with the Program's purposes. We do not 
anticipate that the National Coordinator would approve a newer version 
of a standard for use in the Program where that is inconsistent with 
the Program's purposes, notably including the maintenance and 
advancement of interoperability. Moreover, we believe there is 
substantial value in allowing for the market to, in effect, sunset 
obsolete standards versions at its own pace unless a hard cutover (or 
other highly coordinated nationwide timeline for abandoning older 
versions) would be necessary to sustain functional interoperability. 
The SVAP flexibility simply allows for a developer to choose to work 
with their ONC-ACB to obtain certification, or to modify the scope of 
the of Health IT Module's certification, to reflect that the Health IT 
Module as certified includes: The version of each adopted standard that 
is incorporated by reference in Sec.  170.299; or a specific National 
Coordinator-approved updated version of each applicable standard; or a 
National Coordinator-approved updated version for each of one or more 
applicable standard(s); or multiple version(s) of any one or more 
adopted standard(s). Previously, developers were free to upgrade 
certified Health IT Modules to support newer versions of adopted 
standards, but only in addition to the version(s) of those standards 
incorporated by reference in Sec.  170.299. In our experience, newer 
versions render prior versions obsolete on a more rapid pace for some 
standards than for others and more rapidly than the versions 
incorporated by reference in regulations could be updated. Prior 
feedback had indicated that being required to maintain support for the 
version of a standard that is incorporated by reference in Sec.  
170.299 solely for the purpose of maintaining regulatory compliance 
under the Program represented a burden without commensurate value in 
cases where customers' operational interoperability needs could be met 
only by use of newer version(s) of particular adopted standards than 
the versions listed in the regulations. The SVAP is designed to 
eliminate that burden and simultaneously provide, through inclusion of 
support for advanced standards versions within a Health IT Module's 
certification, enhanced assurance to users that Health IT Modules 
supporting National Coordinator-approved newer versions of standards 
under the SVAP flexibility continue to meet all of the requirements of 
the criteria to which the Health IT Module is certified.
    Comments. A number of commenters requested clarification on how the 
proposed Standards Version Advancement Process would align with 
expansion of the USCDI, or whether the USCDI will be versioned through 
the SVAP. Some commenters expressed an opinion that the USCDI expansion 
process should not be executed or allowed via the SVAP and instead 
require rulemaking.
    Response. As discussed in section IV.B.1, we have adopted the USCDI 
as a standard in Sec.  170.213 and incorporated USCDI v1 by reference 
in Sec.  170.299(n)(5). For purposes of the SVAP, the USCDI will be 
treated like any other standard. This means that health IT when 
presented for certification to any one or more criteria referencing 
Sec.  170.213 will be required to support USCDI v1 or a later version, 
with SVAP providing flexibility for developers to choose whether to 
support later versions of USCDI that the National Coordinator may 
approve for use in the Program in lieu of or in complement to USCDI v1. 
Developers and will not be required to support newer versions of the 
USCDI standard instead of USCDI v1 until such time as Sec.  170.213 and 
Sec.  170.299 are updated. However, developers may voluntary choose to 
use the SVAP flexibility to voluntarily upgrade certified Health IT

[[Page 25777]]

Modules, or to seek certification of their health IT, to newer version 
release(s) of the USCDI if such release(s) have been approved by the 
National Coordinator for use under the Program. As with any other 
standard relevant to the SVAP flexibility, we would anticipate that the 
National Coordinator would not approve for voluntary use under the 
Program an updated version of any standard that would render Health IT 
Module(s) using it incapable of exchanging EHI with other technology 
certified under the Program to other version(s) of the standard. We 
also note that, although HHS is the steward of the USCDI standard, we 
have not at this time foreclosed the possibility that we could publish 
a newer update of the USCDI that the National Coordinator would not 
immediately approve for developers' voluntary use under the Program via 
the SVAP flexibility. We recognize a potential that expanding the USCDI 
to include additional data classes in future versions could lead to 
Health IT Modules certified to these more advanced versions of USCDI 
being able to access, use, and exchange more data classes than Health 
IT Modules certified only to earlier versions of the USCDI. However, 
the technology certified to National Coordinator-approved newer 
versions of the USCDI would be capable of exchanging the data classes 
included in prior version(s) of the standard. Thus, the flexibility 
maintains interoperability while allowing those who need additional 
data classes to be fully supported by certified health IT in their 
access, exchange, and use of these additional data classes and not 
forcing other users of certified health IT (who do not yet need to 
access, exchange, or use such additional data classes) to update their 
health IT. We therefore believe that allowing for expansion of data for 
which certified Health IT Modules can support interoperability at a 
pace driven by the market's progress in standards development and 
demand for interoperability is an important benefit of the SVAP 
flexibility.
    Comments. One commenter stated the SVAP would be more effective for 
electronic prescribing if it could be used to allow voluntary adoption 
of a new version of the NCPDP SCRIPT standard by prescribers, 
pharmacies, and Part D prescription drug plans without CMS rulemaking.
    Response. CMS is solely responsible for Medicare Part D program 
regulations and other policies, including its required e-prescribing 
standards and standards versions. In the future, the SVAP flexibility 
could enable developers to have the certifications of their Health IT 
Modules to e-prescribing criteria updated to reflect conformance of the 
Health IT Modules to newer versions of adopted standards that might be 
required by CMS Part D program or other HHS regulatory requirements 
before we could update the version(s) of e-prescribing standards 
incorporated by reference in Sec.  170.299. This approach would avoid 
the need for CMS or ONC to go through joint rulemaking in order 
maintain programmatic alignment.
h. Updating Already Certified Health IT Leveraging SVAP Flexibility
    We proposed that in instances where a health IT developer has 
certified a Health IT Module, including but not limited to instances 
where its customers are already using the certified Health IT Module, 
if the developer intends to update pursuant to the SVAP election, the 
developer will be required to provide advance notice to all affected 
customers and its ONC-ACB: (a) Expressing its intent to update the 
software to newer versions of the standard approved by the National 
Coordinator through the SVAP; (b) the developer's expectations for how 
the update will affect interoperability of the affected Health IT 
Module as it is used in the real world; and (c) whether the developer 
intends to continue to support the certificate for the existing Health 
IT Module version for some period of time and how long, or if the 
existing version of the Health IT Module certified to prior version(s) 
of applicable standards will be deprecated (e.g., that the developer 
will stop supporting the earlier version of the module and request to 
have the certificate withdrawn) (84 FR 7498). The notice would be 
required to be provided sufficiently in advance of the developer 
establishing its planned timeframe for implementation of the upgrade to 
the more advanced standard(s) version(s) in order to offer customers 
reasonable opportunity to ask questions and plan for the update. We 
requested public comment on the minimum time prior to an anticipated 
implementation of an updated standard or implementation specification 
version update that should be considered reasonable for purposes of 
allowing customers, especially health care providers using the Health 
IT Module in their health care delivery operations, to adequately plan 
for potential implications of the update for their operations and their 
exchange relationships. We also requested comments on specific 
certification criteria, standards, characteristics of the certified 
Health IT Module or its implementation (such as locally hosted by the 
customer using it versus software-as-a-service type of implementation), 
or specific types or characteristics of customers that could affect the 
minimum advance notice that should be considered reasonable across 
variations in these factors (84 FR 7499).
    Comments. Only a few commenters offered thoughts specifically on 
the minimum time prior to an anticipated implementation of an updated 
standard or implementation specification version update that should be 
considered reasonable. Several of these commenters noted that different 
market segments and provider types vary in their willingness or ability 
to upgrade to new software versions. One comment submission indicated 
two months would be a reasonable minimum time prior to implementation 
of an updated standard for their customers to be notified. Another 
commenter observed that the minimum timeframe prior to an anticipated 
implementation of an updated standard is two to four years.
    Response. The comments received comport with our prior 
understanding that the minimum advance notice needed to offer customers 
reasonable opportunity to ask questions and plan for the update or 
modification of Health IT Modules the customers are using or have 
purchased and scheduled for deployment varies across different 
circumstances. We have, therefore, decided to finalize the advance 
notice requirement as proposed. The regulation text for this 
requirement is finalized in Sec.  170.405(b)(8)(i). Thus, a developer 
choosing to take advantage of the SVAP flexibility must provide notice 
to its customers sufficiently in advance of the developer's anticipated 
timeframe for implementation of the update to the newer version(s) of 
applicable standard(s) to offer customers reasonable opportunity to ask 
questions and plan for the update. We note for clarity that we intend 
to apply a reasonableness standard to evaluating adequacy of advance 
notice timeframes for particular version updates in their specific 
factual contexts, prioritizing the perspective of a reasonable person 
in the situation of the developer's customers because this requirement 
is intended to protect the interests of those customers. We would 
anticipate that proactive engagement between the developers and their 
customers would result in mutually agreeable timeframes and obviate the 
need for us to assess reasonableness in at least the vast majority, and 
ideally the totality, of instances where developers choose to use the 
SVAP flexibility.

[[Page 25778]]

i. Health IT Modules Presented for Certification Leveraging SVAP 
Flexibility
    In instances where a health IT developer presents health IT for 
certification to a criterion listed in Sec.  170.405(a) to which the 
health IT is not already certified, we proposed that the health IT 
developer would be permitted to use National Coordinator-approved newer 
versions of any or all of the standards included in the criterion, 
instead of or in combination with the versions of these standards 
incorporated by reference in Sec.  170.299. In such circumstances, a 
health IT developer would be able to choose which National Coordinator-
approved standard version(s) it seeks to include in a new or updated 
certified Health IT Module and would be able to do so on an itemized 
basis. To enable this flexibility for developers seeking certification, 
we proposed to amend ONC-ACB Principles of Proper Conduct (PoPC) to 
require ONC-ACBs offer certification to National Coordinator-approved 
newer versions of standards and provide the ability for ONC-ACBs to 
accept a developer self-declaration of conformity as to the use, 
implementation, and conformance to a newer version of a standard 
(including but not limited to implementation specifications) as 
sufficient demonstration of conformance in circumstances where the 
National Coordinator has approved a version update of a standard for 
use in certification but no testing tool is yet available to test to 
the newer version (84 FR 7501).
    Comments. Commenters supported the proposal to allow for both 
updates to existing certifications of Health IT Modules and newly 
sought certifications to applicable criteria to follow a process of 
self-declaration where approved test tools are not yet available to 
support conformance validation of the pertinent National Coordinator-
approved newer version of a standard. A few commenters requested we 
clarify how developers can demonstrate conformance when a newer version 
of a standard is available for use under this process but does not yet 
have testing tools available under the Program.
    Response. We proposed (84 FR 7456) and have finalized modifications 
in Sec.  170.523(h) to permit ONC-ACBs to certify Health IT Modules 
that the ONC-ACB has evaluated for conformance with certification 
criteria without first passing through an ONC-ATL. As finalized, Sec.  
170.523(h)(2) provides that an ONC-ACB may certify a Health IT Module 
that has been evaluated by it for compliance with a conformance method 
approved by the National Coordinator. This provides flexibility for the 
National Coordinator to approve a conformance method other than ONC-ATL 
testing, for evaluating conformance where the National Coordinator has 
approved a version update of a standard for use in certification but an 
associated testing tool is not yet updated to test to the newer 
version. We have also made edits to the text in Sec.  170.405(b) as 
finalized in comparison to the text included in the Proposed Rule to 
make more immediately clear which specific requirements apply when 
developers choose to take advantage of the SVAP flexibility for 
updating Health IT Modules already certified to a criterion listed in 
Sec.  170.405(a) and which specific requirements apply when developers 
choose to leverage the flexibility when presenting Health IT Modules 
for certification to a criterion listed in Sec.  170.405(a).
    Comments. Commenters recommended HHS give health IT developers' 
flexibility to choose which standards to advance through this process 
and not obligate them to update to all possible standards at once.
    Response. In the Proposed Rule, we noted (84 FR 7497) that a health 
IT developer would be able to choose which National Coordinator-
approved standard version(s) it seeks to include in a new or updated 
certified Health IT Module and would be able to do so on an itemized 
basis. Under the finalized SVAP flexibility in Sec.  170.405(b)(9), 
health IT developers are permitted to choose to use National 
Coordinator-approved version(s) or the version incorporated by 
reference in Sec.  170.299 or both for any standard(s) included in 
applicable criteria it seeks to use in its certified Health IT 
Module(s) on an itemized, standard-by-standard basis at the developer's 
discretion.
    In the Proposed Rule, the regulation text for all SVAP requirements 
was proposed to be codified in Sec.  170.405(b)(5). The SVAP 
requirements, as finalized, are codified in Sec.  170.405(b)(8) and 
(9). We decided to codify the finalized SVAP requirements in separate 
paragraphs because it complements other wording changes to the 
finalized regulation text that we made to make more immediately clear 
on the face of the regulation which specific requirements (Sec.  
170.405(b)(8)) apply when developers choose to take advantage of the 
SVAP flexibility for updating Health IT Modules already certified to a 
criterion listed in Sec.  170.405(a) and which specific requirements 
(Sec.  170.405(b)(9)) apply when developers choose to leverage the 
flexibility when presenting Health IT Modules for certification to a 
criterion listed in Sec.  170.405(a).
j. Requirements Associated With All Health IT Modules Certified 
Leveraging SVAP
    As outlined in the Proposed Rule (84 FR 7499), in all cases, 
regardless of whether a health IT developer is updating an existing 
certified Health IT Module or presenting a new Health IT Module for 
certification to new versions of adopted standards approved by the 
National Coordinator through the Standards Version Advancement Process, 
we proposed that any developer choosing to take advantage of the 
proposed flexibility would need to:
     Ensure its mandatory disclosures in Sec.  170.523(k)(1) 
appropriately reflect its use of any National Coordinator-approved 
newer versions of adopted standards; and
     Address and adhere to all Program requirements--including 
but not limited to Conditions of Certification and Maintenance of 
Certification requirements--that are applicable to its certified Health 
IT Modules regardless of whether those Health IT Modules were certified 
to the adopted standards found in 45 CFR part 170 or National 
Coordinator-approved newer version(s) of the adopted standard(s).
    For example, as we proposed, a developer would need to ensure that 
its real world testing plan and actual real world testing include the 
National Coordinator-approved newer versions of standards to which it 
is claiming conformance, beginning with the plan for and real world 
testing conducted in the year immediately following the first year the 
developer's applicable Health IT Module(s) were, as of August 31, 
certified to the National Coordinator-approved newer versions of 
standards.
    Under the policies outlined in the Proposed Rule, developers would 
be held accountable for maintaining all applicable certified Health IT 
Modules in conformance with any National Coordinator-approved newer 
versions of standards and implementation specifications that they 
voluntarily elect to use in their certified health IT under the real 
world testing Condition and Maintenance of Certification requirements 
proposed in Sec.  170.405, the attestations Condition and Maintenance 
of Certification requirements proposed in Sec.  170.406, and through 
ONC-ACB surveillance applying to certificates that include National 
Coordinator-approved updated versions as it does to those that do not. 
We also included discussion indicating our intent that developers would 
be accountable for correcting

[[Page 25779]]

non-conformities with certification criteria that were discovered in 
real world testing of a Health IT Module certified using National 
Coordinator-approved newer versions. Under the proposed policies, 
prompt corrective action would be required by a developer discovering 
such non-conformity through real world testing, in similar manner as a 
developer would be accountable for correcting non-conformities 
discovered through real world testing of Health IT Modules certified 
using only the versions of Secretary-adopted standards that are 
incorporated by reference in Sec.  170.299, or through other Program 
means.
    Comments. We did not receive specific comments on these general 
requirements and details of the relationship between the proposed SVAP 
and other proposed Program enhancements or existing accountability 
mechanisms.
    Response. We have finalized these details of our SVAP policies as 
proposed.
    We stated in the Proposed Rule that we anticipate providing ONC-
ACBs (and/or health IT developers) with a means to attribute 
information on Health IT Modules' support for National Coordinator-
approved updated versions of standards to the listings on the CHPL for 
the Health IT Modules the ONC-ACB has certified, and proposed to 
require in the PoPC for ONC-ACBs that they are ultimately responsible 
for this information being made publicly available on the CHPL (84 FR 
7501). We requested public comment on any additional information about 
updated standards versions that may be beneficial to have listed with 
certified Health IT Modules on the CHPL.
    Comments. One commenter recommended ONC provide a method on the ONC 
CHPL for documenting the dot version/release associated with the new 
standard version implementation and clarify the ONC-ACBs reporting 
timeline for these types of standard version updates.
    Response. We thank the commenter for the feedback, which will help 
to inform our internal deliberations about future operational planning.
k. Advanced Version Approval for SVAP
    The Proposed Rule (84 FR 7500) included discussion of how, after a 
standard has been adopted through notice and comment rulemaking, ONC 
anticipated undertaking an open and transparent process to timely 
ascertain whether a more recent version of any standard or 
implementation specification that the Secretary as adopted in part 170 
should be approved for developers' voluntary use under the Program. We 
requested commenters' input on our anticipated approach to standards 
and implementation specification advanced version approval as outlined 
in the Proposed Rule.
    Comments. Some commenters expressed concerns that appeared to 
suggest an understanding that the SVAP would be used to adopt new 
standards into the Program.
    Response. As stated in the Proposed Rule, the SVAP flexibility can 
only be used for newer (sometimes known as ``updated'') versions of 
standards and implementation specifications that the Secretary has 
already adopted through notice-and-comment rulemaking.\114\
---------------------------------------------------------------------------

    \114\ As also noted in the Proposed Rule, this policy considers 
the substance of a standard and not whether its name or version 
naming and identification track remains unchanged over time, as 
standards developing organizations and processes may apply different 
naming or identification methods from one version to another of the 
same standards or implementation specifications. For more 
information on version naming and identification tracks for 
standards and implementation specifications, please see the Proposed 
Rule (84 FR 7500).
---------------------------------------------------------------------------

    Comments. One commenter urged that in order to be considered for 
approval for voluntary use under the Program the full details of a 
version of a standard should be required to be publicly available 
online by the start of opportunity for public review and discussion of 
the list of versions under consideration.
    Response. We appreciate the feedback. Although specifics of 
operational processes are outside the scope of this rule, we wish to 
reassure all stakeholders that we do appreciate the value of ensuring 
public dialogue around such matters as consideration of standards 
versions for potential voluntary use in the program is appropriately 
supported by availability of relevant information. As we operationalize 
support for finalized policies including the SVAP, we plan to provide 
ample public outreach and communications through channels familiar to 
affected stakeholders--including but not limited to ONC's HealthIT.gov 
website.
    Comments. Several commenters suggested various potential features 
or processes that could be used in ascertaining whether a more recent 
version of any standard or implementation specification that the 
Secretary as adopted in part 170 should be approved by the National 
Coordinator for developers' voluntary use under the Program. We also 
received several comments regarding potential uses of information from 
the standards review and approval processes or the SVAP flexibility 
itself to inform assessments of various aspects of the health IT 
ecosystem such as the maturity and uptake of specific standards 
versions.
    Response. Although addressing their substance is outside the scope 
of this final rule, we appreciate these responses to our call for 
comments. This information will help to inform our deliberations about 
future program policies and operations.
l. Real World Testing Principles of Proper Conduct for ONC-ACBs
    We proposed to include a new PoPC for ONC-ACBs in Sec.  170.523(p) 
that would require ONC-ACBs to review and confirm that applicable 
health IT developers submit real world testing plans and results in 
accordance with our proposals (84 FR 7501). The proposed requirement 
was that the ONC-ACBs review the plans for completeness. Once 
completeness is confirmed, we proposed that ONC-ACBs would provide the 
plans to ONC and make them publicly available by December 15 of each 
year (see Sec.  170.523(p)(1) and (3) in 84 FR 7598). We proposed that 
for the reasons discussed above in context of developer requirements, 
we have finalized (in Sec.  170.405(b)(1)) December 15 of each year as 
the due date for the annual real world testing plans. We proposed in 
Sec.  170.523(p)(2) that the ONC-ACB would ``review and confirm that 
applicable health IT developers submit real world testing results in 
accordance with Sec.  70.405(b)(2).'' And in Sec.  170.523(p)(3) we 
proposed that the ONC-ACBs would be required to submit real world 
testing results by April 1 of each year to ONC for public availability 
(84 FR 7598).
    Comments. The only comments received relevant to these PoPC 
proposals were about due dates, and were summarized above in context of 
the Sec.  170.405 requirements applicable to developers (see section 
VII.B.5.d Submission Dates, in this final rule).
    Response. We thank commenters again for their feedback on this 
proposal and have finalized the PoPC (170.523(p)(1)-(3)) as proposed, 
with the exception of having adjusted in Sec.  170.523(p)(3) the annual 
due date for publication of developers' real world testing results 
reports on CHPL from the proposed April 1 to the finalized March 15 
date.
    Because we proposed to allow health IT developers to implement 
National Coordinator-approved newer versions of adopted standards and 
implementation specifications in certified Health IT

[[Page 25780]]

Modules, we proposed two requirements to ensure the public has 
knowledge and ONC-ACBs can maintain appropriate oversight and 
surveillance of the version of a standard that certified health IT 
meets. First, we proposed to revise the PoPCs in Sec.  170.523(m) to 
add subparagraph (4) requiring ONC-ACBs to aggregate, no less than 
quarterly, all updates successfully made to use newer versions of 
adopted standards in certified health IT per the requirements for 
developers choosing to take advantage of the SVAP flexibility. This 
would ensure that ONC is aware of the version of a standard that 
certified health IT meets for the purposes of Program administration. 
Second, we proposed, that a developer that chooses to avail itself of 
the SVAP flexibility must address its use of newer versions of adopted 
standards in its real world testing plans and results.
    We sought comment on the proposed additions to the PoPC for ONC-
ACBs. More specifically, we sought comment on whether ONC-ACBs should 
be required to perform an evaluation beyond a completeness check for 
the real world testing plans and results and the value versus the 
burden of such an endeavor.
    Comments. We did not receive any comments on this proposal.
    Response. The substance of the requirement is finalized as 
proposed, though, we have made clarifying edits to the way in which the 
PoPC amendments are organized and phrased. The requirement proposed in 
Sec.  170.523(m)(4) (84 FR 7599) has been re-designated in Sec.  
170.523(m)(5). In the finalized Sec.  170.523(m)(5), we have revised 
the citation to the SVAP requirements because they were proposed in 
Sec.  170.405(b)(5) but are finalized in Sec.  170.405(b)(8) and (9). 
The wording of requirement finalized in Sec.  170.523(m)(5) was 
modified in comparison to that proposed in 84 FR 7599 to make clear 
that ONC-ACBs are required to report on all certifications of Health IT 
Modules to National Coordinator-approved newer versions of Secretary-
adopted standards, both those updated to include newer versions of 
adopted standards and those of Health IT Modules first presented for 
certification using newer versions of adopted standards. Another 
modification to the finalized regulation text in Sec.  170.523(m)(5) in 
comparison with that proposed clarifies that ONC-ACBs are permitted to 
obtain the quarterly record of successful use in certified Health IT 
Modules of newer versions of adopted standards from the ONC-ACB's 
records of certification activity. We believe this clarification is 
important to ensure the regulation text finalized in Sec.  
170.523(m)(5) cannot be misconstrued as precluding use of such records 
as the data source for this requirement.
    In complement to the above requirements to ensure transparency for 
the public and end users, we proposed in Sec.  170.523(t) a new PoPC 
for ONC-ACBs requiring them to ensure that developers seeking to take 
advantage of the SVAP flexibility in Sec.  170.405(b) comply with the 
applicable requirements, and that the ONC-ACB both retain records of 
the timing and content of developers' required \115\ notices and ensure 
each notice is timely and publicly accessible, and easily located via 
the CHPL through attribution of the notice to the certified Health IT 
Modules to which it applies.\116\
---------------------------------------------------------------------------

    \115\ The advance notice requirement that was proposed in Sec.  
170.405(b)(5)(i) and that is now finalized in Sec.  170.405(b)(8)(i) 
remains specific to developers leveraging SVAP flexibility to update 
Health IT Modules with existing certifications.
    \116\ We note for clarity that whether a copy of the content is 
hosted on CHPL, made available via a publicly accessible hyperlink 
provided by the developer, or another mechanism or method that may 
emerge as a more advanced and efficient technical approach to 
achieving this same goal is an operational detail and does not need 
to be defined in rulemaking.
---------------------------------------------------------------------------

    We note that in the proposed regulation text in Sec.  170.523(t) as 
published in 84 FR 7598, there was an editorial error. The editorial 
error was in title in Sec.  170.523(t) as published in 84 FR 7598, 
which read ``Standards Voluntary Advancement Process'' instead of 
``Standards Version Advancement Process,'' although the proposed 
introductory text correctly referenced ``Standards Version Advancement 
Process.''
    Comments. We did not receive public comment on the proposed 
paragraph (t) or its addition to Sec.  170.523.
    Response. We have finalized Sec.  170.523(t) with a revised title 
more consistent with the finalized titles of paragraphs (8) and (9) in 
Sec.  170.405(b), and a revised citation to Sec.  170.405. The citation 
to Sec.  170.405 was revised because the SVAP requirements 170.523(t) 
references were proposed in Sec.  170.405(b)(5) but have been finalized 
in Sec.  170.405(b)(8) and (9). The substance of the PoPC requirement 
in Sec.  170.523(t) is finalized as proposed.
m. Health IT Module Certification & Certification to Newer Versions of 
Certain Standards
    We proposed to add in Sec.  170.550, Health IT Module 
certification, a new paragraph (e), which would require that ONC-ACBs 
must provide an option for certification of Health IT Modules to any 
one or more of the criteria referenced in Sec.  170.405(a) based on 
newer versions of standards included in the criteria which have been 
approved by the National Coordinator for use in certification through 
the Standards Version Advancement Process (84 FR 7598).
    Comments. We received no public comments on this proposed addition 
to Sec.  170.550 to accommodate the SVAP flexibility.
    Response. We have finalized the substance of Sec.  170.550(e) as 
proposed. We have modified the regulatory text finalized in Sec.  
170.550(e) in comparison with that proposed in 84 FR 7598 by adding a 
header. The finalized paragraph reads: ``Standards Updates. ONC-ACBs 
must provide an option for certification of Health IT Modules to any 
one or more of the criteria referenced in Sec.  170.405(a) based on 
newer versions of standards included in the criteria which have been 
approved by the National Coordinator for use in certification.''
    We proposed to revise Sec.  170.555(b)(1) to accommodate the SVAP 
flexibility. The revised text in Sec.  170.555(b)(1) as proposed (84 FR 
7598) read: ONC-ACBs are not required to certify Complete EHRs and/or 
Health IT Module(s) according to newer versions of standards adopted 
and named in subpart B of this part, unless: (i) The National 
Coordinator identifies a newer version through the Standards Version 
Advancement Process and a health IT developer voluntarily elects to 
seek certification of its health IT in accordance with Sec.  
170.405(b)(5); or (ii) The new version is incorporated by reference in 
Sec.  170.299.
    Comments. We did not receive public comments on revising paragraph 
(b)(1) of Sec.  170.555 to accommodate the SVAP flexibility.
    Response. We have finalized the substance of this revision as 
proposed. However, we have struck ``Complete EHRs and/or'' from the 
text finalized in Sec.  170.555(b)(1) consistent with our finalizing 
the removal from 45 CFR part 170 of references to ``Complete EHRs'' in 
conjunction with the removal of the 2014 Edition (as discussed in 
section III.B.2 of this final rule). We have clarified the text in 
Sec.  170.555(b)(1) as finalized to use the word ``approves'' in place 
of ``identifies,'' consistent with our phrasing and terminology 
throughout the preamble of this final rule and finalized regulation 
text implementing the SVAP flexibility. We have replaced ``under the 
Standards Version Advancement Process'' with ``for use in 
certification'' because we

[[Page 25781]]

believe this wording prevents potential confusion about whether the 
term ``Standards Version Advancement Process'' refers to the 
administrative flexibility established in Sec.  170.405(b)(8) and (9) 
or to the National Coordinator's approach to approving versions for use 
in the Program. We have also revised the citation to Sec.  170.405(b) 
in the finalized text in Sec.  170.555 because the SVAP provisions 
proposed in Sec.  170.405(b)(5) have been finalized in Sec.  
170.405(b)(8) and (9).
6. Attestations
    The Cures Act requires that a health IT developer, as a Condition 
and Maintenance of Certification requirement under the Program, provide 
to the Secretary an attestation to all of the Conditions of 
Certification requirements specified in PHSA Sec.  3001(c)(5)(D), 
except for the ``EHR reporting criteria submission'' Condition of 
Certification requirement in Sec.  3001(c)(5)(D)(vii). We proposed to 
implement the Cures Act by requiring health IT developers to attest, as 
applicable, to compliance with the Conditions and Maintenance of 
Certification requirements proposed in Sec. Sec.  170.401 through 
170.405.
    We proposed that, as a Maintenance of Certification requirement for 
the ``attestations'' Condition of Certification requirement under Sec.  
170.406(b), health IT developers would need to submit their 
attestations every 6 months (i.e., semiannually). We proposed to 
provide a 14-day attestation period twice a year. For health IT 
developers presenting Health IT Modules for certification for the first 
time under the Program, we proposed that they would be required to 
submit an attestation at the time of certification and also comply with 
the semiannual attestation periods. As stated in the Proposed Rule, we 
would publicize and prompt developers to complete their attestation 
during the required attestation periods. We also proposed to provide a 
method for health IT developers to indicate their compliance, 
noncompliance with, or the inapplicability of each Condition and 
Maintenance of Certification requirement as it applies to all of their 
health IT certified under the Program for each attestation period. 
Last, we proposed to provide health IT developers the flexibility to 
specify noncompliance per certified Health IT Module, if necessary. We 
noted, however, that any noncompliance with the proposed Conditions and 
Maintenance of Certification requirements, including the 
``attestations'' Conditions and Maintenance of Certification 
requirements, would be subject to ONC direct review, corrective action, 
and enforcement procedures under the Program.
    We welcomed comments on the proposed attestations Condition and 
Maintenance of Certification requirements, including the appropriate 
frequency and timing of attestations. We also welcomed comments on the 
proposed responsibilities for ONC-ACBs related to the attestations of 
Condition and Maintenance of Certification requirements.
    Comments. We received many comments supporting the ``attestations'' 
Condition and Maintenance of Certification requirements. Commenters 
generally agreed that health IT developers should attest that they are 
complying with all the required Conditions and Maintenance of 
Certification requirements. A few commenters were concerned that the 
Condition of Certification requirements set up unreasonable 
expectations that health IT developers attest to statements that are 
subject to interpretation and are ambiguous, and that developers should 
be able to articulate how their software and businesses meet the 
expectations.
    We also received comments suggesting ways to reduce burden for 
health IT developers. Some commenters suggested less frequent 
attestation periods ranging from once a year to every two years as a 
means for reducing burden on health IT developers. Another commenter 
suggested that we send reminders to health IT developers when an 
attestation(s) needs renewal. One commenter recommended that we include 
a specific deadline at the middle and end of each year for attestations 
in lieu of the proposed predefined 14-day attestation window. Another 
commenter recommended that attestations should only be sent 
electronically as any other process of reporting (e.g., written letter) 
would be onerous on all parties.
    Response. We thank commenters for their support and have adopted in 
Sec.  170.406 the ``attestations'' Conditions and Maintenance of 
Certification requirement with revisions discussed below. These 
revisions should both provide clarity for compliance and reduce burden.
    Health IT developers will be attesting to the Conditions of 
Certification that are statutory requirements under section 4002 of the 
Cures Act. This final rule also addresses concerns of ambiguity and 
interpretation by revising the Conditions and Maintenance of 
Certification requirements and the information blocking provision, 
which is a Condition of Certification in Sec.  170.401. We have also 
revised Sec.  170.406 to provide further clarity on the applicability 
of each of the Conditions and Maintenance of Certification requirements 
to health IT developers for the purposes of attestation. For example, 
all health IT developers under the Program would attest to the 
``information blocking'' Condition of Certification requirement (Sec.  
170.401), while only health IT developers that have health IT certified 
to the ``API'' certification criteria (Sec.  170.315(g)(7)-(10)) would 
be required to attest to the ``API'' Condition of Certification and 
Maintenance requirements (Sec.  170.404). We have also revised the 
``attestations'' Conditions and Maintenance of Certification 
requirements in Sec.  170.406 to clearly reflect that all attestations 
must be approved and submitted by an officer, employee, or other 
representative the health IT developer has authorized to make a binding 
attestation(s) on behalf of the health IT developer. This provides 
regulatory clarity for health IT developers as to their responsibility 
under the attestation provisions (Sec.  170.406).
    A requirement of attestation every 6 months properly balances the 
need to support enforcement actions with the attestation burden placed 
on developers. In this regard, allegations of inappropriate actions and 
non-compliance by health IT developers with Program requirements and 
the information blocking provision can be more readily cross-referenced 
against their attestations for enforcement purposes comparative to a 
one-year or two-year attestation period. Based on the efficient methods 
we are establishing for attestation as described below, we believe that 
we have implemented this statutory requirement for health IT developers 
in ways that will reduce the compliance burden for them. We also refer 
readers to section VII.D of this preamble for discussion of ONC direct 
review, corrective action, and enforcement procedures for the 
Conditions and Maintenance of Certification requirements under the 
Program.
    We recognize comments expressing concerns on the potential burden 
placed on health IT developers to attest semiannually. The process we 
plan to implement for providing attestations should minimize burden on 
health IT developers. To further minimize potential burden on health IT 
developers, we have revised the proposed 14-day attestation window to 
extend the window to 30 days. In other words, health IT developers will 
be able to submit their attestations within a

[[Page 25782]]

designated 30-day window twice a year for purposes of compliance. To 
note, in accordance with Sec.  170.406(b), the first attestation window 
will begin April 1, 2021. This attestation period will cover the time 
period from the effective date of the final rule through March 31, 
2021. This irregular time period is due to the publication of the final 
rule. Subsequently, a regular 6-month period will commence with the 
attestation window for the 6-month period opening on October 1, 2021 
(attesting for the period of April 1 through September 30). We have 
also revised the Conditions and Maintenance of Certification 
requirements to reflect that all health IT developers under the Program 
would adhere to a similar semiannual attestation schedule, rather than 
new health IT developers also attesting at the time of certification. 
We believe this is more practical, less burdensome for health IT 
developers and ONC-ACBs, and creates less confusion as to what actions 
and statements a health IT developer is attesting to (i.e., for past 
actions under the Program).
    As stated in the Proposed Rule, we plan to implement several other 
means to minimize burden. First, we plan to publicize and prompt 
developers to complete their attestation during the required 
attestation periods. Second, as proposed in the Proposed Rule, we will 
provide a method for health IT developers to indicate their compliance, 
noncompliance, or the inapplicability of each Condition and Maintenance 
of Certification requirement as it applies to all or each of their 
Health IT Modules certified under the Program for each attestation 
period. Third, to clarify our proposal and respond to the comment 
recommending electronic submission, we note ONC-ACBs have discretion to 
specify the format and may choose to require electronic submission. In 
addition, to support electronic submission, we will provide a web-based 
form and method for health IT developers to submit attestations in an 
efficient manner for ONC-ACBs' review.
ONC-ACB Responsibilities
    We proposed that attestations would be submitted to ONC-ACBs and 
reviewed in accordance with Sec.  170.523(q) as a means for ONC-ACBs to 
monitor health IT developers for compliance with Program requirements. 
ONC-ACBs would be required to share the attestations with ONC. ONC 
would then make the attestations publicly available through the CHPL. 
The other responsibility we proposed in Sec.  170.550(l) was that 
before issuing a certification, an ONC-ACB would need to ensure that 
the health IT developer of the Health IT Module has met its 
responsibilities related to the Conditions and Maintenance of 
Certification requirements as solely evidenced by its attestation. For 
example, if a health IT developer with an active certification under 
the Program provided noncompliant designations in their attestation but 
was already participating in a corrective action plan (CAP) under ONC 
direct review to resolve the noncompliance, certification would be able 
to proceed while the issue is being resolved.
    Comments. One commenter requested clarification on the specific 
responsibilities of ONC-ACBs when collecting and submitting 
attestations to ONC, including instances of an attestation indicating 
non-conformity and the lack of a submission of an attestation by a 
health IT developer.
    Response. We thank commenters for their input and have finalized as 
proposed. We refer readers to section VII.D for further discussion of 
ONC direct review, corrective action, and enforcement procedures for 
the Conditions and Maintenance of Certification requirements under the 
Program, including the roles of ONC-ACBs in enforcement of the 
Conditions and Maintenance of Certification requirements.
7. EHR Reporting Criteria Submission
    As stated in the Proposed Rule, the Cures Act specifies that health 
IT developers shall be required, as a Condition and Maintenance of 
Certification requirement under the Program, to submit certain 
information to satisfy the reporting criteria on certified health IT in 
accordance with the EHR Reporting Program requirements established 
under section 3009A of the PHSA, as added by section 4002 of the Cures 
Act. We have not yet established an EHR Reporting Program. Once ONC 
establishes such an EHR Reporting Program, we will undertake future 
rulemaking to propose and implement the associated Condition and 
Maintenance of Certification requirement(s) for health IT developers.

C. Compliance

    The Maintenance of Certification requirements discussed above do 
not necessarily define all the outcomes necessary to meet the 
Conditions of Certification. Rather, they provide preliminary or 
baseline evidence toward measuring whether a Condition of Certification 
requirement is being met. Thus, ONC could determine that a Condition of 
Certification requirement is not being met through reasons other than 
the Maintenance of Certification requirements. For example, meeting the 
Maintenance of Certification requirement that requires a health IT 
developer to not establish or enforce any contract or agreement that 
contravenes the Communications Condition of Certification requirement 
does not excuse a health IT developer from meeting all the requirements 
specified in the Communications Condition of Certification requirement. 
This is analogous to clarifications ONC has previously provided about 
certification criteria requirements whereby testing prior to 
certification sometimes only tests a subset of the full criterion's 
intended functions and scope. However, for compliance and surveillance 
purposes, we have stated that ONC and its ONC-ACBs will examine whether 
the certified health IT meets the full scope of the certification 
criterion rather than the subset of functions it was tested against (80 
FR 62709 and 62710).
    Comments. We did not receive any comments specific to compliance 
with Maintenance of Certification requirements as related to meeting 
Conditions of Certification requirements.
    Response. We continue to maintain our position that Maintenance of 
Certification requirements do not define all of the outcomes necessary 
to meet the Conditions of Certification requirements. Thus, while 
complying with Maintenance of Certification requirements will provide 
evidence toward measuring whether a Condition of Certification 
requirement is being met, reasons beyond the Maintenance of 
Certification requirements could result in ONC determining that a 
Condition of Certification requirement has not been met.

D. Enforcement

    The Cures Act affirms ONC's role in using certification to improve 
health IT's capabilities for the access, use, and exchange of EHI. The 
Cures Act provides this affirmation through expanded certification 
authority for ONC to establish Conditions and Maintenance of 
Certification requirements for health IT developers that go beyond the 
certified health IT itself. The new Conditions and Maintenance of 
Certification requirements in section 4002 of the Cures Act focus on 
the actions and business practices of health IT developers (e.g., 
information blocking and appropriate access, use, and exchange of 
electronic health information) as well as technical interoperability of 
health IT (e.g., APIs and real world testing). Furthermore

[[Page 25783]]

and equally important, section 4002 of the Cures Act provides that the 
Secretary of HHS may encourage compliance with the Conditions and 
Maintenance of Certification requirements and take action to discourage 
noncompliance. Given these considerations, we proposed a general 
enforcement framework outlining a corrective action process for ONC to 
review potential or known instances where a Condition or Maintenance of 
Certification requirement has not been or is not being met by a health 
IT developer under the Program, including the requirement for a health 
IT developer to attest to meeting the Conditions and Maintenance of 
Certification requirements.
1. ONC Direct Review of the Conditions and Maintenance of Certification 
Requirements
    Historically we utilized the processes previously established for 
ONC direct review of certified health IT in the ONC Health IT 
Certification Program: Enhanced Oversight and Accountability Act (EOA) 
final rule (81 FR 72404), and as codified in Sec. Sec.  170.580 and 
170.581, to address non-conformities with Program requirements. For 
multiple reasons, we proposed in 84 FR 7503 to utilize substantially 
the same processes for the enforcement of the Conditions and 
Maintenance of Certification requirements. First, these processes were 
designed to address non-conformities with Program requirements. 
Conditions and Maintenance of Certification requirements have been 
adopted as Program requirements and, as such, any noncompliance with 
the Conditions and Maintenance of Certification requirements 
constitutes a Program non-conformity. Second, health IT developers are 
familiar with the ONC direct review provisions as they were established 
by the EOA final rule in October 2016. Third, Sec. Sec.  170.580 and 
170.581 have provided thorough and transparent processes for working 
with health IT developers through notice and corrective action to 
remedy Program non-conformities. Last, the direct review framework has 
provided equitable opportunities for health IT developers to respond to 
ONC actions and appeal certain ONC determinations.
    As further discussed below, we have finalized our proposed approach 
to utilize the processes previously established and codified in 
Sec. Sec.  170.580 and 170.581 for ONC direct review of certified 
health IT for the enforcement of the Conditions and Maintenance of 
Certification requirements, along with our proposed revisions to these 
processes in order to properly incorporate enforcement of these 
requirements. We note that the Information Blocking Condition of 
Certification (Sec.  170.401) and the related Assurances Condition of 
Certification requirement (Sec.  170.402(a)(1)) have a delayed 
enforcement date of 6 months after date of publication of the final 
rule.
2. Review and Enforcement Only by ONC
    We proposed in 84 FR 7503 to retain use of the term ``direct 
review'' as previously adopted in the EOA final rule to continue to 
distinguish actions ONC takes to directly review certified health IT or 
health IT developers' actions from actions taken by an ONC-ACB to 
review certified health IT under surveillance. We proposed, however, 
that ONC would be the sole party responsible for enforcing compliance 
with the Conditions and Maintenance of Certification requirements.
    Comments. We received comments requesting clarification that ONC-
ACBs are not responsible for enforcement of the Conditions and 
Maintenance of Certification requirements.
    Response. We have finalized this review and enforcement approach in 
Sec. Sec.  170.580(a)(1) and 170.580(a)(2)(iii) as proposed above. We 
clarify that ONC-ACBs are not responsible for enforcement of the 
Conditions and Maintenance of Certification requirements. Under 
finalized Sec.  170.523(s), and as further discussed later in this 
section, ONC-ACBs must report any information that could inform whether 
ONC should exercise direct review of noncompliance with the Conditions 
and Maintenance of Certification requirements to ONC. ONC-ACBs also 
address non-conformities with technical and other Program requirements 
through surveillance and by working with health IT developers through 
corrective action plans.
3. Review Processes
    As discussed above, we proposed to utilize the processes previously 
established and codified in Sec. Sec.  170.580 and 170.581 for ONC's 
direct review and enforcement of the Conditions and Maintenance of 
Certification requirements, along with certain proposed revisions and 
additions to these processes to properly incorporate enforcement of 
these requirements and effectuate congressional intent conveyed through 
the Cures Act.
a. Initiating Review and Health IT Developer Notice
    We proposed in 84 FR 7503 to fully incorporate the review of 
compliance with the Conditions and Maintenance of Certification 
requirements into the provisions of Sec.  170.580(a) and (b). We 
proposed in Sec.  170.580(a)(2)(iii) that if ONC has a reasonable 
belief that a health IT developer has not complied with a Condition or 
Maintenance of Certification requirement, then it may initiate direct 
review. Similarly, we proposed in Sec.  170.580(b)(1) and (2) that ONC 
may issue the health IT developer a notice of potential non-conformity 
or notice of non-conformity and provide the health IT developer an 
opportunity to respond with an explanation and written documentation, 
including any information ONC requests.
    Comments. We received one comment that ONC should communicate with 
a representative sample of users of a health IT product when enforcing 
the Conditions and Maintenance of Certification requirements.
    Response. We appreciate this comment. We are committed to 
consistent and thorough enforcement of the Conditions and Maintenance 
of Certification requirements and review of complaints of 
noncompliance. Our goal is to work with developers to remedy any 
noncompliance in a timely manner. During the course of our review of a 
potential noncompliance, we may communicate with users of the health 
IT, as appropriate. We have finalized this approach regarding 
initiation of review and health IT developer notice in Sec. Sec.  
170.580(a)(2)(iii) and 170.580(b) as proposed.
i. Complaint Resolution
    In the Proposed Rule, we noted and recommended in 84 FR 7503 that 
customers and end users first work with their health IT developers to 
resolve any issues of potential noncompliance with the Conditions and 
Maintenance of Certification requirements. We proposed that if the 
issue cannot be resolved, the end user should contact the ONC-ACB for 
assessment. However, as discussed above and in section VII.D.5 below, 
the ONC-ACB purview for certified health IT generally applies to 
certified capabilities and limited requirements of developer business 
practices. We proposed that if neither of these pathways resolves the 
issue, end users may want to provide feedback to ONC via the Health IT 
Feedback Form.
    Comments. We received one comment recommending that we require 
complaints regarding developer compliance with Conditions and

[[Page 25784]]

Maintenance of Certification requirements go directly to ONC rather 
than to an ONC-ACB. Another commenter requested that we provide 
guidance regarding how to report issues related to developer 
compliance.
    Response. We have finalized in Sec.  170.580 our proposed approach 
regarding complaint resolution as described above, which is guided by 
prior Program experience.
    Comments. One commenter recommended that we adopt a self-disclosure 
mechanism for health IT developers to report any non-conformity with 
the Program and enable such self-disclosure to offer health IT 
developers regulatory protection.
    Response. We appreciate the comment and strongly encourage self-
disclosure by developers, which health IT developers currently do under 
the Program. We note that currently there are methods by which health 
IT developers may communicate with ONC-ACBs and/or ONC, and it is our 
longstanding policy to work with health IT developers to correct non-
conformities. While we believe this approach works well, consistent 
with Executive Order 13892, we are considering whether it would be 
appropriate to adopt additional procedures that further encourage self-
reporting of non-conformities and voluntary information sharing, as 
well as procedures to provide pre-enforcement rulings to health IT 
developers who make inquiries regarding their compliance with 
regulatory requirements.
ii. Method of Correspondence With Health IT Developers
    Section 170.505 states that correspondence and communication with 
ONC or the National Coordinator shall be conducted by email, unless 
otherwise necessary or specified. We noted in the Proposed Rule in 84 
FR 7503 that in the EOA final rule we signaled our intent to send 
notices of potential non-conformity, non-conformity, suspension, 
proposed termination, and termination via certified mail (81 FR 72429). 
However, we proposed to follow Sec.  170.505 for correspondence 
regarding direct review of noncompliance with the Conditions and 
Maintenance of Certification requirements.
    As discussed in the Proposed Rule, the type and extent of review by 
ONC could vary significantly based on the complexity and severity of 
each fact pattern. For instance, ONC may be able to address certain 
noncompliance with the Conditions and Maintenance of Certification 
requirements quickly and with minimal effort (e.g., failure to make 
public a documentation hyperlink), while other situations may be more 
complex and require additional time and effort (e.g., violation of API 
fee prohibitions). Considering this wide range of potential 
noncompliance with the Conditions and Maintenance of Certification 
requirements, we proposed that ONC retain discretion to decide, on a 
case-by-case basis, when to go beyond the provisions of Sec.  170.505 
to use means other than email in providing notices and correspondence 
for noncompliance with the Conditions and Maintenance of Certification 
requirements.
    We solicited comment on the nature and types of noncompliance with 
the Conditions and Maintenance of Certification requirements that ONC 
should consider in determining the method of correspondence. We also 
solicited comment on whether the type of notice should determine the 
method of correspondence. More specifically, we solicited comment on 
whether certain types of notices under direct review should be 
considered more critical than others, thus requiring a specific method 
of correspondence.
    Comments. We received several comments regarding the proposed 
method of correspondence with health IT developers. Some commenters 
stressed that time-sensitive notifications should not be sent via 
email, with one commenter noting that ONC should use certified mail, 
with a copy to a designated notice recipient, for notices of potential 
noncompliance and noncompliance with the Conditions and Maintenance of 
Certification requirements. Other commenters suggested that ONC should 
use both email and certified mail for notices regarding initiation of 
direct review, potential non-conformity, non-conformity, suspension, 
proposed termination, and termination. One commenter recommended ONC 
acknowledge receipt of communications received.
    Response. We appreciate commenters' support of our proposals, as 
well as the constructive suggestions. We have finalized our proposal to 
use the provisions in Sec.  170.505 for correspondence regarding 
noncompliance with the Conditions and Maintenance of Certification 
requirements, with minor revisions. While we agree with commenters that 
there may be situations when sending notice only via email would not be 
adequate, such situations would be contingent on the circumstances as 
described in the Proposed Rule. Therefore, we have revised the 
regulation text of Sec.  170.505 to specify some of those 
considerations. These considerations include, but are not limited to, 
whether: The party requests use of correspondence beyond email; the 
party has responded via email to our communications; we have sufficient 
information from the party to ensure appropriate delivery of such 
notice; and, importantly, the alleged violation of a Condition or 
Maintenance of Certification requirement or other Program requirement 
within ONC's purview under Sec.  170.580 indicates a serious violation 
of the Program with potential consequences of suspension, certification 
termination, or a certification ban.
    We did not propose any requirements regarding acknowledgment of 
receipt, and we have finalized our proposed approach to utilize the 
processes previously established and codified in Sec. Sec.  170.580 and 
170.581 for ONC direct review of certified health IT for the 
enforcement of the Conditions and Maintenance of Certification 
requirements, which include response requirements already codified in 
Sec. Sec.  170.580 and 170.581.
    Comments. One commenter requested clarification on ONC's timeframe 
for responding to health IT developers during direct review. Another 
commenter requested clarity on investigation timelines generally.
    Response. We have finalized our proposed approach to utilize the 
processes previously established and currently codified in Sec. Sec.  
170.580 and 170.581 for ONC's direct review and enforcement of the 
Conditions and Maintenance of Certification requirements, which include 
specific response timeframes throughout the direct review process. We 
refer commenters to Sec. Sec.  170.580 and 170.581 for the timeframes 
applicable to the various steps in the direct review process. We also 
clarify that proposed termination and suspension are excluded from 
ONC's direct review process for the Conditions and Maintenance of 
Certification requirements, so any timeframes related to proposed 
termination and suspension do not apply.
b. Relationship With ONC-ACBs and ONC-ATLs
    Section 170.580(a)(3) outlines ONC direct review in relation to the 
roles of ONC-ACBs and ONC-ATLs, which we proposed to revise to 
incorporate the Conditions and Maintenance of Certification 
requirements. In the Proposed Rule in 84 FR 7507, we provided 
situational examples in section VII.D.5 ``Effect on Existing Program 
Requirements and Processes''

[[Page 25785]]

regarding ONC direct review and the role of an ONC-ACB. As finalized in 
the EOA final rule and per Sec.  170.580(a)(3)(v), we stressed that ONC 
may refer the applicable part of its review of certified health IT to 
the relevant ONC-ACB(s) if ONC determines this would serve the 
effective administration or oversight of the Program (81 FR 72427 and 
72428).
    We did not receive comments on this specific aspect of the proposed 
rule and have finalized the relationship with ONC-ACBs and ONC-ATLs in 
Sec.  170.580(a)(3) as proposed.
c. Records Access
    We proposed in 84 FR 7504 to revise Sec.  170.580(b)(3) to ensure 
that ONC, or third parties acting on its behalf, have access to the 
information necessary to enforce the Conditions and Maintenance of 
Certification requirements. As specified in Sec.  
170.580(b)(1)(ii)(A)(2), (b)(2)(ii)(A)(2) and (b)(3), in response to a 
notice of potential non-conformity or notice of non-conformity, ONC 
must be granted access to, and have the ability to share within HHS, 
with other Federal agencies, and with appropriate entities, all of a 
health IT developers' records and technology related to the 
development, testing, certification, implementation, maintenance, and 
use of its certified health IT, and any complaint records related to 
the certified health IT. ``Complaint records'' include, but are not 
limited to issue logs and help desk tickets (81 FR 72431). We proposed 
in 84 FR 7504 to supplement these requirements with a requirement that 
a health IT developer make available to ONC, and third parties acting 
on its behalf, records related to marketing and distribution, 
communications, contracts, and any other information relevant to 
compliance with any of the Conditions and Maintenance of Certification 
requirements or other Program requirements. If ONC determined that a 
health IT developer was not cooperative with the fact-finding process, 
we proposed ONC would have the ability to issue a certification ban 
and/or terminate a certificate (see Sec.  170.581 discussed below and 
Sec.  170.580(f)(1)(iii)(A)(1)).
    We proposed in 84 FR 7504 that ONC would implement appropriate 
safeguards to ensure, to the extent permissible with Federal law, that 
any proprietary business information or trade secrets ONC may encounter 
by accessing the health IT developer's records, other information, or 
technology, would be kept confidential by ONC or any third parties 
working on behalf of ONC.
    Comments. We received one comment recommending that ONC detail the 
procedural and technical safeguards in place to protect information 
submitted to ONC by a developer as part of direct review of compliance 
with a Conditions or Maintenance of Certification requirement.
    Response. As we stated above, in the Proposed Rule, and in the EOA 
final rule (81 FR 72429), we will implement appropriate safeguards to 
ensure, to the extent permissible with Federal law, that any 
proprietary business information or trade secrets ONC may encounter by 
accessing the health IT developer's records, other information, or 
technology, will be kept confidential by ONC or any third parties 
working on behalf of ONC. We have finalized in Sec.  170.580(b)(3) our 
approach regarding records access as proposed. Additionally, we have 
finalized our recommendation, stated in 84 FR 7504 in the Proposed Rule 
and the EOA final rule, that health IT developers clearly mark, as 
described in HHS Freedom of Information Act regulations at 45 CFR 
5.65(c), any information they regard as trade secret or confidential 
prior to disclosing the information to ONC (81 FR 72431).
d. Corrective Action
    We proposed in 84 FR 7504 that if ONC determines that a health IT 
developer is noncompliant with a Condition or Maintenance of 
Certification requirement (i.e., a non-conformity), ONC would work with 
the health IT developer to establish a corrective action plan (CAP) to 
remedy the issue through the processes specified in Sec.  
170.580(b)(2)(ii)(A)(4) and (c). We noted that a health IT developer 
may be in noncompliance with more than one Condition or Maintenance of 
Certification requirement. In such cases, we proposed that ONC would 
follow the proposed compliance enforcement process for each Condition 
or Maintenance of Certification requirement accordingly, but may also 
require the health IT developer to address all violations in one CAP 
for efficiency of process. We also proposed, as we currently do with 
CAPs for certified health IT, to list health IT developers under a CAP 
on ONC's website.
    We did not receive any comments on this aspect of the Proposed 
Rule, and in Sec.  170.580(c) we have finalized our proposals regarding 
corrective action as proposed (84 FR 7504).
e. Certification Ban and Termination
    We proposed in 84 FR 7504 that if a health IT developer under ONC 
direct review for noncompliance with a Condition or Maintenance of 
Certification requirement failed to work with ONC or was otherwise 
noncompliant with the requirements of the CAP and/or CAP process, ONC 
could issue a certification ban for the health IT developer (and its 
subsidiaries and successors). A certification ban, as it currently does 
for other matters under Sec.  170.581, would prohibit future health IT 
by the health IT developer from being certified.
    We proposed in 84 FR 7504 that ONC would also consider termination 
of the certificate(s) of the affected Health IT Module(s) should the 
health IT developer fail to work with ONC or is otherwise noncompliant 
with the requirements of the CAP and/or CAP process. We proposed that 
ONC may consider termination if there is a nexus between the 
developer's actions or business practices in relation to the Conditions 
and Maintenance of Certification requirements and the functionality of 
the affected certified Health IT Module(s). For example, as discussed 
in the Proposed Rule, ONC may determine that a health IT developer is 
violating a Condition of Certification requirement due to a clause in 
its contracts that prevents its users from sharing or discussing 
technological impediments to information exchange. In this example, the 
health IT developer's conduct would violate the Communications 
Condition of Certification requirement that we have finalized in Sec.  
170.403. If the same conduct were also found to impair the 
functionality of the certified Health IT Module (such as by preventing 
the proper use of certified capabilities for the exchange of EHI), ONC 
may determine that a nexus exists between the developer's business 
practices and the functionality of the certified Health IT Module, and 
may consider termination of the certificate(s) of that particular 
Health IT Module under the proposed approach.
    We proposed this approach, which allows ONC to initiate a 
certification ban and/or certificate termination under certain 
circumstances, to ensure that health IT developers are acting in 
accordance with the Conditions and Maintenance of Certification 
requirements. However, we stressed that our first and foremost priority 
is to work with health IT developers to remedy any noncompliance with 
Conditions and Maintenance of Certification requirements through a 
corrective action process before taking further action. This emphasizes 
ONC's desire to promote and support health IT developer compliance with 
the

[[Page 25786]]

Conditions and Maintenance of Certification requirements, and ensure 
that certified health IT is compliant with Program requirements, in 
order to foster an environment where EHI is exchanged in an 
interoperable way.
    We proposed in 84 FR 7505 that in considering whether termination 
of a Health IT Module's certificate(s) and/or a certification ban is 
appropriate, ONC would consider factors including, but not limited to: 
Whether the health IT developer has previously been found in 
noncompliance with the Conditions and Maintenance of Certification or 
other Program requirements; the severity and pervasiveness of the 
noncompliance, including the effect of the noncompliance on widespread 
interoperability and health information exchange; the extent to which 
the health IT developer cooperates with ONC to review the 
noncompliance; the extent of potential negative impact on providers who 
may seek to use the certified health IT to participate in CMS programs; 
and whether termination and/or a certification ban is necessary to 
ensure the integrity of the certification process.
    In the Proposed Rule, we noted in 84 FR 7505 that, as found in 
Sec.  170.580(f)(2), ONC would provide notice of the termination to the 
health IT developer, including providing an explanation for, 
information supporting, and consequences of, the termination, as well 
as instructions for appealing the termination. We proposed to add 
substantially similar notice provisions to Sec.  170.581 for 
certification bans issued under ONC direct review for noncompliance 
with the Conditions and Maintenance of Certification requirements. 
These provisions would also include instructions for requesting 
reinstatement. In this regard, in 84 FR 7505 we proposed to apply the 
current reinstatement procedures under Sec.  170.581 to certification 
bans resulting from noncompliance with the Conditions and Maintenance 
of Certification requirements, but with an additional requirement that 
the health IT developer has resolved the noncompliance with the 
Condition or Maintenance of Certification requirement. In sum, we 
proposed that a health IT developer could seek ONC's approval to re-
enter the Program and have the certification ban lifted if it 
demonstrates that it has resolved the noncompliance with the Condition 
or Maintenance of Certification requirement, and ONC is satisfied that 
all affected customers have been provided appropriate remediation. We 
sought comment on whether ONC should impose a minimum time period for a 
certification ban, such as when a health IT developer is noncompliant 
with a Condition or Maintenance of Certification requirement more than 
once (e.g., a minimum six months for two instances, a minimum of one 
year for three instances). We also sought comment on whether additional 
factors should be considered for a certification ban and/or termination 
of a health IT developer's certified health IT.
    Comments. We received several comments regarding a minimum ban 
length for repeat offenders. A couple of the commenters recommended ONC 
establish a minimum ban and agreed with ONC's examples listed above. 
Other commenters stated that a minimum ban would not be appropriate, 
with one commenter stating that a minimum ban could have unintended 
consequences and another commenter stating that it would be better if 
the length of the ban was determined situationally.
    Response. We have finalized the provisions regarding termination 
and certification ban in Sec. Sec.  170.580 and 170.581 as proposed. We 
have not established a minimum ban length for repeat offenders, as a 
reinstatement process has been established in Sec.  170.581(d) that 
affords ONC the discretion to determine whether a developer has 
demonstrated appropriate remediation to all customers affected by the 
certificate termination, certificate withdrawal, or noncompliance with 
a Condition or Maintenance of Certification requirement. Section 
170.581(d)(4) allows ONC to grant reinstatement into the Program if ONC 
is satisfied with a health IT developer's demonstration of appropriate 
remediation, and ONC may consider any and all factors, including past 
bans, that may affect ONC's decision to grant reinstatement into the 
Program.
    Comments. We received several comments expressing concern for how 
physicians using products whose developer has been banned would be 
impacted with respect to payment programs.
    Response. We appreciate these comments and clarify that the health 
IT products of a health IT developer under a certification ban (not 
certificate termination) would still be considered certified. This 
means that those products would still be available for use by providers 
participating in programs requiring the use of certified health IT. 
However, while under a ban, a health IT developer could not make 
updates to the certification of those products. This means that access 
to new certified functionalities within a health IT developer's 
products would be limited. If the certification status of a product may 
impact health care providers that are users of that product for HHS 
program participation, ONC would continue to support HHS and other 
Federal and State partners, such as CMS, to help identify and make 
available appropriate remedies for users of terminated certified health 
IT. This would include supporting policies to mitigate negative impacts 
on providers, such as the availability of hardship exceptions for the 
Promoting Interoperability (PI) Programs for hospitals as mandated by 
section 4002(b)(1)(A) and (b)(2) of the 21st Century Cures Act and 
finalized by CMS in the FY 2018 Inpatient Prospective Payment System 
final rule (80 FR 38488 through 38490).
    Comments. We received one comment that ONC should add a fine as 
part of the enforcement of the Conditions and Maintenance of 
Certification requirements.
    Response. We appreciate this comment, but ONC does not have the 
authority to add a monetary fine as part of the enforcement of the 
Conditions and Maintenance of Certification requirements. We note, 
however, that health IT developers are subject to civil monetary 
penalties (CMPs) if they engage in information blocking, and that a 
health IT developer must not take any action that constitutes 
information blocking as a Condition of Certification requirement (Sec.  
170.401).
    Comments. One commenter recommended that certification bans apply 
not only to health IT developers who are noncompliant, but also to the 
individual management representatives involved, and that account 
migration review plans be required as an aspect of enforcement in order 
to address issues around creation of new legal entities in response to 
a certification ban.
    Response. We appreciate these comments and note that certification 
bans affect health IT developers participating in the Program, their 
subsidiaries, and their successors (81 FR 72443). We do not have the 
authority to regulate or enforce against individual management 
representatives, though we believe the certification ban's reach is an 
appropriate and sufficient incentive for health IT developers to 
resolve any noncompliance and meet all required conditions. As stated 
previously, we are utilizing processes previously established for ONC 
direct review of certified health IT for the enforcement of the 
Conditions and Maintenance of Certification requirements, which we 
believe are familiar to health IT developers and provide a transparent 
process for working with health IT

[[Page 25787]]

developers to remedy instances of noncompliance.
    Comments. One commenter expressed concern that there is no process 
for measuring the severity of a finding of noncompliance, and ONC's 
proposed enforcement approach would allow for banning of all of a 
health IT developer's certified health IT based on a finding of 
noncompliance. The commenter requested that the final rule specify 
circumstances that could lead to this serious result.
    Response. We appreciate the comment and clarify that, as proposed, 
if a health IT developer under ONC direct review for noncompliance with 
a Condition of Certification requirement failed to work with ONC to 
correct the noncompliance, or was noncompliant with the requirements of 
the CAP, ONC could issue a certification ban. However, we stress that 
our priority is to first work with health IT developers to correct any 
noncompliance with the Conditions and Maintenance of Certification 
requirements through corrective action. As stated in the Proposed Rule 
in 84 FR 7505, factors we would consider prior to issuing a 
certification ban, or termination of a Health IT Module's certificate, 
include whether the health IT developer has previously been found in 
noncompliance with the Conditions and Maintenance of Certification 
requirements or other Program requirements; the severity and 
pervasiveness of the noncompliance; cooperation on the part of the 
health IT developer during ONC review; potential negative impact on 
providers participating in CMS programs; and whether termination and/or 
a certification ban is necessary to ensure the integrity of the 
certification process.
    We clarify that while under a CAP or surveillance by ONC or an ONC-
ACB, in the event a health IT developer's approach to remedy a non-
conformity and/or to meet Program requirements is to withdraw their 
current certificate(s) for replacement with a new certificate issued by 
the ONC-ACB to reflect a new scope, they will not be subject to a 
certification ban. We note that any open non-conformities will be 
transferred to the newly issued certificate(s) and must still be 
resolved by the health IT developer. Similarly, when an ONC-ACB issues 
a new certificate to reflect 2015 Edition changes, and must withdraw a 
health IT developer's current certificate to do so, the health IT 
developer will not be subject to a certification ban if the developer 
is currently under a CAP or has health IT with open non-conformities.
    Comments. One commenter stated that in instances of information 
blocking, the termination of a Health IT Module's certificate or 
issuance of a certification ban should not occur until the health IT 
developer has had the opportunity to respond to the charge of 
information blocking and appeal the finding.
    Response. As stated previously, we have finalized in Sec. Sec.  
170.580 and 170.581 our proposed approach to utilize the processes 
previously established for ONC direct review of certified health IT for 
the enforcement of the Conditions and Maintenance of Certification 
requirements. These processes are open and transparent, and they 
provide an opportunity for health IT developers to remedy instances of 
noncompliance through corrective action. We again stress that it is our 
priority to first work with health IT developers to correct any 
noncompliance with the Conditions and Maintenance of Certification 
requirements through corrective action. We believe these processes 
provide ample opportunity for a health IT developer to respond to and 
address information blocking prior to issuance of a certification ban 
or termination of a Health IT Module's certificate.
    Comments. We received one comment stating that the final rule 
should provide for an emergency remedy when the blocking of information 
places an individual at risk of immediate harm.
    Response. Our current process for direct review enables ONC to 
respond appropriately in the case of certified health IT that may be 
causing or contributing to conditions that present a serious risk to 
public health or safety (Sec. Sec.  170.580(a)(2)(i) and 
170.580(d)(1)). We also refer readers to the information blocking 
section in this final rule (section VIII of preamble and Part 171) for 
a detailed discussion regarding the information blocking provision and 
the exceptions to the information blocking definition, including those 
designed to prevent harm to patients and others.
f. Appeal
    We proposed in 84 FR 7505 that a health IT developer would have an 
opportunity to appeal an ONC determination to issue a certification ban 
and/or certificate termination resulting from noncompliance with a 
Condition or Maintenance of Certification requirement. We proposed to 
follow the processes specified in Sec.  170.580(g). As such, we 
proposed to revise Sec.  170.580(g) to incorporate ONC direct review of 
compliance with the Conditions and Maintenance of Certification 
requirements.
    Comments. We received a number of comments generally supporting our 
proposal to utilize the Appeals processes in our enforcement of 
compliance with the Condition or Maintenance of Certification 
requirements.
    Response. We appreciate the comments expressing support for our 
proposal and have finalized our proposal and proposed revisions to 
Sec.  170.580(g) to incorporate ONC direct review of compliance with 
the Conditions and Maintenance of Certification requirements.
g. Suspension
    We proposed in 84 FR 7506 to not apply the suspension processes 
under Sec.  170.580 to our review of compliance with the Conditions and 
Maintenance of Certification requirements. Section 170.580 includes a 
process for suspending the certification of a Health IT Module at any 
time if ONC has a reasonable belief that the certified health IT may 
present a serious risk to public health and safety. While this will 
remain the case for certified health IT under ONC direct review (i.e., 
suspension of certification is always available under ONC direct review 
when the certified health IT presents a serious risk to public health 
and safety), we do not believe such circumstances would apply to 
noncompliance with the Conditions or Maintenance of Certification 
requirements. Further, we believe the more streamlined processes 
proposed for addressing noncompliance with Conditions and Maintenance 
of Certification requirements alleviates the need to proceed through a 
suspension process.
    Comments. We received a number of comments generally supporting our 
proposal not to include Suspension in our enforcement of compliance 
with the Condition or Maintenance of Certification requirements.
    Response. We appreciate the comments expressing support for our 
proposal and have finalized our proposal as proposed.
h. Proposed Termination
    We proposed in 84 FR 7506 to not include an intermediate step 
between a developer failing to take appropriate and timely corrective 
action and termination of a certified Health IT Module's certificate 
called ``proposed termination'' (see Sec.  170.580(e) and 81 FR 
72437)). Rather, as discussed above, ONC may proceed directly to 
issuing a certification ban or notice of termination if it determines a 
certification ban and/or certificate termination are appropriate per 
the considerations

[[Page 25788]]

discussed above. The Conditions and Maintenance of Certification 
requirements focus on developer business practices and actions for 
which, as previously discussed, noncompliance is likely to undermine 
the integrity of the Program and impede widespread interoperability and 
information exchange. As such, we stated that it is appropriate and 
consistent with the Cures Act to proceed immediately to a certification 
ban and/or termination of the affected Health IT Module's 
certificate(s) if a developer does not take appropriate and timely 
corrective action. A certification ban and/or termination serves as an 
appropriate disincentive for noncompliance with the Conditions and 
Maintenance of Certification requirements.
    Comments. We received a number of comments generally supporting our 
proposal not to include Proposed Termination in our enforcement of 
compliance with the Condition or Maintenance of Certification 
requirements.
    Response. We appreciate the comments expressing support for our 
proposal and have finalized our proposal as proposed.
4. Public Listing of Certification Ban and Termination
    We proposed in 84 FR 7506 to publicly list on ONC's website health 
IT developers and certified Health IT Modules that are subject to a 
certification ban and/or have been terminated, respectively, for 
noncompliance with a Condition or Maintenance of Certification 
requirement or for reasons already specified in Sec.  170.581. We take 
this same approach for health IT with terminated certifications (see 81 
FR 72438). Public listing serves to discourage noncompliance with 
Conditions and Maintenance of Certification and other Program 
requirements, while encouraging cooperation with ONC and ONC-ACBs and 
remediation of non-conformities. It also serves to provide notice to 
all ONC-ATLs, ONC-ACBs, public and private programs requiring the use 
of certified health IT, and consumers of certified health IT of the 
status of certified health IT and health IT developers operating under 
the Program. We sought comment on this proposal, including input on the 
appropriate period of time to list health IT developers and affected 
certified Health IT Modules on healthit.gov.
    Comments. We received several recommendations that we should enable 
indefinite posting of certification bans and certificate terminations, 
including a comment recommending that the public listing show the start 
and end date of bans that were lifted. We also received one comment 
recommending that ONC differentiate reinstated developers on the public 
listing. We also received one comment that there should be an option 
for a ban to be lifted once the developer comes into compliance.
    Response. Responsive to comments and in order to support 
transparency, we have decided not to set a time limit for listings on 
the Certified Health IT Product List (CHPL) and to also provide the 
start and end dates of bans that were lifted. We clarify that the CHPL 
provides transparency regarding certified health IT listings, including 
historical non-conformities assessed through surveillance, even after 
the non-conformity is resolved. This approach to historical 
transparency is applied to certification bans as well. We also clarify 
that a certification ban can be lifted as long as the developer has 
resolved the noncompliance and met all required conditions. We refer 
readers to Sec.  170.581 for details about the certification ban and 
reinstatement processes.
5. Effect on Existing Program Requirements and Processes
    The Cures Act introduced new Conditions and Maintenance of 
Certification requirements that encompass technical and functional 
requirements of health IT and new actions and business practice 
requirements for health IT developers, which we proposed to adopt in 
subpart D of Part 170. The pre-Cures Act structure and requirements of 
the Program provide processes to enforce compliance with technical and 
functional requirements of certified health IT, and to a more limited 
extent, requirements for the business practices of health IT developers 
(see, e.g., 45 CFR 170.523(k)(1)) under subparts C (Certification 
Criteria for Health Information Technology) and E (ONC Health IT 
Certification Program) of Part 170. ONC-ACBs are required to perform 
surveillance on certified Health IT Modules and may investigate 
reported allegations of non-conformities with Program requirements 
under subparts A, B, C, and E, with the ultimate goal of working with 
the health IT developer to correct the non-conformity. Under certain 
circumstances, such as unsafe conditions or impediments to ONC-ACB 
oversight, ONC may directly review certified health IT to determine 
whether it conforms to the requirements of the Program (see Sec.  
170.580 and the EOA final rule at 81 FR 72404). These avenues for 
investigating non-conformities with certified Health IT Modules will 
continue to exist under the Program and generally focus on 
functionality and performance of certified health IT, or on more 
limited requirements of business practices of health IT developers 
found in subparts A, B, C and E of Part 170, respectively. Thus, there 
may be instances where one or more Condition or Maintenance of 
Certification requirement is not being or has not been met that also 
relate to certified Health IT Module non-conformities under subparts A, 
B, C and E. We proposed that under these situations, ONC could in 
parallel implement both sets of processes--existing processes to 
investigate Health IT Module non-conformities and the proposed process 
to enforce compliance with the Conditions and Maintenance of 
Certification requirements. We stressed, however, that under the 
proposed enforcement approach, only ONC would have the ability to 
determine whether a Condition or Maintenance of Certification 
requirement per subpart D has been or is being met.
    We proposed to delineate the scope of an ONC-ACB's requirements to 
perform surveillance on certified Health IT Modules as related only to 
the requirements of subparts A, B, C and E of Part 170. Given our 
proposed approach that would authorize solely ONC to determine whether 
a Conditions or Maintenance of Certification requirement per subpart D 
has been or is being met, we proposed in 84 FR 7506 to add a new PoPC 
for ONC-ACBs in Sec.  170.523(s) that would require ONC-ACBs to report 
to ONC, no later than a week after becoming aware, any information that 
could inform whether ONC should exercise direct review for 
noncompliance with a Condition or Maintenance of Certification 
requirement or any matter within the scope of ONC direct review. We did 
not receive specific comments on this section of the Proposed Rule and 
have finalized this approach regarding delineation of the review 
activities of ONC and ONC-ACBs in Sec. Sec.  170.580 and 170.581 as 
proposed.
6. Coordination With the Office of the Inspector General
    We clarified in the Proposed Rule in 84 FR 7507 that the 
enforcement approach would apply only to ONC's administration of the 
Conditions and Maintenance of Certification requirements and other 
requirements under the Program, but it would not apply to other 
agencies or offices that have independent authority to investigate and 
take enforcement action

[[Page 25789]]

against a health IT developer of certified health IT. Notably, section 
3022(b)(1)(A)(ii) of the PHSA, as added by the Cures Act, authorizes 
the OIG to investigate claims that a health IT developer of certified 
health IT has engaged in information blocking, which is defined by 
section 3022(a)(1) of the PHSA as subject to reasonable and necessary 
activities identified by the Secretary as exceptions to the definition 
as proposed in part 171 (see section VIII.D of this final rule). 
Additionally, section 3022(b)(1)(A)(i) authorizes OIG to investigate 
claims that a health IT developer of certified health IT has submitted 
a false attestation under the Condition of Certification requirement 
which is described at section 3001(c)(5)(D)(vi) of the Cures Act. We 
emphasized that ONC's and OIG's respective authorities under the Cures 
Act (and in general) are independent and that either or both offices 
may exercise those authorities at any time.
    We noted, however, that ONC and OIG may coordinate their respective 
information blocking activities, as appropriate, such as by sharing 
information about claims or suggestions of possible information 
blocking or false attestations (including violations of Conditions and 
Maintenance of Certification requirements that may indicate that a 
developer has falsely attested to meeting a Condition or Maintenance of 
Certification requirement). Therefore, we proposed in 84 FR 7507 that 
we may coordinate our review of a claim of information blocking with 
OIG or defer to OIG to lead a review of a claim of information 
blocking. In addition, we proposed that we may rely on OIG's findings 
to form the basis of a direct review action.
    Comments. The majority of comments received supported the general 
enforcement approach proposed by ONC. We did receive one comment 
recommending that we use a process similar to OCR's enforcement of the 
HIPAA Rules and centralize enforcement of patient and provider rights 
with respect to privacy and access to EHI. Additionally, we received 
several comments seeking clarification regarding ONC's coordination 
with OIG and one expressing concern about the potential for a developer 
to be under review by both OIG and ONC for the same conduct.
    Response. We welcome the many comments in support of our proposed 
enforcement approach. We also appreciate the comment regarding using 
processes similar to OCR and centralizing enforcement of privacy and 
access rights. We agree that it is crucial that we develop clear 
processes for reporting and investigating claims of potential 
information blocking. To that end, ONC and OIG are actively 
coordinating on establishing referral policies and procedures to ensure 
the timely and appropriate flow of information related to information 
blocking complaints. We also note that the information blocking section 
of this final rule (part 171) has a delayed compliance date of 6 months 
after date of publication of the final rule.
    OIG and ONC are also coordinating timing of the effective date of 
this final rule and the start of information blocking enforcement and 
enforcement of the Conditions of Certification related to information 
blocking (Sec.  170.401, Sec.  170.404(a)(1), and Sec.  170.406(a)(1)). 
We are providing the following information on timing for actors 
regulated by the information blocking provision. Enforcement of 
information blocking civil monetary penalties (CMP) in section 
3022(b)(2)(A) of the PHSA will not begin until established by future 
notice and comment rulemaking by OIG. As a result, actors would not be 
subject to penalties until CMP rules are final. At a minimum, the 
timeframe for enforcement would not begin sooner than the compliance 
date of the information blocking provision and will depend on when the 
CMP rules are final. Discretion will be exercised such that conduct 
that occurs before that time will not be subject to the information 
blocking CMPs. Individuals and entities are subject to the information 
blocking regulations and must comply with this rule as of the 
compliance date of this provision.
    The Cures Act directs the National Coordinator to implement a 
standardized process for the public to submit reports on claims of 
health information blocking. ONC intends to implement and evolve this 
complaint process by building on existing mechanisms, including the 
current ONC complaint process. We requested comment in the Proposed 
Rule on ways to adapt our current complaint process for claims of 
information blocking and refer readers to section VIII.F of this final 
rule for a more detailed discussion of the complaint process for claims 
of information blocking. OIG also has the ability to receive and review 
complaints directly from the public. This ensures that there is no 
``wrong door'' by which a complainant can submit information. OIG will 
provide training to allow their investigators to identify information 
blocking allegations as part of their other fraud and abuse 
investigations. Additionally, as part of their continued efforts to 
implement the information blocking authorities, OIG will establish 
policies and procedures for reviewing and triaging complaints. We will 
continue to work with OIG to establish coordinated and aligned 
procedures and reviews of information blocking complaints as envisioned 
by the Cures Act. We also emphasize that in order to promote effective 
enforcement, the information blocking provision of the Cures Act 
empowers OIG to investigate claims of information blocking and provides 
referral processes to facilitate coordination with other relevant 
agencies, including ONC, OCR, and the Federal Trade Commission (FTC). 
Future notice and comment rulemaking by OIG will provide more 
additional detail regarding information blocking enforcement.
    We clarify that there could be situations when a health IT 
developer of certified health IT's practices could be reviewed by both 
ONC and OIG because ONC and OIG have separate and distinct enforcement 
authority regarding claims of information blocking. We explained in the 
Proposed Rule that ONC has statutory authority to enforce the 
Information Blocking Condition and Maintenance of Certification 
requirements (Sec.  170.401) and that ONC would enforce the Conditions 
of Certification requirements through the direct review process. OIG 
has investigatory authority for the information blocking provision (42 
U.S.C. 300jj-52(b)), which may lead to the issuance of (CMPs) for 
information blocking conducted by health IT developers of certified 
health IT, health information networks, and health information 
exchanges. OIG may also investigate health care providers for 
information blocking, which could result in health care providers being 
subject to appropriate disincentives. In addition, OIG may investigate 
false attestations by health IT developers participating in the 
Program. Since ONC's and OIG's respective authorities with regard to 
information blocking under the Cures Act (and in general) are 
independent, it is necessary that either or both offices may exercise 
those authorities at any time.
    However, we emphasize, as we explained above in the Proposed Rule, 
that we anticipate that ONC and OIG will coordinate their respective 
information blocking activities, as appropriate, such as by sharing 
information about claims or suggestions of possible information 
blocking or false attestations (including violations of Conditions and 
Maintenance of Certification requirements that may indicate that a 
developer has falsely attested to meeting a Condition or Maintenance of 
Certification

[[Page 25790]]

requirement). Therefore, we have finalized in Sec.  170.580(a)(4) the 
proposed approach that will allow us to coordinate our review of a 
claim of information blocking with the OIG, or defer to OIG to lead a 
review of a claim of information blocking. In addition, the finalized 
approach will allow ONC to rely on OIG findings to form the basis of a 
direct review action.
7. Applicability of Conditions and Maintenance of Certification 
Requirements for Self-Developers
    The HHS regulation that established the Program, ``Establishment of 
the Permanent Certification Program for Health Information Technology'' 
(76 FR 1261), addresses self-developers and describes the concept of 
``self-developed'' as referring to a Complete EHR or EHR Health IT 
Module designed, created, or modified by an entity that assumed the 
total costs for testing and certification and that will be the primary 
user of the health IT (76 FR 1300 and 1301). While we proposed in 84 FR 
7508 in the ``Enforcement'' section of the Proposed Rule that all 
general Conditions and Maintenance of Certification requirements apply 
to such developers, we also sought comment on which aspects of the 
Conditions and Maintenance of Certification requirements may not be 
applicable to self-developers.
    Comments. We received one comment that self-developers should not 
be permitted to rely on the exception available under the 
``Communications'' Condition of Certification requirement that allows 
developers to place limited restrictions on the communications of their 
employees who are using their products.
    Response. We agree with the comment that self-developers should not 
be allowed to restrict the communications of users of their product who 
are also employees. We have revised the language of the 
``Communications'' Condition of Certification requirement in Sec.  
170.403(a)(2)(ii)(A)(2) to clarify that the limited prohibitions 
developers may place on employees under the Condition of Certification 
requirement cannot be placed on users of the developers' products who 
also happen to be employees or contractors of the developer. Overall, 
we intend to hold self-developers to all Conditions and Maintenance of 
Certification requirements of health IT developers, as applicable based 
on the health IT certified.

VIII. Information Blocking

A. Statutory Basis

    Section 4004 of the Cures Act added section 3022 of the Public 
Health Service Act (PHSA) (42 U.S.C. 300jj-52, ``the information 
blocking provision''). Section 3022(a)(1) of the PHSA defines practices 
that constitute information blocking when engaged in by a health care 
provider, or a health information technology developer, exchange, or 
network. Section 3022(a)(3) authorizes the Secretary to identify, 
through notice and comment rulemaking, reasonable and necessary 
activities that do not constitute information blocking for purposes of 
the definition set forth in section 3022(a)(1). We proposed in the 
Proposed Rule to establish exceptions to the information blocking 
definition, each of which would define certain activities that would 
not constitute information blocking for purposes of section 3022(a)(1) 
of the PHSA because they are reasonable and necessary to further the 
ultimate policy goals of the information blocking provision. We also 
proposed to interpret or define certain statutory terms and concepts 
that are ambiguous, incomplete, or provide the Secretary with 
discretion, and that we believe are necessary to carry out the 
Secretary's rulemaking responsibilities under section 3022(a)(3) (84 FR 
7522).

B. Legislative Background and Policy Considerations

    In the Proposed Rule, we outlined the purpose of the information 
blocking provision and related policy and practical considerations that 
we considered in identifying the reasonable and necessary activities 
that we proposed as exceptions to the information blocking definition 
(84 FR 7508).
1. Purpose of the Information Blocking Provision
    We explained in the Proposed Rule that the information blocking 
provision was enacted in response to concerns that some individuals and 
entities are engaging in practices that unreasonably limit the 
availability and use of electronic health information (EHI) for 
authorized and permitted purposes. These practices undermine public and 
private sector investments in the nation's health IT infrastructure, 
and frustrate efforts to use modern technologies to improve health care 
quality and efficiency, accelerate research and innovation, and provide 
greater value and choice to health care consumers (84 FR 7508).
    We emphasized that the nature and extent of information blocking 
has come into sharp focus in recent years. In 2015, at the request of 
Congress, we submitted a Report on Health Information Blocking \117\ 
(``Information Blocking Congressional Report''), in which we commented 
on the then-current state of technology and of health IT and health 
care markets. Notably, we observed that prevailing market conditions 
create incentives for some individuals and entities to exercise control 
over EHI in ways that limit its availability and use (84 FR 7508).
---------------------------------------------------------------------------

    \117\ ONC, Report to Congress on Health Information Blocking 
(Apr. 2015), https://www.healthit.gov/sites/default/files/reports/info_blocking_040915.pdf [hereinafter ``Information Blocking 
Congressional Report''].
---------------------------------------------------------------------------

    We noted that we have continued to receive complaints and reports 
of information blocking from patients, clinicians, health care 
executives, payers, app developers and other technology companies, 
registries and health information exchanges, professional and trade 
associations, and many other stakeholders. We noted that ONC has 
listened to and reviewed these complaints and reports, consulted with 
stakeholders, and solicited input from our Federal partners in order to 
inform our proposed information blocking policies. Stakeholders 
described discriminatory pricing policies that have the obvious purpose 
and effect of excluding competitors from the use of interoperability 
elements. Many industry stakeholders who shared their perspectives with 
us in listening sessions, including several health IT developers of 
certified health IT, condemned these practices and urged us to swiftly 
address them. We highlighted that our engagement with stakeholders 
confirmed that, despite significant public and private sector efforts 
to improve interoperability and data accessibility, adverse incentives 
remain and continue to undermine progress toward a more connected 
health system (84 FR 7508).
    Based on these economic realities and our first-hand experience 
working with the health IT industry and stakeholders, in the 
Information Blocking Congressional Report, we concluded that 
information blocking is a serious problem, and recommended that 
Congress prohibit information blocking and provide penalties and 
enforcement mechanisms to deter these harmful practices (84 FR 7508).
    We noted in the Proposed Rule that recent empirical and economic 
research further underscores the intractability of this problem and its 
harmful effects. In a national survey of health information 
organizations, half of respondents reported that EHR developers 
routinely

[[Page 25791]]

engage in information blocking, and a quarter of respondents reported 
that hospitals and health systems routinely do so. The survey reported 
that perceived motivations for such conduct included, for EHR vendors, 
maximizing short-term revenue and competing for new clients, and for 
hospitals and health systems, strengthening their competitive position 
relative to other hospitals and health systems.\118\ We noted that 
other research suggests that these practices weaken competition among 
health care providers by limiting patient mobility, encouraging 
consolidation, and creating barriers to entry for developers of new and 
innovative applications (also referred to as ``apps'') and technologies 
that enable more effective uses of clinical data to improve population 
health and the patient experience \119\ (84 FR 7508).
---------------------------------------------------------------------------

    \118\ See, e.g., Julia Adler-Milstein and Eric Pfeifer, 
Information Blocking: Is It Occurring And What Policy Strategies Can 
Address It?, 95 Milbank Quarterly 117, 124-25 (Mar. 2017), available 
at https://onlinelibrary.wiley.com/doi/10.1111/1468-0009.12247/full.
    \119\ See, e.g., Martin Gaynor, Farzad Mostashari, and Paul B. 
Ginsburg, Making Health Care Markets Work: Competition Policy for 
Health Care, 16-17 (Apr. 2017), available at https://www.brookings.edu/research/making-health-care-markets-work-competition-policy-for-health-care/; Diego A. Martinez et al., A 
Strategic Gaming Model For Health Information Exchange Markets, 
Health Care Mgmt. Science (Sept. 2016). (``[S]ome healthcare 
provider entities may be interfering with HIE across disparate and 
unaffiliated providers to gain market advantage.'') Niam Yaraghi, A 
Sustainable Business Model for Health Information Exchange 
Platforms: The Solution to Interoperability in Healthcare IT (2015), 
available at https://www.brookings.edu/research/papers/2015/01/30-sustainable-business-model-health-information- exchange-yaraghi; 
Thomas C. Tsai & Ashish K. Jha, Hospital Consolidation, Competition, 
and Quality: Is Bigger Necessarily Better?, 312 J. AM. MED. ASSOC. 
29, 29 (2014).
---------------------------------------------------------------------------

    We explained in the Proposed Rule that the information blocking 
provision provides a comprehensive response to these concerns. The 
information blocking provision defines and creates possible penalties 
and disincentives for information blocking in broad terms, while 
working to deter the entire spectrum of practices that unnecessarily 
impede the flow of EHI or its use to improve health and the delivery of 
care. The information blocking provision applies to the conduct of 
health care providers and health IT developers, exchanges, and 
networks, and seeks to deter information blocking through civil 
monetary penalties and disincentives for violations. Additionally, 
developers of health IT certified under the Program are prohibited from 
information blocking under 3001(c)(5)(D)(i) of the PHSA (84 FR 7509).
    The information blocking provision authorizes the HHS Office of 
Inspector General (OIG) to investigate claims of information blocking 
and provides for referral processes to facilitate coordination among 
Federal agencies, including ONC, the HHS Office for Civil Rights (OCR), 
and the Federal Trade Commission (FTC). The information blocking 
provision also provides for a process for the public to submit reports 
on claims of information blocking as well as confidentiality 
protections to encourage and facilitate the reporting of information 
blocking. Enforcement of the information blocking provision is 
buttressed by section 3001(c)(5)(D)(i) and (vi) of the PHSA, which 
requires the Secretary to establish as a Condition and Maintenance of 
Certification requirement under the Program that health IT developers 
do not take any action that constitutes information blocking and 
require such developers to attest that they have not engaged in such 
conduct (84 FR 7509).
2. Policy Considerations and Approach to Information Blocking
    We explained in the Proposed Rule that the information blocking 
provision encompasses a broad range of potential practices in order to 
ensure that individuals and entities that engage in information 
blocking are held accountable. However, we explained that it is 
possible that some activities that are innocuous, or even beneficial, 
could technically implicate the information blocking provision. Given 
the possibility of these activities, section 3022(a)(3) of the PHSA 
requires the Secretary, through rulemaking, to identify reasonable and 
necessary activities that do not constitute information blocking. We 
refer to such reasonable and necessary activities identified by the 
Secretary as ``exceptions'' to the information blocking provision. The 
information blocking provision also excludes from the definition of 
information blocking those practices that are required by law (section 
3022(a)(1) of the PHSA) and clarifies certain other practices that 
would either not be considered information blocking or penalized 
(sections 3022(a)(6) and (7) of the PHSA) (84 FR 7509).
    In considering potential exceptions to the information blocking 
provision, we strove to balance a number of policy and practical 
considerations. To minimize compliance and other burdens for 
stakeholders, we explained that we were seeking to promote clear, 
predictable, and administrable policies. In addition, we emphasized our 
intention to implement the information blocking provision in a way that 
would be sensitive to legitimate practical challenges that may prevent 
access to, exchange, or use of EHI in certain situations. We also 
explained our goal to accommodate practices that, while they may 
inhibit access, exchange, or use of EHI, are reasonable and necessary 
to advance other compelling policy interests, such as preventing harm 
to patients and others, promoting the privacy and security of EHI, and 
promoting competition and consumer welfare (84 FR 7509).
    At the same time, we explained that we sought to provide a 
comprehensive response to the information blocking problem. Information 
blocking can occur through a variety of business, technical, and 
organizational practices that can be difficult to detect and that are 
constantly changing as technology and industry conditions evolve. The 
statute responds to these challenges by defining information blocking 
broadly and in a manner that allows for careful consideration of 
relevant facts and circumstances in individual cases.
    Accordingly, we proposed in the Proposed Rule to establish certain 
defined exceptions to the information blocking provision as a way to 
identify reasonable and necessary activities that do not constitute 
information blocking as required by section 3022(a)(3) of the PHSA. We 
proposed that these exceptions would be subject to strict conditions 
and would apply three overarching policy criteria. First, each 
exception would be limited to certain activities that are both 
reasonable and necessary. These reasonable and necessary activities 
include: Promoting public confidence in the health IT infrastructure by 
supporting the privacy and security of EHI and protecting patient 
safety; and promoting competition and innovation in health IT and its 
use to provide health care services to consumers. Second, we noted that 
each exception addresses a significant risk that regulated individuals 
and entities will not engage in these reasonable and necessary 
activities because of uncertainty regarding the breadth or 
applicability of the information blocking provision. Third, we 
explained that each exception is intended to be tailored, through 
appropriate conditions, so that it is limited to the reasonable and 
necessary activities that it is designed to protect and does not extend 
protection to other activities or practices that could raise 
information blocking concerns (84 FR 7509).
3. General Comments Regarding Information Blocking Exceptions
    Comments. Numerous commenters expressed support for the proposed

[[Page 25792]]

information blocking exceptions overall. Some commenters stated that 
information blocking is a widespread problem and perhaps the greatest 
barrier to interoperability, and supported our approach to addressing 
information blocking.
    While most commenters supported our policy goals regarding 
information blocking, others questioned whether our policies would have 
detrimental consequences to the industry given the breadth of the 
definitions, ambiguity of the expectations, and narrowness of the 
proposed exceptions. Another commenter stated that the proposed 
information blocking exceptions are too vague and that an alternative 
approach is necessary to reduce confusion. The commenter stated that we 
should align the information blocking requirements with the certified 
capabilities of health IT developers, and that information blocking 
should be evaluated through the lens of access, exchange, and use of 
the USCDI. One commenter suggested that our information blocking 
policies be more patient-focused as offered by the Individual Health 
RecordTM (IHR) Model.\120\ A few commenters requested 
clarification on how each of the exceptions would be arbitrated, and 
requested that we provide additional examples of actions that may fall 
within each exception.
---------------------------------------------------------------------------

    \120\ The IHR is a digital tool that provides an all-in-one 
record of an individual's health, enabling a person and their care 
team to help improve collaboration and care.
---------------------------------------------------------------------------

    Response. We appreciate the support expressed by many commenters. 
This final rule maintains the general direction of the Proposed Rule 
regarding information blocking but focuses the scope of certain terms, 
while also addressing the reasonable and necessary activities that 
would qualify for an exception under the information blocking 
provision. As an example, we have focused the scope of the EHI and 
Health Information Network (HIN) definitions and have included a new 
exception in this final rule, the Content and Manner Exception (Sec.  
171.301). We appreciate the comment regarding the IHR Model, but have 
determined that the best approach to support interoperability and the 
access, exchange, and use of EHI is through the policies finalized in 
this final rule, which are patient-focused. For instance, the Fees 
Exception (Sec.  171.302), which allows certain fees to be charged, 
does not apply to a fee based in any part on the electronic access (as 
such term is defined in Sec.  171.302(d)) of an individual's EHI by the 
individual, their personal representative, or another person or entity 
designated by the individual. We emphasize that an actor's practice of 
charging an individual, their personal representative, or another 
person or entity designated by the individual for electronic access to 
the individual's EHI would be inherently suspect under an information 
blocking review.
    We continue to receive complaints and reports alleging information 
blocking from a wide range of stakeholders. ONC has listened to and 
reviewed these complaints and reports, consulted with stakeholders, 
solicited input from our Federal partners, and reviewed public comments 
received in response to the Proposed Rule in order to inform our 
information blocking policies. We look forward to ongoing collaboration 
with public and private sector partners as we implement the information 
blocking provision of this final rule. To note, we have provided 
clarifications and additional examples throughout this final rule.
    Comments. Numerous commenters expressed concern over the proposed 
effective date of the information blocking policies. Commenters stated 
that imposing stringent new mandates with an overly aggressive 
implementation timeframe could be counterproductive by increasing 
administrative and financial burdens on physician practices, 
threatening the security of health information, and potentially 
compromising patient safety. Several provider organizations requested 
an enforcement ``grace period'' after the new information blocking 
requirements take effect to allow providers sufficient time to 
understand the requirements and implement new procedures to be 
compliant before any disincentives would be applied. Specifically, 
commenters recommended that OIG not take any enforcement action for a 
period of 18 months or two years after the effective date of the final 
rule. Several commenters recommended a period of enforcement discretion 
of no less than five years during which OIG would require corrective 
action plans instead of imposing penalties for information blocking. 
One commenter also recommended that we ``grandfather'' any economic 
arrangements that exist two years from date of the final rule.
    We did not receive any comments on the proposed Sec.  171.101, 
Applicability, which stated that this part applies to health care 
providers, health IT developers of certified health IT, health 
information exchanges, and health information networks, as those terms 
are defined in Sec.  171.102.
    Response. We thank commenters for their input. Taking these 
comments into consideration, we have delayed the compliance date of the 
information blocking section of this rule (45 CFR part 171). The 
compliance date for the information blocking section of this final rule 
will be six months after the publication date of this final rule in the 
Federal Register. This six-month delayed compliance date was 
established to provide actors with time to thoroughly read and 
understand the final rule and educate their workforce in order to apply 
the exceptions in an appropriate manner. We also note that the 
finalized definition of information blocking (Sec.  171.103)) and the 
new Content and Manner Exception (Sec.  171.301(a)) reduce the scope of 
the EHI definition for the first 18 months after the compliance date of 
the information blocking section of this final rule to the EHI 
identified by the data elements represented in the USCDI. Therefore, in 
addition to the information blocking section's compliance date being 
six months after publication, actors will have an additional 18 months 
to gain experience applying the exceptions with just the EHI identified 
by the data elements represented in the USCDI as compared to the full 
scope of EHI, which would apply thereafter.
    During this combined period of 24 months, we strongly encourage 
actors to apply the exceptions to all EHI as if the scope were not 
limited to EHI identified by the data elements represented in the 
USCDI. However, given the initial scope of EHI identified in the 
information blocking definition in Sec.  171.103 and the Content and 
Manner Exception in Sec.  171.103, if an actor did not, in the first 24 
months from this final rule's publication date, enable access, 
exchange, or use of data outside the USCDI, or did not appropriately 
apply an exception to data outside the USCDI, such practice or error 
would not be considered information blocking because that data would 
not be considered ``EHI'' during that time period.
    We have also delayed the compliance date of the Information 
Blocking Condition of Certification requirement in Sec.  170.401 and 
the Assurances Condition of Certification requirement in Sec.  
170.402(a)(1). We also note that under 45 CFR part 171, we have focused 
the scope of the EHI definition and have revised the seven proposed 
exceptions in a manner that is clear, actionable, and likely to reduce 
perceived burden.
    OIG and ONC are coordinating timing of the compliance date of the 
information blocking section of this

[[Page 25793]]

final rule (45 CFR part 171) and the start of information blocking 
enforcement. We are providing the following information on timing for 
actors. Enforcement of information blocking civil monetary penalties 
(CMP) in section 3022(b)(2)(A) of the PHSA will not begin until 
established by future notice and comment rulemaking by OIG. As a 
result, actors would not be subject to penalties until CMP rules are 
final. At a minimum, the timeframe for enforcement would not begin 
sooner than the compliance date of the information blocking section of 
this final rule (45 CFR part 171) and will depend on when the CMP rules 
are final. Discretion will be exercised such that conduct that occurs 
before that time will not be subject to information blocking CMP.
    We have finalized Sec.  171.101 with an additional paragraph to 
codify the compliance date for the information blocking section of this 
final rule (45 CFR part 171). Section 171.101(b) states that health 
care providers, health IT developers of certified health IT, health 
information exchanges, and health information networks must comply with 
this part on and after November 2, 2020.
    Comments. Several commenters requested that we develop training and 
educational materials on the information blocking provision. Commenters 
specifically stated that we should work with other agencies (including 
CMS, OIG, FTC and OCR) to develop and widely disseminate comprehensive 
informational materials, such as sub-regulatory guidance and frequently 
asked questions about what constitutes information blocking. Some 
commenters recommended we work with OIG to ensure that enforcement 
focuses on education rather than penalties against non-malicious 
information blockers. A few commenters suggested that we offer an 
opportunity for stakeholders to seek advisory opinions from OIG to 
clarify what constitutes information blocking, or that we create a 
formal advisory committee on information blocking. Other commenters 
requested that heath care providers be provided an opportunity to cure 
an alleged violation and an opportunity to appeal the alleged 
violation.
    Response. We thank commenters for their feedback, including their 
suggestions for establishing a formal advisory committee. While we do 
not plan to establish an advisory committee, we plan to engage in 
multiple efforts to educate stakeholders. We intend to provide 
educational resources such as infographics, fact sheets, webinars, and 
other forms of educational materials and outreach based on needs 
identified. We emphasize that the final rule details our information 
blocking policies, and these educational materials are intended to 
educate stakeholders on our final policies established in the final 
rule. We are also actively coordinating with OIG and have provided OIG 
with comments we received on the Proposed Rule related to information 
blocking investigations and enforcement. Future notice and comment 
rulemaking by OIG will provide additional detail regarding information 
blocking enforcement.

C. Relevant Statutory Terms and Provisions

    In the Proposed Rule, we included regulation text to codify the 
definition of information blocking in Sec.  171.103. We discussed how 
we proposed to interpret certain aspects of the information blocking 
provision that we believe are ambiguous, incomplete, or that provided 
the Secretary with discretion. We proposed to define or interpret 
certain terms or concepts that are present in the statute and, in a few 
instances, to establish new regulatory terms or definitions that we 
believe are necessary to implement the directive in section 3022(a)(3) 
of the PHSA to identify reasonable and necessary activities that do not 
constitute information blocking. We explained that our goal in 
interpreting the statute and defining relevant terms is to provide 
greater clarity concerning the types of practices that could implicate 
the information blocking provision and, relatedly, to more effectively 
communicate the applicability and scope of the exceptions (84 FR 7509).
    Comments. We did not receive any comments on the codification of 
the proposed definition of information blocking in Sec.  171.103.
    As discussed in more detail in section VIII.C.3, we received many 
comments expressing concerns regarding the breadth of the proposed EHI 
definition and requesting flexibility in the implementation of the 
information blocking provision. Many commenters stated that it would be 
difficult for actors to provide the full scope of EHI as it was 
proposed to be defined, particularly as soon as the final rule was 
published. Some commenters opined that we were trying to do too much 
too fast. Commenters requested that we provide flexibility for actors 
to adjust to the scope of the EHI definition, as well as the 
exceptions. Commenters asserted that such an approach would permit them 
to adapt their processes, technologies, and systems to enable the 
access, exchange, and use of EHI as required by the Cures Act and this 
final rule. Some commenters suggested that EHI under the information 
blocking provision should be limited to ePHI as defined in 45 CFR 
160.103, while others requested that ONC consider constraining the EHI 
covered by the information blocking provision to only the data included 
in the USCDI.
    Response. We have finalized the proposed definition of information 
blocking in Sec.  171.103 with the addition of paragraph (b). This new 
paragraph states that until May 2, 2022--which is 18 months after the 
6-month delayed compliance date for part 171 (a total of 24 months 
after the publication date of this final rule)--EHI for purposes of 
part 171 is limited to the EHI identified by the data elements 
represented in the United States Core Data for Interoperability (USCDI) 
standard adopted in Sec.  170.213. This addition aligns with the 
content condition within the Content and Manner Exception, which states 
that for up to May 2, 2022, an actor must respond to a request to 
access, exchange, or use EHI with, at a minimum, the EHI identified by 
the data elements represented in the USCDI standard adopted in Sec.  
170.213 (see Sec.  171.301(a)(1)).
    This incremental expansion of the access, exchange, and use of EHI 
in both the information blocking definition (Sec.  171.103) and Content 
and Manner Exception (Sec.  171.301) responds to commenters' concerns 
regarding the breadth of health information actors are required to 
share and the concern about the pace at which we are implementing the 
information blocking provision. By using USCDI as the baseline of EHI 
for 18 months after the compliance date of the information blocking 
section of this final rule (45 CFR part 171),\121\ we have created a 
transparent, predictable starting point for sharing the types of EHI 
that is understood by the regulated community and more readily 
available for access, exchange, and use. In addition, health IT that 
has been certified to the 2015 Edition ``CCDS'' certification criteria 
will be able to immediately and readily produce almost all of the data 
elements identified in the USCDI. Furthermore, most, if not all, of 
such health IT already supports recording USCDI data elements and most 
HIEs/HINs are routinely exchanging such data elements. Further those 
developers maintaining certification over the 18-month period from the 
compliance date of the information blocking section of this

[[Page 25794]]

final rule (45 CFR part 171) will be in the process of updating their 
certified health IT to produce all of the data elements specified in 
the USCDI, including being certified to the new standardized 
application programming interface (API) criterion (Sec.  
170.315(g)(10)) and API Condition of Certification (Sec.  170.404).
---------------------------------------------------------------------------

    \121\ The compliance date for the information blocking section 
of this final rule (45 CFR part 171) is six months after the 
publication date of the final rule.
---------------------------------------------------------------------------

    We believe the 18-month delay will provide actors with adequate 
time to prepare for the sharing of all EHI and sunset any non-compliant 
technology, while providing a clear deadline for when all EHI must be 
available for access, exchange, and use. During this time period, 
actors can gain awareness, experience, and comfort with the information 
blocking provision and exceptions without being required to apply the 
information blocking exceptions to all EHI as it is defined in Sec.  
171.102 (see section VIII.C.3). We expect actors to use this 18-month 
delay from the compliance date of the information blocking section of 
this final rule (45 CFR part 171) (in addition to the 6-month period 
from the publication date of this final rule to the information 
blocking compliance date) to practice applying the exceptions to real-
life situations and to update their processes, technologies, and 
systems to adapt to the new information blocking requirements. We 
believe actors will benefit from learning how to respond to requests 
for all EHI and applying the exceptions during the 18-month delay.
    Further, this approach will ensure that the application of the 
information blocking provision is equitable across actors during the 
18-month time period. For instance, if we had required actors to 
respond to a request to access, exchange, or use EHI during this 18-
month time period with all EHI that the actor is able to provide, then 
actors who are able to provide more EHI would carry a heavier burden 
than actors who were only able to provide the data elements specified 
in the USCDI. Nonetheless, and as discussed above, we encourage actors 
to respond to requests for access, exchange, or use of EHI with as much 
EHI as possible in order to promote interoperability and to practice 
applying the exceptions.
    We have included language regarding this incremental expansion of 
the access, exchange, and use of EHI in both the information blocking 
definition (Sec.  171.103) and Content and Manner Exception (Sec.  
171.301) in order to ensure that the 18-month delay is uniformly 
applied in the broad circumstances when requestors request access, 
exchange, or use of EHI as well as in situations when an actor seeks to 
satisfy the Content and Manner Exception by fulfilling a request to 
access, exchange, or use EHI in an alternative manner than the manner 
requested. This approach will ensure that the requisite content to be 
included in an actor's response to a request to access, exchange, or 
use EHI during the 18-month period is clear and consistent throughout 
our information blocking policies.
1. ``Required by Law''
    With regard to the statute's exclusion of practices that are 
``required by law'' from the definition of information blocking, we 
emphasized in the Proposed Rule that ``required by law'' refers 
specifically to interferences with access, exchange, or use of EHI that 
are explicitly required by State or Federal law. By carving out 
practices that are ``required by law,'' the statute acknowledged that 
there are laws that advance important policy interests and objectives 
by restricting access, exchange, and use of EHI, and that practices 
that follow such laws should not be considered information blocking (84 
FR 7509).
    We noted in the Proposed Rule that for the purpose of developing an 
exception for reasonable and necessary privacy-protective practices, we 
distinguished between interferences that are ``required by law'' and 
those engaged in pursuant to a privacy law, but which are not 
``required by law.'' (The former does not fall within the definition of 
information blocking, but the latter may implicate the information 
blocking provision and an exception may be necessary (84 FR 7510)).
    Comments. We received comments requesting additional clarity 
regarding the meaning and scope of ``required by law'' within the 
information blocking provision.
    Response. We thank commenters for the feedback. We clarify that our 
references to Federal and State law include statutes, regulations, 
court orders, and binding administrative decisions or settlements, such 
as (at the Federal level) those from the FTC or the Equal Employment 
Opportunity Commission (EEOC). We further note that ``required by law'' 
would include tribal laws, as applicable. For a detailed discussion of 
the application of ``required by law'' in the context of the Privacy 
Exception, please see section VIII.D.1.b.
2. Health Care Providers, Health IT Developers, Exchanges, and Networks
    We explained in the Proposed Rule that section 3022(a)(1) of the 
PHSA, in defining information blocking, refers to four classes of 
individuals and entities that may engage in information blocking and 
which include: Health care providers, health IT developers, networks, 
and exchanges. We proposed in the Proposed Rule to adopt definitions of 
these terms to provide clarity regarding the types of individuals and 
entities to whom the information blocking provision applies (84 FR 
7510). We noted that, for convenience and to avoid repetition in the 
preamble, we typically refer to these individuals and entities covered 
by the information blocking provision as ``actors'' unless it is 
relevant or useful to refer to the specific type of individual or 
entity. That is, when the term ``actor'' appears in the preamble, it 
means a health care provider, health IT developer, health information 
exchange, or health information network. We proposed to codify this 
definition of ``actor'' in Sec.  171.102.
    Comments. We did not receive any comments on this general approach 
to use the term ``actors'' throughout the rule for clarity or the 
proposed definition of ``actor'' in Sec.  171.102. We note that we did 
receive comments about the definitions of the four categories of 
actors, which are discussed below.
    Response. We have finalized this approach and the definition of 
``actor'' in Sec.  171.102 as proposed.
a. Health Care Providers
    We identified in the Proposed Rule that the term ``health care 
provider'' is defined in section 3000(3) of the PHSA (84 FR 7510). We 
proposed to adopt this definition for purposes of section 3022 of the 
PHSA (that is, for purposes of information blocking) when defining 
``health care provider'' in Sec.  171.102. We noted that the PHSA 
definition is different from the definition of ``health care provider'' 
under the HIPAA Rules. We further stated that we were considering 
adjusting the information blocking definition of ``health care 
provider'' to cover all individuals and entities covered by the HIPAA 
Rules ``health care provider'' definition in 45 CFR 160.103. We sought 
comment on whether such an approach would be justified, and encouraged 
commenters to specify reasons why doing so might be necessary to ensure 
that the information blocking provision applies to all health care 
providers that might engage in information blocking.
    Comments. A significant number of commenters were in favor of using 
the definition of health care provider used in the HIPAA Rules. 
However, other commenters asserted that doing so would exceed the scope 
intended by the Cures Act. Some commenters requested exclusions or a 
``phased-in'' approach

[[Page 25795]]

for the requirements for State agencies, institutions, public health 
departments, ambulatory surgical centers, and other small providers due 
to their limited resources or limited access to health IT. Other 
commenters suggested limiting the application of the information 
blocking provisions only to those health care providers using certified 
health IT though some commenters also opposed such a limitation. Some 
commenters suggested including additional categories such as medical 
device manufacturers and community-based organizations that address 
social determinants of health (e.g., access to food, housing, and 
transportation).
    Response. We have retained in this final rule the definition of 
``health care provider'' as set forth in section 3000(3) of the PHSA as 
proposed. The definitions listed in section 3000 of the PHSA apply 
``[i]n this title,'' which refers to Title XXX of the PHSA. Section 
3022 of the PHSA is included in Title XXX. We note that the last clause 
of the health care provider definition in section 3000(3) of the PHSA 
gives the Secretary discretion to expand the definition to any other 
category determined to be appropriate by the Secretary. We will 
consider whether the definition should be expanded in the future if the 
scope of health care providers subject to the information blocking 
provision does not appear to be broad enough in practice to ensure that 
the information blocking provision applies to all health care providers 
that might engage in information blocking.
    With respect to the requested exclusions or a ``phased-in'' 
approach for certain types of entities, we do not believe that this is 
necessary due to the addition of paragraph (b) within the information 
blocking definition in Sec.  171.103 and the new Content and Manner 
Exception in Sec.  171.310. Section 171.103(b) states that until May 2, 
2022--which is 18 months after the compliance date of the information 
blocking section of this final rule (part 171)--EHI for purposes of 
part 171 is limited to the EHI identified by the data elements 
represented in the United States Core Data for Interoperability (USCDI) 
standard adopted in Sec.  170.213 (see the discussion in section 
VIII.C). Similarly, the Content and Manner Exception allows actors to 
make available a limited set of EHI (the USCDI) during the first 18 
months after the six-month delayed compliance date for part 171 (a 
total of 24 months after publication of this final rule). This 
approach, as well as the Infeasibility Exception, will address concerns 
about certain actors having limited resources or limited access to 
health IT.
    The health care provider definition and resources we have made 
available provide clarity and examples of the types of individuals and 
entities covered by the definition. To this point, medical device 
manufacturers and community-based organizations, as described by 
commenters, generally would not meet the health care provider 
definition unless they are also a type of individual or entity 
identified in the definition.
b. Health IT Developers of Certified Health IT
    Section 3022(a)(1)(B) of the PHSA defines information blocking, in 
part, by reference to the conduct of health information technology 
developers. In the Proposed Rule (84 FR 7510), we explained that, 
because title XXX of the PHSA does not define ``health information 
technology developer,'' we interpreted section 3022(a)(1)(B) in light 
of the specific authority provided to OIG in section 3022(b)(1)(A) and 
(b)(2). We noted that section 3022(b)(2) discusses developers, 
networks, and exchanges by referencing any individual or entity 
described in section 3022(b)(1)(A) or (C). Section 3022(b)(1)(A) 
states, in relevant part, that OIG may investigate any claim that a 
health information technology developer of certified health information 
technology or other entity offering certified health information 
technology engaged in information blocking.
    We believe it is reasonable to interpret these sections together to 
mean that the information blocking provision extends to individuals or 
entities that develop or offer certified health IT. That the individual 
or entity must develop or offer certified health IT, we explained, is 
further supported by section 3022(a)(7) of the PHSA--which refers to 
developers' responsibilities to meet the requirements of 
certification--and section 4002 of the Cures Act--which identifies 
information blocking as a Condition of Certification. Consistent with 
this, we proposed a definition of ``health IT developer of certified 
health IT'' in Sec.  171.102 (84 FR 7601) and an interpretation of the 
use of ``health information technology developer'' in section 3022 of 
the PHSA that would apply to part 171 only, and would not apply (84 FR 
7511) to the implementation of any other section of the PHSA \122\ or 
the Cures Act, such as section 4005(c)(1) of the Cures Act.
---------------------------------------------------------------------------

    \122\ Because part 171 is referenced by part 170 subpart D, the 
definition and interpretation are relevant to developers' 
obligations to meet Condition and Maintenance of Certification 
Requirements.
---------------------------------------------------------------------------

Limiting the Definition of Health IT Developer to Developers of 
Certified Health IT
    Comments. A number of commenters suggested broadening the 
definition of ``health IT developers'' to include all developers of 
health IT, whether or not any of their products include Health IT 
Module(s) certified under ONC's Health IT Certification Program. 
Several of these commenters expressed concern that developers of only 
non-certified health IT would, under our proposed definition, be able 
to continue to block patients from accessing or directing their EHI to 
third parties of their choice. A majority of these commenters expressed 
concerns that an information blocking prohibition limited to developers 
who participate in the ONC Health IT Certification Program (also 
referred to as ``the Program'') will result in an uneven playing field 
for developers who participate in the Program in comparison to those 
who do not participate in the Program. Some commenters suggested that 
this could motivate developers to avoid or withdraw from the Program.
    Response. We believe that ``health information technology 
developer'' as used in PHSA section 3022(a)(1)(B) should be interpreted 
in light of the specific authority provided to OIG in section 
3022(b)(1)(A) and (b)(2). Section (b)(1)(A) states, in relevant part, 
that OIG may investigate any claim that a health information technology 
developer of certified health information technology or other entity 
offering certified health information technology engaged in information 
blocking. We recognize that health IT developers that are not 
developers of certified health IT could engage in conduct meeting the 
definition of information blocking in section 3022(a) of the PHSA. 
However, the statute places health IT developers of certified health IT 
on different footing than other developers of health IT with respect to 
information blocking enforcement. A broader definition of ``health IT 
developer'' in Sec.  171.102 would not change the scope or effect of 
section 3022(b)(1)(A) and (b)(2) of the PHSA.
    We acknowledge that the information blocking provision may change 
some health IT developers' assessments of whether participation in the 
voluntary ONC Health IT Certification Program is the right decision for 
their health IT products and customers. However, we believe the value 
certification offers to the health IT developers' customers, such as 
health care providers, is substantially enhanced by both the 
information blocking provision and the

[[Page 25796]]

enhancements to certification called for in PHSA section 3001(c)(5)(D). 
We believe the benefit that certification offers health IT developers' 
customers will continue to weigh in favor of the developers obtaining 
and maintaining certification of their products. For example, the 
Promoting Interoperability Programs (formerly known as the Medicare and 
Medicaid EHR Incentive Programs) continue to require use of Certified 
EHR Technology (CERHT), which makes certification important for 
developers seeking to market certain types of health IT (notably 
including, but not limited to, that within the ``Base EHR'' definition 
in Sec.  170.102) to eligible clinicians, eligible hospitals, and 
critical access hospitals (CAHs).
    Comments. Several commenters recommended alternative approaches to 
interpreting the Cures Act, to justify broadening the definition of 
``health IT developer'' in 45 CFR 171.102 to include all developers of 
any products within the definition of ``health information technology'' 
in section 3000 of the PHSA. These commenters offered a variety of 
rationales, including consideration of information that would have been 
available to Congress at the time the Cures Act was enacted, as the 
basis for inferring that Congress did not intend to limit the scope of 
the information blocking provision to developers that participate in 
the voluntary ONC Health IT Certification Program. Some commenters 
stated the phrasing of the Cures Act's information blocking provision 
appeared to exclude health IT developers that do not participate in our 
Program and recommended that we address what some comments described as 
a potential enforcement gap by broadening the regulatory definition of 
``health IT developer'' in 45 CFR 171.102, although they did not 
identify a specific statutory basis for closing what their comments 
described as a gap or drafting issue in the statute. One commenter 
asked that we work with Congress to expand the definition of health IT 
developer beyond those with at least one product that is or that 
includes at least one Health IT Module certified under the Program.
    Response. As explained in the Proposed Rule and in the immediately 
preceding response to comments, we believe that ``health information 
technology developer'' as used in PHSA section 3022(a)(1)(B) should be 
interpreted in light of the specific authority provided to OIG in 
section 3022(b)(1)(A) and (b)(2). Our interpretation is that the 
individual or entity must develop or offer certified health IT to be 
considered a health IT developer covered by the information blocking 
provision, which is further supported by PHSA sections 3022(a)(7) and 
3001(c)(5)(D). Section 3022(a)(7) refers to developers' 
responsibilities to meet the requirements of certification, and section 
3001(c)(5)(D) identifies as a Condition of Certification that a health 
IT developer not engage in information blocking. Moreover, PHSA Sec.  
3022 does not specifically address all of the types of individuals and 
entities (such as health plans and claims data clearinghouses) that 
could or currently do engage in practices that might otherwise meet the 
definition of information blocking in PHSA Sec.  3022(a).
Applicability of Information Blocking Provision to Non-Certified Health 
IT Products of a Developer of Certified Health IT
    Comments. On the whole, the majority of comments supported defining 
``health IT developer'' in a manner that includes all health IT 
products developed or offered by developers who have at least one 
Health IT Module certified under the Program. However, multiple 
comments, predominantly from the perspective of developers of certified 
health IT, recommended that we limit the definition of ``health IT 
developers of certified health IT'' in Sec.  171.102 so that it would 
encompass only the developers' conduct specific to their certified 
health IT products. Commenters advocating this more limited definition 
stated that these developers' non-certified health IT products would be 
competing against similar products of developers who are not subject to 
the information blocking provision.
    Response. The Cures Act does not prescribe that only practices 
involving certified health IT may implicate PHSA section 3022(a). If 
Congress had intended to limit the application of section 3022 of the 
PHSA to practices involving certified health IT, we believe PHSA 
section 3022 would have included language that tied enforcement of that 
section to the operation or performance of health IT products that 
include one or more Health IT Module(s) certified under the Program. 
Instead, PHSA section 3022(b)(1)(A) provides that the HHS Inspector 
General may investigate under PHSA section 3022 any claim that ``a 
health information technology developer of certified health information 
technology or other entity offering certified health information 
technology--submitted a false attestation under section 
3001(c)(5)(D)(vii); or engaged in information blocking.'' Similarly, 
neither subparagraph (B) of PHSA section 3022(b)(1), specific to claims 
that a health care provider engaged in information blocking, nor 
subparagraph (C), specific to claims that health information exchanges 
(HIEs) or health information networks (HINs) engaged in information 
blocking, includes language limiting the Inspector General to 
investigating claims tied to these actors' use of certified health IT.
    Moreover, our observation is that the customers of health IT 
developers of certified health IT seldom, if ever, rely solely on 
Health IT Modules certified under the Program to meet their needs to 
access, exchange, and use EHI. A developer's health IT product suite 
that a hospital, clinician office practice, or other health care 
provider uses (and colloquially references) as its ``EHR system'' will 
typically include a wide variety of functions, services, components, 
and combinations thereof. Even where such a health IT product suite 
meets the definition of ``Certified EHR Technology'' for purposes of 
participation in the Promoting Interoperability Programs, there is no 
guarantee that every part of the overall product suite will meet the 
requirements of at least one certification criterion adopted by the 
Secretary. In fact, typically only a subset of the functions, services, 
components, and combinations thereof within the overall product suite 
will meet the requirements of at least one certification criterion 
adopted by the Secretary and be Health IT Modules certified under the 
Program.
    If we were to interpret the information blocking provision as 
applying only to the certified Health IT Modules within a developer's 
product suite(s), we are concerned the developers' customers might too 
easily presume, based on the developer's participation in the ONC 
Health IT Certification Program, that the developer will not engage in 
information blocking with respect to any of the EHI that the customer 
uses of the developer's product suite(s) to access, exchange, or use. 
Moreover, limiting our definition of ``health IT developer of certified 
health IT'' for purposes of part 171 to only the subset of an 
individual or entity's products that are, or that specifically include, 
Health IT Modules certified under our Program could encourage 
developers to split various functions, services, or combinations 
thereof into multiple products so that they could more easily or 
broadly avoid accountability for engaging in practices otherwise 
meeting the definition of information blocking in Sec.  171.103 with 
respect to various pieces of their product suite(s) rather than

[[Page 25797]]

composing products in response to customers' needs and preferences.
    We do not believe this outcome would be in the best interest of 
patients, health care providers, or other customers of health IT 
developers of certified health IT. Thus, while acknowledging that our 
definition of ``health IT developer of certified health IT'' in 
specific may, like the information blocking provision in general, 
change some health IT developers' assessments of whether participation 
in the voluntary ONC Health IT Certification Program is the right 
decision for their health IT products and customers, we believe the 
definition we have finalized offers necessary assurance to purchasers 
and users that a health IT developer that has chosen to participate in 
the Program can be held accountable under part 170 subpart D and under 
part 171 should that developer also engage in any conduct meeting the 
definition of information blocking in Sec.  171.103.
Duration of Health IT Developer of Certified Health IT Status
    We proposed that ``health IT developer of certified health IT'' 
would mean an individual or entity that develops or offers health 
information technology (as that term is defined in 42 U.S.C. 300jj(5)) 
and which had, at the time it engaged in a practice that is the subject 
of an information blocking claim, health information technology (one or 
more) certified under the ONC Health IT Certification Program. We 
proposed (84 FR 7511) that the term ``information blocking claim'' 
within this definition should be read broadly to encompass any 
statement of information blocking or potential information blocking. We 
also noted in the Proposed Rule that ``claims'' of information blocking 
within this definition would not be limited, in any way, to a specific 
form, format, or submission approach or process.
    We stated in the Proposed Rule that we were also considering 
additional approaches to help ensure developers and offerors of 
certified health IT remain subject to the information blocking 
provision for an appropriate period of time after leaving the Program. 
While encouraging commenters to identify alternative approaches for 
identifying when a developer or offeror should, and when they should no 
longer, be subject to the information blocking provision, we requested 
comment on whether one of two specific approaches would best achieve 
our policy goal of ensuring that health IT developers of certified 
health IT will face consequences under the information blocking 
provision if they engage in information blocking in connection with EHI 
that was stored or controlled by the developer or offeror while they 
were participating in the Program. One such approach would have defined 
``health IT developer of certified health IT'' as including developers 
and offerors of certified health IT that continue to store EHI that was 
previously stored in health IT certified in the Program. The other 
would have continued to define a developer or offeror of health IT as a 
``health IT developer of certified health IT'' for purposes of part 171 
for an appropriate period of time, such as one year, after the 
developer or offeror left the Program (no longer had any Health IT 
Modules certified under part 170).
    Comments. We received several comments in support of defining 
``health IT developer of certified health IT'' in a way that would 
include developers and offerors who have left the Program so long as 
they continue to store or control EHI that had been stored in or by 
their health IT products while the products were, or included one or 
more, Health IT Module(s) certified in the Program. We also received 
several comments recommending developers of certified health IT remain 
subject to the information blocking provision for a period of time 
after leaving the Program. A couple of commenters recommended a hybrid 
approach that would include individuals and entities in the definition 
of ``health IT developer of certified health IT'' while they continue 
to store EHI that had been stored in certified health IT or for a 
reasonable period of time after they ceased participating in the 
Program, whichever is longer.
    One reason commenters stated in support of extending the definition 
of ``health IT developer of certified health IT'' beyond the time a 
developer ceased participating in the program was that in commenters' 
view this could help former customers access the EHI that the customers 
need to provide the best care for patients and that they had contracted 
with a developer to manage while the developer had certified health IT. 
Some commenters stated that the need for customers to ensure their 
contracts with Program-participating developers include provisions for 
retrieval of the EHI upon termination or conclusion of the contract 
would be eliminated if the period of time during which the ``health IT 
developer of certified health IT'' definition applied extended beyond 
the date a developer leaves the Program. Other comments recommended 
against developers remaining subject to the information blocking 
provision after leaving the Program, citing concerns such as burden.
    Response. We thank commenters for their feedback. We have finalized 
in Sec.  171.102 that a ``health IT developer of certified health IT'' 
for purposes of part 171 means an individual or entity, other than a 
health care provider that self-develops health IT for its own use, that 
develops or offers health information technology (as that term is 
defined in 42 U.S.C. 300jj(5)) and which has, at the time it engages in 
a practice that is the subject of an information blocking claim, one or 
more Health IT Modules certified under a program for the voluntary 
certification of health information technology that is kept or 
recognized by the National Coordinator pursuant to 42 U.S.C. 300jj-
11(c)(5) (ONC Health IT Certification Program). This definition will 
ensure conduct a developer or offeror engages in while it has any 
health IT product certified under the Program will be within the 
definition of ``health IT developer of certified health IT'' for 
purposes of part 171.
    We have not extended the definition of ``health IT developer of 
certified health IT'' beyond the date on which a developer or offeror 
no longer has any health IT certified under the Program. It may be that 
extending duration of ``health IT developer of certified health IT'' 
status beyond the date on which a developer or offeror stops 
participating in the Program could help motivate such a developer or 
offeror to better support transfers of EHI in their custody if their 
customers choose to switch products because of the developer's 
withdrawal from the Program. However, we believe that ensuring 
continuity of access to patients' EHI is an essential consideration in 
the process of selecting and contracting for health IT. All transitions 
between different health IT products will require transfer of EHI 
between those products. Planning for this transfer is, as a practical 
matter, integral to a successful transition between products that 
ensures continuity of access to EHI essential to safe, well-coordinated 
patient care. We are not persuaded that any of the alternative 
approaches to duration of ``health IT developers of certified health 
IT'' status could eliminate the need for health care providers and 
other customers of ``health IT developers of certified health IT'' to 
ensure their health IT planning and contracting provides for 
appropriate transfer(s) of data at the conclusion or termination of any 
particular contract.
    We also note that in the market for certified Health IT Modules 
today, many of the customers of health IT developers

[[Page 25798]]

or offerors are HIPAA-covered entities (such as health care providers) 
or HIPAA business associates (BAs) (such as health information 
exchanges or clinical data registries) with whom covered entities 
contract for particular services. In such cases, the HIPAA Rules 
generally require that a HIPAA covered entity (or BA) enter into a 
business associate agreement (BAA) that requires that the BA (or 
subcontractor BA) return or destroy the PHI after the termination of 
its service as a BA (or subcontractor BA). Because a contract for 
health IT products or services, and any associated BAA, could extend 
beyond a developer or offeror's departure from the ONC Health IT 
Certification Program, we believe such contracts and agreements provide 
an appropriate mechanism for customers to guard against a health IT 
developer or offeror who has left the Program refusing to relinquish 
EHI. We note further that limiting the definition of ``health IT 
developer of certified health IT'' to the time period during which the 
individual or entity has at least one Health IT Module certified under 
the Program would not require claims of information blocking to come to 
our attention during that same period. We have finalized the definition 
as proposed, with modification to its wording that is discussed below.
    Comments. A commenter suggested that the definition of 
``information blocking claim'' should not include any ``potential 
information blocking,'' but instead should be evaluated with facts and 
evidence necessary to support a verifiable claim.
    Response. We did not propose to define in regulation ``information 
blocking claim.'' We did note in the preamble to the Proposed Rule that 
for purposes of the definition of ``health IT developer of certified 
health IT'' proposed in Sec.  171.102, claims of information blocking 
would not be limited, in any way, to a specific form, format, or 
submission process (84 FR 7511). In the definition of ``health IT 
developer of certified health IT'' finalized in Sec.  171.102, we have 
retained reference to the time at which the individual or entity that 
develops or offers certified health IT engages in a practice that is 
the subject of an information blocking claim so that it is immediately 
clear on the face of the regulation text that the claim need not be 
brought while the developer still has certified health IT. If a health 
IT developer of certified health IT engages in a practice that is 
within the definition of information blocking in Sec.  171.103 while 
they remain in the Program, that health IT developer cannot avoid 
applicability of the information blocking provision to those practices 
by simply leaving the Program before any claim(s) about the practice 
may come to light. Our reference to claims of information blocking in 
the finalized definition of ``health IT developer of certified health 
IT'' is not intended to imply that any actor whose conduct is the 
subject of a claim of information blocking that is received by HHS 
necessarily will be found to have engaged in conduct meeting the 
definition of information blocking in Sec.  171.103 or that is 
otherwise contrary to requirements of the ONC Health IT Certification 
Program (such as the Condition and Maintenance of Certification 
requirements established in subpart D of part 170).\123\ If subject to 
an investigation, each practice that implicates the information 
blocking provision and does not meet an exception would be analyzed on 
a case-by-case basis to evaluate, for example, whether it rises to the 
level of an interference, and whether the actor acted with the 
requisite intent.
---------------------------------------------------------------------------

    \123\ Section 3022(b) of the PHSA authorizes the HHS Office of 
the Inspector General to investigate claims of information blocking. 
Simultaneously, ONC has responsibility for assessing developers' 
compliance with requirements of the ONC Health IT Certification 
Program. Coordination between ONC and OIG in our respective roles is 
discussed in section VII.D.3 of this preamble.
---------------------------------------------------------------------------

Developers and Offerors of Certified Health IT
    We stated in the proposed rule that within the definition of 
``health IT developer of certified health IT'' for purposes of part 
171, we interpret an ``individual or entity that develops the certified 
health IT'' as the individual or entity that is legally responsible for 
the certification status of the health IT, which would be the 
individual or entity that entered into a binding agreement that 
resulted in the certification status of the health IT under the Program 
or, if such rights are transferred, the individual or entity that holds 
the rights to the certified health IT (84 FR 7511). We also stated that 
an ``individual or entity that offers certified health IT'' would 
include an individual or entity that under any arrangement makes 
certified health IT available for purchase or license. We requested 
comment on both of these interpretations, and whether there are 
particular types of arrangements under which certified health IT is 
``offered'' in which the offeror should not be considered a ``health IT 
developer of certified health IT'' for the purposes of the information 
blocking provision.
    Comments. Several comments questioned the inclusion of offerors of 
certified health IT who do not themselves develop the health IT in the 
definition of ``health IT developer of certified health IT.'' Some 
commenters recommended the exclusion of offerors who do not modify or 
configure the health IT in question. Some commenters advocated treating 
entities that include other developers' certified health IT in the 
health IT products or services they offer, but do not themselves 
develop certified health IT, as being outside the definition of 
``health IT developer of certified health IT.'' Commenters stated that 
these offerors do not themselves develop the certified health IT and 
thus do not control its design. Commenters also stated that the 
products offered by some of these offerors (such as clinical data 
registries which may be certified to clinical quality measurement and 
measure reporting criteria) are not primary sources of patients' EHI, 
and that offerors of health IT that is not a primary source of EHI 
should be excluded from the definition of health IT developer of 
certified health IT. One commenter specifically recommended excluding 
from the definition individuals and entities that offer under their own 
brand, but do not modify or configure, certified health IT developed by 
others. These commenters suggested that this is desirable in order to 
hold developers accountable for information blocking conduct in the 
course of development.
    Response. Including both developers and other offerors in the 
definition of ``health IT developer of certified health IT'' is 
consistent with the policy goal of holding all entities who could, as a 
developer or offeror, engage in information blocking accountable for 
their practices that are within the definition of information blocking 
in Sec.  171.103. PHSA section 3022(b)(1)(A) expressly references both 
``a health information technology developer of certified health 
information technology'' and ``other entity offering certified health 
information technology'' in the context of authority to investigate 
claims of information blocking. As stated in the Proposed Rule (84 FR 
7510), we interpret PHSA section 3022(a)(1)(B) in light of the specific 
authority provided to OIG in PHSA section 3022(b)(1)(A) and (b)(2).
    We interpret these sections together as the basis for applicability 
of the information blocking provision to individuals or entities that 
develop or offer certified health IT. We refer commenters concerned 
about holding offerors that do not develop, modify, or configure health 
IT accountable for the conduct of others to PHSA section 3022(a)(6), 
which states that the term ``information blocking,'' with respect to

[[Page 25799]]

an individual or entity, shall not include an act or practice other 
than an act or practice committed by such individual or entity. Where 
the individual or entity that develops health IT is different from the 
individual or entity that offers certified health IT, each such 
individual or entity would have the potential to engage in various 
practices within the definition of information blocking in PHSA section 
3022(a) and 45 CFR 171.103, and we believe each should be accountable 
for their own conduct. Actors who are not primary generators of EHI or 
who may hold only a few data classes or elements for any given patient 
(as would be the case for examples specifically cited by commenters), 
could nevertheless engage in conduct that constitutes information 
blocking as defined in Sec.  171.103 with respect to that EHI they do 
hold or control. We therefore see no reason to exclude them from the 
definition of health IT developer of certified health IT. To do so 
would not be consistent with the policy goal of addressing the problem 
of information blocking.
    Comments. Several commenters recommended that public health 
agencies that develop and/or offer health IT products and services, 
such as those related to syndromic surveillance and immunization 
registries, be excluded from the definition of health IT developer in 
Sec.  171.102.
    Response. We believe the vast majority of public health agencies 
would remain outside of our definition of ``health IT developer of 
certified health IT'' finalized in Sec.  171.102. The ``public health'' 
certification criteria within the ONC Health IT Certification Program 
are applicable to the health IT that health care providers would use to 
exchange information with public health information infrastructure. 
These criteria are not applicable to the public health information 
reporting or exchange infrastructure itself.
Treatment of ``Self-Developers'' of Certified Health IT
    We stated in the proposed rule (84 FR 7511) that a ``self-
developer'' of certified health IT, as the term has been used in the 
ONC Health IT Certification Program (Program) and described in section 
VII.D.7 of the Proposed Rule (84 FR 7507), section VII.D.7 of this 
preamble, and previous rulemaking,\124\ would be treated as a health 
care provider for the purposes of information blocking because our 
description of a self-developer for Program purposes \125\ would mean 
that they would not be supplying or offering their certified health IT 
to other entities (84 FR 7511 and 7512). We stated in the Proposed Rule 
that self-developers would still be subject to the proposed Conditions 
and Maintenance of Certification requirements because they have health 
IT certified under the Program (see also section VII.D.7 of the 
Proposed Rule (84 FR 7507) and section VII.D.7 of this preamble). We 
requested comments on our treatment of ``self-developers'' for 
information blocking purposes and whether there are other factors we 
should consider.
---------------------------------------------------------------------------

    \124\ The final rule establishing ONC's Permanent Certification 
Program, ``Establishment of the Permanent Certification for Health 
Information'' (76 FR 1261), addresses self-developers.
    \125\ The language in the final rule establishing ONC's 
Permanent Certification Program describes the concept of ``self-
developed'' as referring to a complete EHR or EHR Module designed, 
created, or modified by an entity that assumed the total costs for 
testing and certification and that will be the primary user of the 
health IT (76 FR 1300).
---------------------------------------------------------------------------

    Comments. A number of comments expressed support of treating 
``self-developer'' health care providers who do not supply or offer 
their certified health IT to other entities as health care providers 
for purposes of information blocking.
    Response. We appreciate commenters' input. The definition of 
``health IT developer of certified health IT'' that we have finalized 
in Sec.  171.102 expressly excludes health care providers who self-
develop health IT for their own use. However, we remind health care 
providers who may be considering or are embarking on self-development 
of certified Health IT Modules that ``self-developers'' are subject to 
certain Condition and Maintenance of Certification requirements 
finalized in subpart D of part 170. These requirements include, though 
they are not limited to, providing assurances and attestations that 
they will not, have not, and do not engage in conduct constituting 
information blocking.
    For purposes of the definition of ``health IT developer of 
certified health IT,'' we interpret ``a health care provider that self-
develops health IT for its own use'' to mean that the health care 
provider is responsible for the certification status of the Health IT 
Module(s) and is the primary user of the Health IT Module(s). Moreover, 
we interpret ``a health care provider that self-develops health IT for 
its own use'' to mean that the health care provider does not offer the 
health IT to other entities on a commercial basis or otherwise. This 
interpretation rests on our established concept of ``self-developed'' 
certified Health IT Modules. In this context, it is important to note 
that some use of a self-developer's health IT may be made accessible to 
individuals or entities other than the self-developer and its employees 
without that availability being interpreted as offering or supplying 
the health IT to other entities in a manner inconsistent with the 
concept of ``self-developer.'' For example, if a hospital were to self-
develop an EHR system, we would not consider inclusion in that system 
of certain functionalities or features--such as APIs or patient 
portals--to be offering or supplying the hospital's self-developed 
health IT to other entities. We would also not interpret as offering or 
supplying the self-developed health IT to other entities the issuance 
of login credentials allowing licensed health care professionals who 
are in independent practice to use the hospital's EHR to furnish and 
document care to patients in the hospital. Keeping in the hospital's 
EHR a comprehensive record of a patient's care during an admission is a 
practice we view as reasonable and it typically requires that all the 
professionals who furnish care to patients in the hospital be able to 
use the hospital's EHR system. It is also customary practice amongst 
hospitals that purchase commercially marketed health IT, as well as 
those that self-develop their health IT, to enable health care 
professionals in independent practice who furnish care in the hospital 
to use the EHR in connection to furnishing and documenting that care. 
Clinician portals made available to facilitate independent licensed 
health care professionals furnishing and/or documenting care to 
patients in the hospital would also not be interpreted as negating the 
hospital's ``self-developer'' status. However, if a health care 
provider responsible for the certification status of any Health IT 
Module(s) were to offer or supply those Health IT Module(s), separately 
or integrated into a larger product or software suite, to other 
entities for those entities' use in their own independent operations, 
that would be inconsistent with the concept of the health care provider 
self-developing health IT for its own use.
    In deciding to exclude health care providers who self-develop 
health IT for their own use from the definition of ``health IT 
developer of certified health IT'' finalized in Sec.  171.102, we rely 
substantially on our Program experience that self-developed certified 
health IT currently represents a small, and diminishing, share of the 
Health IT Modules certified under our Program. We also note that we may 
consider amending this definition in future

[[Page 25800]]

rulemaking in response to changing market conditions. For example, the 
market might evolve in ways that would increase risk of abuse of this 
exclusion of health care providers who self-develop certified health IT 
from the application of the Sec.  171.103 definition of ``information 
blocking'' to their conduct as a developer of health IT. In such 
circumstances, we might contemplate appropriate revisions to the 
definition of ``health IT developer of certified health IT'' for 
purposes of part 171.
Summary of Finalized Policy: Definition of Health IT Developer of 
Certified Health IT
    In Sec.  171.102, we have finalized that ``health IT developer of 
certified health IT'' means an individual or entity, other than a 
health care provider that self-develops health IT for its own use, that 
develops or offers health information technology (as that term is 
defined in 42 U.S.C. 300jj(5)) and which has, at the time it engages in 
a practice that is the subject of an information blocking claim, one or 
more Health IT Modules certified under a program for the voluntary 
certification of health information technology that is kept or 
recognized by the National Coordinator pursuant to 42 U.S.C. 300jj-
11(c)(5) (ONC Health IT Certification Program). This is substantially 
the definition we proposed (84 FR 7601), but with minor modifications 
to its text.
    We have added to this finalized definition ``other than a health 
care provider that self-develops health IT for its own use,'' so that 
this feature of the proposed definition which we stated in the Proposed 
Rule's preamble (84 FR 7511) is immediately clear on the face of the 
regulation text itself. We also replaced the proposed phrasing ``health 
information technology (one or more) certified'' (84 FR 7601) with 
``one or more Health IT Modules certified'' because it is more 
consistent with our Program terminology. We also replaced ``under the 
ONC Health IT Certification Program'' from the proposed phrasing with 
the finalized ``under a program for the voluntary certification of 
health information technology that is kept or recognized by the 
National Coordinator pursuant to 42 U.S.C. 300jj-11(c)(5) (ONC Health 
IT Certification Program).'' Currently, we keep a single Program that 
we refer to as the ONC Health IT Certification Program. For purposes of 
precision, we decided to refer to the statutory basis for the Program, 
and indicate parenthetically the manner in which we currently reference 
it.
    We interpret ``individual or entity that develops'' certified 
health IT as the individual or entity that is legally responsible for 
the certification status of the health IT, which would be the 
individual or entity that entered into a binding agreement that 
resulted in the certification status of the health IT under the Program 
or, if such rights are transferred, the individual or entity that holds 
the rights to the certified health IT. As we clarified in the final 
rule ``ONC Health IT Certification Program: Enhanced Oversight and 
Accountability'' (81 FR 72404), the consequences under 45 CFR part 170 
for a developer's having had one or more of its products' certification 
terminated apply to developers, their subsidiaries, and their 
successors (81 FR 72443).
    For purposes of part 171 and the information blocking provision, we 
interpret an entity that has health IT to include not only the entity 
that entered into a binding agreement that resulted in the 
certification status of the health IT under the Program, but also its 
subsidiaries, and its successors. The facts and circumstances of a 
particular case may determine which individual(s) or entity (or 
entities) are culpable and whether enforcement against particular 
individual(s), the developer entity, a successor in rights to the 
health IT, the developer or successor's subsidiary, or a parent entity 
will be pursued. Similarly, use of the word ``individual'' in this 
context does not limit responsibility for practices of an entity that 
develops or offers health IT to the particular natural person(s) who 
may have signed binding agreement(s) that resulted in the certification 
status of the health IT under the Program. Depending on the nature of 
the organization, the person who signs the binding agreement that 
results in the certification status may be different from the person 
who determines the fees, the person who implements the health IT, and 
the person who sets the overall business strategy for the company. The 
facts and circumstances of each case may determine who the culpable 
individual or individual(s) are and whether enforcement against the 
entity or against specific individual(s) will be pursued.
    As stated in the Proposed Rule, for purposes of this definition, a 
developer or offeror of a single certified health IT product that has 
had its certification suspended will still be considered to have 
certified health IT (84 FR 7511).
c. Health Information Networks and Health Information Exchanges
    The terms ``network'' and ``exchange'' are not defined in the 
information blocking provision or in any other relevant statutory 
provisions. We proposed to define these terms in a way that does not 
assume the application or use of certain technologies and is flexible 
enough to apply to the full range and diversity of exchanges and 
networks that exist today and that may arise in the future.
    We stated that in considering the most appropriate way to define 
these terms, we examined how they are used throughout the Cures Act and 
the HITECH Act. Additionally, we considered dictionary and industry 
definitions of ``network'' and ``exchange.'' While the terms have 
varied usage and meaning in different industry contexts, we noted that 
certain concepts are common and were incorporated into the proposed 
definitions.
Health Information Network
    We proposed a functional definition of ``health information 
network'' (HIN) that focused on the role of these actors in the health 
information ecosystem. We stated that the defining attribute of a HIN 
is that it enables, facilitates, or controls the movement of 
information between or among different individuals or entities that are 
unaffiliated. Therefore, we proposed that two parties are affiliated if 
one has the power to control the other, or if both parties are under 
the common control or ownership of a common owner. We noted that a 
significant implication of the definition is that a health care 
provider or other entity that enables, facilitates, or controls the 
movement of EHI within its own organization, or between or among its 
affiliated entities, is not a HIN in connection with that movement of 
information for the purposes of the HIN definition.
    We proposed that an actor could be considered a HIN if it performs 
any one or any combination of the following activities. First, the 
actor would be a HIN if it were to determine, oversee, administer, 
control, or substantially influence policies or agreements that define 
the business, operational, technical, or other conditions or 
requirements that enable or facilitate the access, exchange, or use of 
EHI between or among two or more unaffiliated individuals or entities. 
Second, an actor would be a HIN if it were to provide, manage, control, 
or substantially influence any technology or service that enables or 
facilitates the access, exchange, or use of EHI between or among two or 
more unaffiliated individuals or entities.
    We noted that, typically, a HIN will influence the sharing of EHI 
between many unaffiliated individuals or entities. However, we did not 
propose to establish any minimum number of

[[Page 25801]]

parties or ``nodes'' beyond the requirement that there be some actual 
or contemplated access, exchange, or use of information between or 
among at least two unaffiliated individuals or entities that is 
enabled, facilitated, or controlled by the HIN. We stated that any 
further limitation would be artificial and would not capture the full 
range of entities that should be considered networks under the 
information blocking provision. We clarified that any individual or 
entity that enables, facilitates, or controls the access, exchange, or 
use of EHI between or among only itself and another unaffiliated 
individual or entity would not be considered a HIN in connection with 
the movement of that EHI (although that movement of EHI may still be 
regulated under the information blocking provision on the basis that 
the individual or entity is a health care provider or health IT 
developer of certified health IT). To be a HIN, we emphasized that the 
individual or entity would need to be enabling, facilitating, or 
controlling the access, exchange, or use of EHI between or among two or 
more other individuals or entities that were not affiliated with it.
    We provided multiple examples to illustrate how the proposed 
definition would operate. An entity is established within a state for 
the purpose of improving the movement of EHI between the health care 
providers operating in that state. The entity identifies standards 
relating to security and offers terms and conditions to be entered into 
by health care providers wishing to participate in the network. The 
entity offering (and then overseeing and administering) the terms and 
conditions for participation in the network would be considered a HIN 
for the purpose of the information blocking provision. We noted that 
there is no need for a separate entity to be created in order for that 
entity to be considered a HIN. To illustrate, we stated that a health 
system that ``administers'' business and operational agreements for 
facilitating the exchange of EHI that are adhered to by unaffiliated 
family practices and specialist clinicians in order to streamline 
referrals between those practices and specialists would likely be 
considered a HIN.
    We noted that the proposed definition would also encompass an 
individual or entity that does not directly enable, facilitate, or 
control the movement of information, but nonetheless exercises control 
or substantial influence over the policies, technology, or services of 
a network. In particular, we stated that there may be an individual or 
entity that relies on another entity--such as an entity specifically 
created for the purpose of managing a network--for policies and 
technology, but nevertheless dictates the movement of EHI over that 
network. As an example, a large health care provider could decide to 
lead an effort to establish a network that facilitates the movement of 
EHI between a group of smaller health care providers (as well as the 
large health care provider) and through the technology of health IT 
developers. To achieve this outcome, the large health care provider, 
together with some of the participants, could create a new entity that 
administers the network's policies and technology.
    In this scenario, we noted that the large health care provider 
would come within the functional definition of a HIN and could be held 
accountable for the conduct of the network if the large health care 
provider used its control or substantial influence over the new 
entity--either in a legal sense, such as via its control over the 
governance or management of the entity, or in a less formal sense, such 
as if the large health care provider prescribed a policy to be 
adopted--to interfere with the access, exchange, or use of EHI. We 
clarified that the large health care provider in this example would be 
treated as a health care provider when utilizing the network to move 
EHI via the network's policies, technology, or services, but would be 
considered a HIN in connection with the practices of the network over 
which the large health care provider exercises control or substantial 
influence.
    We sought comment on the proposed definition of a HIN. In 
particular, we requested comment on whether the proposed definition was 
broad enough (or too broad) to cover the full range of individuals and 
entities that could be considered HINs within the meaning of the 
information blocking provision. Additionally, we specifically requested 
comment on whether the proposed definition would effectuate our policy 
goal of defining this term in a way that does not assume particular 
technologies or arrangements and was flexible enough to accommodate 
changes in these and other conditions.
    We note that we summarize and respond to the comments received on 
the HIN definition below with the comments received on the health 
information exchange definition (HIE) due to the overlap in the 
comments received and our responses.
Health Information Exchange
    We proposed to define a ``health information exchange'' (HIE) as an 
individual or entity that enables access, exchange, or use of EHI 
primarily between or among a particular class of individuals or 
entities or for a limited set of purposes. We noted that our research 
and experience in working with exchanges drove the proposed definition 
of this term. We stated that HIEs would include, but were not limited 
to, regional health information organizations (RHIOs), State health 
information exchanges (State HIEs), and other types of organizations, 
entities, or arrangements that enable EHI to be accessed, exchanged, or 
used between or among particular types of parties or for particular 
purposes. As an example, we noted an HIE might facilitate or enable the 
access, exchange, or use of EHI exclusively within a regional area 
(such as a RHIO), or for a limited scope of participants and purposes 
(such as a clinical data registry or an exchange established by a 
hospital-physician organization to facilitate Admission, Discharge, and 
Transfer (ADT) alerting). We further noted that HIEs may be established 
under Federal or State laws or regulations but may also be established 
for specific health care or business purposes or use cases. We also 
mentioned that if an HIE facilitates the access, exchange, or use of 
EHI for more than a narrowly defined set of purposes, then it may be 
both an HIE and a HIN.
    We sought comment on the proposed HIE definition and encouraged 
commenters to consider whether the proposed definition was broad enough 
(or too broad) to cover the full range of individuals and entities that 
could be considered exchanges within the meaning of the information 
blocking provision, and whether the proposed definition was 
sufficiently flexible to accommodate changing technological and other 
conditions.
Comments on the HIN and HIE Definitions
    As mentioned above, we received substantially similar comments on 
both proposed definitions. Based on those comments and our approach to 
the final definition for these terms, we have combined our comment 
summary and response for the proposed definitions.
    Comments. Many commenters suggested that the definitions of HIN and 
HIE should be combined because confusion could arise in trying to 
distinguish between the two terms. Commenters asserted that these 
definitions are used to describe entities that perform the same or 
similar functions. Some commenters expressed support for the broad 
functional definitions of HIE and HIN, while others expressed concern 
that many organizations could be unintentionally

[[Page 25802]]

covered by the proposed definitions due to the broad scope of the 
definitions as proposed.
    Many commenters suggested excluding certain individuals and 
entities from the HIE and/or HIN definitions, while other commenters 
noted such an approach could significantly limit the application of the 
information blocking provision. Proposed exclusions offered by 
commenters included, but were not limited to: Health plans, payers, 
health care providers, business associates, accountable care 
organizations, health care clearinghouses, public health agencies, 
research organizations, clinical data registries, certified health 
information technology providers, software developers, mobile app 
providers, cloud storage vendors, internet service providers, and 
patient or consumer focused social media.
    Some commenters suggested limiting the types of activities and/or 
the purposes for those activities that might be necessary to be 
considered a HIN or HIE.
    Commenters also raised concerns with particular language in the 
proposed HIN definition, noting that the term ``substantially 
influences'' was vague and that we should remove ``individual'' from 
the definitions as commenters could not foresee an individual acting as 
a HIN or HIE.
    Response. The definitions of HIN and HIE in the Proposed Rule 
achieved a key goal which was to solicit feedback from a wide array of 
stakeholders that might be considered HINs or HIEs under the proposed 
definition, including on whether the definitions were too broad or not 
broad enough. We have adopted a modified definition in this final rule 
to address much of the feedback without expressly excluding any 
specific type of entity, which we believe would be unwieldy to 
appropriately administer and, more importantly, in conflict with our 
overarching approach to include any individual or entity that performs 
certain functional activities as outlined in the Proposed Rule.
    Foremost, in this final rule, we are combining the definitions of 
HIN and HIE to create one functional definition that applies to both 
statutory terms in order to clarify the types of individuals and 
entities that would be covered. This approach is consistent with 
statements we made in the Proposed Rule noting that a HIE could also be 
an HIN. In addition, section 3022 of the PHSA often groups these two 
terms together, and as we noted previously, does not define them. This 
approach will also eliminate stakeholder confusion as expressed by 
commenters and respond to commenters who asserted the terms refer to 
entities performing the same function. To this point, we have found 
numerous associations and publications referring to entities that 
perform the same or similar functions that we have specified in the 
HIN/HIE definition as HINs, HIEs, and regional health information 
organizations (RHIOs).\126\ We have finalized under Sec.  171.102 that 
a health information network or health information exchange means an 
individual or entity that determines, controls, or has the discretion 
to administer any requirement, policy, or agreement that permits, 
enables, or requires the use of any technology or services for access, 
exchange, or use of EHI: (1) Among more than two unaffiliated 
individuals or entities (other than the individual or entity to which 
this definition might apply) that are enabled to exchange with each 
other; and (2) that is for a treatment, payment, or health care 
operations purpose, as such terms are defined in 45 CFR 164.501 
regardless of whether such individuals or entities are subject to the 
requirements of 45 CFR parts 160 and 164.
---------------------------------------------------------------------------

    \126\ See HIMSS FAQ, Health Information Exchange: A catch-all 
phrase for all health information exchange, including Regional 
Health Information Organizations (RHIOs), Quality Information 
Organizations (QIOs), Agency for Healthcare Research and Quality 
(AHRQ)-funded communities and private exchanges, https://protect2.fireeye.com/url?k=7d5b6f82-210e6652-7d5b5ebd-0cc47a6a52de-fe4abdcde0e54deb&u=https://www.himss.org/library/health-information-exchange/FAQ; AHIMA, ``An HIE is the electronic movement of health-
related information among organizations according to nationally 
recognized standards. HIE is also sometimes referred to as a health 
information network (HIN)'', https://bok.ahima.org/PdfView?oid=104129; SHIEC Member List, SHIEC is the trade 
association of HIEs, called the Strategic Health Information 
Exchange collaborative, which has 17 members with ``network'' in 
their name, https://protect2.fireeye.com/url?k=f84ddacd-a418d31d-f84debf2-0cc47a6a52de-8424832df6e921dc&u=https://strategichie.com/membership/member-list/.
---------------------------------------------------------------------------

    In consideration of comments, we also narrowed the definition in 
three ways. First, the types of actions (e.g., manages or facilitates) 
that would be necessary for an actor to meet the definition of HIN or 
HIE were reduced. This includes removing the ``substantially 
influences'' element of the proposed definition of HIN to address 
concerns about possible ambiguity. Second, we have revised the 
definition to specify that to be a HIN or HIE there must be exchange 
among more than two unaffiliated individuals or entities besides the 
HIN/HIE that are enabled to exchange with each other. This revision 
ensures that the definition does not unintentionally cover what are 
essentially bilateral exchanges in which the intermediary is simply 
performing a service on behalf of one entity in providing EHI to 
another or multiple entities and no actual exchange is taking place 
among all entities (e.g., acting as an intermediary between two 
entities where the first sends non-standardized data to be converted by 
the intermediary into standardized data for the receiving entity). To 
be clear, to be enabled, the parties must have the ability and 
discretion to exchange with each other under the policies, agreements, 
technology, and/or services. Third, we focused the definition on three 
activities: Treatment, payment, and health care operations, as each are 
defined in the HIPAA Rules (45 CFR 164.501). The activities described 
by the terms treatment, payment and health care operations were 
selected for multiple reasons. Many, but not all, individuals and 
entities that would meet the definition of HIN/HIE for information 
blocking purposes will be familiar with these terms because they 
currently function as a covered entity or business associate under the 
HIPAA Rules. Last, this approach serves to ensure that certain 
unintended individuals and entities are not covered by the definition, 
which we discuss in more detail below.
    Two important points about the definition require clarification. 
First, the reference to the three types of activities does not limit 
the application of the HIN/HIE definition to individuals or entities 
that are covered entities or business associates (as defined in HIPAA). 
For example, if three unaffiliated entities exchanging information were 
health care providers that were not HIPAA covered entities, their 
exchange of information for treatment purposes through a HIN or HIE 
would qualify for this element of the definition even though the HIN/
HIE would not be a business associate to any of the providers. We 
expect such situations to be rare, but they may occur. Second, the 
three activities serve as elements of the definition such that if an 
individual or entity meets them, then the individual or entity would be 
considered a HIN/HIE under the information blocking regulations for any 
practice they conducted while functioning as a HIN/HIE. To illustrate, 
if a HIN/HIE was exchanging EHI on behalf of a health care provider for 
treatment purposes, but denied an individual access to their EHI 
available in the HIN/HIE, then the HIN/HIE would be considered a HIN/
HIE under the circumstances for the purposes of information blocking. 
Having said this, the HIN/HIE may not have ``interfered

[[Page 25803]]

with'' the individual's access to their EHI depending on the terms of 
the HIN/HIE's business associate agreements with the participating 
covered entities or for other reasons such as the EHI could not be 
disclosed by law or the HIN/HIE met an exception under the information 
blocking provision. To be clear, the HIN/HIE definition is only 
applicable to the circumstances of an information blocking claim. For 
example, a health care provider that may have ownership of a HIN/HIE, 
would not be considered a HIN/HIE, but instead a ``health care 
provider'' with respect to situations that involve their behavior as a 
health care provider, such as denying another health care provider's 
ability to access, exchange, or use EHI for treatment purposes or 
denying an individual's access to their EHI via the health care 
provider's patient portal.
    With respect to suggestions to exclude specific types of entities, 
we believe that the Cures Act goals of supporting greater 
interoperability, access, exchange, and use of EHI are best advanced by 
a functional definition without specific exclusions. We note, however, 
that the narrower definition of HIN/HIE in this final rule should 
clearly exclude entities that might have been included under the 
proposed definitions, such as social networks, internet service 
providers, and technology that solely facilitates the exchange of 
information among patients and family members. The definition in this 
final rule continues to focus on the functional activity of the 
individual or entity in question and not on any title or classification 
of the person or entity.
    The reference to ``individual'' was maintained in the final rule 
because the Cures Act states that penalties apply to any individual or 
entity that is a developer, network, or exchange (see section 
3022(b)(2)(A) of the PHSA).
3. Electronic Health Information
    In the Proposed Rule, we noted that the information blocking 
definition applies to electronic health information (EHI) (section 
3022(a)(1) of the PHSA). We further noted that while section 3000(4) of 
the PHSA by reference to section 1171(4) of the Social Security Act 
defines ``health information,'' EHI is not specifically defined in the 
Cures Act, PHSA, HITECH Act, or other relevant statutes. Therefore, we 
proposed to include the definition of EHI in Sec.  171.102 and define 
it to mean (84 FR 7513):
    (i) Electronic protected health information; and
    (ii) any other information that--
     is transmitted by or maintained in electronic media, as 
defined in 45 CFR 160.103;
     identifies the individual, or with respect to which there 
is a reasonable basis to believe the information can be used to 
identify the individual; and
     relates to the past, present, or future health or 
condition of an individual; the provision of health care to an 
individual; or the past, present, or future payment for the provision 
of health care to an individual (84 FR 7513).
    We explained in the Proposed Rule that this definition of EHI 
includes, but is not limited to: Electronic protected health 
information and health information that is created or received by a 
health care provider and those operating on their behalf; health plan; 
health care clearinghouse; public health authority; employer; life 
insurer; school; or university. In addition, we clarified that under 
our proposed definition, EHI includes, but is not limited to, 
electronic protected health information (ePHI) as defined in 45 CFR 
160.103. We noted that EHI may also be provided, directly from an 
individual, or from technology that the individual has elected to use, 
to an actor covered by the information blocking provisions. We also 
proposed that EHI does not include health information that is de-
identified consistent with the requirements of 45 CFR 164.514(b) (84 FR 
7513).
    We clarified that the EHI definition provides for an expansive set 
of health information, which could include information on an 
individual's health insurance eligibility and benefits, billing for 
health care services, and payment information for services to be 
provided or already provided, which may include price information (84 
FR 7513).
    We generally requested comment on this proposed definition as well 
as on whether the exclusion of health information that is de-identified 
consistent with the requirements of 45 CFR 164.514(b). We also sought 
comment on the parameters and implications of including price 
information within the scope of EHI for purposes of information 
blocking (84 FR 7513).
    Comments. Some commenters were strongly supportive of the proposed 
EHI definition, stating that it covers the breadth of EHI that should 
be addressed within the regulation. Conversely, many other commenters, 
including health care providers and health IT developers, contended 
that the definition was overly broad and vague. They expressed concern 
about their ability to know what health information they must make 
available for access, exchange, and use for the purposes of complying 
with the information blocking provision. Some other commenters posited 
that they could be put in a situation of having to separate EHI from 
PHI for compliance purposes, noting this would be extremely burdensome. 
Many commenters stated simply trying to determine what constitutes EHI 
for compliance purposes would be extremely burdensome and costly.
    Commenters offered various options for narrowing the scope of the 
EHI definition. Many commenters suggested that EHI should only be 
electronic protected health information (ePHI) as defined under the 
HIPAA Rules. Some of these commenters specifically recommended that the 
EHI definition be limited to align with the definition of a designated 
record set under HIPAA. A few commenters stated that EHI should be 
limited to observational health information as described in the 
Proposed Rule (84 FR 7516). Commenters also recommended that the EHI 
definition be limited to only standardized health information, with 
some commenters recommending that EHI be specifically limited to 
information that meets the USCDI standard.
    Response. We appreciate the comments and agree that actors should 
not have to separate ePHI from EHI in order to comply with both the 
HIPAA Rules and the information blocking provision. It is also 
important for actors to clearly understand what health information 
should be available for access, exchange, and use. To address these 
concerns, we have focused the EHI definition at this time on terms that 
are used in the HIPAA Rules and that are widely understood in the 
health care industry as well as on a set of health information that is 
currently collected, maintained, and made available for access, 
exchange, and use by actors. By doing so, we believe we have eliminated 
any perceived burden and actors will be in a situation that will permit 
them to readily and continually comply with the information blocking 
provision. While we understand that some commenters supported the EHI 
definition as proposed or included alternative definitions in their 
comments, we believe that, for the above reasons, the EHI definition we 
have codified in regulation through this final rule will enable 
effective implementation.
    We have defined EHI (Sec.  171.102) to mean electronic protected 
health information (ePHI) as the term is defined for HIPAA in 45 CFR 
160.103 to the extent that the ePHI would be included in a designated 
record set as defined in 45 CFR 164.501 (other than

[[Page 25804]]

psychotherapy notes as defined in 45 CFR 164.501 or information 
compiled in reasonable anticipation of, or for use in, a civil, 
criminal, or administrative action or proceeding), regardless of 
whether the group of records are used or maintained by or for a covered 
entity as defined in 45 CFR 160.103. The ePHI definition in 45 CFR 
160.103 incorporates the definitions in that section for protected 
health information and electronic media. Although the definition of 
designated record set refers to records maintained by or for a covered 
entity, the EHI definition has been finalized to apply to groups of 
records (as they are included in the designated record set) regardless 
of whether they are maintained by or for a covered entity (e.g., a 
developer of certified health IT, a health information network, a 
health information exchange, or even a health care provider that may 
not be a covered entity or may not be acting as a business associate of 
a covered entity).
    We did not focus the EHI definition finalized in this final rule on 
observational health information (OHI) as described in the Proposed 
Rule (84 FR 7516) for multiple reasons. We did not and cannot not at 
this time define OHI concretely. The use of OHI as a definition would 
also not align with our above stated goals to provide alignment with 
the HIPAA Rules and ease of implementation for actors. We also did not 
focus the EHI definition solely on the data identified in the USCDI 
standard. We are strong supporters of interoperability and standards-
based access and exchange. To this point, the ONC Health IT 
Certification Program (Program) supports standards-based 
interoperability through the adoption of standards and the 
certification of health IT to those standards. In this respect, we have 
made the USCDI a baseline set of data that certified health IT must be 
able to make available for access and exchange (see section IV.B.1 of 
this preamble). However, this set of EHI is too limiting in terms of 
what actors are capable of making available in both the near and long 
term as is evident by compliance with HIPAA's right of access 
regulatory provision in 45 CFR 164.524.
    To be further responsive to commenters expressing compliance 
concerns about the EHI definition, we have established a new ``Content 
and Manner'' exception in this final rule (Sec.  171.301) that will 
provide actors time to adjust to the new information blocking paradigm 
and make EHI available for access, exchange, and use. The new exception 
permits an actor to provide, at a minimum, a limited set of EHI 
comprised of the data elements included in the USCDI for access, 
exchange, and use during the first 18 months after the compliance date 
of the information blocking provisions (24 months after publication of 
this final rule). The data elements represented in the USCDI represent 
an even more focused set of data than the finalized EHI definition 
(Sec.  171.102). We refer readers to section VIII.D.2.a of this final 
rule for further discussion of this new exception.
    Comments. Commenters argued both for and against the inclusion of 
price information in the EHI definition. Commenters that argued for the 
inclusion of price information stated that it was well within the 
meaning of the term health information found in the PHSA. Many of these 
commenters argued that the availability of this type of information 
would be helpful to patients in selecting and obtaining health care. 
Commenters also contended that the availability of price information 
would increase competition and reduce health care costs. Conversely, 
other commenters made various arguments for not including price 
information within the definition of EHI. Some of these commenters 
asserted that price information was not within the scope of health 
information as specified in section 3022 of the PHSA because Congress 
did not specifically include it. Commenters also asserted that price 
information is too vague and lacks standardization to be clearly 
understood and made available for access, exchange, and use. Other 
commenters contended that disclosing price information would violate 
trade secret laws and would harm competitive pricing by health plans.
    Response. The EHI definition codified through this final rule does 
not expressly include or exclude price information. However, to the 
extent that ePHI includes price information and is included in a 
designated record set, it would be considered EHI. This approach is 
intended to assure that the current scope of EHI for purposes of 
information blocking is aligned with the definitions of ePHI and 
designated record set under the HIPAA Rules, with limited exceptions.
    Comments. A few commenters specifically questioned whether 
algorithms or processes that create EHI, or the clinical interpretation 
or relevancy of the results of the algorithms or processes, would be 
considered EHI.
    Response. The EHI definition codified through this final rule does 
not expressly include or exclude algorithms or processes that create 
EHI, or the clinical interpretation or relevancy of the results of the 
algorithms or processes. However, any such information would be 
considered EHI if it was ePHI included in the designated record set 
(such as the inclusion of the clinical interpretation of an algorithm's 
results in an individual's clinical note). Like with price information, 
this approach is intended to ensure that the current scope of EHI for 
purposes of information blocking is aligned with the definitions of 
ePHI and designated record set under the HIPAA Rules, with limited 
exception.
    Comments. Many commenters supported the position that health 
information which is de-identified in accordance with HIPAA regulations 
should not be considered EHI.
    Response. We agree that health information that is de-identified 
consistent with the requirements of 45 CFR 164.514(b) should not be 
included in EHI. It is not, however, necessary to specifically exclude 
such de-identified information from the EHI definition because 
information that does not identify an individual, and with respect to 
which there is no reasonable basis to believe that the information can 
be used to identify an individual, is not individually identifiable 
information, so it would not be EHI (see 45 CFR 164.514(a)). To note, 
once PHI has been de-identified, it is no longer considered to be PHI. 
So, such information would not be considered EHI by definition (see 45 
CFR 164.514 (b)).
    Comments. One commenter viewed the proposed EHI definition as 
overly restrictive by requiring EHI to be individually identifiable.
    Response. The EHI definition codified through this final rule 
retains the core requirement that the health information be 
individually identifiable in order to be consistent with HIPAA and 
general health care industry practice regarding use and disclosure of 
health information.
4. Price Information--Request for Information
    In the Proposed Rule, we requested comment on the technical, 
operational, legal, cultural, environmental, and other challenges to 
creating price transparency within health care, and posed multiple 
specific questions for commenters to consider (84 FR 7513 and 7514).
    We received over 1,000 comments regarding price information and 
price transparency in response to our request, which included 
recommendations from the HITAC. We thanks commenters for their comments 
and have shared this

[[Page 25805]]

feedback with appropriate Department partners.
5. Interests Promoted by the Information Blocking Provision
a. Access, Exchange, and Use of EHI
    We stated in the Proposed Rule that the information blocking 
provision promotes the ability to access, exchange, and use EHI, 
consistent with the requirements of applicable law. We interpreted the 
terms ``access,'' ``exchange,'' and ``use'' broadly, consistent with 
their generally understood meaning in the health IT industry and their 
function and context in the information blocking provision (84 FR 
7514).
    We explained in the Proposed Rule that the concepts of access, 
exchange, and use are closely related: EHI cannot be used unless it can 
be accessed, and this often requires that the EHI be exchanged among 
different individuals or entities and through various technological 
means. Moreover, the technological and other means necessary to 
facilitate appropriate access and exchange of EHI vary significantly 
depending on the purpose for which the information will be used. We 
stated that this explanation is consistent with the way these terms are 
employed in the information blocking provision and in other relevant 
statutory provisions. Noting, for example, that section 3022(a)(2) of 
the PHSA contemplates a broad range of purposes for which EHI may be 
accessed, exchanged, and used--from treatment, care delivery, and other 
permitted purposes, to exporting complete information sets and 
transitioning between health IT systems, to supporting innovations and 
advancements in health information access, exchange, and use.
    In addition, we stated in the Proposed Rule that we considered how 
the terms access, exchange, and use have been defined or used in 
existing regulations and other relevant health IT industry contexts. We 
explained that, while those definitions have specialized meanings and 
are not controlling for the purposes of information blocking, they are 
instructive insofar as they illustrate the breadth with which these 
terms have been understood in other contexts. We noted that the HIPAA 
Security Rule defines ``access'' as the ability or the means necessary 
to read, write, modify, or communicate data/information or otherwise 
use any system resource (45 CFR 164.304). Last, we noted that the HIPAA 
Privacy Rule defines the term ``use,'' which includes the sharing, 
employment, application, utilization, examination, or analysis of 
individually identifiable health information within an entity that 
maintains the information (45 CFR 160.103).
    We stated that the types of access, exchange, and use described 
above would be promoted under the information blocking provision, as 
would other types of access, exchange, or use not specifically 
contemplated in these or other regulations.
    We emphasized in the Proposed Rule the interrelated nature of the 
definitions and proposed to define these terms in Sec.  171.102. For 
example, the definition of ``use'' that we proposed includes the 
ability to read, write, modify, manipulate, or apply EHI to accomplish 
a desired outcome or to achieve a desired purpose, while ``access'' is 
defined as the ability or means necessary to make EHI available for 
use. As such, we specified that the interference with ``access'' would 
include, for example, an interference that prevented a health care 
provider from writing EHI to its health IT or from modifying EHI stored 
in health IT, whether by the provider itself or by, or via, a third-
party app. We encouraged comment on these definitions. In particular, 
we asked commenters to consider whether these definitions are broad 
enough to cover all of the potential purposes for which EHI may be 
needed and ways in which it could conceivably be used, now and in the 
future.
    Comments. Several commenters supported our proposed definitions of 
``access,'' ``exchange,'' and ``use,'' based on our broad 
interpretation of the definitions, which they stated supports 
interoperability. Several health IT developers and developer 
organizations stated that the definition of ``access'' was overly 
broad. They suggested that we clarify and narrow the scope of our 
proposed definition of ``access.'' One commenter specifically suggested 
that we clarify that ``access'' need not be provided through a direct 
interface. Some commenters suggested that we remove the proposed 
language regarding ``any and all source systems.''
    Some commenters expressed concern that the proposed definition of 
``exchange'' is overly broad. Other commenters requested additional 
clarity regarding the scope of the definition. One commenter suggested 
that we clarify the meaning of ``transmission'' within the definition.
    Some health care providers and provider organizations stated that 
our proposed definition of ``use'' was overly broad. Some commenters 
suggested that we look to more established definitions of ``use,'' such 
as HIPAA. Other commenters suggested that the proposed definition would 
inappropriately increase administrative burden.
    Response. We have revised these definitions in response to 
comments. These revisions do not narrow the scope of the definitions in 
regard to their intended interpretation and purpose in supporting 
interoperability and the goals of the information blocking provision. 
We believe, however, the revisions and their explanations below will 
provide the necessary clarifications for stakeholders to properly 
implement and comply with the terms.
Access
    We have finalized the definition of ``access'' as ``the ability or 
means necessary to make EHI available for exchange, use, or both'' 
(Sec.  171.102). This final definition improves on the proposed 
definition (see 84 FR 7601) in a couple of ways. First, it makes clear 
that ``access'' is the ability or means necessary to make EHI available 
not only for ``use,'' but also for ``exchange'' or both (the proposed 
definition only included ``for use''). This modification will provide 
clarity because, as we noted in the Proposed Rule, these terms are 
interrelated and EHI cannot be exchanged or used if it is inaccessible. 
Second, to be responsive to comments and in order to promote additional 
clarity in the definition, we have removed ``including the ability to 
securely and efficiently locate and retrieve information from any and 
all source systems in which the information may be recorded or 
maintained'' from the definition. This language was exemplary and 
resulted in some confusion among stakeholders. Last, we clarify that 
the definition of ``access'' is not limited to direct interfaces, which 
we believe is evident by the final definition.
Exchange
    We have finalized the definition of ``exchange'' as ``the ability 
for electronic health information to be transmitted between and among 
different technologies, systems, platforms, or networks.'' As with the 
finalized ``access'' definition, we have maintained the general scope 
of the proposed definition while modifying the definition for clarity. 
First, we removed ``securely and efficiently'' as proposed descriptors 
of the way that EHI is to be transmitted under the definition. While we 
continue to advocate for and promote secure and efficient exchange, we 
do not think this descriptive language is necessary within the 
definition of ``exchange'' because ``exchange'' for the purposes of the 
information blocking provision can

[[Page 25806]]

occur regardless of whether the transaction is ``secure'' or 
``efficient.'' Our intent with this definition was never to exclude 
unsecure or ``inefficient'' exchanges from the definition or 
enforcement of the information blocking provision because the exchange 
of EHI was not secure or ``inefficient,'' so we have removed this 
extraneous language. We also refer stakeholders to the information 
blocking exceptions included in this final rule that discuss how EHI 
may be transmitted and the importance of security as it relates to the 
access, exchange, and use of EHI.
    Second, we have removed the provision at the end of the proposed 
definition, that in order for ``exchange'' to occur, it must be ``in a 
manner that allows the information to be accessed and used.'' This 
language was potentially confusing because the manner of transmittal is 
not a necessary component of the ``exchange'' definition. If EHI is 
exchanged but is done so in way that does not permit the use of the 
EHI, then that practice may implicate the information blocking 
provision because the ``use'' of the EHI is being prevented. Further, 
to be responsive to comments, we emphasize that ``transmitted'' within 
the definition is not limited to a one-way transmission, but instead is 
inclusive of all forms of transmission such as bi-directional and 
network-based transmission. We note this as a point of clarification, 
as it was always our intent that ``transmission'' would be interpreted 
this way.
Use
    We have finalized ``use'' to mean ``the ability for EHI, once 
accessed or exchanged, to be understood and acted upon.'' Put another 
way, ``use'' is an individual or entity's ability to do something with 
the EHI once it has been accessed or exchanged. We believe this final 
definition is more concise and clear than the proposed definition--
``the ability of health IT or a user of health IT to access relevant 
EHI; to comprehend the structure, content, and meaning of the 
information; and to read, write, modify, manipulate, or apply the 
information to accomplish a desired outcome or to achieve a desired 
purpose'' (84 FR 7602). Again, we emphasize the general scope and 
meaning of the definition is the same as proposed as explained below.
    First, we have removed language that is more appropriately used as 
examples in this preamble. For instance, the use of the word 
``understood'' in the final definition encompasses the ability to 
comprehend various things such the structure, content, and meaning of 
the information from the proposed definition. However, we clarify that 
``understood'' just like the proposed term ``comprehend'' does not mean 
the ability to understand the clinical significance or relevance of the 
EHI. For example, if an ambulatory provider received patient EHI from a 
hospital that included a risk score, the concept of ``use'' does not 
require the hospital to provide additional resources to interpret the 
score nor would the tool or technology needed to interpret the 
information be considered an interoperability element because its sole 
purpose is clinical interpretation.
    Similarly to ``understood,'' ``acted upon'' within the final 
definition encompasses the ability to read, write, modify, manipulate, 
or apply the information from the proposed definition. We also clarify 
that ``use'' is bi-directional (to note, we also clarified above in the 
``exchange'' discussion that ``exchange'' is bi-directional). Thus, an 
actor's practice could implicate the information blocking provision not 
only if the actor's practice interferes with the requestor's ability to 
read the EHI (one-way), but also if the actor's practice interferes 
with the requestor's ability to write the EHI (bi-directional) back to 
a health IT system.
    We note that the ability ``to access relevant EHI'' from the 
proposed definition will fall under the ``access'' definition, 
particularly in light of the modifications we have made to the 
``access'' definition discussed above. Last, we note that we have 
removed the requirement from the final definition that it would only be 
considered ``use'' if the action were ``to accomplish a desired outcome 
or to achieve a desired purpose.'' We do not believe this language is 
necessary because the ultimate purpose of the ``use'' of the EHI is not 
relevant to the definition of ``use.''
    We appreciate the comments suggesting that we look to more 
established definitions of ``use,'' such as that within the HIPAA 
Privacy Rule. We did consider adopting the HIPAA Privacy Rule 
definition, but ultimately decided that our finalized definition is 
more appropriate and easier to understand within the information 
blocking context. We also appreciate the comments suggesting that the 
proposed definition would inappropriately increase administrative 
burden; however, we do not believe there is a basis for such assertion, 
particularly with the clarifications we have provided and the focusing 
of the EHI definition.
b. Interoperability Elements
    We proposed to use the term ``interoperability element'' to refer 
to any means by which EHI can be accessed, exchanged, or used. We 
proposed that the means of accessing, exchanging, and using EHI is not 
limited to functional elements and technical information but also 
encompasses technologies, services, policies, and other conditions 
\127\ necessary to support the many potential uses of EHI. Because of 
the evolving nature of technology and the diversity of privacy and 
other laws and regulations, institutional arrangements, and policies 
that govern the sharing of EHI, we did not provide an exhaustive list 
of interoperability elements in the Proposed Rule. We requested comment 
on the proposed definition.
---------------------------------------------------------------------------

    \127\ See ONC, Connecting Health and Care for the Nation: A 
Shared Nationwide Interoperability Roadmap at x-xi, https://www.healthit.gov/topic/interoperability/interoperability-roadmap 
(Oct. 2015) [hereinafter ``Interoperability Roadmap''].
---------------------------------------------------------------------------

    Comments. Some commenters supported the proposed definition, noting 
that the breadth and scope of the definition is appropriate. Some 
commenters requested clarifications and modifications regarding aspects 
of the proposed definition. A few commenters requested that we clarify 
whether specific functionalities and technologies, such as certified 
Health IT Modules and proprietary APIs, would be considered 
interoperability elements. A commenter requested, within the context of 
the Licensing Exception (Sec.  171.303), clarification regarding 
whether interoperability elements are limited to those elements to 
which an actor can lawfully confer rights or licenses without the 
agreement of a third party. A few commenters stated that the definition 
should exclude underlying substantive content or health facts because 
such content is not a potential means by which EHI may be accessed, 
exchanged, or used. One of those commenters also requested that we 
clarify that legally required data tags are excluded from the 
``interoperability element'' definition. A commenter suggested that we 
clarify that whether a functionality is considered an interoperability 
element should be determined without regard to whether it can be 
protected under copyright or patent law. One commenter requested 
additional examples of interoperability elements. Another commenter 
requested clarification regarding the meaning of ``transmit'' within 
the definition.
    Some commenters stated that the definition is too broad and should 
be narrowed. A couple of commenters

[[Page 25807]]

stated that the definition is confusing and ambiguous. A few commenters 
noted that we should focus the definition on specific elements that are 
currently certified and/or are employed to support interoperability 
through existing standards and requirements that enable the exchange of 
EHI in a usable fashion.
    Response. We appreciate commenters' support of the proposed 
definition, as well as the comments that requested clarifications and 
suggested improvements to the definition. We have streamlined the 
definition, with the intent of maintaining a broad definition of 
interoperability elements, and leveraged other regulatory and industry 
terms to add clarity. We have finalized the definition of 
``interoperability element'' to mean hardware, software, integrated 
technologies or related licenses, technical information, privileges, 
rights, intellectual property, upgrades, or services that: (1) May be 
necessary to access, exchange, or use EHI; and (2) is controlled by the 
actor, which includes the ability to confer all rights and 
authorizations necessary to use the element to enable the access, 
exchange, or use of EHI.
    While this definition remains broad, it is confined by changes we 
have made to other parts of the information blocking section. 
Specifically, the more focused definitions of ``electronic health 
information'' and ``access,'' ``exchange,'' or ``use'' will result in a 
smaller scope of interoperability elements, as defined above, being 
necessary to enable access, exchange, or use of EHI. Further, under the 
Content and Manner Exception (Sec.  171.301), we establish that an 
actor is not required to respond to a request to access, exchange, or 
use EHI in the manner requested if the actor would be required to 
license its IP (which could constitute an interoperability element) and 
cannot reach agreeable terms for the license with the requestor (Sec.  
171.301(b)(1)(i)(B)). This means that actors who do not want to license 
their interoperability elements will not be required to do so if they 
are able to respond in an alternative manner in accordance with Sec.  
171.301(b)(2).
    We believe the above definition improves on the proposed definition 
in multiple ways. First, while preserving the meaning described in the 
Proposed Rule that would constitute an interoperability element (i.e., 
hardware, software, technical information, technology, service, 
license, right, privilege), we have removed descriptive language and 
examples from the regulation text. Such language did not add clarity, 
as it was not exhaustive as noted in the regulation text, which 
included the language: ``Any other means by which electronic health 
information may be accessed, exchanged, or used.'' The removal of this 
language makes the definition clearer and more concise. We note that we 
provide examples of ``interoperability elements'' in the discussion 
below.
    Second, we leveraged the definition of ``health information 
technology'' from title XXX of the PHSA (specifically, section 3000(5) 
of the PHSA), as added by title XIII of the HITECH Act. The Cures Act 
amended title XXX of the PHSA to establish the information blocking 
provision in section 3022 of the PHSA. Section 3000(5) of the PHSA 
defines ``health information technology'' as ``hardware, software, 
integrated technologies or related licenses, intellectual property, 
upgrades, or packaged solutions sold as services that are designed for 
or support the use by health care entities or patients for the 
electronic creation, maintenance, access, or exchange of health 
information.'' We emphasize that this definition includes intellectual 
property.
    When we drafted the Proposed Rule, we chose to use the term 
``interoperability element'' to describe the means necessary to access, 
exchange, or use EHI instead of ``health IT'' because we believed that 
defining a new term (interoperability element) would allow us to tailor 
and focus the definition to the specific issue of information blocking. 
However, after further reflection and review of stakeholder comments--
specifically those requesting additional clarity regarding the 
definition of ``interoperability element''--we believe a better 
approach is to leverage the definition of ``health information 
technology'' from section 3000(5) of the PHSA because that definition 
provides the statutory basis for the types of technology, services, 
functionality necessary to support interoperability, including the 
access, exchange, and use of EHI. We believe this approach of 
leveraging an established, statutory definition will promote 
transparency and clarify ONC's expectations for regulated actors.
    As such, we have added ``integrated technologies,'' ``intellectual 
property,'' and ``upgrades'' from the PHSA definition into our 
definition of interoperability element. These additions will strengthen 
the ``interoperability element'' definition by explicitly identifying 
types of interoperability elements that would have been covered by our 
proposed definition, but were not called out in the proposed definition 
(these types of interoperability elements would have been covered by 
the provision in the proposed definition that an interoperability 
element could be any other means by which EHI may be accessed, 
exchanged, or used). We chose not to substitute the PHSA health 
information technology definition in its entirety for the 
``interoperability element'' definition in this final rule because some 
aspects do not fit within the ``interoperability element'' definition. 
For instance, the concept of ``packaged solutions'' is undefined and 
would not add clarity to the interoperability element definition. Thus, 
we believe this approach will achieve our goal of establishing a 
definition of interoperability element that is tailored for the 
information blocking context.
    Last, we have clarified within the definition that a requisite 
component of an interoperability element is that it is controlled by 
the actor. As used in the interoperability element definition, 
controlled by the actor includes the ability to confer all rights and 
authorizations necessary to use the element to enable the access, 
exchange, or use of EHI. In order to make this point clear, we have 
added and finalized paragraph (2) within the interoperability element 
definition (see Sec.  171.102). Thus, if an actor could not confer a 
right or authorization necessary to use the interoperability element to 
enable the access, exchange, or use of electronic health information, 
(e.g., by way of sub-license or assignment), the actor would not have 
the requisite ``control'' under the ``interoperability element'' 
definition. This clarification reinforces our position that our rule 
does not require or encourage actors to infringe on IP rights.
    We appreciate the comments that asked that we specify whether 
specific functionalities and technologies, such as certified Health IT 
Modules and proprietary APIs, would be considered interoperability 
elements. We clarify that most certified Health IT Modules and 
proprietary APIs would be considered interoperability elements under 
the interoperability element definition. We also clarify that the 
underlying substantive content or health facts are not considered 
interoperability elements because substantive content and health facts 
are not a means by which EHI is accessed, exchanged, or used. Regarding 
legally required data tags, we would need additional information 
concerning the specific data tag to determine whether it could 
constitute an interoperability element.

[[Page 25808]]

Generally, data tags would likely be considered technical information 
under the ``interoperability element'' definition, but such data tags 
would need to be necessary to access, exchange, or use EHI to be 
considered an interoperability element.
    A determination regarding whether a functionality is considered an 
interoperability element will be determined without regard to whether 
it is protected under copyright or patent law. In fact, the finalized 
definition of interoperability element includes ``licenses'' and 
``intellectual property.'' We have also established an exception to 
information blocking that supports the licensing of intellectual 
property. Thus, we make clear that functionalities generally covered by 
copyright, patent, or other such laws can be interoperability elements.
    In response to the commenter who requested additional examples of 
interoperability elements, we provide the following non-exhaustive list 
of examples:
     Functional elements of health IT that could be used to 
access, exchange, or use EHI for any purpose, including information 
exchanged or maintained in disparate media, information systems, or by 
HINs/HIEs;
     Technical information that describes the functional 
elements of technology, such as a standard, specification, protocol, 
data model, or schema, that would be required to use a functional 
element of a certain technology, including for the purpose of 
developing compatible technologies that incorporate or use the 
functional elements;
     System resources, technical infrastructure, or HIN/HIE 
elements that are required to enable the use of a compatible technology 
in production environments; or
     Licenses, rights, or privileges that may be required to 
commercially offer and distribute compatible technologies and make them 
available for use in production environments.
    We appreciate the comments requesting that we clarify and narrow 
the ``interoperability element'' definition. As discussed above, we 
believe the revised definition addresses commenters' concerns regarding 
the clarity of the definition. Responsive to commenters, the final 
definition is also narrower than the proposed definition, as we have 
removed the proposed provision that an interoperability element could 
be any other means by which EHI may be accessed, exchanged, or used 
(see 84 FR 7602).
    We have decided not to focus the definition on certified elements 
or existing standards or requirements because such a narrowed focus 
would unduly limit the definition, interoperability, and the access, 
exchange, and use of EHI. The finalized definition reflects that there 
are countless means by which EHI may be accessed, exchanged, or used 
that are not certified or standardized. We note that the new Content 
and Manner Exception (Sec.  171.301) supports certified and standards-
based exchange as suggested by the commenter. We refer readers to 
VIII.D.2.a of this preamble for a discussion of that exception.
    We note that we have removed the term ``transmit'' from the 
regulatory text because it no longer fit in the context of other 
changes made to the definition.
6. Practices That May Implicate the Information Blocking Provision
    To meet the definition of information blocking under section 
3022(a) of the PHSA, a practice must be likely to interfere with, 
prevent, or materially discourage the access, exchange, or use of EHI. 
In this section and elsewhere in the Proposed Rule, we discussed 
various types of hypothetical practices that could implicate the 
information blocking provision. We did this to illustrate the scope of 
the information blocking provision and to explain our interpretation of 
various statutory concepts. However, we stressed that the types of 
practices discussed in the preamble of the Proposed Rule are 
illustrative and not exhaustive and that many other types of practices 
could also implicate the provision. We emphasized that the fact that we 
did not identify or discuss a particular type of practice did not imply 
that it is less serious than those that were discussed in the preamble. 
Indeed, we explained in the Proposed Rule that because information 
blocking may take many forms, it is not possible to anticipate or 
catalog all potential types of practices that may raise information 
blocking concerns.
    We emphasized that any analysis of information blocking necessarily 
requires a careful consideration of the individual facts and 
circumstances, including whether the practice was required by law, 
whether the actor had the requisite knowledge, and whether an exception 
applies. A practice that seemingly meets the statutory definition of 
information blocking would not be information blocking if it was 
required by law, if one or more elements of the definition were not 
met, or if it was covered by one of the exceptions for reasonable and 
necessary activities.
    In accordance with section 3022(a)(3) of the PHSA, we proposed in 
the Proposed Rule to establish exceptions to the information blocking 
provision for certain reasonable and necessary activities. We proposed 
that if an actor can establish that an exception applies to each 
practice for which a claim of information blocking has been made, 
including that the actor satisfied all applicable conditions of the 
exception at all relevant times, then the practice would not constitute 
information blocking.
    Comments. There was broad support from commenters regarding the 
categories of practices identified in the Proposed Rule that may 
implicate the information blocking provision, as well as the non-
exhaustive list of specific examples provided in the Proposed Rule to 
assist with compliance. Commenters noted that the illustrative examples 
provided were helpful in providing further clarity on the scope of the 
information blocking provision. Many commenters noted that considerable 
barriers continue to obstruct both provider and patient access to 
patient data and our approach to the information blocking provision can 
increase access to this data.
    Several commenters suggested the need for a comprehensive inventory 
or repository of examples, including examples of information blocking 
conduct that have been submitted to ONC. Many commenters suggested 
specific clarifications and modifications to the examples provided in 
the Proposed Rule in the sections below, as well as additional examples 
for inclusion in the final rule, such as additional examples applicable 
to specific contexts (e.g., imaging providers, and pharmacies) or 
specific practices (e.g., practices involving clinical data registries 
and pharmacogenomics).
    Response. We thank commenters for their support and feedback. We 
have not revised the examples provided in the Proposed Rule because we 
believe they are clear, accurate, and helpful to readers. To be 
responsive to commenters who requested additional examples be added to 
the final rule, we have added examples in the discussion of ``Limiting 
or Restricting the Interoperability of Health IT'' in section 
VIII.C.6.c.ii. as well as additional examples within the preamble 
discussion for the exceptions. We used commenters' suggestions to help 
inform these examples and highlight important use cases and 
circumstances that required additional clarification. We emphasize that 
these listed examples are illustrative, but not exhaustive.
    We also clarify that when we say that the actor must satisfy all 
applicable conditions of the exception at all

[[Page 25809]]

relevant times to meet each exception, all relevant times means any 
time when an actor's practice relates to the access, exchange, or use 
of EHI.
a. Prevention, Material Discouragement, and Other Interference
    We explained in the Proposed Rule that the information blocking 
provision and its enforcement subsection do not define the terms 
``interfere with,'' ``prevent,'' and ``materially discourage,'' and use 
these terms collectively and without differentiation. Based on our 
interpretation of the information blocking provision and the ordinary 
meanings of these terms in the context of EHI, we interpreted these 
terms to not be mutually exclusive. Instead, prevention and material 
discouragement may be understood as types of interference, and that use 
of these terms in the statute to define information blocking 
illustrates the desire to reach all practices that an actor knows, or 
should know, are likely to prevent, materially discourage, or otherwise 
interfere with the access, exchange, or use of EHI. Consistent with 
this understanding, we used the terms ``interfere with'' and 
``interference'' as inclusive of prevention and material 
discouragement.
    We explained that interference could take many forms. In addition 
to the prevention or material discouragement of access, exchange, or 
use, we stated that interference could include practices that increase 
the cost, complexity, or other burdens associated with accessing, 
exchanging, or using EHI. Interference could also include practices 
that limit the utility, efficacy, or value of EHI that is accessed, 
exchanged, or used, such as by diminishing the integrity, quality, 
completeness, or timeliness of the data. Relatedly, to avoid potential 
ambiguity and clearly communicate the full range of potential practices 
that could implicate the information blocking provision, we proposed to 
codify a definition of ``interfere with'' in Sec.  171.102, consistent 
with our interpretation set forth above (84 FR 7516).
    Comments. We did not receive comments on our proposed definition of 
``interfere with.''
    Response. We have finalized the definition of ``interfere with'' 
(also referred to as ``interference'') in Sec.  171.102 as proposed, 
but with a modification to remove the phrase ``access, exchange, or use 
of electronic health information'' from the definition. We removed this 
language because it was not necessary in the definition, and to avoid 
duplication, as we often say in the preamble of this final rule that 
``a practice interferes with access, exchange or use of EHI.'' We also 
note that we received many comments requesting clarification of whether 
certain practices would constitute interference with the access, 
exchange, and use of EHI, and thus implicate the information blocking 
provision. We address these comments in section VIII.C.6.c (Examples of 
Practices Likely to Interfere with the Access, Exchange or Use of EHI) 
below.
b. Likelihood of Interference
    We noted in the Proposed Rule that the information blocking 
provision is preventative in nature. That is, the information blocking 
provision proscribes practices that are likely to interfere with 
(including preventing or materially discouraging) access, exchange, or 
use of EHI--whether or not such harm materializes. By including both 
the likely and the actual effects of a practice, the information 
blocking provision encourages individuals and entities to avoid 
engaging in practices that undermine interoperability, and to 
proactively promote access, exchange, and use of EHI.
    We explained that a practice would satisfy the information blocking 
provision's ``likelihood'' requirement if, under the circumstances, 
there is a reasonably foreseeable risk that the practice will interfere 
with access, exchange, or use of EHI. We explained that a policy or 
practice that limits timely access to information in an appropriate 
electronic format creates a reasonably foreseeable likelihood of 
interfering with the use of the information.
    We noted that whether the risk of interference is reasonably 
foreseeable will depend on the particular facts and circumstances 
attending the practice or practices at issue. Because of the number and 
diversity of potential practices, and the fact that different practices 
will present varying risks of interfering with access, exchange, or use 
of EHI, we did not attempt to anticipate all of the potential ways in 
which the information blocking provision could be implicated. 
Nevertheless, to assist with compliance, we clarified certain 
circumstances in which, based on our experience, a practice will almost 
always be likely to interfere with access, exchange, or use of EHI. We 
cautioned that the situations listed are not exhaustive and that other 
circumstances may also give rise to a very high likelihood of 
interference under the information blocking provision. We noted that in 
each case, the totality of the circumstances should be evaluated as to 
whether a practice is likely to constitute information blocking.
    In the Proposed Rule, we stated that we believe that information 
blocking concerns are especially pronounced when the conduct at issue 
has the potential to interfere with the access, exchange, or use of EHI 
that is created or maintained during the practice of medicine or the 
delivery of health care services to patients, which we referred to 
collectively as ``observational health information'' (84 FR 7516 
and7517). We received a few comments seeking clarification regarding 
our use of the term ``observational health information'' or that we 
provide a regulatory definition for the term.
    Comments. We received some comments requesting clarification 
regarding the meaning of ``timely'' access in the discussion in the 
Proposed Rule.
    Response. We have not established a set timeframe for what 
``timely'' access means because there is so much variability regarding 
what ``timely'' will mean based on the specific facts and 
circumstances, and particularly with regard to the broad scope of 
health IT being discussed. We emphasize that whether access is 
considered timely will be determined based on the specific facts and 
circumstances. We refer readers to the discussion in section 
VIII.C.6.c. on ``Limiting or Restricting the Interoperability of Health 
IT'' where we discuss how slowing or delaying access, exchange, or use 
of EHI could be considered information blocking.
    Comments. We did not receive any additional comments regarding out 
interpretation of the information blocking provision's ``likelihood'' 
requirement discussed above.
    Response. We have finalized our interpretation as described above.
    Comments. We received comments requesting clarification regarding 
the meaning of ``observational health information'' as used in the 
Proposed Rule.
    Response. As discussed earlier in section VIII.C.3, after 
consideration of concerns raised by commenters, we have not finalized 
the definition of EHI as proposed. Instead, we have finalized a more 
focused definition of EHI. Because we have finalized a definition of 
EHI with a more focused scope than proposed, we no longer believe our 
proposed approach regarding observational health information is 
necessary. Accordingly, we are not using the term ``observational 
health information'' in this final rule. We refer readers to section 
VIII.C.3. for further discussion of the definition of EHI.

[[Page 25810]]

i. Purposes for Which Information May Be Needed
    We explained in the Proposed Rule that the information blocking 
provision will almost always be implicated when a practice interferes 
with access, exchange, or use of EHI for certain purposes, including 
but not limited to:
     Providing patients with access to their EHI and the 
ability to exchange and use it without special effort (see section 
VII.B.4).
     Ensuring that health care professionals, care givers, and 
other authorized persons have the EHI they need, when and where they 
need it, to make treatment decisions and effectively coordinate and 
manage patient care and can use the EHI they may receive from other 
sources.
     Ensuring that payers and other entities that purchase 
health care services can obtain the information they need to 
effectively assess clinical value and promote transparency concerning 
the quality and costs of health care services.
     Ensuring that health care providers can access, exchange, 
and use EHI for quality improvement and population health management 
activities.
     Supporting access, exchange, and use of EHI for patient 
safety and public health purposes.
    We emphasized that the need to ensure that EHI is readily available 
and usable for these purposes is paramount. Therefore, practices that 
increase the cost, difficulty, or other burdens of accessing, 
exchanging, or using EHI for these purposes would almost always 
implicate the information blocking provision. We stressed that 
individuals and entities that develop health IT or have a role in 
making these technologies and services available should consider the 
impact of their actions and take steps to support interoperability and 
avoid impeding the availability or use of EHI (84 FR 7517).
    Comments. We did not receive comments of the discussion above.
    Response. Consistent with the Proposed Rule, in this final rule we 
continue to emphasize that practices that interfere with the access, 
exchange, or use of EHI for the purposes listed in this section and 
that do not meet any of the final exceptions will almost always 
implicate the information blocking provision and will be inherently 
suspect. These practices may jeopardize the core functions of the 
health care system that require the access, exchange, or use of EHI. We 
believe there are few, if any, legitimate reasons for an actor to 
interfere with the use of EHI in the context of these purposes.
    We specifically emphasize that practices that involve an actor 
charging an individual a fee to access, exchange, or use their EHI 
would be inherently suspect, as discussed in more detail in the Fees 
Exception (section VIII.D.2.b), as there are few, if any, legitimate 
reasons for an actor to charge an individual for access to their EHI.
ii. Control Over Essential Interoperability Elements; Other 
Circumstances of Reliance or Dependence
    We explained in the Proposed Rule that an actor may have 
substantial control over one or more interoperability elements that 
provide the only reasonable means of accessing, exchanging, or using 
EHI for a particular purpose. We noted that, in these circumstances, 
any practice by the actor that could impede the use of the 
interoperability elements--or that could unnecessarily increase the 
cost or other burden of using the elements--would almost always 
implicate the information blocking provision.
    We explained that the situation described above is most likely when 
customers or users are dependent on an actor's technology or services, 
which can occur for any number of reasons. For example, technological 
dependence may arise from legal or commercial relations, such as a 
health care provider's reliance on its EHR developer to ensure that EHI 
managed on its behalf is accessible and usable when it is needed. 
Relatedly, most EHI is currently stored in EHRs and other source 
systems that use proprietary data models or formats. Knowledge of the 
data models, formats, or other relevant technical information (e.g., 
proprietary APIs) is necessary to understand the data and make 
efficient use of it in other applications and technologies. Because 
this information is routinely treated as confidential or proprietary, 
the developer's cooperation is required to enable uses of the EHI that 
go beyond the capabilities provided by the developer's technology. This 
includes the capability to export complete information sets and to 
migrate data in the event that a user decides to switch to a different 
technology.
    We noted that separate from these contractual and intellectual 
property issues, users may become ``locked in'' to a particular 
technology, HIE, or HIN for financial or business reasons. For example, 
many health care providers have invested significant resources to adopt 
EHR technologies--including costs for deployment, customization, data 
migration, and training--and have tightly integrated these technologies 
into their information management strategies, clinical workflows, and 
business operations. As a result, they may be reluctant to switch to 
other technologies due to the significant cost and disruption this 
would entail.
    We explained that another important driver of technological 
dependence is the ``network effects'' of health IT adoption, which are 
amplified by reliance on technologies and approaches that are not 
standardized and do not enable seamless interoperability. Consequently, 
health care providers and other health IT users may gravitate towards 
and become reliant on the proprietary technologies, HIEs, or HINs that 
have been adopted by other individuals and entities with whom they have 
the greatest need to exchange EHI. We noted that these effects may be 
especially pronounced within particular products or geographic areas. 
For example, a HIN that facilitates certain types of exchange or 
transactions may be so widely adopted that it is a de facto industry 
standard. A similar phenomenon may occur within a particular geographic 
area once a critical mass of hospitals, physicians, or other providers 
adopt a particular EHR technology, HIE, or HIN.
    We emphasized that in these and other analogous circumstances of 
reliance or dependence, there is a heightened risk that an actor's 
conduct will interfere with access, exchange, or use of EHI. To assist 
with compliance, we highlighted the following common scenarios, based 
on our outreach to stakeholders, in which actors exercise control over 
key interoperability elements.\128\
---------------------------------------------------------------------------

    \128\ As an important clarification, we note that control over 
interoperability elements may exist with or without the actor's 
ability to manipulate the price of the interoperability elements in 
the market.
---------------------------------------------------------------------------

    Health IT developers of certified health IT that provide EHR 
systems or other technologies used to capture EHI at the point of care 
are in a unique position to control subsequent access to and use of 
that information.
     HINs and HIEs may be in a unique position to control the 
flow of information among particular persons or for particular 
purposes, especially if the HIN or HIE has achieved significant 
adoption in a particular geographic area or for a particular type of 
health information use case.
     Similar control over EHI may be exercised by other 
entities, such as health IT developers of certified health IT, that 
supply or control proprietary technologies, platforms, or services that 
are widely adopted by a class of users or that are a ``de facto 
standard'' for

[[Page 25811]]

certain types of EHI exchanges or transactions.
     Health care providers within health systems and other 
entities that provide health IT platforms, infrastructure, or 
information sharing policies may have a degree of control over 
interoperability or the movement of data within a geographic area that 
is functionally equivalent to the control exercised by a dominant 
health IT developer, HIN, or HIE.
    To avoid engaging in conduct that may be considered information 
blocking, actors with control over interoperability elements should be 
careful not to engage in practices that exclude persons from the use of 
those elements or create artificial costs or other impediments to their 
use.
    We encouraged comment on these and other circumstances that may 
present an especially high likelihood that a practice will interfere 
with access, exchange, or use of EHI within the meaning of the 
information blocking provision.
    Comments. A few commenters appreciated the examples provided and 
ONC's acknowledgement in the Proposed Rule that certain parties are in 
a unique position to control access, exchange, and use of EHI. Other 
commenters urged ONC to only hold accountable those parties that 
actually have control of the EHI or control of interoperability 
elements necessary to access, exchange, or use the EHI in question.
    Response. We thank commenters for their support. We stress that any 
analysis of whether an actor's practices constitute information 
blocking will depend on the particular facts and circumstances of the 
case, which may include an assessment of the actor's control over the 
EHI or interoperability elements necessary to access, exchange, or use 
the EHI in question, as applicable. A key element of information 
blocking is that the actor's practice is likely to interfere with an 
individual or entity's ability to access, exchange, or use EHI. Thus, 
we look at accountability through the lens of whether the actor is the 
individual or entity engaging in the practice.
    Regarding the comment that we should only hold accountable those 
parties that actually have control of the EHI or interoperability 
elements necessary to access, exchange, or use the EHI, we note that we 
have addressed this issue within preamble discussion concerning the 
definition of ``interoperability element'' (VIII.C.5.b), Infeasibility 
Exception (VIII.D.1.d), and Content and Manner Exception (VIII.D.2.a). 
We refer readers to those discussions.
c. Examples of Practices Likely To Interfere With Access, Exchange, or 
Use of EHI
    To further clarify the scope of the information blocking provision, 
we described in the Proposed Rule several types of practices that would 
be likely to interfere with access, exchange, or use of EHI. Those 
examples clarified and expanded on those set forth in section 
3022(a)(2) of the PHSA.
    Because information blocking can take many forms, we emphasized 
that the categories of practices described in the Proposed Rule were 
illustrative only and did not provide an exhaustive list or 
comprehensive description of practices that may implicate the 
information blocking provision and its penalties. We also reiterated 
that each case will turn on its unique facts. We noted that, for the 
categories of practices described in the Proposed Rule, we did not 
consider the applicability of any exceptions. We reiterate that the 
examples provided in the Proposed Rule were designed to provide greater 
clarity on the various types of hypothetical practices that could 
implicate the information blocking provision.
    Comments. We received comments requesting that we revise or clarify 
examples provided in the Proposed Rule in the following sections.
    Response. We have not revised or clarified the majority of the 
examples for purposes of this final rule, and we believe the majority 
of the examples are still applicable. We note in the discussion below 
necessary clarifications concerning concepts expressed in some of the 
proposed examples. We refer readers to the Proposed Rule (84 FR 7518 
through 7521) for a complete listing of the examples provided for each 
category of practices below.
i. Restrictions on Access, Exchange, or Use
    We explained in the Proposed Rule that the information blocking 
provision establishes penalties, including civil monetary penalties, or 
requires appropriate disincentives, for practices that restrict access, 
exchange, or use of EHI for permissible purposes. We noted that one 
means by which actors may restrict access, exchange, or use of EHI is 
through formal restrictions. These may be expressed in contract or 
license terms, EHI sharing policies, organizational policies or 
procedures, or other instruments or documents that set forth 
requirements related to EHI or health IT. Additionally, in the absence 
of an express contractual restriction, an actor may achieve the same 
result by exercising intellectual property or other rights in ways that 
restrict access, exchange, or use (84 FR 7518).
    We explained that access, exchange, or use of EHI can also be 
restricted in less formal ways. The information blocking provision may 
be implicated, for example, where an actor simply refuses to exchange 
or to facilitate the access or use of EHI, either as a general practice 
or in isolated instances. The refusal may be expressly stated or it may 
be implied from the actor's conduct, such as where the actor ignores 
requests to share EHI or provide interoperability elements; gives 
implausible reasons for not doing so; or insists on terms or conditions 
that are so objectively unreasonable that they amount to a refusal to 
provide access, exchange, or use of the EHI (84 FR 7518).
    We emphasized that restrictions on access, exchange, or use that 
are required by law would not implicate the information blocking 
provision. Moreover, we recognized that some restrictions, while not 
required by law, may be reasonable and necessary for the privacy and 
security of individuals' EHI and noted that such practices may qualify 
for protection under an exception (84 FR 7519).
    Comments. Commenters requested that we clarify the types of 
contract and agreement terms that could implicate the information 
blocking provision beyond terms specifying fees and the licensing of 
intellectual property rights. Some commenters stated that ``legacy EHR 
platforms'' impede real time data flow between EHRs and the clinical 
workflow, including the use of third-party clinical decision support 
applications, through various contract terms. Many commenters also 
indicated that EHR developers place onerous contract terms on 
developers of applications that enable patient access to EHI through 
APIs. A few commenters asserted that a business associate (BA), as 
defined under the HIPAA Privacy Rule, should not be liable under the 
information blocking provision (or there should be an exception for 
information blocking) for not responding to or fulfilling requests for 
access, exchange, or use of EHI if such access, exchange, or use of EHI 
would violate the BA's business associate agreement (BAA).
    Response. We first clarify that all of the scenarios provided by 
the commenters might implicate the information blocking provision. We 
offer specific situations as follows where there might be an 
implication. As a first example, an actor (e.g., a health care provider 
that is a covered entity

[[Page 25812]]

under HIPAA) may want to engage an entity for services (e.g., use of a 
clinical decision support application (``CDS App Developer'')) that 
require the CDS App Developer to enter into a BAA with the health care 
provider and, in order to gain access and use of the EHI held by 
another BA of the health care provider (e.g., EHR developer of 
certified health IT), the CDS App Developer is required by the EHR 
developer of certified health IT to enter into a contract to access its 
EHR technology. As a second example, an entity may offer an application 
that facilitates patients' access to their EHI through an API 
maintained by an actor (e.g., EHR developer of certified health IT) 
that is a BA of a health care provider that is a covered entity under 
HIPAA. As a third example, a health care provider may request EHI from 
an actor that is a BA of another health care provider under HIPAA, such 
as an EHR developer of certified health IT or HIN, that is contracted 
to make EHI available for treatment purposes.
    In response to comments and for the situations described above, we 
clarify that contracts and agreements can interfere with the access, 
exchange, and use of EHI through terms besides those that specify 
unreasonable fees and commercially unreasonable licensing terms (see 
sections VIII.D.2.b (Fees) and VIII.D.2.c (Licensing) for further 
discussion of unreasonable fees and commercially unreasonable licensing 
terms and associated exceptions to the information blocking provision). 
For instance, a contract may implicate the information blocking 
provision if it included unconscionable terms for the access, exchange, 
or use of EHI or licensing of an interoperability element, which could 
include, but not be limited to, requiring a software company that 
produced a patient access application to relinquish all IP rights to 
the actor or agreeing to indemnify the actor for acts beyond standard 
practice, such as gross negligence on part of the actor. Such terms may 
be problematic with regard to information blocking in situations 
involving unequal bargaining power related to accessing, exchanging, 
and using EHI.
Business Associate Agreements (BAAs)
    We designed the final rule to operate in a manner consistent with 
the framework of the HIPAA Privacy Rule and other laws providing 
privacy rights for patients. Foremost, we do not require the disclosure 
of EHI in any way that would not already be permitted under the HIPAA 
Privacy Rule (or other Federal or State law). However, if an actor is 
permitted to provide access, exchange, or use of EHI under the HIPAA 
Privacy Rule (or any other law), then the information blocking 
provision would require that the actor provide that access, exchange, 
or use of EHI so long as the actor is not prohibited by law from doing 
so (assuming that no exception is available to the actor).
    Under the HIPAA Privacy Rule, a BAA must contain the elements 
specified in 45 CFR 164.504(e), including a description of the 
permitted and required uses of PHI by the business associate, and 
provide that the business associate will not use or further disclose 
the protected health information other than as permitted or required by 
the contract or as required by law.\129\ While the information blocking 
provision does not require actors to violate these agreements, a BAA or 
its associated service level agreements must not be used in a 
discriminatory manner by an actor to forbid or limit disclosures that 
otherwise would be permitted by the Privacy Rule. For example, a BAA 
entered into by one or more actors that permits access, exchange, or 
use of EHI by certain health care providers for treatment should 
generally not prohibit or limit the access, exchange, or use of the EHI 
for treatment by other health care providers of a patient.
---------------------------------------------------------------------------

    \129\ 45 CFR 164.514(e)(3) limits the use and disclosure of a 
limited data set (LDS) to only the purposes of research, public 
health or health care operations. Some of the other restrictions on 
use and disclosure by a party that receives LDS Recipient are 
similar to those imposed by the HIPAA Rules on business associates 
so the discussion that follows generally applies to recipients of 
LDS and their data use agreements as well as to business associates 
(and their business associate agreements) to the extent of such 
similar provisions.
---------------------------------------------------------------------------

    To be clear, both the health care provider(s) who initiated the BAA 
and the BA who may be an actor under the information blocking provision 
(e.g., a health IT developer of certified health IT) would be subject 
to the information blocking provision in the instance described above. 
To illustrate the potential culpability of a BA, a BA with significant 
market power may have contractually prohibited or made it difficult for 
its covered entity customers to exchange EHI, maintained by the BA, 
with health care providers that use an EHR system of one of the BA's 
competitors. To determine whether there is information blocking, the 
actions and processes (e.g., negotiations) of the actors in reaching 
the BAA and associated service level agreements would need to be 
reviewed to determine whether there was any action taken by an actor 
that was likely to interfere with the access, exchange, or use of EHI, 
and whether the actor had the requisite intent. We further note that if 
the BA has an agreement with the covered entity to provide EHI to a 
third party that requests it and the BA refuses to provide the access, 
exchange, or use of EHI to a requestor in response to the request 
received by the CE, then the BA (who is also an actor under the 
information blocking provision) may have violated the information 
blocking provision unless an exception applied.
Successors to Contractors and Agreements
    We note that there may be circumstances in which there is a 
successor to a contract or agreement when, for example, an actor goes 
out of business, a provider leaves a practice, or an actor engages in a 
merger or adopts a new corporate structure. If not handled 
appropriately, it is possible that information blocking could occur.
ii. Limiting or Restricting the Interoperability of Health IT
    We explained in the Proposed Rule that the information blocking 
provision includes practices that restrict the access, exchange, or use 
of EHI in various ways (see section 3022(a)(2) of the PHSA). These 
practices could include, for example, disabling or restricting the use 
of a capability that enables users to share EHI with users of other 
systems or to provide access to EHI to certain types of persons or for 
certain purposes that are legally permissible. In addition, the 
information blocking provision may be implicated where an actor 
configures or otherwise implements technology in ways that limit the 
types of data elements that can be exported or used from the 
technology. We noted that other practices that would be suspect include 
configuring capabilities in a way that removes important context, 
structure, or meaning from the EHI, or that makes the data less 
accurate, complete, or usable for important purposes for which it may 
be needed. Likewise, implementing capabilities in ways that create 
unnecessary delays or response times, or that otherwise limit the 
timeliness of EHI accessed or exchanged, may interfere with the access, 
exchange, and use of that information and therefore implicate the 
information blocking provision. We noted that any conclusions regarding 
such interference would be based on fact-finding specific to each case 
and would need to consider the applicability of the exceptions.
    We explained that the information blocking provision would be 
implicated if an actor were to deploy technological measures that limit 
or restrict the ability to reverse engineer the functional

[[Page 25813]]

aspects of technology in order to develop means for extracting and 
using EHI maintained in the technology. We noted that this may include, 
for example, employing technological protection measures that, if 
circumvented, would trigger liability under the Digital Millennium 
Copyright Act (see 17 U.S.C. 1201) or other laws.
Additional Examples
    In the context of ONC's certification rules, including 
certification criteria and Conditions and Maintenance of Certification 
requirements, we provide the following more explicit examples of 
actions by actors that would likely constitute information blocking.
    The first example of a technical interference that restricts the 
interoperability of health IT relates to the publication of ``FHIR 
service base URLs'' (sometimes also referred to as ``FHIR endpoints''). 
As discussed in the API Condition of Certification preamble (section 
VII.B.4), an API User needs to know a certified API technology's FHIR 
service base URL to interact with the certified API technology. This 
knowledge is foundational for the use of certified API technology 
without special effort. Therefore, a FHIR service base URL cannot be 
withheld by an actor as it (just like many other technical interfaces) 
is necessary to enable the access, exchange, and use of EHI. Notably, 
in the case of patients seeking access to their EHI, the public 
availability of FHIR service base URLs is an absolute necessity and 
without which the access, exchange, and use of EHI would be prevented. 
Thus, any action by an actor to restrict the public availability of 
URLs in support of patient access would be more than just likely to 
interfere with the access, exchange, or use of EHI; it would prevent 
such access, exchange, and use. Accordingly, as noted in Sec.  
170.404(b)(2), a Certified API Developer must publish FHIR service base 
URLs for certified API technology that can be used by patients to 
access their electronic health information.
    Consistent with this example, the above interpretation means that 
API Information Sources (i.e., health care providers) who locally 
manage their FHIR servers without Certified API Developer assistance 
cannot refuse to provide to Certified API Developers the FHIR service 
base URL(s) that is/are necessary for patients to use to access their 
EHI. Equally, pursuant to the Maintenance of Certification requirement 
finalized for Certified API Developers in Sec.  170.404, they would be 
required to publish the FHIR service base URLs they centrally manage on 
behalf of API Information Sources. We also clarify that the public 
availability of FHIR service base URLs is a requirement that is scoped 
specifically to the context of patients' access to their EHI and is not 
intended to be interpreted as requiring all FHIR service base URLs to 
be made publicly available (i.e., FHIR service base URLs that are 
created and used among business partners would not need to be made 
publicly available).
    Along the same lines discussed in the example directly above, for a 
patient to be able to use an application of their choice with certified 
API technology, the software application will need to be 
``registered.'' In that regard, as a second example, an actor's refusal 
to register a software application that enables a patient to access 
their EHI would effectively prevent its use given that registration is 
a technical prerequisite for software applications to be able to 
connect to certified API technology. As a result, such refusals in the 
context of patient access unless otherwise addressed in this rule would 
be highly suspect and likely to implicate information blocking. We 
note, however, for the first and second example that neither app 
registration nor the public availability of a FHIR service base URL 
means that an application will be able to access any EHI. On the 
contrary, the application would be unable to do so unless a patient 
authenticates themselves via an appropriate workflow or, in the case of 
a health care provider, the application is appropriately configured to 
work within the provider's IT infrastructure.
    As a third example, there is often specific information that may be 
necessary for certain actors, in this case health care providers, to 
effectively access, exchange, and use EHI via their Certified EHR 
Technology and certified Health IT Modules. A health care provider's 
``direct address'' is an example of this kind of information. If this 
information were not made known to a health care provider upon request, 
were inaccessible or hidden in a way that a health care provider could 
not identify (or find out) their own direct address, or were refused to 
be provided to a health care provider by a health IT developer with 
certified health IT, we would consider all such actions to be 
information blocking because knowledge of a direct address is necessary 
to fully engage in the exchange of EHI.
    As a last example, we note that, to the extent that a legal 
transfer of IP to an individual or entity that is not an actor is 
intended to facilitate circumvention of the information blocking 
provision, the transfer itself by an actor could be considered an 
interference with the access, exchange, or use of EHI.
    We note that we have added definitions of ``API Information 
Source,'' ``API User,'' ``Certified API Developer,'' and ``certified 
API technology'' to Sec.  171.102. Each of those terms is defined as 
they are in Sec.  170.404(c). We note that ``API Information Source'' 
replaced the proposed definition of ``API Data Provider'' and 
``Certified API Developer'' replaced the proposed definition of ``API 
Technology Supplier'' in order to align with the terms used in Sec.  
170.404(c) (see the proposed terms in 84 FR 7601).
    Comments. A few commenters requested that we provide further 
clarity on whether slowing or delaying access, exchange, or use of EHI 
could be considered information blocking.
    Response. We clarify that slowing or delaying access, exchange, or 
use of EHI could constitute an ``interference'' and implicate the 
information blocking provision. We understand that some delays may be 
legitimate and inevitable due to factors such as limited legal, project 
management, and technical resources. Notwithstanding such 
understandable challenges, we are aware that some actors use and 
embellish legitimate challenges to create extended and unnecessary 
delays. For instance, an actor could have legitimate technical scoping 
and architecture questions regarding data integrations that require 
attention and take time to address. However, these scoping and 
architecture questions could constitute interference and implicate the 
information blocking provision if they are not necessary to enable 
access, exchange, or use of EHI and are being utilized as a delay 
tactic. When assessing such practices, facts indicating that an actor 
created extended or unnecessary delays may be evidence of an actor's 
intent. We expect actors to make good faith efforts to work through 
common and understandable challenges and limitations to enable 
requestors to access, exchange, and use EHI as quickly and efficiently 
as possible.
iii. Impeding Innovations and Advancements in Access, Exchange, or Use 
or Health IT-Enabled Care Delivery
    We explained in the Proposed Rule that the information blocking 
provision encompasses practices that create impediments to innovations 
and advancements to the access, exchange, and use of EHI, including 
care delivery enabled by health IT (section 3022(a)(2)(C)(ii) of the 
PHSA). Importantly, the information blocking provision may be 
implicated and

[[Page 25814]]

penalties or appropriate disincentives may apply if an actor were to 
engage in exclusionary, discriminatory, or other practices that impede 
the development, dissemination, or use of interoperable technologies 
and services that enhance access, exchange, or use of EHI.
    We emphasized that, most acutely, the information blocking 
provision may be implicated if an actor were to refuse to license or 
allow the disclosure of interoperability elements to persons who 
require those elements to develop and provide interoperable 
technologies or services--including those that might complement or 
compete with the actor's own technology or services. The same would be 
true if the actor were to allow access to interoperability elements but 
were to restrict their use for these purposes. We provided a list of 
non-exhaustive examples to illustrate practices that would likely 
implicate the information blocking provision by interfering with 
access, exchange, or use of EHI (84 FR 7519 and 7520). We encourage 
readers to review those examples in the Proposed Rule, as they are 
still applicable.
    We explained that, rather than restricting interoperability 
elements, an actor may insist on terms or conditions that are 
burdensome and discourage their use. These practices may implicate the 
information blocking provision as well. We have chosen not to include 
those examples in this final rule, but emphasize that they are still 
applicable and encourage readers to review the examples in the Proposed 
Rule (84 FR 7520).
    We explained that the information blocking provision may also be 
implicated if an actor were to discourage efforts to develop or use 
interoperable technologies or services by exercising its influence over 
customers, users, or other persons, and we provided a non-exhaustive 
list of examples. We have chosen not to include those examples in this 
final rule, but emphasize that they are still applicable and encourage 
readers to review the examples in the Proposed Rule (84 FR 7520).We 
noted that similar concerns would arise were an actor to engage in 
discriminatory practices--such as imposing unnecessary and burdensome 
administrative, technical, contractual, or other requirements on 
certain persons or classes of persons--that interfere with access and 
exchange of EHI by frustrating or discouraging efforts to enable 
interoperability. We provided a list of non-exhaustive examples to 
illustrate some ways this could occur. We have chosen not to include 
those examples in this final rule, but emphasize that they are still 
applicable and encourage readers to review the examples in the Proposed 
Rule (84 FR 7520).
    Not all instances of differential treatment would necessarily 
constitute a discriminatory practice that may implicate the information 
blocking provision. For example, we explained that different fee 
structures or other terms may reflect genuine differences in the cost, 
quality, or value of the EHI and the effort required to provide access, 
exchange, or use. We also noted that, in certain circumstances, it may 
be reasonable and necessary for an actor to restrict or impose 
reasonable and non-discriminatory terms or conditions on the use of 
interoperability elements, even though such practices could implicate 
the information blocking provision. For this reason, and as further 
explained in section VIII.D, we proposed to establish a narrow 
exception for licensing interoperability elements (see Sec.  171.303) 
that would apply to these types of practices.
    Comments. We received some recommendations to describe specific 
scenarios when a refusal to license would be considered information 
blocking.
    Response. We note that for the purposes of the categories of 
practices described in the Proposed Rule (84 FR 7518 through 7521), we 
did not consider the applicability of any exceptions, and strongly 
encouraged readers to review the discussion of practices in this 
section in conjunction with the section on the exceptions (84 FR 7518). 
Regarding the specific comment above regarding licensing, we direct 
readers to our discussion of the Licensing Exception (section 
VIII.D.2.c.) for additional examples and a discussion of substantive 
conditions we have finalized for the licensing of interoperability 
elements under the exception.
    We note one important clarification that applies to all examples in 
the Proposed Rule concerning the licensing of interoperability 
elements. As clarified in the Licensing Exception preamble discussion, 
an actor will not implicate the information blocking provision in 
circumstances where the entity requesting to license or use the 
interoperability element is not seeking to use the interoperability 
element to interoperate with either the actor or the actor's customers 
in order for EHI to be accessed, exchanged, or used. In other words, if 
there is no nexus between a requestor's need to license an 
interoperability element and existing EHI, an actor's refusal to 
license the interoperability element altogether or in accordance with 
Sec.  171.303 would not constitute an interference under the 
information blocking provision. We refer readers to the Licensing 
Exception preamble discussion in section VIII.D.2.c.
Interference Versus Education When an Individual Chooses Technology To 
Facilitate Access
    In the Proposed Rule, we stated that the information blocking 
provision would likely be implicated when an EHR developer of certified 
health IT requires third-party applications to be ``vetted'' for 
security before use but does not promptly conduct the vetting or 
conducts the vetting in a discriminatory or exclusionary manner (84 FR 
7519). We also stated under the proposed ``promoting the privacy of 
EHI'' exception that when the consent or authorization of an individual 
was necessary for access, exchange, or use of EHI, to qualify for the 
exception, an actor must not have improperly encouraged or induced the 
individual to not provide the consent or authorization. We further 
stated that this does not mean that an actor cannot inform an 
individual about the advantages and disadvantages of exchanging EHI and 
any associated risks, so long as the information communicated is 
accurate and legitimate. However, we noted that an actor could not 
mislead an individual about the nature of the consent to be provided, 
dissuade individuals from providing consent in respect of disclosures 
to the actor's competitors, or impose onerous requirements to 
effectuate consent that were unnecessary and not required by law (84 FR 
7531).
Overview of Comments
    Commenters expressed concerns that app developers not covered by 
the HIPAA Rules frequently do not provide patients (individuals) with 
clear terms of how their EHI will be subsequently used by the app 
developer once patients authorize (approve) the app to receive their 
EHI. These commenters, many of whom would be actors under the 
information blocking provision, expressed these concerns in comments 
recited below, while also requesting clarification about what steps 
they may take to assist individuals in protecting the privacy and 
security of their EHI.
    Comments. Commenters requested that we clarify the extent of 
vetting that would be permitted by actors for third-party apps.
    Response. We first clarify that the example provided in the 
Proposed Rule and recited above was to illuminate practices, such as 
delaying access and

[[Page 25815]]

discriminatory behavior, which could implicate the information blocking 
provision. ``Vetting'' in the example's context meant a determination 
regarding whether the app posed a security risk to the EHR developer's 
API, which may be the situation with a proprietary API. For certified 
API technology, which includes the use of OAuth2 among other security 
requirements in addition to its focus on ``read-only''/responses to 
requests for EHI to be transmitted, there should be few, if any, 
security concerns about the risks posed by patient-facing apps to the 
disclosing actor's health IT systems (because the apps would only be 
permitted to receive EHI at the patient's direction). Thus, for third-
party applications chosen by individuals to facilitate their access to 
their EHI held by actors, there would generally not be a need for 
``vetting'' on security grounds and such vetting actions otherwise 
would be an interference. We refer readers to our discussion of 
``vetting'' versus verifying an app developer's authenticity under the 
API Condition of Certification earlier in section VII.B.4 of this 
preamble. We do note, however, that actors, such as health care 
providers, have the ability to conduct whatever ``vetting'' they deem 
necessary of entities (e.g., app developers) that would be their 
business associates under HIPAA before granting access and use of EHI 
to the entities. In this regard, covered entities must conduct 
necessary vetting in order to comply with the HIPAA Security Rule.
    Comments. Several commenters stated that the information blocking 
proposals would open the door for third-party apps (e.g., patient-
facing apps) to access, exchange, and use copious amounts of patient 
data without providing patients with clear terms of use. Commenters 
stated that most individuals may be surprised when commercial 
application companies that are not subject to the HIPAA Rules shared 
health information obtained from a hospital or health plan, such as 
diagnoses, medications, or test results, in ways the HIPAA Rules would 
not permit. These commenters asserted that individuals would 
incorrectly blame the hospital or health plan if a third-party app 
developer sold their EHI or used it for marketing or other purposes. 
Additionally, the commenters contended that because the third-party 
apps and the third-party app developers are not subject to the HIPAA 
Rules, such developers may, through their apps' required terms of use, 
grant the developers the right to sell the EHI received or generated by 
the app without the individual's consent or could expose all of the 
individual's EHI without the individual's knowledge.
    Response. This final rule supports an individual's ability to 
choose which third-party developer and app are best for receiving all 
or part of their EHI from a health care provider and to agree to clear 
and public terms of use on how that initial and ongoing engagement with 
the third-party developer and app occurs. As discussed in more detail 
below, this final rule also supports and strongly encourages providing 
individuals with information that will assist them in making the best 
choice for themselves in selecting a third-party application. We 
believe that allowing actors to provide additional information to 
individuals about apps will assist individuals as they choose apps to 
receive their EHI and such an approach is consistent with statements in 
the Proposed Rule recited above regarding informing individuals about 
the advantages and disadvantages of exchanging EHI and any associated 
risks. Individuals concerned about information privacy and security can 
gain a better understanding about how the third-party apps are using 
and storing their EHI, how individuals will be able to exercise any 
consent options, and more about what individuals are consenting to 
before they allow the app to receive their EHI.
    Practices that purport to educate patients about the privacy and 
security practices of applications and parties to whom a patient 
chooses to receive their EHI may be reviewed by OIG or ONC, as 
applicable, if there was a claim of information blocking. However, we 
believe it is unlikely these practices would interfere with the access, 
exchange, and use of EHI if they meet certain criteria. Foremost, the 
information provided by actors must focus on any current privacy and/or 
security risks posed by the technology or the third-party developer of 
the technology. Second, this information must be factually accurate, 
unbiased, objective, and not unfair or deceptive. Finally, the 
information must be provided in a non-discriminatory manner. For 
example, all third-party apps must be treated the same way in terms of 
whether or not information is provided to individuals about the privacy 
and security practices employed. To be clear, an actor may not prevent 
an individual from deciding to provide its EHI to a technology 
developer or app despite any risks noted regarding the app itself or 
the third-party developer.
    Comments. Several commenters requested that we require actors, 
including API technology suppliers, to verify the existence of a 
privacy notice for each application requesting registration by an API 
User (third-party app developer). Commenters also suggested that the 
privacy notices should be commensurate with ONC's Model Privacy Notice 
(MPN). One commenter recommended that all third-party developers should 
have to attest ``yes'' or ``no'' to having a privacy notice for each 
app it makes available for use/(for patients to use) to access EHI. The 
commenter asserted that requiring attestation would provide 
transparency about the existence or lack of privacy policies and 
practices and data uses and serve as a means to support enforcement of 
acts of deceptive or misleading conduct in relation to stated privacy 
policies and practices.
    Response. As noted above, an actor may provide factually accurate, 
objective, unbiased, fair, and non-discriminatory information about the 
third party or third-party app that an individual chooses to use to 
receive EHI on their behalf. And as also noted above, we strongly 
encourage actors to educate patients and individuals about the risks of 
providing other entities or parties access to their EHI. This type of 
education can be designed to inform the patient about the privacy and 
security practices of the third party and the third-party app, 
including whether the third-party developer has not acted in accordance 
with elements of its privacy policy. In this regard, we think there are 
many efficient and allowable ways of providing such education without 
such practices being considered or creating an interference under the 
information blocking provision, including those similar to the one 
suggested by the commenter.
    For example, to the commenter's specific point, actors may 
establish processes where they notify a patient, call to a patient's 
attention, or display in advance (as part of the app authorization 
process with certified API technology) whether the third-party 
developer of the app that the patient is about to authorize to receive 
their EHI has attested in the positive or negative whether the third 
party's privacy policy and practices (including security practices such 
as whether the app encrypts the EHI) meet certain ``best practices'' 
set by the market for privacy policies and practices. We note that we 
identify minimum best practices for third-party privacy policies and 
practices below. This notification, would enable a patient to pause, 
consider this educational information provided by the actor, and decide 
whether to proceed with approving the

[[Page 25816]]

app to receive their EHI or to stop mid-way in the process to do more 
research into the app or to pick a different app, in which case the 
patient would not approve the original app in question to receive their 
EHI. Understandably, in order for an actor to execute this kind of 
notification or attention grabbing process and to attribute certain app 
developer practices to educational insights provided to a patient in 
real-time, certain information may need to be collected by an actor in 
advance. Such information may include whether the app developer has a 
privacy notice, policies, or practices. Actors providing patients with 
educational information (a notice) could help patients better 
understand how their EHI may be used by the app and the third-party 
developer.
    While the ONC 2018 MPN is a voluntary, openly available resource 
designed to help developers clearly convey comprehensive information 
about their privacy and security policies and practices to their users, 
the privacy notice and practices of a third-party developer's app or 
personal health record does not have to be identical to the ONC's 2018 
MPN. There may be other privacy policies and practices (including 
security practices) of third-party developers and apps that accomplish 
the same goals and even provide more information relevant to a user. At 
a minimum, as it relates to the above, all third-party privacy policies 
and practices should adhere to the following:
    (1) The privacy policy is made publicly accessible at all times, 
including updated versions;
    (2) The privacy policy is shared with all individuals that use the 
technology prior to the technology's receipt of EHI from an actor;
    (3) The privacy policy is written in plain language and in a manner 
calculated to inform the individual who uses the technology;
    (4) The privacy policy includes a statement of whether and how the 
individual's EHI may be accessed, exchanged, or used by any other 
person or other entity, including whether the individual's EHI may be 
sold at any time (including in the future); and
    (5) The privacy policy includes a requirement for express consent 
from the individual before the individual's EHI is accessed, exchanged, 
or used, including receiving the individual's express consent before 
the individual's EHI is sold (other than disclosures required by law or 
disclosures necessary in connection with the sale of the application or 
a similar transaction).
    We note that the market may set different and more stringent 
expectations for third-party privacy notices and practices than the 
above minimum. As described above and in the examples below, an actor 
may provide information or notice to the individual whose EHI is 
requested from the actor that the privacy policy that applies to the 
technology used to make the request does or does not meet the minimum 
privacy policy notice and practices outlined above.
    Example 1: Providing education to an individual of a third-party 
app developer's privacy and security policies and practices through an 
automated attestation and warning process.
    An API User (third-party app developer) develops a software 
application (named ``App-Y'') and registers it with the Certified API 
Developer's (developer of certified health IT) authorization server. 
During the registration process, the Certified API Developer requests, 
as a business associate and on behalf of a HIPAA covered entity, that 
the API User attest that for App-Y, the API User follows the privacy 
policies and practices outlined above. Given the ``yes or no'' choice, 
the API User attests ``no.'' The Certified API Developer completes App-
Y's registration process and provides it with a client identifier. An 
individual seeks to use App-Y to obtain their EHI from the health care 
provider (covered entity) that is a customer of the Certified API 
Developer. The individual then opens App-Y on their smartphone and 
after authenticating themselves to their health care provider (covered 
entity), but prior to the app receiving the EHI from the health care 
provider, the patient is provided with an app authorization screen 
controlled by the health care provider.
    Using the certified API technology and the normal OAuth2 workflow 
the patient is asked by the health care provider via the app 
authorization screen whether they want to approve or reject App-Y's 
ability to receive their EHI via certified API technology. On the 
authorization screen, there is a ``warning'' from the health care 
provider that the application has not ``attested'' to having privacy 
policies and practices that adhere to the minimum policies and 
practices outlined above or to having other specified privacy and 
security policies. When presented with that warning, the patient has 
two choices: (1) Choose to ignore the warning and approve App-Y's 
ability to receive their EHI and App-Y receives the patient's PHI; or 
(2) reject App-Y's ability to receive their EHI, and the health care 
provider does not provide the patient's EHI to App-Y.
    Example 2: Patient sending EHI using certified health IT 
capabilities provided by health IT developer.
    An individual has made an appointment with a health care specialist 
for a second medical opinion. During the initial scheduling, the 
administrative staff requested that the individual bring all their 
prior health information to the specialist. The patient portal of the 
individual's primary care provider allows EHI to be transmitted to a 
third party using Direct protocol. The individual identifies a third-
party app that is able to receive EHI using Direct protocol and creates 
an account with the app as well as obtain/create a ``Direct address.'' 
During the account creation process with the app, the individual 
reviews the ``privacy policy'' for the app. The third-party app also 
sends the individual a copy of the privacy policy via email once the 
individual completes the account creation process.
    Subsequently, the individual logs into the primary care provider's 
portal to transmit her EHI to her direct address linked to her new 
account on the third-party app. Her provider uses certified health IT 
that is capable of sending EHI securely using Direct protocol to third-
party organizations (including apps) with which they have exchanged 
trust anchors. It turns out, the health care provider has established 
prior trust with the third-party app and is able to send EHI to the 
application. To note, this health care provider may offer education, 
including a warning (notice), to the patient, as discussed above, if 
the provider is being directed by the patient to transmit their EHI to 
a recipient that is unknown to the provider.
    Prior to sending the EHI, the portal provides a summary screen that 
provides the privacy policy ``warning'' about the third-party app. The 
patient reviews and accepts it. The provider's system/API technology 
sends EHI to her Direct address. The patient logs into her application 
and confirms that the EHI has been received.
    Comments. Commenters stated that, given the access to personal 
health information that patient-directed third-party apps are expected 
to have and the potential privacy risks they pose, a process should be 
implemented by the Federal Trade Commission (FTC) to vet apps for the 
adequacy of the consumer disclosures which should include the privacy 
and security of the information and secondary uses that should be 
permitted. A commenter suggested that the vetting process should be at 
the application and application developer

[[Page 25817]]

level, and that the results of such vetting process should be made 
public in the form of an application ``safe list.''
    Response. The privacy practices of developers of patient-facing 
health IT products and services are typically regulated by the Federal 
Trade Commission Act (FTC Act). The FTC Act prohibits unfair or 
deceptive acts or practices in or affecting commerce (15 U.S.C. 
45(a)(1)), but it does not prescribe specific privacy requirements. The 
FTC has authority to enforce the FTC Act's prohibition on deception, 
for example, by challenging deceptive statements made in privacy 
policies, user interfaces, FAQs, or other consumer-facing materials. 
The FTC could also, for example, challenge a particular use or 
disclosure of EHI as unfair if it causes or is likely to cause 
substantial injury to consumers that is not reasonably avoidable by 
consumers themselves and not outweighed by countervailing benefits to 
consumers or to competition (15 U.S.C. 45(n)). We will continue to work 
with our Federal partners, including the FTC, to assess education 
opportunities for consumers and app developers about the privacy and 
security of EHI collected, used, or received by health apps.
    Comments. A commenter recommended the development of a privacy 
framework regarding how health information should be shared and to 
empowering consumers; and it noted that it should be developed and 
matured in concert with the modernization of our nation's health IT 
infrastructure. They expressed that there are private sector and 
public-private examples of models that we should look to from both 
health care and other industries. They believed that the Proposed Rule 
does not, however, fully address patient and consumer privacy 
protections. They recommended that the Center for Medicare and Medicaid 
Services and ONC should work together with relevant agencies and 
departments and private-sector colleagues to develop a companion 
consumer privacy framework.
    Response. We are aware of various industry initiatives regarding a 
``privacy framework.'' We have previously published the Nationwide 
Privacy and Security Framework for Electronic Exchange of Individually 
Identifiable Health Information; \130\ produced, in cooperation with 
the FTC, FDA, and OCR, the Mobile Health Apps Interactive Tool; \131\ 
and more recently published and developed the Privacy and Security 
Framework for Patient-Centered Outcomes Research (PCOR). This project 
developed tools and resources that address the many different types of 
data that can be used to conduct patient-centered outcomes research. 
The framework consists of two initiatives: The Legal and Ethical 
Architecture for PCOR Data (Architecture), which guides readers through 
the responsible use and protection of electronic health data for PCOR 
and The Patient Choice Technical Project which harmonized existing 
technical mechanisms to enable interoperable exchange of patient 
consent for basic and granular choice for research and treatment, 
payment, and health care operations. This project, which remains 
active, also identifies, tests and validates technical standards that 
support an individual's consent preferences.\132\
---------------------------------------------------------------------------

    \130\ https://www.healthit.gov/sites/default/files/nationwide-ps-framework-5.pdf.
    \131\ https://www.ftc.gov/tips-advice/business-center/guidance/mobile-health-apps-interactive-tool.
    \132\ See https://www.healthit.gov/topic/scientific-initiatives/pcor/privacy-and-security-framework-pcor-psp.
_____________________________________-

    We will continue to monitor how individuals are educated about 
potential privacy and security risks of third-party apps and will 
continue to work with HHS OCR and industry stakeholders to further 
educate individuals as part of our implementation of section 4006 of 
the Cures Act. In this regard, we also encourage individuals to review 
consumer education materials related to protecting their EHI on our 
website at healthit.gov (``What You Can do to Protection Your Health 
Information''--https://www.healthit.gov/topic/privacy-security/what-you-can-do-protect-your-health-information; and ``Health IT: How to 
Keep Your Health Information Privacy and Secure: Fact Sheet''--https://www.healthit.gov/sites/default/files/how_to_keep_your_health_information_private_and_secure.pdf).
    Comments. Commenters expressed concerns that if patients access 
their health data--some of which could contain family history and could 
be sensitive--through a smartphone, they should have a clear 
understanding of the potential uses of that data by third-party app 
suppliers.
    Response. Under the HIPAA Privacy Rule, when a covered health care 
provider, in the course of treating an individual, collects or 
otherwise obtains an individual's family medical history, this 
information may become part of the individual's medical record (45 CFR 
164.501 (definition of ``Designated Record Set''). Thus, if the family 
medical history becomes part of the medical record, the individual/
patient may exercise the rights under the HIPAA Privacy Rule, 45 CFR 
164.524, to this information in the same fashion as any other 
information in the medical record, including the right of access. As 
discussed above, actors may educate patients of the risks related to 
providing other persons and entities with their EHI, including the 
various the types of EHI (e.g., family health history) that will be 
provided to an entity (e.g., third-party app) at the patient's request.
iv. Rent-Seeking and Other Opportunistic Pricing Practices
    Certain practices that artificially increase the cost and expense 
associated with accessing, exchanging, and using EHI may implicate the 
information blocking provision. We emphasized in the Proposed Rule that 
such practices are plainly contrary to the information blocking 
provision and the concerns that motivated its enactment.
    We explained that an actor may seek to extract profits or capture 
revenue streams that would be unobtainable without control of a 
technology or other interoperability elements that are necessary to 
enable or facilitate access, exchange, or use of EHI. Most EHI is 
currently stored in EHRs and other source systems that use proprietary 
data models or formats; this puts EHR developers (and other actors that 
control data models or standards) in a unique position to block access 
to (including the export and portability of) EHI for use in competing 
systems or applications or to charge rents for access to the basic 
technical information needed to accomplish the access, exchange, or use 
of EHI for these purposes. We emphasized that these information 
blocking concerns may be compounded to the extent that EHR developers 
do not disclose, in advance, the fees they will charge for interfaces, 
data export, data portability, and other interoperability-related 
services (see 80 FR 62719 through 62725; 80 FR 16880 through 16881). We 
noted that these concerns are not limited to EHR developers. Other 
actors who exercise substantial control over EHI or essential 
interoperability elements may engage in analogous behaviors that would 
implicate the information blocking provision (84 FR 7520).
    To illustrate, we provided a list of non-exhaustive examples that 
reflected some of the more common types of rent-seeking and 
opportunistic behaviors of which we were aware and that are likely to 
interfere with access, exchange, or use of EHI. Those examples are 
still applicable and we encourage readers to

[[Page 25818]]

review the examples in the Proposed Rule (84 FR 7520 and 7521).
    The information blocking provision may be implicated by these and 
other practices by which an actor profits from its unreasonable control 
over EHI or interoperability elements without adding any efficiency to 
the health care system or serving any other pro-competitive purpose. 
However, we stressed that the reach of the information blocking 
provision is not limited to these types of practices. We interpreted 
the definition of information blocking to encompass any fee that 
materially discourages or otherwise imposes a material impediment to 
access, exchange, or use of EHI. We used the term ``fee'' in the 
broadest possible sense to refer to any present or future obligation to 
pay money or provide any other thing of value and proposed to include 
this definition in Sec.  171.102. We noted that this scope may be 
broader than necessary to address genuine information blocking concerns 
and could unnecessarily diminish investment and innovation in 
interoperable technologies and services. Therefore, as further 
explained in section VIII.D, we proposed to create an exception that, 
subject to certain conditions, would permit the recovery of costs that 
are reasonably incurred to provide access, exchange, and use of EHI (84 
FR 7521).
    Comments. We did not receive comments specifically on our proposed 
definition of ``fee.''
    Response. We have finalized the definition in Sec.  171.102 as 
proposed.
    Comments. A few commenters requested additional examples and 
clarity on the types of rent-seeking and opportunistic pricing 
practices that would be likely to implicate the information blocking 
provision.
    Response. We refer readers to our discussion of the Fees Exception 
(section VIII.D.2.b.) for additional examples, as well as for a 
detailed discussion of fees that may and may not be charged under this 
exception.
v. Non-Standard Implementation Practices
    We explained in the Proposed Rule that section 3022(a)(2)(B) of the 
PHSA states that information blocking may include implementing health 
IT in non-standard ways that substantially increase the complexity or 
burden of accessing, exchanging, or using EHI. In general, this type of 
interference is likely to occur when, despite the availability of 
generally accepted technical, policy, or other approaches that are 
suitable for achieving a particular implementation objective, an actor 
does not implement the standard, does not implement updates to the 
standard, or implements the standard in a way that materially deviates 
from its formal specifications. We noted that these practices lead to 
unnecessary complexity and burden, such as the additional cost and 
effort required to implement and maintain ``point-to-point'' 
connections, custom-built interfaces, and one-off trust agreements.
    While each case will necessarily depend on its individual facts, 
and while we recognized that the development and adoption of standards 
across the health IT industry is an ongoing process, we explained that 
the information blocking provision would be implicated in at least two 
distinct sets of circumstances. First, we stated that information 
blocking may arise where an actor chooses not to adopt, or to 
materially deviate from, relevant standards, implementation 
specifications, and certification criteria adopted by the Secretary 
under section 3004 of the PHSA. Second, even where no federally adopted 
or identified standard exists, if a particular implementation approach 
has been broadly adopted in a relevant industry segment, deviations 
from that approach would be suspect unless strictly necessary to 
achieve substantial efficiencies.
    To further illustrate these types of practices that may implicate 
the information blocking provision, we provided a list of non-
exhaustive examples of conduct that would be likely to interfere with 
access, exchange, or use of EHI. We have chosen not to include those 
examples in this final rule, but emphasize that they are still 
applicable and encourage readers to review the examples in the Proposed 
Rule (84 FR 7521).
    We explained that even where no standards exist for a particular 
purpose, actors should not design or implement health IT in non-
standard ways that unnecessarily increase the costs, complexity, and 
other burdens of accessing, exchanging, or using EHI. We also noted 
that we were aware that some actors attribute certain non-standard 
implementations on legacy systems that the actor did not themselves 
design but which have to be integrated into the actor's health IT. We 
noted that such instances will be considered on a case-by-case basis.
    Comments. A few commenters requested additional clarity on when 
non-standard based interoperability is permissible. Some commenters 
urged ONC to be careful and flexible in its interpretation of this 
information blocking practice given the complexities of health IT 
implementation, such as implementing newly adopted standards or 
requirements. One commenter highlighted the importance of being able to 
retain certain types of optionality, especially for specialized use 
cases. Other commenters expressed concern that considering non-standard 
implementation practices as likely to implicate the information 
blocking provision could have the unintended consequence of stymying 
innovative or novel technologies used in information exchange.
    Response. We appreciate the commenters' suggestions. We emphasize 
that the problematic nature of non-standard design and implementation 
choices was identified by Congress in section 3022(a)(2)(B) of the 
PHSA, which states that information blocking may include implementing 
health IT in non-standard ways that are likely to substantially 
increase the complexity or burden of accessing, exchanging, or using 
EHI. We continue to be concerned that these practices will lead to 
unnecessary complexity and burden related to the access, exchange, or 
use of EHI, and depending on the circumstances, we maintain that such 
practices would be likely to interfere with access, exchange, or use of 
EHI. We refer readers to the discussion of this topic in the Fees 
Exception (section VIII.D.2.b).
    We also agree, however, that we must give each case careful 
consideration and assess the individual facts and circumstances to 
determine whether such practices would be likely to interfere with 
access, exchange, or use of EHI.
7. Applicability of Exceptions
a. Reasonable and Necessary Activities
    Section 3022(a)(3) of the PHSA requires the Secretary to identify, 
through notice and comment rulemaking, reasonable and necessary 
activities that do not constitute information blocking for purposes of 
the definition in section 3022(a)(1). Section 3022(a)(1) of the PHSA 
defines information blocking by referring to practices likely to 
interfere with, prevent or materially discourage access, exchange or 
use of electronic health information. Based on this terminology used in 
the PHSA, we noted that conduct that implicates the information 
blocking provision and that does not fall within one of the exceptions 
or does not meet all conditions for an exception, would be considered a 
``practice.'' Conduct that falls within an exception and meets all the 
applicable conditions for that exception would be considered

[[Page 25819]]

an ``activity.'' We noted that the challenge with this distinction is 
that when examining conduct that is the subject of an information 
blocking claim--an actor's actions that are likely to interfere with 
access, exchange, or use of EHI--it can be illusory to distinguish, on 
its face, conduct that is a practice and conduct that is an activity. 
Indeed, conduct that implicates the information blocking provision but 
falls within an exception could nonetheless be considered information 
blocking if the actor has not satisfied the conditions applicable to 
that exception.
    Acknowledging the terminology used in the PHSA, we proposed to 
define ``practice'' in Sec.  171.102 as one or more related acts or 
omissions by an actor.
    We also proposed to use the term ``practice'' throughout the 
Proposed Rule when we described conduct that is likely to interfere 
with, prevent, or materially discourage the access, exchange, or use of 
EHI, and clarify when describing the conduct at issue whether it is a 
practice that is information blocking, a practice that implicates the 
information blocking provision, or a practice that is reasonable and 
necessary and not information blocking (84 FR 7522). We stated that 
adopting the terminology of ``activity'' to describe conduct that may 
or may not be information blocking would be confusing and obfuscate our 
intent in certain circumstances. Consistent with this approach, when 
describing the exceptions in the final rule, we describe practices 
that, if all the applicable conditions are met, are reasonable and 
necessary and not information blocking.
    Comments. We received no comments specifically on the distinction 
between ``activities'' and ``practices'' and our proposed definition 
and use of the term ``practice.''
    Response. We have finalized the definition of ``practice'' in Sec.  
171.102 as ``an act or omission by an actor.'' This definition is a 
modification of the proposed definition, which was ``one or more 
related acts or omissions by an actor.'' We finalized this definition 
of ``practice'' in order to clarify that a practice need only be a 
single act or omission. This modification does not substantively change 
the proposed definition, as we included in the proposed definition that 
a ``practice'' could be one act or omission.
    We have finalized the use of the term ``practice,'' rather than the 
term ``activity,'' to describe conduct that is likely to interfere 
with, prevent or materially discourage the access, exchange, or use of 
EHI. We have also finalized our approach that when identifying 
exceptions, we describe practices that, if all the applicable 
conditions are met, are reasonable and necessary and not information 
blocking.
b. Treatment of Different Types of Actors
    We explained in the Proposed Rule that the proposed exceptions 
would apply to health care providers, health IT developers of certified 
health IT, HIEs, and HINs who engage in certain practices covered by an 
exception, provided that all applicable conditions of the exception are 
satisfied at all relevant times and for each practice for which the 
exception is sought. We noted that the exceptions are generally 
applicable to all actors. However, in some instances, we proposed 
conditions within an exception that apply to a particular type of 
actor.
    Comments. Several commenters agreed that the exceptions should 
apply to all actors. A few commenters requested that ONC identify 
exceptions that apply to all actors and identify exceptions that only 
apply to select actors.
    Response. We appreciate the support for our approach to the 
exceptions, as well as the suggestion to restructure the exceptions. We 
continue to believe that the clearest and most equitable approach to 
the exceptions is to make all of the exceptions apply to all actors, as 
proposed. We have addressed the commenters' concerns by creating 
conditions within certain exceptions that apply to one or a subset of 
actors, as applicable.
c. Establishing That Practices Meet the Conditions of an Exception
    We proposed that, in the event of an investigation of an 
information blocking complaint, an actor must demonstrate that an 
exception is applicable and that the actor met all relevant conditions 
of the exception at all relevant times and for each practice for which 
the exception is sought (84 FR 7522). We considered this allocation of 
proof to be a substantive condition of the proposed exceptions. As a 
practical matter, we proposed that actors are in the best position to 
demonstrate compliance with the conditions of the exceptions and to 
produce the detailed evidence necessary to demonstrate that compliance. 
We requested comment about the types of documentation and/or 
standardized methods that an actor may use to demonstrate compliance 
with the exception conditions.
    Comments. Many commenters requested clarification regarding the 
type and amount of documentation required to demonstrate that they have 
met an exception. In particular, many commenters noted that meeting the 
exceptions will substantially increase documentation burden and other 
administrative costs for actors. Commenters also noted that 
organizations may need to update, develop and/or implement policies and 
procedures focused on documenting compliance with information blocking 
exceptions. Many commenters requested that ONC develop and provide 
examples, templates, and guidance on the type of documentation that 
would be acceptable to support the conditions for each information 
blocking exception. Several commenters noted that the supporting 
documentation should clearly demonstrate why the actor qualifies for 
the exception, why the exception is required, and how all conditions of 
the exception are fulfilled. One commenter asked that we provide 
guidance on the appropriate storage method for this documentation, as 
this information may not be appropriate for the clinical record.
    Response. We thank commenters for these thoughtful comments and 
suggestions. We have tailored the exceptions and provided significant 
detail within each exception to clearly explain what an actor must do 
to meet each exception. For each exception, we have proposed and 
finalized conditions that we believe can be consistently applied across 
a range of actors and practices and also further the goals of the 
information blocking provision. For some exceptions, this includes a 
writing or documentation requirement to demonstrate that the practice 
precisely meets all of the conditions to afford an actor the enhanced 
assurance an exception offers. Many of these conditions are related to 
other existing regulatory requirements that have similar documentation 
standards. For example, an actor's practice may meet the Security 
Exception at Sec.  171.203 if it is consistent with an organizational 
security policy and that policy meets several requirements. We expect 
that many actors have existing organizational security policies based 
on the ``Policy and procedures and documentation requirements'' in the 
HIPAA Security Rule at 45 CFR 164.316. Consequently, the burden 
associated with meeting the documentation requirement in the Security 
Exception should be less if actors are already complying with the HIPAA 
Security Rule.
    We encourage actors to voluntarily comply with an exception so that 
their practices do not meet the definition of information blocking and 
are not subject

[[Page 25820]]

to information blocking enforcement. However, failure to meet an 
exception does not necessarily mean a practice meets the definition of 
information blocking. If subject to an investigation, each practice 
that implicates the information blocking provision and does not meet an 
exception would be analyzed on a case-by-case basis to evaluate, for 
example, whether it rises to the level of an interference, and whether 
the actor acted with the requisite intent.

D. Exceptions to the Information Blocking Definition

    We proposed to establish seven exceptions to the information 
blocking provision. The exceptions would apply to certain practices 
that may technically meet the definition of information blocking but 
that are reasonable and necessary to further the underlying public 
policies of the information blocking provision. We appreciate that most 
actors will want to meet an exception to guarantee that their practice 
or practices do not meet the definition of information blocking and be 
subject to enforcement. The statute defines information blocking 
broadly and in a manner that allows for careful consideration of 
relevant facts and circumstances in individual cases, which includes 
analysis of an actor's intent and whether it meets the requisite 
knowledge standard.
    The proposed exceptions were based on three related policy 
considerations. First, each exception was limited to certain activities 
that clearly advance the aims of the information blocking provision. 
These reasonable and necessary activities included providing 
appropriate protections to prevent harm to patients and others; 
promoting the privacy and security of EHI; promoting competition and 
innovation in health IT and its use to provide health care services to 
consumers, and to develop more efficient means of health care delivery; 
and allowing system downtime to implement upgrades, repairs, and other 
changes to health IT. Second, each proposed exception addressed a 
significant risk that regulated actors will not engage in these 
beneficial activities because of uncertainty concerning the breadth or 
applicability of the information blocking provision. Finally, each 
exception was subject to strict conditions to ensure that it was 
limited to activities that are reasonable and necessary.
    We explained that the first three exceptions extended to certain 
activities that are reasonable and necessary to prevent harm to 
patients and others; promote the privacy of EHI; and promote the 
security of EHI, subject to strict conditions to prevent the exceptions 
from being misused. We discussed that without these exceptions, actors 
may be reluctant to engage in the reasonable and necessary activities 
and that this could erode trust in the health IT ecosystem and 
undermine efforts to provide access and facilitate the exchange and use 
of EHI for important purposes. We stressed that such a result would be 
contrary to the purpose of the information blocking provision and the 
broader policies of the Cures Act.
    We explained that the next three exceptions addressed activities 
that are reasonable and necessary to promote competition and consumer 
welfare. First, we proposed to permit the recovery of certain types of 
reasonable costs incurred to provide technology and services that 
enable access to EHI and facilitate the exchange and use of that 
information, provided certain conditions are met. Second, we proposed 
to permit an actor to decline to provide access, exchange, or use of 
EHI in a manner that is infeasible, subject to a duty to provide a 
reasonable alternative. And third, we proposed an exception that would 
permit an actor to license interoperability elements on reasonable and 
non-discriminatory terms. We emphasized that the exceptions would be 
subject to strict conditions to ensure that they do not extend 
protection to practices that raise information blocking concerns.
    The last exception recognized that it may be reasonable and 
necessary for actors to make health IT temporarily unavailable for the 
benefit of the overall performance of health IT. This exception would 
permit an actor to make the operation of health IT unavailable to 
implement upgrades, repairs, and other changes.
    As context for the proposed exceptions, we noted that addressing 
information blocking is critical for promoting competition and 
innovation in health IT and for the delivery of health care services to 
consumers. We noted that the information blocking provision itself 
expressly addresses practices that impede innovation and advancement in 
health information access, exchange, and use, including care delivery 
enabled by health IT (section 3022(a)(2)(C)(ii) of the PHSA). We also 
noted that health IT developers of certified health IT, HIEs, HINs, 
and, in some instances, health care providers, may exploit their 
control over interoperability elements to create barriers to entry for 
competing technologies and services that offer greater value for health 
IT customers and users, provide new or improved capabilities, and 
enable more robust access, exchange, and use of EHI.\133\ More than 
this, we emphasized that information blocking may harm competition not 
just in health IT markets, but also in markets for health care 
services.\134\ Dominant providers in these markets may leverage their 
control over technology to limit patient mobility and choice.\135\ They 
may also pressure independent providers to adopt expensive, hospital-
centric technologies that do not suit their workflows, limit their 
ability to share information with unaffiliated providers, and make it 
difficult to adopt or use alternative technologies that could offer 
greater efficiency and other benefits.\136\ The technological 
dependence resulting from these practices can be a barrier to entry by 
would-be competitors. It can also make independent providers vulnerable 
to acquisition or induce them into exclusive arrangements that enhance 
the market power of incumbent providers while preventing the formation 
of clinically-integrated products and networks that offer more choice 
and better value to consumers and purchasers of health care services.
---------------------------------------------------------------------------

    \133\ See also Martin Gaynor, Farzad Mostashari, and Paul B. 
Ginsberg, Making Health Care Markets Work: Competition Policy for 
Health Care, 16-17 (Apr. 2017), available at https://heinz.cmu.edu/news/news-detail/index.aspx?nid=3930.
    \134\ See, e.g., Keynote Address of FTC Chairwoman Edith 
Ramirez, Antitrust in Healthcare Conference Arlington, VA (May 12, 
2016), available at https://www.ftc.gov/system/files/documents/public_statements/950143/160519antitrusthealthcarekeynote.pdf.
    \135\ See, e.g., Martin Gaynor, Farzad Mostashari, and Paul B. 
Ginsberg, Making Health Care Markets Work: Competition Policy for 
Health Care, 16-17 (Apr. 2017), available at https://heinz.cmu.edu/news/news-detail/index.aspx?nid=3930.
    \136\ See, e.g., Healthcare Research Firm Toughens Survey 
Standards as More CIOs Reap the Profits of Reselling Vendor 
Software, Black Book, available at https://www.prweb.com/releases/2015/02/prweb12530856.htm; Arthur Allen, Connecticut Law Bans EHR-
linked Information Blocking, Politico.com (Oct. 29, 2015).
---------------------------------------------------------------------------

    We noted in the Proposed Rule that section 3022(a)(5) of the PHSA 
provides that the Secretary may consult with the Federal Trade 
Commission (FTC) in defining practices that do not constitute 
information blocking because they are necessary to promote competition 
and consumer welfare. We expressed appreciation for the expertise and 
informal technical assistance of FTC staff, which we took into 
consideration in developing the exceptions for recovering costs 
reasonably incurred, responding to requests that are infeasible, and 
licensing of interoperability elements on reasonable and non-
discriminatory terms. We noted that the language in the Cures Act 
regarding information blocking is substantively and substantially 
different

[[Page 25821]]

from the language and goals in the antitrust laws enforced by the FTC. 
We explained that we view the Cures Act as addressing conduct that may 
be considered permissible under the antitrust laws. On this basis, the 
Proposed Rule required that actors who control interoperability 
elements cooperate with individuals and entities that require those 
elements for the purpose of developing, disseminating, and enabling 
technologies and services that can interoperate with the actor's 
technology.
    We emphasized that ONC took this approach because we view patients 
as having an overwhelming interest in EHI about themselves. As such, 
access to EHI, and the EHI itself, should not be traded or sold by 
those actors who are custodians of EHI or who control its access, 
exchange, or use. We emphasized that such actors should not be able to 
charge fees for providing electronic access, exchange, or use of 
patients' EHI. We explained that the information blocking provision 
prohibits actors from interfering with the access, exchange, or use of 
EHI unless they are required to do so under an existing law or are 
covered by one of the exceptions detailed in this preamble. In 
addition, we explained that any remedy sought or action taken by HHS 
under the information blocking provision would be independent of the 
antitrust laws and would not prevent FTC or DOJ from taking action with 
regard to the same actor or conduct.
    We proposed to include a provision in Sec.  171.200 that addresses 
the availability and effect of exceptions.
    We requested comment on the seven proposed exceptions, including 
whether they will achieve our stated policy goals.
    Comments. We received comments regarding each of the proposed 
exceptions.
    Response. We have responded to the comments regarding each 
exception in the preamble discussions for each exception. Overall, we 
have made modifications to the structure and scope of the proposed 
exceptions.
    In this final rule, we have restructured the proposed exceptions 
(proposed in Sec. Sec.  171.201-207) and have added another exception 
for clarity. In addition, we have divided the exceptions into two 
categories: (1) Exceptions that involve not fulfilling requests to 
access, exchange, or use EHI, which are finalized in Sec. Sec.  
171.201-205; and (2) exceptions that involve procedures for fulfilling 
requests to access, exchange, or use EHI, which are finalized in 
Sec. Sec.  171.301-303. We also changed the titles of the exceptions to 
questions for additional clarity. We believe this new structure will 
help actors better understand our expectations of them and enhance 
transparency around the exceptions.
    We note that we use the term ``fulfill'' throughout the exceptions 
in the context of an actor ``fulfilling'' a request to access, 
exchange, or use EHI. This term is intended to reflect not just a 
response to a request to access, exchange, or use EHI, but also making 
the EHI available for the requested access, exchange, or use.
    We have finalized the seven exceptions with modifications discussed 
below. Based on requests for comment we included in the Proposed Rule 
regarding the scope of the EHI definition (84 FR 7513) and the 
Infeasibility Exception (84 FR 7542 through 7544), we have also 
established a new exception in Sec.  171.301 (referred to as the 
Content and Manner Exception) under section 3022(a)(3) of the PHSA as a 
means to identify reasonable and necessary activities that do not 
constitute information blocking. We discuss the details of the new 
Content and Manner Exception in section VIII.D.2.a of this preamble.
    We appreciate the FTC's comments on the Proposed Rule and the 
expertise and informal technical assistance provided by FTC staff for 
this final rule, which we took into consideration throughout our 
development of the final rule, including as it relates to the 
definitions of various terms in the final rule (e.g., the definitions 
of ``electronic health information'' and ``health information network'' 
(discussed above)) and the exceptions (e.g., the Infeasibility 
Exception, Fees Exception, and Licensing Exception; as well as the 
establishing of the new Content and Manner Exception).
    Comments. We did not receive any comments on the provision in Sec.  
171.200.
    Response. We have finalized Sec.  171.200 as proposed and have 
included an identical provision in Sec.  171.300 that is applicable to 
Part C. This addition was necessary based on the new structure of the 
exceptions discussed above.
    1. Exceptions that involve not fulfilling requests to access, 
exchange, or use EHI
    a. Preventing Harm Exception -- When will an actor's practice that 
is likely to interfere with the access, exchange, or use of electronic 
health information in order to prevent harm not be considered 
information blocking?
    We proposed to establish an exception to the information blocking 
provision in Sec.  171.201 that would apply to certain practices that 
are reasonable and necessary to prevent harm to a patient or another 
person. As discussed in the Proposed Rule's preamble (84 FR 7523 and 
7524), this exception is intended to allow for the protection of 
patients and other particular persons against substantial risks of harm 
otherwise arising from the access, exchange, or use of EHI in defined 
circumstances. Strict conditions were proposed to prevent this 
exception from being misused.
    As explained in the Proposed Rule, we use the term ``patient'' to 
denote the context in which the threat of harm arises (84 FR 7523). 
That is, this exception has been designed to recognize practices taken 
for the benefit of recipients of health care -- those individuals whose 
EHI is at issue -- and other persons whose information may be recorded 
in that EHI or who may be at risk of harm because of the access, use, 
or exchange of the EHI. This use of the term ``patient'' in the 
Proposed Rule did not imply that practices to which the exception is 
applicable could be implemented only by the licensed health 
professionals with a clinician-patient relationship to the person whose 
EHI is affected by the practices.
    This exception was proposed to apply to practices when the actor 
engaging in a practice has a reasonable belief that the practice will 
directly and substantially reduce a risk of harm to the patient, and/or 
other particular individuals, that would otherwise arise from the 
particular access, exchange, or use of EHI affected by the practices. 
We proposed that actors including but not limited to health care 
providers would, consistent with conditions of the exception applicable 
to the circumstances in which the practices are used, be able to engage 
in practices recognized under this exception without the actor needing 
to have a clinician-patient relationship with any of the individuals at 
risk of harm.
    Comments. Of more than ninety comment submissions specifically 
referencing the Preventing Harm Exception, half expressed overarching 
or general support for the exception. None of the comments specifically 
referencing this exception expressed opposition to the exception. Some 
commenters advocated broadening certain aspects of the proposed 
exception, as discussed in more detail below. Several other commenters 
expressed support for a relatively narrow exception, and a few of these 
commenters recommended that once the final rule is effective ONC should 
engage in monitoring to ensure the exception is not abused in practice. 
Many commenters requested

[[Page 25822]]

clarification on specific points, or expressed concerns or suggested 
modifications to particular aspects of the exception, as will be 
discussed in more detail below.
    Response. We appreciate the many thoughtful comments on the value 
of this exception, particular aspects of the proposed exception, and 
areas where we could streamline how we express the policy so it is 
easier to understand. Considering all of the comments received, we have 
decided to finalize the exception largely as proposed, with 
modifications to better align with HIPAA Rules as discussed below and 
to make the regulation text more easily understood. These revisions 
include modification of the title of Sec.  171.201, from ``Exception--
Preventing Harm'' (84 FR 7602) to ``Preventing Harm Exception -- When 
will an actor's practice that is likely to interfere with the access, 
exchange, or use of electronic health information in order to prevent 
harm not be considered information blocking?'' Throughout this 
preamble, we use ``Preventing Harm Exception'' as a short title for 
ease of reference to the exception that has been finalized in Sec.  
171.201.
    Comments. Several comments suggested broadening the scope of the 
exception to allow a broader array of actors to decide what might pose 
a risk of harm to a patient.
    Response. The finalized exception is, as we proposed it would be, 
available to any actor defined in Sec.  171.102, provided that the 
actor's use of a practice for purposes of harm prevention meets the 
conditions in Sec.  171.201. Only where practices are applied to a 
specific patient's EHI and based upon a determination of a risk of harm 
by a licensed health care professional in the exercise of professional 
judgment does this exception explicitly require the determination to 
have been made by a particular subset of actors within the definitions 
in Sec.  171.102. In order to meet the risk of harm condition based on 
an individualized determination consistent with Sec.  171.201(c)(1), 
the licensed health care professional who made the determination must 
have done so in context of a current or prior clinician-patient 
relationship with the patient whose EHI is affected by the 
determination.\137\ However, other actors -- such as other health care 
providers treating the same patient, or an HIE/HIN supporting access, 
exchange, or use of the patient's EHI -- could rely on such a 
determination of a risk of harm. The actor's knowledge of a licensed 
health care professional's individualized determination (consistent 
with Sec.  171.201(c)(1)) that access, exchange, or use posed a risk of 
a harm of a type consistent with Sec.  171.201(d)(1), (2), or (3) (as 
applicable) could factor into a determination based on facts and 
circumstances known or reasonably believed by the actor (consistent 
with the condition finalized Sec.  171.201(f)(2)).
---------------------------------------------------------------------------

    \137\ For purposes of this exception, we interpret ``clinician-
patient relationship'' to include any therapeutic or relationship 
where the licensed health care professional has or at some point had 
some clinical responsibility for or to the patient within the 
professional's scope of practice. Thus, a clinician-patient 
relationship on which a qualifying individualized determination of 
risk of harm could be one of substantial duration over time or 
formed in the course of the first or only occasion on which the 
clinician furnishes or furnished professional services to the 
patient in any setting, including but not limited to telehealth.
---------------------------------------------------------------------------

    An actor could also implement practices based on knowledge of an 
individualized determination of risk (Sec.  171.201(c)(1)) of harm of a 
type consistent with Sec.  171.201(d)(1), (2), or (3) as applicable and 
based on an organizational policy (consistent with the condition 
finalized Sec.  171.201(f)(1)). Thus, the exception is broad enough to 
cover all actors implementing practices that meet its conditions. We 
are finalizing this aspect of the exception as proposed, with 
clarifications to the regulation text to make it easier to understand 
what the specific conditions of the Preventing Harm Exception are and 
how they relate to one another.
    Comments. A large number of commenters requested additional 
guidance in this final rule preamble or through other avenues. For 
example, some commenters requested sub-regulatory guidance and 
educational resource materials to further illustrate and help actors 
understand how the Preventing Harm Exception might apply or what it 
might require without a stakeholder needing to raise particular 
questions or hypothetical fact patterns.
    Response. With the revisions we have made to this exception, we do 
not believe sub-regulatory guidance is necessary for actors who wish to 
avail themselves of this exception to understand the Preventing Harm 
Exception, its conditions, or to conform their practices to the 
conditions. We have made revisions to the regulation text to provide 
enhanced clarity, such as separately expressing each of its substantive 
conditions and incorporating granular alignment to 45 CFR 164.524(a)(3) 
harm standards. This final rule preamble provides additional 
information and feedback through discussion of the particular questions 
and suggestions posed by various commenters and this preamble's 
statements of finalized policy. We will also provide, in connection to 
this final rule, educational resources such as infographics, fact 
sheets, webinars, and other forms of educational materials and 
outreach. We emphasize, however, that we believe the final rule clearly 
describes our information blocking policies, and these educational 
materials are intended only to educate stakeholders on our final 
policies established in the final rule.
    Comments. Several commenters questioned whether ``directly and 
substantially'' may be a more stringent standard than is necessary for 
the reduction of risk of harm to a patient or to another person. A 
number of commenters indicated it could be difficult for actors to know 
where to draw the line between direct and indirect reductions of risk 
of harm, given the potential for reasonable minds to disagree on the 
extent to which a risk arises directly, as opposed to indirectly, from 
the EHI access, exchange, or use affected by a practice. Several 
commenters recommended, as an alternative, that the condition be that 
the actor have a reasonable belief the practice is ``reasonably 
likely'' to reduce a risk of harm.
    Response. After considering comments received, we have finalized in 
Sec.  171.201(a) that the actor must hold a reasonable belief that the 
practice ``will substantially reduce'' a risk of harm to a patient or 
another natural person. In comparison to the regulation text of this 
exception in the Proposed Rule (84 FR 7602), we have removed 
``directly'' from the finalized text of Sec.  171.201(a). We believe 
omitting ``directly'' from the finalized condition obviates concerns 
about actors' ability to determine whether the practice directly 
reduces a risk of harm that could itself arise indirectly. We have 
retained ``substantially'' in the finalized Sec.  171.201(a) because we 
believe it is necessary to ensure this exception cannot be misused to 
justify practices that interfere with access, exchange, or use of EHI 
to achieve only a trivial or illusory reduction in risk of harm. By 
extension, we interpret a ``substantial reduction'' as necessarily 
implying that the risk intended to be reduced was itself substantial 
and not trivial or illusory.
    We note that the harm standard under Sec.  164.524(a)(3) of the 
HIPAA Rules includes that the access requested be ``reasonably likely'' 
to cause the type of harm described in the sub-paragraph applicable to 
a particular denial of access under Sec.  164.524(a)(3). As discussed 
in context of the finalized type of harm condition (Sec.  171.201(d)),

[[Page 25823]]

below, we have aligned the conditions of the Preventing Harm Exception 
finalized in Sec.  171.201 to use the same harm standards as Sec.  
164.524(a)(3) in circumstances where both apply and in circumstances 
where only Sec.  171.201 applies. In order to maintain alignment and 
consistency, we clarify that in circumstances where only Sec.  171.201 
applies, the risk of harm must also initially be at least ``reasonably 
likely,'' regardless of whether the risk of harm is consistent with 
subparagraph (1) or (2) of the type of risk condition finalized in 
Sec.  171.201(c). To satisfy the reasonable belief condition finalized 
in Sec.  171.201(a), the actor must reasonably believe their practices 
(that are likely to, or in fact do, interfere with otherwise 
permissible access, exchange, or use of EHI) will substantially reduce 
that likelihood of harm. Actors who are HIPAA covered entities or 
business associates have extensive experience in complying with Sec.  
164.524(a)(3). Therefore, we believe the belief standard finalized in 
Sec.  171.201(a), combined with reliance on the harm standards used in 
Sec.  164.524(a)(3), will address commenters' concerns about their 
ability to understand and apply the reasonable belief and type of harm 
conditions finalized under Sec.  171.201.
    Comments. A number of commenters advocated closer alignment with 
the HIPAA Privacy Rule. Some commenters expressed concerns about our 
ability to maintain such alignment without interruption if this rule 
were to be finalized prior to any applicable potential updates to the 
HIPAA Privacy Rule pursuant to a proposed rule that HHS had publicly 
expressed an aim to publish in 2019. Some commenters specifically 
questioned whether ``life or physical safety'' would remain the 
standard for the type of harm cognizable under the Privacy Rule for 
denying an individual's right to access their own information. One 
commenter stated they had heard the Privacy Rule harm standard might be 
broadened to recognize additional types of harm, such as emotional or 
psychological harm, in circumstances where the Privacy Rule would 
currently recognize only danger to life or physical safety. A number of 
comments stated that the requirement for the risk to be to life or 
physical safety for all circumstances where this exception would apply 
would conflict with current Privacy Rule provisions applicable to 
individual or proxy access to PHI. A number of commenters recommended 
we revise the conditions for practices to be recognized under the 
Preventing Harm Exception so that harm cognizable under the Privacy 
Rule under particular circumstances would also be cognizable under 
Sec.  171.201.
    Response. We understand commenters' concerns about inconsistency 
across this exception and the Privacy Rule. In particular, concerns 
that center on the fact that requiring in Sec.  171.201 that the risk 
must be to the ``life or physical safety'' of the patient or another 
person in all circumstances where Sec.  171.201 applies would have set 
a different harm standard than applies under Sec.  164.524(a)(3) in 
particular circumstances where both Sec. Sec.  171.201 and 
164.524(a)(3) apply. Specifically, where Sec.  164.524(a)(3)(ii) or 
(iii) apply, the reviewable grounds for denial of right of access 
include where a licensed health care professional has determined, in 
the exercise of professional judgment, that the access requested is 
likely to cause ``substantial harm.'' In contrast, a uniform 
application of the ``life or physical safety'' type of harm under Sec.  
171.201 would have applied the ``life or physical safety'' type of harm 
standard to practices that interfere with access, exchange, or use of 
EHI for purposes of Sec.  171.201 even where Sec.  164.524(a)(3)(ii) or 
(iii) would also apply and where Sec.  164.524(a)(3)(ii) or (iii) would 
apply the ``substantial harm'' standard.
    In response to comments, we have reviewed the potential for 
conflict between Sec.  171.201 requiring ``life or physical safety'' as 
the type of harm in circumstances where Sec.  164.524(a)(3(ii) or (iii) 
also apply. We have determined that for particular types of 
circumstances where both Sec. Sec.  171.201 and 164.524(a)(3) apply, 
the best approach is to apply under Sec.  171.201 the exact same harm 
standard that each specific sub-paragraph of Sec.  164.524(a)(3) 
applies in each of these types of circumstances. We believe that 
extending the application under Sec.  171.201 of the specific harm 
standards in Sec.  164.524(a)(3)(i) through (iii) to situations that 
are similar in significant respects to situations where each of these 
sub-paragraphs of Sec.  165.524(a)(3) would apply, but where Sec.  
164.524(a)(3) does not apply, provides consistency that simplifies 
compliance for actors subject to both 45 CFR part 171 and 45 CFR part 
164. Situations where Sec.  171.201 could apply but where Sec.  
164.524(a)(3) would not apply include, but are not limited to, those 
where the actor's practice is likely to interfere with an individual or 
their legal representative's access, exchange, or use of the 
individual's EHI but not to the extent of failing to provide access (as 
the term is used in context of Sec.  164.524) within the timeframe 
allowed under Sec.  164.524.
    To make the alignment between the Preventing Harm Exception and the 
Privacy Rule clear, the final regulation text at Sec.  171.201(d) 
cross-references the specific types of harm that would serve as grounds 
for denying an individual or their personal representative access to 
their PHI under the Privacy Rule (Sec.  164.524(a)(3)) in particular 
types of circumstances.\138\ By cross-referencing to Sec.  
164.524(a)(3), we align the regulations to streamline compliance for 
actors. We also believe this approach will allow that alignment to 
remain in place if changes were to be made to Sec.  164.524(a)(3) harm 
standards in the future.\139\ In particular types of circumstances 
where both Sec.  164.524(a)(3) and Sec.  171.201 apply, the 
subparagraphs of finalized Sec.  171.201(d) (the type of harm 
condition) cross-reference to the Sec.  164.524(a)(3)(i), (ii), and 
(iii) harm standard that applies under Sec.  171.201 in each of these 
types of circumstances. Moreover, where only Sec.  171.201 applies to a 
practice where the type of risk is consistent with Sec.  171.201(c)(1), 
the finalized subparagraphs of Sec.  171.201(d) cross-reference and 
apply the harm standard that Sec.  164.524(a)(3)(i), (ii), or (iii) 
would apply to denial of the individual's (Sec.  164.524) right of 
access to their own PHI, the individual or their representative's 
access to the PII of another person within that PHI, or the 
individual's personal representative's access to the individual's PHI.
---------------------------------------------------------------------------

    \138\ Meeting the harm standard is necessary but not alone 
sufficient for a practice to be recognized as reasonable and 
necessary under this exception; all other conditions of the 
exception must also be met.
    \139\ Alignment between part 171 subpart B and Sec.  
164.524(a)(1) and (2) is discussed in Section VIII.D.2. We also 
acknowledge that it is possible some types of revision to 45 CFR 
part 164 could necessitate modifications to 45 CFR part 171 in the 
future.
---------------------------------------------------------------------------

    One example of a particular circumstance in which both Sec.  
164.524(a)(3) and Sec.  171.201 would apply is where a health care 
provider (as defined in Sec.  171.102) that is also a HIPAA covered 
entity (as defined in Sec.  160.103) denies the patient's personal 
representative access to the patient's EHI based on a licensed health 
care professional's determination in the exercise of professional 
judgment (Sec.  171.201(c)(1)) that granting that personal 
representative access to the patient's EHI would pose a risk of 
substantial harm to the patient.\140\ In

[[Page 25824]]

this circumstance, the finalized Sec.  171.201(d)(1), which cross-
references the harm standard applicable under Sec.  165.524(a)(3)(iii), 
applies. In this example situation, the qualifying determination of 
risk of harm (Sec.  171.201(c)(1)) is that any access (or exchange, or 
use) of the EHI by the personal representative is reasonably likely to 
cause harm consistent with the standard established in Sec.  
164.524(a)(3)(iii), and thus the health care professional, or another 
HIPAA covered entity or business associate with knowledge of the 
determination, could also deny a request by the representative to 
access the individual's ePHI under Sec.  164.524(a)(iii).
---------------------------------------------------------------------------

    \140\ For purposes of how the Sec.  171.201 requirements and 
cross-references to Sec.  164.524 operate within this example, it 
makes no difference whether the health care provider acting on the 
individualized determination is the licensed health care 
professional who made the determination consistent with Sec.  
171.201(c)(1), another licensed health care professional, or another 
type of health care provider (such as a hospital or skilled nursing 
facility).
---------------------------------------------------------------------------

    Under Sec.  164.524(a)(iii), the harm must be a ``substantial 
harm'' to qualify for the denial of the patient's personal 
representative's request to access the patient's PHI. Similarly, both 
Sec.  171.201 and Sec.  164.524(a)(3) apply where an information 
blocking actor that is also a HIPAA covered entity, acting in reliance 
on a determination of risk of harm made by a licensed health care 
professional in the exercise of professional judgment, does not provide 
the patient or the patient's personal representative any access to 
information within the patient's EHI that references another person. In 
this type of circumstance, Sec.  171.201(d)(2) by cross-reference to 
Sec.  164.524(a)(3)(ii) applies the same ``substantial harm'' standard 
under Sec.  171.201 that applies to the actor's denying the patient or 
their representative access to that information under Sec.  
164.524(a)(3)(ii).\141\
---------------------------------------------------------------------------

    \141\ Note that the ``individual'' and ``access'' have different 
meanings under 45 CFR 164.524 from those in 45 CFR part 171. 
Regarding an individual's right of access under 45 CFR 164.524, the 
term ``access'' should be understood in that HIPAA Privacy Rule 
context.
---------------------------------------------------------------------------

    In Sec.  171.201(d)(1), (2), and (3), as finalized, we also apply 
the harm standards described in Sec.  164.524(a)(3)(i), (ii), or (iii) 
to particular types of circumstances where Sec.  164.524 does not 
apply, but that are similar with respect to whether it is the patient 
or their representative requesting access, and whether the access 
requested is to information within the patient's EHI that is another 
person's identifiable information. For example, Sec.  171.201(d)(3) 
applies the harm standard described in Sec.  164.524(a)(3)(i) where 
practices that are likely to interfere with a patient's access, 
exchange, or use \142\ of the patient's own EHI are implemented to 
substantially reduce a risk of harm arising from data that is known or 
reasonably suspected to be misidentified or mismatched, corrupt due to 
technical failure, or erroneous for another reason (Sec.  
171.201(c)(2)). Provided its conditions are met in full, the Preventing 
Harm Exception (Sec.  171.201) would apply to such practices as 
delaying access, exchange, or use, for the time necessary to correct 
the errors that would otherwise pose a risk of harm to the patient (or 
another person) that would be cognizable under Sec.  164.524(a)(3)(i) 
if Sec.  164.524(a)(3)(i) applied.\143\ Such delays are not explicitly 
addressed under Sec.  164.524(a)(3), which provides a maximum timeframe 
for disclosure of PHI to which patients have the right of access, and 
Sec.  164.524(a)(3) does not expressly contemplate risks of harm 
arising from data issues as would be consistent with Sec.  
171.201(c)(2). By contrast, Sec.  171.201 defines when a practice that 
is likely to, or does, interfere with the access, exchange, or use of 
EHI is excepted from the definition of information blocking in Sec.  
171.103 that applies to the actor engaged in the practice, and 
expressly applies where the actor can demonstrate a reasonable belief 
the practice will substantially reduce a risk of harm arising from data 
issues consistent with Sec.  171.201(c)(2).
---------------------------------------------------------------------------

    \142\ As the terms ``access,'' ``exchange,'' and ``use'' are 
defined in Sec.  171.102.
    \143\ Note, again, that ``access'' has a different meaning in 
subpart E of 45 CFR part 164 than it does in 45 CFR part 171.
---------------------------------------------------------------------------

    Because risks of harm arising from data that is known or reasonably 
suspected to be misidentified or mismatched, corrupt due to technical 
failure, or erroneous for another reason (Sec.  171.201(c)(2)) would 
apply equally to an individual's or their representative's or their 
health care provider's access, exchange, or use of the patient's EHI, 
Sec.  171.201(d)(4) applies the standard in Sec.  164.524(a)(3)(i) to 
all of these circumstances. Thus, as Sec.  164.524(a)(3)(i) stands at 
the time of publication of this final rule, the access, exchange, or 
use of the EHI affected by the practice must be reasonably likely to 
endanger the life or physical safety of the patient or another person 
were the practice not implemented. (Please see Table 3 for a crosswalk 
of the particular types of circumstances addressed by the subparagraphs 
under Sec.  171.201(d) to the Sec.  164.524 harm standard applicable to 
each type of circumstance.)
    The finalized regulatory text in Sec.  171.201 is revised from the 
Proposed Rule to reflect this more granular and comprehensive alignment 
of harm standards across the two regulatory provisions. We believe this 
alignment achieves the level of granular cross-reference necessary and 
that is preferable to selecting only one of these standards to apply in 
all types of circumstances under Sec.  171.201. We further note that 
the revised regulation text is consistent with our decision to 
completely align the EHI definition with the definition of ePHI within 
the designated record set.\144\
---------------------------------------------------------------------------

    \144\ See section VIII.C.3 of this preamble and the finalized 
definition of ``electronic health information'' in Sec.  171.102.
---------------------------------------------------------------------------

    Comments. A number of commenters advocated for expanding the 
definition of harm that is contemplated under this exception to 
encompass psychological and/or emotional harm in addition to risks to 
life or physical safety, including but not limited to expanding the 
concept of individualized determinations of risk of harm by health care 
professionals. A few commenters specifically advocated recognizing the 
potential for financial, reputational, or social/cultural harms. A 
number of other commenters expressed a concern that broadening the 
exception to address additional types of potential harm could risk its 
being overused to withhold information from patients where available 
evidence does not indicate there is a risk. One commenter reported 
having observed that some clinicians express a belief that mere 
disclosure of health data directly to patients without the clinician's 
professional interpretation will routinely cause harm, despite what the 
commenter described as existing evidence to the contrary.
    Response. We believe it would be challenging to define an 
appropriate and unique standard for purposes of this exception for non-
physical harms that all actors defined in Sec.  171.102 could apply 
consistently and, most importantly, without unduly restricting 
patients' rights to access their health information. We also recognize, 
as discussed above, the practical utility of alignment with relevant 
Privacy Rule provisions. At this time, only danger to the individual's 
``life or physical safety'' is recognized as grounds for denial of an 
individual's right of access under Sec.  164.524(a)(3)(i). However, 
``substantial harm'' is the standard applied under the Privacy Rule 
where the access denied is to information identifying another person 
(other than a health care provider) or where an individual's personal 
representative is denied access to the individual's PHI under Sec.  
164.524(a)(3)(ii) or (iii). To align with the relevant Privacy Rule 
provisions, the final regulation text (Sec.  171.201(d)(1) and

[[Page 25825]]

(2)) references the same harm standards as the Privacy Rule uses where 
Sec.  164.524(a)(3)(ii) or (iii) as well as Sec.  171.201 applies, and 
in circumstances where Sec.  164.524(a)(3) is not implicated but the 
actor's practice is both based on an individualized determination of 
harm (consistent with Sec.  171.201(c)(1)) and likely to interfere 
with: (Sec.  171.201(d)(2)) a patient's or their legal representative's 
access, exchange, or use of information within their EHI that 
identifies another person (other than a health care provider); or 
(Sec.  171.201(d)(1)) the patient's legal representative's access, 
exchange, or use of the patient's EHI. The finalized Sec.  
171.201(d)(3) and (4) also re-use the familiar Sec.  164.524(a)(3)(i) 
type of harm for the wide variety of circumstances where Sec.  171.201 
applies but the type of risk is consistent with Sec.  171.201(c)(2) or 
the (otherwise legally permissible) access, exchange, or use of EHI 
with which the practice is likely to interfere is by someone other than 
the patient or their legal representative. Thus, the finalized Sec.  
171.201 does not establish a standard for non-physical harm that would 
be unique to the Preventing Harm Exception but instead recognizes 
``substantial harm'' in circumstances where Sec.  164.524(a)(3)(ii) or 
(iii) apply, and also applies this familiar type of harm in situations 
where neither Sec.  164.524(a)(3)(ii) nor (iii) applies but where re-
use of this same standard under Sec.  171.201 is consistent with the 
goal of aligning the types of harm recognized under Preventing Harm 
Exception with the grounds for denying a right of access request under 
the Privacy Rule.
    Comments. One commenter specifically recommended allowing actors to 
rely on an individual's own subjective beliefs related to harm.
    Response. We interpret this comment as pertaining to the beliefs of 
the patient whose EHI would be affected by a practice. We appreciate 
this opportunity to explain that practices implemented to honor and 
apply the patient's expressed preferences regarding access, exchange, 
or use of their EHI are addressed by the Privacy Exception finalized in 
Sec.  171.202.
    Comments. A number of commenters requested clarification of how the 
Preventing Harm Exception and its conditions might operate in 
situations involving minors where applicable State laws allow non-
emancipated minors to independently consent to certain types of health 
care and provide for keeping records of such care confidential from the 
minor's parents/guardians. Several of these commenters specifically 
requested clarification about the operation of this exception where 
State law provides for minors to be able to consent to some or all 
types of health care but does not provide for or allow the minors to 
access their health records information at all, or in specific 
format(s).
    Response. We appreciate commenters' offering us the opportunity to 
reiterate that where a particular access, exchange, or use of EHI is 
prohibited by applicable Federal, State, or tribal law, an exception to 
the definition of information blocking is not needed. Nothing in part 
171 calls for access, exchange, use, or other disclosure of EHI that is 
prohibited by other applicable law. If an actor simply cannot 
effectively segment EHI they could safely and permissibly share from 
EHI they are not permitted to share in a given requested format, the 
actor should refer to the exception for requests that are infeasible 
(Sec.  171.204). However, if the EHI they could legally disclose could 
be shared in a different manner than that initially requested but the 
different manner would support segmentation, then an actor should 
provide the EHI they can safely and legally share in the most 
appropriate manner consistent with the Content and Manner Exception 
(Sec.  171.301).
    Comments. Several commenters specifically requested clarification 
as to the information blocking implications where State law and/or the 
organization's account provisioning process do not provide for minors 
to obtain the login credentials needed to access their own records 
through an electronic portal, which will often be the login credentials 
a patient would use to authorize an app to receive the records through 
the provider's API.
    Response. Where the actor does not have a reasonable belief that a 
practice interfering with minors' access to their own EHI will 
substantially reduce a risk of harm cognizable under this exception, 
the Preventing Harm Exception (Sec.  171.201) would not apply. This 
exception would also not apply where any person--whether adult, 
emancipated minor, or non-emancipated minor--is not able to provide 
adequate verification of their identity consistent with the actor's 
health information privacy or security protection policies. Actors 
should assess practices related to verifying the identity of a patient, 
or a legal representative of the patient, for consistency with the 
conditions of the Privacy Exception as finalized in Sec.  171.202 and/
or the Security Exception as finalized in Sec.  171.203. Likewise, 
practices implemented to confirm a representative's legal authority to 
access or request or authorize access, exchange, or use of a minor's 
EHI on behalf of the minor, should be analyzed in the context of the 
Privacy Exception as finalized in Sec.  171.202 and/or the Security 
Exception as finalized in Sec.  171.203. Where otherwise applicable law 
prohibits a specific access, exchange, or use of information, an 
exception to part 171 is not necessary due to the exclusion of 
``required by law'' practices from the statutory information blocking 
definition in section 3022 of the PHSA (as discussed in section 
VIII.C.1 of this preamble). However, where an actor simply lacks the 
technical capability to provide access, exchange, or use in a specific 
requested mechanism, format, or manner, we would encourage the actor to 
review its practices for consistency with the new Content and Manner 
Exception finalized in Sec.  171.301 or the Infeasibility Exception 
finalized in Sec.  171.204.
    Comments. Several commenters requested clarification as to whether 
the Preventing Harm Exception would apply to 42 CFR part 2 data when it 
is not made available for access, exchange, or use because the patient 
did not consent to its access, exchange, or use.
    Response. We appreciate the opportunity to remedy any confusion 
that may have been caused by the Proposed Rule's use of an illustrative 
example (84 FR 7524) within which the requirement to withhold data 
subject to 42 CFR part 2 regulations rendered a particular access, 
exchange, or use of only a portion of the patient's EHI legally 
permissible. In the example, only those portions of the patient's EHI 
to which 42 CFR part 2 does not apply could be permissibly accessed, 
exchanged, or used. This example was intended only to illustrate that 
the mere fact that an actor has knowledge, possession, custody, or 
control of more EHI than the actor could legally share would not, 
itself, provide a basis for application of the Preventing Harm 
Exception to the actor's withholding of any of the EHI that the actor 
could legally share. When an actor that is subject to 42 CFR part 2 
cannot honor a request for access, exchange, or use of data subject to 
42 CFR part 2 specifically because the patient has not provided the 
consent that would be required by 42 CFR part 2 before the actor could 
disclose that specific data for access, exchange, or use, the 
Preventing Harm Exception (Sec.  171.201) would not apply. When an 
actor has 42 CFR part 2 data for a patient but does not believe it has 
documented the patient consent that is legally required before the 
actor can fulfill a request for

[[Page 25826]]

access, exchange, or use of that data, the actor should refer instead 
to the Privacy Exception finalized in Sec.  171.202. If the actor lacks 
the technical capability to effectively segment data that it can 
legally share from data that it cannot legally share, the actor should 
also consider the new Content and Manner Exception finalized in Sec.  
171.301 or the Infeasibility Exception finalized in Sec.  171.204.
    Comments. Several commenters noted that some State laws prohibit 
the release of specific information, such as results of particular 
diagnostic tests, to patients through electronic means (e.g., patient 
portals or APIs) until particular protocols have been completed. 
Commenters cited, as an example, State law mandates for initial 
communication of particular information to the patient by a health 
professional in real time. The commenters requested clarification of 
whether or how Sec.  171.201 would apply in those circumstances.
    Response. As is the case with 42 CFR part 2 data that the patient 
has not consented to disclose, the exception finalized in Sec.  171.201 
would not apply in these particular types of circumstances. The 
information blocking definition proposed and finalized in Sec.  171.103 
does not include a practice that is likely to, or in fact does, 
interfere with the access, exchange, or use of EHI when the practice is 
required by law. If the actor lacks the technical capability to segment 
data at the level of granularity needed to withhold only those data 
points, elements, or classes that it is legally prohibited from 
disclosing in response to a particular request, the actor should 
consider the Content and Manner Exception finalized in Sec.  171.301 or 
the Infeasibility Exception finalized in Sec.  171.204.
    Comments. Several commenters recommended that we recognize under 
Sec.  171.201 practices requiring patients to obtain their laboratory 
results information only through the ordering provider's EHR. 
Commenters stated that inaccurate display of such results is a safety 
risk and that other actors such as laboratories and HINs/HIEs may not 
have the technical capability to display the information accurately in 
a human-readable interface that would be in full compliance with 
regulatory requirements otherwise applicable to human-readable displays 
of laboratory results information.
    Response. We agree that display of inaccurate values for laboratory 
results, or other clinical observations, could represent a safety risk. 
We do not believe it would be appropriate to broadly limit patients to 
obtaining their laboratory information only from providers that are (or 
that employ) professionals whose scope of practice allows them to order 
the tests. If a laboratory, or a HIN/HIE, has the data in an 
interoperable format to support its exchange across providers, but does 
not have the technical capability to appropriately display it for human 
readability (such as in a patient portal), then the laboratory, or HIN/
HIE, should make the data available in the interoperable format to 
providers or patients who can then view the data using technology the 
provider or patient has chosen as appropriate to their needs. If any 
actor receives a request for data access, exchange, or use via a 
specific mechanism that the actor does not have the technical 
capability to support, the actor should consider the Content and Manner 
Exception finalized in Sec.  171.301 or the Infeasibility Exception 
finalized in Sec.  171.204.
    Comments. One commenter suggested recognizing a new exception under 
the Preventing Harm Exception that would allow a health care provider 
who is also a research institution to require, as a condition of making 
EHI available for use in research, that the health care provider be a 
collaborator in that research. The commenter stated that institutions 
ensure accuracy in the way data is used and analyzed by requiring they 
participate in any research involving their patients' information so 
that they can explain for the research team any anomalies or other 
characteristics unique to their own institutions' data and collection 
methods. This commenter stated that disclosing EHI for research 
purposes when the research being conducted does not involve the health 
care provider disclosing the EHI could lead to misinterpreted outcomes 
based on flawed data that could have a negative impact on scientific 
discovery.
    Response. We considered this suggested expansion of the Preventing 
Harm Exception specifically in the context of the definition of 
``electronic health information'' that we proposed, and the more 
focused definition of ``electronic health information'' that we have 
finalized.\145\ The Preventing Harm Exception is intended to apply to 
practices an actor reasonably believes will substantially reduce a risk 
of harm (of a type cognizable under this exception) to particular 
person(s), such as a patient or a natural person in the patient's life 
or multiple patients whose EHI was corrupted or mismatched due to a 
technical failure of an actor's systems. The risk of potential harm 
described by the comment was specifically of misinterpretations of EHI 
leading to research findings that negatively impact scientific 
discovery. This risk is too far removed from a reasonable, and 
reasonably foreseeable, likelihood of cognizable harm to particular 
patients or other particular natural persons to fit within the intent 
of the Preventing Harm Exception finalized in Sec.  171.201. Therefore, 
we did not modify the exception in response to this comment.
---------------------------------------------------------------------------

    \145\ We note that, although various types of research data and 
data sets may be or include ``electronic health information'' as 
defined in Sec.  171.102, not all research data or data sets are or 
include data meeting this definition.
---------------------------------------------------------------------------

Finalized Belief and Harm Conditions for Sec.  171.201
    Having considered comments received on the belief and harm 
standards, we have finalized the exception at Sec.  171.201 with 
modification, as discussed in responses to comments. These 
modifications simplify the belief standard, and more thoroughly and 
specifically align the harm standard applicable for this exception with 
either the Privacy Rule harm standard applicable under Sec.  
164.524(a)(3)(i) (in most circumstances) or the harm standard in Sec.  
164.524(a)(3)(ii) or (iii) (in particular circumstances). The harm 
standard in Sec.  164.524(a)(3)(ii) or (iii) applies where both 
Sec. Sec.  171.201 and 164.524(a)(3)(ii) or (iii) would apply, or in 
particular circumstances that are sufficiently similar as to be 
analogous to circumstances where both Sec. Sec.  171.201 and 
164.524(a)(3)(ii) or (iii) would apply.\146\ Please reference the 
finalized Sec.  171.201(a) for the regulatory text of the belief 
standard. Please reference the finalized Sec. Sec.  171.201(d)(1)-(3) 
for regulatory text that establishes the specific Sec.  164.524(a)(3) 
harm standard that applies in each of the three particular types of 
circumstances specific to patients and their representatives' access to 
the patient's EHI, and reference Sec.  171.201(d)(4) for regulatory 
text establishing the specific Sec.  164.524(a)(3) harm standard 
applicable in all other types of circumstances where Sec.  171.201 
applies.
---------------------------------------------------------------------------

    \146\ Please note that the Preventing Harm Exception will not 
normally apply where a patient or their representative may seek 
access to EHI that is excluded from the right of access under Sec.  
164.524(a)(1) or to which access may be denied on unreviewable 
grounds under Sec.  164.524(a)(2). In circumstances where Sec.  
171.201 conditions are not met but an actor wishes to withhold EHI 
from an individual's right of access under Sec.  164.524(a)(1) or 
(2), the actor should refer to the privacy exception (Sec.  
171.202).
---------------------------------------------------------------------------

    The circumstances where both Sec. Sec.  171.201 and 164.524(a)(3) 
would apply are where the practices do

[[Page 25827]]

interfere with access, exchange, or use by the patient or their legal 
representative (who is their personal representative for purposes of 
Sec.  164.524) of some or all of the patient's EHI to the point of 
denying access (as used in context of Sec.  164.524) on grounds of a 
risk of harm determined on an individualized basis by a licensed health 
care professional in the exercise of professional judgment (Sec.  
171.201(c)(1) as finalized). Circumstances where Sec.  164.524(a)(3) is 
not implicated but that are analogous to circumstances where both 
Sec. Sec.  164.524(a)(3) and 171.201 apply are those where the risk of 
harm is determined on an individualized basis consistent with finalized 
Sec.  171.201(c)(1) and the practice does not entirely deny but is 
likely to, or does, interfere with the patient's or their legal 
representative's access, exchange, or use of the EHI that is otherwise 
legally permissible. (For example, the practice may result in delaying 
access, exchange, or use of the EHI but for less time than is permitted 
for granting of a right of access request under Sec.  164.524.)
    In a wide variety of circumstances where Sec.  171.201 will apply, 
Sec.  164.524 would not apply. Such circumstances include those where 
the access, exchange, or use of EHI with which the practice is likely 
to, or does, interfere is not related to right of access under the 
HIPAA Privacy Rule, such as access, exchange, or use of the patient's 
EHI by the patient's health care providers. Likewise, Sec.  171.201 
will apply but Sec.  164.524(a)(3) will not apply when the risk of harm 
arises from data issues (Sec.  171.201(c)(2)) rather than having been 
determined on an individualized basis by a licensed health care 
professional (Sec.  171.201(c)(1)). In these circumstances where Sec.  
164.524 would not apply, and that are not analogous to circumstances 
where Sec.  164.524(a)(3) would apply, Sec.  171.201(d)(4) (type of 
harm condition) applies the harm standard that would be cognizable 
under Sec.  164.524(a)(3)(i) so that the actor must reasonably believe 
the practice will reduce a risk otherwise posed to the life or physical 
safety of the patient or another natural person.\147\ This provides, 
under Sec.  171.201, consistency across this wide array of 
circumstances where Sec.  164.524(a)(3) would not be implicated 
regardless of the extent of interference or length of delay the 
practice may pose to the access, exchange, or use of the EHI. Because 
the circumstances to which the finalized Sec.  171.201(d)(4) applies 
include access, exchange, or use of the patient's EHI by health care 
providers furnishing services to the patient, we believe it is most 
appropriate to apply under Sec.  171.201(d)(4) the same standard of 
harm that would apply to denying a patient access to the patient's EHI. 
This is consistent with our proposal (84 FR 7602) to require that 
practices likely to interfere with any access, use, or exchange of EHI 
would need to reduce a risk to the ``life or physical safety'' of a 
patient or another person to satisfy the conditions in Sec.  171.201 
and be excepted from the definition of information blocking in Sec.  
171.103. We have also clarified the regulation text so it is expressly 
clear on its face that the risk to be reduced must be one that would 
otherwise arise from the specific access, use, or exchange of EHI 
affected by the practice.
---------------------------------------------------------------------------

    \147\ Please note that although ``individual'' as defined in 45 
CFR 169.103 is not limited to natural persons, the belief standard 
in the finalized Sec.  171.201 is, consistent with the requirement 
that in most circumstances the risk of harm at issue must be to life 
or physical safety.
---------------------------------------------------------------------------

    Under Sec.  164.524(a)(3)(i), a covered entity may deny an 
individual access to protected health information (PHI) about that 
individual in a designated record set only if a licensed health care 
professional in the exercise of professional judgment determines that 
releasing the information to them would endanger the life or physical 
safety of the individual or another person. Under Sec.  171.201(d)(3), 
an actor \148\ may implement a practice that is likely to, or does, 
interfere with the patient's access, exchange, or use of their own EHI 
when the actor reasonably believes the practice will substantially 
reduce a risk of harm to life or physical safety of the patient or 
another person, regardless of whether that risk is determined on an 
individualized basis (Sec.  171.201(c)(1)) or arises from data that is 
known or reasonably suspected to be corrupt due to technical failure, 
erroneous for another reason, or misidentified or mismatched (Sec.  
171.201(c)(2)).
---------------------------------------------------------------------------

    \148\ An actor could be any individual or entity meeting the 
definition of ``health care provider,'' ``health IT developer of 
certified health IT'' or ``health information network or health 
information exchange'' in Sec.  171.102, and may or may not also be 
a HIPAA covered entity or business associate as defined in the HIPAA 
Rules.
---------------------------------------------------------------------------

    Under Sec.  164.524(a)(3)(ii) and (iii), the standard of 
``substantial harm'' applies where the individual or their 
representative are denied access to information in the individual's 
record that identifies another person (other than a health care 
provider), or an individual's personal representative is denied access 
to the individual's information. Thus, the type of harm standard 
applicable under Sec.  171.201 will in most cases require that the 
actor's practice be based on a reasonable belief that the requested 
access, exchange, or use with which the practice is likely to or does 
interfere would otherwise endanger the ``life or physical safety'' of 
the patient or another person. However, the ``substantial harm'' 
standard included in Sec.  164.524(a)(3)(ii) and (iii) would apply in 
specific circumstances as shown in Table 3. As discussed above, we have 
made this change to the finalized Sec.  171.201 to align the harm 
standard applied by Sec.  171.201 with the one applied by Sec.  
164.524(a)(3) where both would apply, and in analogous circumstances 
(as described above). As explained above, we revised the harm standard 
applicable in particular circumstances to avoid setting a higher 
threshold under Sec.  171.201 for practices likely to interfere with 
access, exchange, or use \149\ of EHI than would be applicable to 
entirely denying access under Sec.  164.524(a)(ii) or (iii) \150\ in 
the same circumstances. In the finalized Sec.  171.201(d), we have 
applied the type of harm described in Sec.  164.524(a)(ii) and (iii) to 
particular circumstances where Sec.  164.524(a)(ii) and (iii) do not 
apply, but that are analogous to such circumstances, for the reasons 
stated in responses to comments above.
---------------------------------------------------------------------------

    \149\ As ``access,'' ``exchange,'' and ``use'' are defined in 
Sec.  171.102.
    \150\ Please note that ``access'' has a different meaning under 
45 CFR 164.524 than in 45 CFR part 171. Regarding an individual's 
right of access under 45 CFR 164.524, the term ``access'' should be 
understood in that HIPAA Privacy Rule context.

[[Page 25828]]



 Table 3--Mapping of Circumstances Under Sec.   171.201(d) to Applicable
                             Harm Standards
------------------------------------------------------------------------
      Requirements under Sec.
 171.201(d) type of harm condition     Applicable harm standards \151\
------------------------------------------------------------------------
Sec.   171.201(d)(1)--where the      The harm of which the actor
 practice interferes with access,     reasonably believes the practice
 exchange, or use of the patient's    will substantially reduce a risk
 EHI by their legal representative    must be the type of harm described
 and the practice is implemented      in 45 CFR 164.524(a)(3)(iii),
 pursuant to an individualized        which is substantial harm to the
 determination of risk of harm made   individual or another person.\152\
 by a licensed health care
 professional in the exercise of
 professional judgment (Sec.
 171.201(c)(1)).
Sec.   171.201(d)(2)--where the      The harm of which the actor
 practice interferes with the         reasonably believes the practice
 patient's or their legal             will substantially reduce a risk
 representative's access to, use or   must be the type of harm described
 exchange of information that         in 45 CFR 164.524(a)(3)(ii), which
 references another natural person    is substantial harm to such other
 and the practice is implemented      person.
 pursuant to an individualized
 determination of risk of harm made
 by a licensed health care
 professional in the exercise of
 professional judgment (Sec.
 171.201(c)(1)).
Sec.   171.201(d)(3)--where the      The harm of which the actor
 practice interferes with the         reasonably believes the practice
 patient's access, exchange, or use   will substantially reduce a risk
 of their own EHI, regardless of      must be the type of harm described
 whether the risk the practice is     in 45 CFR 164.524(a)(3)(i), which
 implemented to substantially         is a harm to the life or physical
 reduce is determined on an           safety of the individual or
 individualized basis by a licensed   another person.
 health care professional in the
 exercise of professional judgment
 (Sec.   171.201(c)(1)) or arises
 from data that is known or
 reasonably suspected to be corrupt
 due to technical failure,
 erroneous for another reason, or
 misidentified or mismatched (Sec.
  171.201(c)(2)).
Sec.   171.201(d)(4)--where the      The harm of which the actor
 practice interferes with the         reasonably believes the practice
 patient's legal representative's     will substantially reduce a risk
 otherwise legally permissible        must be the type of harm described
 access, exchange, or use of the      in 45 CFR 164.524(a)(3)(i), which
 patient's EHI and the practice is    is a harm to life or physical
 implemented to reduce a risk         safety of the individual or
 arising from data that is known or   another person.
 reasonably suspected to be
 misidentified or mismatched,
 corrupt due to technical failure,
 or erroneous for another reason
 (Sec.   171.201(c)(2)).
------------------------------------------------------------------------

Types of Risk of Harm to Patients Cognizable Under This Exception
---------------------------------------------------------------------------

    \151\ Note that the ``individual'' and ``access'' have different 
meanings under 45 CFR 164.524 from those in 45 CFR part 171. 
Regarding an individual's right of access under 45 CFR 164.524, the 
term ``access'' should be understood in that HIPAA Privacy Rule 
context.
    \152\ Note that grounds for denial of an individual's right of 
access include that the access is reasonably likely to cause the 
harm identified in the particular subparagraph under Sec.  
164.524(a)(3). For purposes of 45 CFR part 171, we interpret that 
the stated type of harm must, to the best of the actor's knowledge 
and belief, be substantial, in absence of particular practice(s), in 
order for an actor to reasonably believe the practice(s) will 
substantially reduce that risk. We would interpret a reasonable 
likelihood of the described harm, as used under Sec.  164.524(a)(3) 
to be a substantial risk for purposes of Sec.  171.201.
---------------------------------------------------------------------------

    We proposed (84 FR 7524) that to qualify for this exception, an 
actor's practice must respond to one or more type(s) of risk of harm 
cognizable under this exception. The three types of risk of harm that 
we proposed would satisfy the conditions of this exception are:
     Risks arising from corrupt or inaccurate data being 
recorded or incorporated in a patient's EHI;
     risks arising from misidentification of a patient or 
patient's EHI; and
     risks identified by a determination made by a licensed 
health care professional that a specific access or disclosure of EHI is 
reasonably likely to endanger the life or physical safety of the 
patient or another person.
    We provided additional explanation and discussion of these types of 
risk of harm in the preamble of the proposed rule (84 FR 7524 and 
7425). We also requested comment (84 FR 7525) on:
     Whether these categories of harm capture the full range of 
safety risks that might arise directly from accessing, exchanging, or 
using EHI; and
     Whether we should consider other types of patient safety 
risks related to data quality and integrity concerns or that may have a 
less proximate connection to EHI but that could provide a reasonable 
and necessary basis for an actor to restrict or otherwise impede 
access, exchange, or use of EHI in appropriate circumstances.
    We will first discuss those comments that pertain to the cognizable 
types of risk of harm in general. Comments specific to each of the 
three types of risk of harm will be discussed separately, in the order 
they were presented in the Proposed Rule.
    Comments. Overall, comments were supportive of the exception 
recognizing risks of harm arising from corrupt or misidentified 
information, and individualized determinations of risk of harm made by 
licensed health care professionals in the exercise of professional 
judgment. Numerous commenters requested clarification or additional 
information to help actors more effectively understand and efficiently 
document their risk determinations in connection to practices for which 
they would seek to claim that the Preventing Harm Exception applies.
    Response. We appreciate the feedback received. In response to 
comments calling broadly for additional clarification or information, 
we have provided detailed responses to comments received. Where useful 
to enrich the discussion, some responses discuss hypothetical example 
situations that illustrate how a particular aspect of the exception 
would operate in such a situation.
    Comments. Some comments suggested that the determinations and the 
rationale for individualized determinations by health care 
professionals in the exercise of professional judgment should be 
documented in the electronic health record.
    Response. We believe documentation in the EHR, such as in 
appropriate notes field(s), may be a practical, efficient approach to 
documentation of determinations of risk of harm consistent with Sec.  
171.201 for some -- perhaps many -- licensed health care professionals. 
Therefore, we confirm that EHRs are considered an appropriate approach 
or method for the documenting, and for retaining documentation, of 
determinations of risk consistent with Sec.  171.201(c)(1). We also 
note that much (perhaps all) of the information about the patient's 
individual circumstances that factors into the professional's 
determination of risk will most naturally and most often be documented 
in the EHR in the ordinary course of furnishing care to the patient. 
Nothing in Sec.  171.201 would require duplicating information already 
captured in the EHR in a different form

[[Page 25829]]

or format specific or unique to Sec.  171.201, whether in the EHR or 
elsewhere. However, we also believe that there is substantial potential 
for variability in health care professionals' current methods for 
documenting risk factors and determinations.
    In addition, we do not believe it is necessary to require different 
or duplicate documentation of information that is already otherwise 
captured in reliable business records consistent with the HIPAA Privacy 
Rule and applicable State laws--including, but not limited to, laws 
protecting patient privacy or mandating provider reporting of 
particular types of abuse their patients may experience. Therefore, 
requiring via regulation that all health care professionals document 
their determination specifically in the EHR in order to satisfy this 
exception's conditions could impose an unnecessary burden on those who 
would like to conform their practices to this exception but currently 
take a different approach to documenting risk factors or to documenting 
individualized determinations of risk specific to access, exchange, or 
use of the patient's EHI by the patient or their legal 
representative(s). Thus, we have not finalized a requirement that 
licensed health care professionals must document in their EHR or in any 
other particular system(s) their individualized determinations of risk 
of harm in order for the determinations of risk to satisfy the risk of 
harm condition finalized in 171.201(c)(1).
    Comments. One commenter noted that minors may not fully understand 
the implications of downloading and sharing their EHI, which represents 
a different type of risk than the three discussed in the Proposed Rule. 
The commenter advocated for health care providers to have discretion to 
impose restrictions on non-emancipated minors' ability to access their 
EHI through an API.
    Response. We did not modify the Preventing Harm Exception in 
response to this comment. The Preventing Harm Exception (Sec.  171.201) 
is intended to apply to practices an actor reasonably believes will 
substantially reduce a risk of harm to one or more particular 
person(s), and in many circumstances (Sec.  171.201(d)(3) or (4)) a 
risk of harm to the life or physical safety of particular persons, such 
as: A patient or person in the patient's life; or multiple patients 
whose EHI was corrupted or mismatched due to a technical failure of an 
actor's systems. Where a non-emancipated minor, or other patient, is 
otherwise legally entitled to access or receive their own health 
information that does not include identified information about another 
person, the Preventing Harm Exception will apply only to those 
practices reasonable and necessary to address risk to the life or 
physical safety of another person consistent with Sec.  171.201(d)(3) 
and its specific cross-reference to Sec.  164.524(a)(3)(i). The Privacy 
Exception (Sec.  171.202) is intended to recognize reasonable and 
necessary practices to protect patients' privacy. We also note that we 
have clarified in this final rule that although practices that purport 
to educate patients about the privacy and security practices of 
applications and parties with which a patient chooses to share their 
EHI would always be subject to review by OIG if there were a claim of 
information blocking, such practices likely would not be considered to 
interfere with the access, exchange, and use of EHI if they meet 
certain criteria (see section VIII.C.6, above).
Risk of Corrupt or Inaccurate Data Being Recorded or Incorporated in a 
Patient's Electronic Health Record
    We proposed (84 FR 7524) that the Preventing Harm Exception could 
apply to practices that address risks of harm arising from corrupted or 
inaccurate EHI being recorded or incorporated in a patient's electronic 
health record. We further proposed that recognized risks from incorrect 
or inaccurate information would be limited to those arising from known 
or reasonably suspected corruption and inaccuracies caused by 
performance and technical issues affecting health IT. We clarified that 
the Preventing Harm Exception would not extend to purported accuracy 
issues arising from the incompleteness of a patient's electronic health 
record generally. We acknowledged that Federal and State laws may 
require an actor to obtain an individual's written consent before 
sharing specific health information, such as information subject to 42 
CFR part 2. However, we expressly noted in the Proposed Rule that this 
exception would not apply to an actor's conduct in refusing to provide 
access, exchange, or use of the remainder of the patient's record on 
the basis that the information withheld per patient's non-consent would 
render the remainder of the patient's record incomplete and thus 
inaccurate. We also noted that known inaccuracies in some data within a 
record may not be sufficient justification to withhold the entire 
record so long as the remainder of the patient's EHI could be 
effectively shared without also presenting the known incorrect or 
corrupted information as if it were trustworthy.
    Comments. Commenters were supportive of the Preventing Harm 
Exception applying to appropriate practices to address corrupt or 
incorrect data in EHI and the risks that would otherwise arise from 
propagation of corrupt or otherwise incorrect EHI within a patient's 
record.
    Response. We appreciate all of the feedback received, including but 
not limited to confirmation that responding stakeholders are supportive 
of this exception applying to practices an actor reasonably believes 
will substantially reduce a risk of harm otherwise arising from access, 
exchange, or use of corrupt or inaccurate data within a patient's 
record.
    Comments. One commenter, acknowledging that patients' wishes that 
specific information not be shared should be honored, advocated 
expanding this exception to cover physicians' declining to disclose any 
EHI to other physicians where withholding of some information at the 
patient's request would, in the disclosing physician's view, render the 
patient's record so distorted as to be misleading.
    Response. As we explained in the Proposed Rule, we would not 
recognize incompleteness of the EHI that an actor can disclose as a 
source of a risk of harm cognizable under this exception. For instance, 
patients may make requests that specific information not be accessed, 
exchanged, or used beyond a specific clinician-patient (or other 
relevant) relationship because the information is associated with a 
stigmatized condition, or for personal reasons (such as the patient's 
subjective perception the information may be embarrassing or otherwise 
detrimental to them). In the Proposed Rule, we provided an illustrative 
example of a patient declining consent to share 42 CFR part 2 substance 
abuse treatment information, and stated we would not consider the 
remainder of the patient's record inaccurate based on its 
incompleteness (84 FR 7524). Health care providers receiving any 
patient's records of prior care presumably have an awareness of the 
potential that some information may be omitted from the information 
they receive for a wide variety of reasons that include, but that are 
not limited to, patients' intentional choices to withhold some 
information. Therefore, we do not believe it would be appropriate to 
consider EHI to be corrupt, inaccurate, or otherwise erroneous where it 
is simply a subset of everything an actor knows about the patient.
    We are not persuaded that a patient's withholding consent to share 
specific

[[Page 25830]]

portions of their overall EHI, regardless of the patient's rationale 
for withholding consent, would render the data set their physician (or 
other health care provider) could share more dangerous to the patient 
than sharing none of the patient's EHI with another of the patient's 
providers. Instead, we remind health care providers that nothing in 
part 171 overrides Federal, State, or tribal law protections of 
patients' privacy preferences. Likewise, nothing in part 171 reduces 
variation in what and how much information patients remember, or are 
willing, to disclose to their health care providers. Patients remain 
free to withhold various information from their health care providers, 
including but not limited to what other providers they may have seen in 
the past.
    Before enactment of the Cures Act, health care providers could not 
safely assume every patient record they received from any source 
necessarily included all the information that could or should be known 
by that source that would be relevant to the patient's health or care 
by that provider, even where the source can permissibly share 
everything they do know. Thus, we reiterate that we do not believe it 
is reasonable or necessary for purposes of preventing harm that a 
provider withhold the EHI that they could permissibly share in any 
particular circumstance simply because they happen to have more EHI 
than they can permissibly share.
    However, we also highlight that for purposes of this exception a 
data export or access mechanism appropriately showing that some data 
may be unavailable or omitted from the export or presentation is 
materially different from a data export or presentation that 
misrepresents the patient's EHI. For example, exports or presentations 
omitting all medication data and correctly stating ``medication data 
not available,'' \153\ we would not consider corrupt, inaccurate, or 
otherwise erroneous. By contrast, however, an export or presentation 
stating ``no current medications,'' or stating ``none'' or ``none 
known'' in the medication section, when in fact the system producing 
the export or representation does include current known medications for 
the patient, represents a type of risk recognized under Sec.  
171.201(c)(2).
---------------------------------------------------------------------------

    \153\ Or otherwise indicating, in a manner appropriate to the 
circumstances, that absence of information in the extract or 
representation should not be understood as a statement that there is 
no such data in the source system.
---------------------------------------------------------------------------

    Under Sec.  171.201(d)(4), as finalized, a practice that is likely 
to, or that in fact does, interfere with otherwise permissible access, 
exchange, or use of a patient's EHI by their health care providers must 
be one the actor implementing the practice reasonably believes will 
substantially reduce a risk of harm of a type that could serve as 
grounds for denial of the individual's right of access to their EHI 
under the 45 CFR 164.524(a)(3)(i). Therefore, in order for a practice 
likely to interfere with the access, exchange, or use of EHI by one of 
the patient's health care providers to satisfy the conditions of the 
Preventing Harm Exception, the actor must hold a reasonable belief that 
the practice will substantially reduce a risk to the patient's, or 
another natural person's, life or physical safety that would otherwise 
arise from the access, exchange, or use of the EHI with which the 
practice interferes. Erroneous misrepresentations that a patient is not 
known to be taking any medications, when in fact they are known to be 
taking one or more medications, is typically a system problem and one 
that can give rise to risk to the physical safety, or even the life, of 
any or all patients whose EHI may be affected by the problem.
    Comments. One comment submission highlighted a tension between the 
data-provision preferences of health care providers requesting data and 
other actors (such as other providers and their health IT developers) 
from whom data is requested. This commenter indicated providers 
requesting data, such as long-term/post-acute providers caring for 
patients after a hospital stay, may currently have to wait days to 
receive any of the patient's clinical data from the hospital stay 
because the hospital or its health IT developer refuses to generate and 
send the C-CDA document until every last data element is finalized. The 
commenter suggested we clarify whether Sec.  171.201 would apply to 
such circumstances.
    Response. An actor's practice of delaying fulfillment of an 
otherwise feasible and legally permissible request for exchange, 
access, or use of EHI that is finalized and available to the actor 
merely because the actor knows more EHI for that patient will become 
available at some later date would not satisfy the conditions of Sec.  
171.201. As we stated in the Proposed Rule, we do not view mere 
incompleteness of a patient record as rendering the remainder of the 
patient's record inaccurate (84 FR 7524). We recognize that specific 
data points may not be appropriate to disclose or exchange until they 
are finalized. Such data points would include, but are not necessarily 
limited to: Laboratory results pending confirmation or otherwise not 
yet considered by the hospital reliable for purposes of clinical 
decision making; or notes that the clinician has begun to draft but 
cannot finalize until they receive (confirmed) laboratory or pathology 
results or other information needed to complete their decision making. 
We hope it is, and will be increasingly, rare that an actor cannot 
effectively sequester non-finalized EHI from finalized EHI. However, we 
cannot rule out the possibility that some actors may face that problem 
at some point. If an actor cannot effectively sequester non-finalized 
EHI from a particular access, exchange, or use where inclusion of non-
finalized EHI would not be appropriate, the actor should refer to the 
new Content and Manner Exception (finalized in Sec.  171.301) or the 
Infeasibility Exception finalized in Sec.  171.204.
    Comments. A number of commenters expressed concerns that many 
actors' health IT systems currently lack the capability to segment data 
by class and element that would be needed to withhold only those 
classes or elements that were corrupted or erroneous as described in 
the Proposed Rule. Commenters requested clarification on whether the 
Sec.  171.201 Preventing Harm Exception would in these cases apply to 
the entirety of the patient's EHI, how it would apply, or if another 
exception would also be needed.
    Response. In the circumstances these comments described, the 
Preventing Harm Exception will apply only to the EHI known or 
reasonably suspected to be corrupt or erroneous. If an actor lacks the 
data segmentation capabilities that would be needed to sequester only 
that data known or reasonably suspected to be corrupt or erroneous from 
the requested access, exchange, or use, we would encourage the actor to 
consider meeting the conditions of another exception with respect to 
the remaining EHI. For example, the Content and Manner Exception (Sec.  
171.301) may allow for the actor to provide the requestor with the EHI 
not known or reasonably suspected to be corrupt or erroneous, albeit in 
a different way than was initially requested. Or, if the actor lacks 
the technical capability to share the EHI that is not known or 
reasonably suspected to be corrupt or erroneous consistent with the 
Content and Manner Exception (Sec.  171.301), then the actor may wish 
to meet the Infeasibility Exception (Sec.  171.204). The applicability 
of the exceptions will depend on the particularized circumstances, 
including but not limited to the specific request made. We believe the 
conditions of these exceptions also offer frameworks within which a 
responding actor and an

[[Page 25831]]

EHI requester may be able to identify a mutually agreeable approach to 
making trustworthy EHI appropriately available in at least some of the 
instances where a request cannot be safely fulfilled in exactly the 
manner of the requester's first preference.
    Comments. One comment expressed a concern that some health care 
providers, particularly those already receiving feedback from payers 
about their data quality, might believe the Preventing Harm Exception 
would allow them to withhold patients' access to the patients' own EHI 
to prevent the patients from seeing data quality issues the provider 
knows or believes are present in that EHI.
    Response. If a provider knows that the data quality issues in their 
records serve as a source of risk consistent with Sec.  171.201(c)(2), 
so as to form the basis of a reasonable belief the patient's accessing 
or using the data would place the patient at risk of harm cognizable 
under this exception,\154\ the exception would apply if all other 
conditions of the exception were met. However, known corruption or 
other errors that would place a patient accessing their EHI at risk of 
harm cognizable under this exception on the basis of accessing--and 
presumably making health or care decisions based on--that EHI would 
also raise a substantial concern regarding the safety of that EHI for 
use by the provider. Thus, we would expect that whenever a given health 
care provider believes the EHI within their records is safe enough for 
their own use in the delivery of patient care, the Preventing Harm 
Exception would not excuse the provider from honoring their patients' 
requests to access, exchange, or use that EHI simply because the 
patients might discover error(s) in that EHI. If, to the actor's 
knowledge or reasonable belief, only some data classes or elements 
within a patient's EHI are a source of risk consistent with Sec.  
171.201(c)(2), the actor should continue to make the remaining data 
classes and elements available to the patients and other requestors (as 
appropriate under applicable law). Where the actor lacks the technical 
ability to appropriately sequester only the corrupt or erroneous data 
within the EHI they hold for given patient(s), the actor should 
reference the Content and Manner Exception finalized in Sec.  171.301 
or the Infeasibility Exception finalized in 171.204.
---------------------------------------------------------------------------

    \154\ Note that where the practice interferes with a patient's 
access to their own EHI, the applicable harm standard is established 
in Sec.  171.201(d)(3) and is the same one established at Sec.  
164.524(a)(3)(i). Currently, that would be harm to life or physical 
safety.
---------------------------------------------------------------------------

    Comments. Several commenters requested clarification on whether an 
actor has a responsibility to assess the data in their possession, 
custody, or control for risk of harm before making it available for 
access, exchange, or use.
    Response. The conditions finalized in Sec.  171.201 for practices 
that interfere with the access, exchange, and use of EHI for purposes 
of preventing harm to be excepted from the definition of information 
blocking (Sec.  171.103) do not require that actors generally evaluate 
data requested for data quality issues or other sources of risk of harm 
before fulfilling requests for access, exchange, or use of the EHI. At 
the same time, actors should be aware that where an actor may have an 
affirmative duty under otherwise applicable law for the quality or 
accuracy of data, or for assessing other types of risk of harm that 
could be implicated by an EHI access, exchange, or use request, nothing 
in Sec.  171.201 should be construed as lessening or otherwise changing 
that duty. For example, the Preventing Harm Exception does not lessen 
or otherwise change an actor's existing obligations to ensure patient 
EHI is created, recorded, and maintained to standards of accuracy and 
reliability consistent with laws, regulations, and accreditation 
requirements applicable to the particular actor in any given 
circumstance.
    Comments. Commenters expressed appreciation for the inclusion of 
this exception so that health care providers will not be forced to 
share incorrect data. Several of these commenters requested we clarify 
a provider's responsibility for correcting corrupt or incorrect 
information once it is discovered.
    Response. For health care providers, existing State and Federal 
laws and regulations address the responsibility to maintain appropriate 
records of health care furnished and in support of reimbursement sought 
from various programs and payers. Health care providers that have 
obtained voluntary accreditations may have made additional commitments 
related to record-keeping and data quality in context of obtaining and 
maintaining those accreditations. These existing responsibilities of 
health care providers are not lessened or otherwise changed by the 
Preventing Harm Exception. The exception simply provides for exception 
from the definition of information blocking at Sec.  171.103 of 
practices interfering with the access, exchange, or use of mismatched, 
corrupt due to technical failure, or otherwise erroneous EHI in order 
to substantially reduce a risk of harm. Presuming its conditions are 
otherwise met, Sec.  171.201 would apply to a variety of practices 
appropriate to correct mismatched, corrupt due to technical failure, or 
otherwise erroneous EHI in a manner consistent with otherwise 
applicable law, regulations, accreditation standards, and payment 
program standards.
    Comments. One comment requested clarity regarding the applicability 
of this exception to data received from a third party, where the actual 
accuracy of the data cannot be, or has not been, confirmed by the actor 
asked to make that data available for access, exchange, or use.
    Response. We recognize that in some circumstances the available and 
feasible mechanisms for EHI access, exchange, or use may not support as 
much data provenance information as an actor might prefer. In such 
circumstances, the actor would be free to communicate supplemental 
information about specific data's provenance to a requestor. However, 
the conditions of the Preventing Harm Exception would not be met where 
EHI requested was received from a third party and the actor could not 
confirm the accuracy of the EHI.
    Comments. A comment from the perspective of health IT developers 
and implementers stated that this exception should allow an actor to 
err on the side of caution as the actor looks to determine the extent 
of potential distortions in a record before sharing it. A number of 
commenters described practices used today by HIEs to assess and resolve 
data quality issues, including but not limited to taking all of the 
records from a particular source offline while assessing the extent or 
cause of issues identified in some record(s) from that source.
    Response. The Preventing Harm Exception is intended to apply to a 
variety of practices reasonable and necessary to protect patients from 
risk of harm arising from access, exchange, or use of data that is 
known or reasonably suspected to be corrupt, inaccurate, mismatched, or 
misidentified. To be covered by the exception, the practice may 
interfere with the access, exchange, or use of EHI only to the minimum 
extent necessary to substantially reduce a risk of harm cognizable 
under the exception, but the exception does not require that every 
record affected by the practice have first been confirmed to contain 
corrupt, mismatched, or otherwise dangerously problematic data. In some 
circumstances, such as a particular data source experiencing a

[[Page 25832]]

known or reasonably suspected system or other technical failure 
producing widespread corruption, mismatching, or other dangerous 
errors, the minimum reasonable and necessary precautions may make all 
records from that source unavailable pending resolution of the 
technical failure and its risk-producing effects. The actor's knowledge 
or reasonable suspicion could be appropriately derived in various ways. 
These ways would include, but are not limited to: Detection of specific 
data quality issues in a sampling of records from the particular 
source; or receipt of notice from a source that they had experienced 
technical issues or failures resulting in corruption, mismatching, or 
other data quality issues giving rise to risks of harm cognizable under 
this exception.
    Comments. A commenter noted that this exception should be applied 
rarely, and when applied should not be a mechanism to selectively block 
information from specific actors. However, several other commenters 
made observations that, in current practice, EHI coming from sources 
whose data has a pattern of higher-than-normal error rates may be 
subjected to more extensive review, and potentially delayed in broader 
availability, compared with EHI from sources whose data error rate is 
within a more normal range. Comments describing such current practices 
recommended that this exception should allow for continued application 
of additional data quality assurance processing to EHI from sources 
whose data exhibits a history or pattern of more numerous or more risky 
data quality issues.
    Response. If an actor were to engage in practices systematically 
interfering with access, exchange, or use of EHI from a particular 
source based on considerations extraneous to the prevalence and risk 
profile of data quality issues in the EHI, such practices would not 
meet the conditions to be excepted under Sec.  171.201 from the 
definition of information blocking finalized in Sec.  171.103. Examples 
of considerations we would consider to be extraneous in this context 
notably include, but are not limited to, whether the data source was 
competitor of the actor and whether the actor may harbor personal 
animus toward the data source. However, this exception would apply to 
practices not based in whole or any part on considerations extraneous 
to the prevalence and risk profile of data quality issues in the EHI, 
provided each such practice meets all conditions in Sec.  171.201 that 
are applicable to the circumstances in which it is used.
    Comments. Commenters noted that integration of data from various 
types of sources is challenging because of differences in the data 
elements that different types of sources can exchange, and because of 
technical differences in how similar data elements may be structured, 
defined, or encoded across different types of sources. Commenters also 
stated that data from new exchange partners may raise questions about 
potential accuracy issues in interpreting and integrating different 
types of data as well as integrating similar data from various types of 
sources. Commenters recommended that Sec.  171.201 recognize that 
practices may delay integration and availability of EHI in order to 
address these issues, and also recommended that a time limit be 
established for completing evaluations of incoming data.
    Response. We appreciate commenters' highlighting that the U.S. 
health care system as a whole includes opportunities for access, 
exchange, and use of a wider variety of data classes and elements than 
are currently addressed by standards and implementation specifications 
adopted in part 170, and more sources than just those actors currently 
using certified health IT. We are aware that, in a variety of 
circumstances, safely and appropriately integrating data from a new 
source may require time to determine and apply appropriate processing 
approaches to ensure that data are not corrupted in the process of 
mapping or converting them to the structures and standards used by the 
recipient. Our finalized exception will apply to appropriately tailored 
practices for assessing and mitigating risks otherwise posed by 
integration of data from new sources, that is not standardized, or that 
is standardized to non-published, proprietary, or obsolete standards. 
In cases where the original meaning of EHI received cannot be 
determined in a manner allowing for conversion to the formats and 
standards used by the recipient's systems, it may sometimes be 
necessary to decline to integrate such data in the recipient's 
production systems. However, we believe it would be premature to 
establish via this rulemaking specific time limits for assessment and 
processing of EHI received from new exchange partners, in large part 
due to the considerable variability in systems and circumstances of the 
actors involved in such exchange relationships. Should the need arise 
to assess the reasonableness, necessity, and timeliness of an actor's 
practices applied to data received from new or various types of 
sources, we would do so in context of the specific circumstances in 
which particular practices were applied by particular actor(s).
Finalized Policy for Risks of Harm Arising From Corrupt or Inaccurate 
Data
    We have finalized the type of risk condition with modifications to 
the proposed regulation text. We have reorganized the regulation text, 
and in the context of that reorganization rephrased the statement of 
some conditions. We have also, in Sec.  171.201(c)(2) replaced the word 
``inaccurate'' (used in proposed Sec.  171.201(a)(2)) with 
``erroneous'' to better differentiate between normal shortfalls in the 
complete accuracy of a record and risk-generating errors in the data. 
We also combine all data-specific sources of risk of harm in the final 
Sec.  171.201(c)(2) instead of splitting them across two paragraphs as 
was the case in Sec.  171.201(a)(1) (``corrupt or inaccurate'' in the 
Proposed Rule) and Sec.  171.201(a)(2) (``misidentified or mismatched'' 
in the Proposed Rule). We made this change because misidentified, 
mismatched, corrupt, and otherwise erroneous data are all sources of 
risk arising from issues with the data rather than characteristics 
unique to a patient or their circumstances. Additional conditions must 
be met for Sec.  171.201 to apply to practices implemented to 
substantially reduce a risk of harm arising from data issues 
(consistent with Sec.  171.201(c)(2)), including Sec.  171.201(a), (b), 
(d)(3) or (4), and (f)(1) or (2). Whether (d)(3) or (d)(4) applies 
turns on whether the practice is likely to, or does, interfere with a 
patient's own or other legally permissible access, exchange, or use of 
the patient's EHI. Whether (f)(1) or (f)(2) applies turns on whether 
the actor implements the practice consistent with an organizational 
policy (f)(1) or based on a determination based on the particularized 
facts and circumstances known or reasonably believed by the actor at 
the time the determination was made and while the practice remains in 
use (f)(2).
    For purposes of providing additional information and explanation as 
requested by many commenters, we reiterate that a risk of harm arising 
from data that is known or reasonably suspected to be misidentified or 
mismatched, corrupt due to technical failure, or erroneous for another 
reason (Sec.  171.201(c)(2) as finalized) will not, consistent with 
discussion and illustrative examples in the preamble to the Proposed 
Rule (84 FR 7524), satisfy the conditions of the Preventing Harm

[[Page 25833]]

Exception if it turns on mere speculation about, or possibilities of, 
as-yet-undetected inaccuracies or other imperfections in the EHI. An 
electronic health record, like the paper chart it replaces, is 
inevitably less than perfectly complete and precisely accurate across 
100 percent of the variables potentially relevant to the individual's 
health. Because the risk that records in general may be imperfect is a 
risk that we understand as inherent to (and thus ordinarily addressed 
in the course of) clinical practice, it will not be recognized as 
justifying practices that implicate the information blocking 
definition. Thus, the Preventing Harm Exception finalized in Sec.  
171.201 does not extend to purported accuracy issues arising from 
potential, suspected, or known incompleteness of a patient's electronic 
health record generally, such as the possibility of a patient choosing, 
or not remembering, to mention some of the medications they regularly 
take. Similarly, the possibility that any given patient's EHI could at 
any time contain sporadic, undetected, inaccurate data points as a 
result of data entry errors--such as an entered weight of 123 instead 
of the accurate observation of 132--would not be interpreted as 
satisfying the condition finalized in Sec.  171.201(c)(2).
    The Preventing Harm Exception will apply in those instances where 
specific EHI of one or more patients is affected by a risk consistent 
with the finalized Sec.  171.201(c)(2). Assuming its other conditions 
that are applicable to the specific circumstances are met, the 
Preventing Harm Exception will apply to appropriately tailored 
practices that affect a particular patient's EHI regardless of the 
origin or cause of known or reasonably suspected data issues giving 
rise to risk of harm consistent with Sec.  171.201(c)(2), and to the 
use of the practices for such time as is reasonable and necessary to 
amend or correct the patient's EHI. In assessing timeliness and 
reasonableness of an actor's approach to making such corrections, we 
would take into consideration the facts and circumstances within which 
they operate, including but not limited to licensure or certification 
requirements applicable to the actor's EHI governance. For a health 
care provider, we anticipate such licensure or certification 
requirements will typically include clinical records standards set by 
State licensure laws and additional standards applicable to that 
provider given their specific circumstances, such as patient records 
maintenance standards set by issuing bodies of facility/organizational 
accreditations or professional board certifications the provider may 
also hold.
    Where an actor lacks the technical capability to sequester from 
otherwise legally permissible access, exchange, or use only that subset 
of EHI the actor knows or reasonably suspects is affected by data 
issues giving rise to risk of harm consistent with Sec.  171.201(c)(2), 
the Preventing Harm Exception will not recognize withholding of the 
remaining EHI. In such circumstances, an actor should refer to the 
exceptions for Content and Manner (Sec.  171.301) and Infeasibility 
(Sec.  171.204), as may be applicable, in regard to the EHI that they 
do not know or reasonably suspect to be affected by data issues giving 
rise to risk of harm consistent with Sec.  171.201(c)(2).
Risk Arising From Misidentifying a Patient or Mismatching Patients' 
Electronic Health Information
    The Preventing Harm Exception is intended to apply to practices 
that are designed to promote data quality and integrity and to support 
health IT applications properly identifying and matching patient 
records or EHI. As discussed in the preamble to the Proposed Rule (84 
FR 7524), accurately identifying patients and correctly attributing 
their EHI to them is a complex task and involves layers of safeguards. 
The task requires application of appropriate procedures for verifying a 
patient's identity and properly registering the patient in health IT 
systems. Safeguards include such usability and implementation decisions 
such as ensuring the display of a patient's name and date of birth, and 
perhaps a recent photograph, on every screen from which clinicians and 
other caregivers access, enter, and/or modify data in the patient's 
record. When a clinician, other health IT user, or other actor knows or 
reasonably suspects that specific EHI is not correctly attributed to 
one or more particular patient(s), it would be reasonable for them to 
avoid sharing the EHI that could introduce or propagate errors in 
patient records and thereby pose risks to the patient(s) affected.\155\
---------------------------------------------------------------------------

    \155\ Please note that practices designed and implemented to 
ensure that persons requesting access to their EHI are who they 
claim to be and give them access to only that EHI that is theirs 
would not be cognizable under the Preventing Harm Exception; we have 
established two other exceptions designed to address practices 
reasonable and necessary to protect the privacy (see Sec.  171.202) 
and security (see Sec.  171.203) of individuals' EHI.
---------------------------------------------------------------------------

    Under the Preventing Harm Exception as proposed, an actor's 
response to the risk of misidentified patient health information would 
need to be no broader than necessary to mitigate the risk of harm 
arising from the potentially misidentified record or misattributed data 
(84 FR 7524). For example, under the proposed exception, an actor--such 
as a health IT developer of certified health IT--refusing to provide a 
batch export on the basis that the exported records might contain a 
misidentified record would not find that practice recognized under this 
exception. Similarly, a health care provider or other actor that 
identified that a particular piece of information had been 
misattributed to a patient would not be excused under Sec.  171.201 
from exchanging or providing access to all other EHI about the patient 
that had not been misattributed. The actor knowing or reasonably 
suspecting some data had been misidentified or misattributed would also 
be expected to confirm the extent of such errors and to take 
appropriate steps to correct their own records, consistent with 
applicable law, regulations, and accreditation standards applicable to 
the actor, and best practices or other appropriate industry benchmarks 
for health records and information management.
    Comments. Commenters recommended we consider that actors bear 
significant responsibility to preserve and promote data quality and 
integrity, and that actors generally take risk-averse approaches to 
preventing and to assessing and resolving errors in identifying EHI and 
matching patient EHI.
    Response. We appreciate the opportunity to assure all stakeholders 
that we are aware that the EHI an actor receives from various sources 
may feature a variety of characteristics that call for varying degrees 
of pre-processing to achieve a level of matching accuracy considered by 
the health care provider community to be sufficient for safe use of the 
data in patient care. In some circumstances, we understand additional 
or special processing--including but not necessarily limited to human 
eyes-on analysis to confirm matches--may be needed before records are 
deemed to have been accurately matched, and that data requiring human 
processing may be delayed in integration and availability compared with 
data that can be satisfactorily matched through an actor's automated 
means. Section 171.201 will apply to such practices provided all of its 
conditions are met.
    Comments. Commenters recommended the finalized exception recognize 
as reasonable and necessary to protect patient safety practices such as 
sequestering from access and exchange all records from a particular 
source, or

[[Page 25834]]

affected by a particular system or technical process, until the scope 
and cause of patient matching or attribution issues can be identified 
and appropriately resolved. Commenters stated such practices are 
commonly used today by HINs/HIEs, and provided illustrative examples of 
current practice. Comments described as an example current practice of 
HIEs not making available any record(s) that their monitoring for 
technical or other issues identifies as an improperly matched patient 
record--and any other records that may be affected by a similar 
technical issue--until the record(s) can be corrected to include only 
accurately matched data.
    Response. We do understand that a variety of methods and approaches 
may currently be needed to assess the scope, identify, and 
appropriately address the cause of patient matching or attribution 
errors. Section 171.201 will apply to practices otherwise meeting its 
conditions that affect more patients' records than those specifically 
confirmed to include mismatched or misattributed EHI. Where its 
conditions are otherwise met, the exception will apply to use of 
practices likely to interfere with access, exchange, or use of EHI that 
the actor knows includes mismatched or misattributed data or reasonably 
suspects includes such errors. Reasonable suspicion could be formed on 
various bases, such as objectively observable patterns of association 
between detected errors and a particular data source, application, 
system, or process. However, a practice of delaying the availability of 
records from any particular data source based on factors extraneous to 
matching processes and accuracy would not be excepted from the 
definition of information blocking. Examples of extraneous factors 
include, but are not limited to, whether the data source was competitor 
of the actor and whether the actor may harbor personal animus toward 
the data source.
    Comments. One commenter suggested the Preventing Harm Exception 
allow for providers to refuse to release pediatric data to direct-to-
consumer applications unless the provider was satisfied with the 
applications' ability to properly segment the data where multiple 
users' records might be stored in the same instance of the application. 
Specifically, the comment expressed a concern that if applications are 
not set up to safely handle multiple patients, data from multiple 
patients could be mixed together in ways that create a potential for 
serious harm stemming from how those data might then be used or 
interpreted.
    Response. The potential for EHI to be mismatched (or otherwise 
mishandled) by an application, whether mobile or otherwise, is neither 
unique to pediatric patients' EHI nor particular to apps that receive 
the patient's data from a provider's API. A patient whose provider has 
not yet implemented a standards-based API could use other means to get 
their EHI into their chosen direct-to-consumer app. Such means could 
include accessing view, download, and transmit functionality of the 
provider's certified health IT via the patient portal and transmitting 
an extract of their data in C-CDA format to the recipient of the 
patient's (or their legal representative's) choice. An individual or 
their representative could also exercise the individual's right of 
access under the HIPAA Privacy Rule to obtain the individual's EHI that 
is accessible under this right, in another format in which it is 
readily producible, and then upload it to an app of their choosing. In 
general, we do not believe it would be appropriate to extend the 
Preventing Harm Exception to apply to practices whereby actors would 
limit otherwise legally permissible access, exchange, or use of patient 
EHI based on concerns that a requestor will not handle patient matching 
in a manner acceptable to the actor. Therefore, this exception will not 
apply to actors' refusal to allow access, exchange, or use of EHI on 
grounds that the actor may not know, or may not be satisfied with, the 
matching methods to be used by a recipient of the EHI after the EHI has 
been securely transferred to the recipient. Provided the practices meet 
its conditions, the Security Exception (Sec.  171.203) will apply to a 
variety of practices directly related and tailored to specific security 
threats to the actor's systems and EHI within those systems that may be 
posed by particular connections or interfaces with third-party systems 
or software. We also note that practices that do not inappropriately 
discourage patients from accessing, exchanging, or using their EHI as 
they choose, but that are appropriately designed and implemented to 
help patients make more informed choices about their EHI and apps can 
be designed and implemented to avoid meeting the definition of 
information blocking finalized in Sec.  171.103.
    Comments. One commenter expressed a concern that this exception 
could become a pretext for an actor to avoid sharing EHI on basis of 
the actor not being satisfied with the accuracy achieved by a 
prospective recipient's patient matching methods. This commenter 
requested ONC clarify that this exception does not allow for an actor 
to take a position that it will not share EHI unless the requesting 
entity demonstrates it will match patients using a method, or to a 
degree of accuracy, satisfactory to the actor being requested to share 
the information.
    Response. We do not believe it would be appropriate to extend the 
Preventing Harm Exception to apply to practices whereby actors would 
limit otherwise legally permissible access, exchange, or use of patient 
EHI based on concerns that a requestor will not handle patient matching 
in a manner acceptable to the actor. Various recipients and users of 
EHI will have different purposes and contexts of data use and thus may 
appropriately deem differing levels of assurance of match accuracy 
satisfactory to meet their obligations, for patient safety or 
otherwise. Therefore, this exception will not apply to actors' refusal 
to allow access, exchange, or use of EHI on grounds that the actor may 
not know, or may not be satisfied with, the matching methods to be used 
by a recipient of the EHI after the EHI has been securely transferred 
to the recipient.
    Comments. Some commenters specifically discussed concerns about 
potential misuse of this exception on a claim of patient matching 
concerns, and that this exception could lessen actors' motivations for 
improving their patient match capabilities. Some commenters suggested 
specific additional requirements for applicability of this exception to 
practices implemented to reduce risks of harm arising from mismatch or 
misidentification of patient EHI, in order to guard against its misuse 
or potentially incentivizing stagnation in rates of patient matching 
capabilities advancement. Additional requirements that commenters 
suggested were:
     That an actor only be able to take advantage of this 
exception on basis of mismatch if the actor's matching methods met or 
exceeded a performance threshold;
     that the actor proactively communicates to requestors the 
actor's minimum matching criteria and other aspects of its matching 
methods; and
     a requirement for specific features in the actor's 
systems, such as returning informative error messages regarding match 
failures.
    Response. We are aware there is variation across actors in 
technical capabilities relevant to patient matching, resources to 
improve those capabilities, and other operational considerations. We 
are not aware of clear evidence or broad industry consensus on specific 
practices or

[[Page 25835]]

performance thresholds that should apply to across all EHI use cases 
and operational contexts. We believe it would be premature to limit the 
availability of this exception to actors able to implement specific 
practices or meet particular metrics of patient matching performance 
specified through this rulemaking. Because this exception is intended 
to except from the definition of information blocking in Sec.  171.103 
practices that are reasonable and necessary to protect patients from 
risks of cognizable harm attributable to types of risk specifically 
including risks arising from mismatched EHI, rather than to drive 
changes in patient matching practices in the industry, such 
requirements could render this exception unavailable in circumstances 
where it is intended to apply. Thus, we have determined that it is more 
appropriate to leave actors engaged in using data the discretion and 
responsibility for determining what level of certainty in the accuracy 
of record matching is necessary for their use of the EHI. We appreciate 
this opportunity to clarify that the Preventing Harm Exception would 
not excuse actors from making appropriate good faith efforts to match 
patient records, which we expect will ordinarily include communication 
and cooperation between data sources and recipients. Moreover, we 
believe an actor will generally have a natural incentive to communicate 
proactively, appropriately, and in good faith with those with whom they 
exchange data, specifically to minimize unnecessary extra processing 
and follow-up communications on the part of both exchange partners. 
Therefore, we have not modified the Preventing Harm Exception's 
conditions in response to these comments.
    Comments. One commenter expressed a concern that to ensure they do 
not release information that has potential errors in patient matching 
or attribution, they will need to invest in improved patient record 
matching accuracy, which the commenter indicates would for them include 
new technical solutions compared with their current practice.
    Response. This exception is not intended, and we are not persuaded 
that as finalized it will function, to impose a new or specific 
obligation on actors to ensure they do not release information that 
could contain latent errors. Other commenters did recommend we consider 
doing so. However, for the reasons stated above in response to those 
comments, we have not established a pre-requisite that an actor meet a 
particular threshold of patient-matching performance before this 
exception will apply to practices otherwise meeting the conditions of 
Sec.  171.201 applicable in the particular circumstances, including 
that the actor can demonstrate a reasonable belief the practice(s) will 
substantially reduce a risk of harm cognizable under Sec.  171.201. We 
emphasize that we have not established a pre-requisite for 
applicability of Sec.  171.201 that would call upon an actor to use 
particular methods, or satisfy particular threshold performance rates 
on any specific metric, for patient identification and matching.
    Comments. A few commenters requested clarification as to whether a 
patient would be liable for accessing another patient's EHI that had 
been mismatched or misattributed to the patient accessing the 
information.
    Response. This issue is outside the scope of this rulemaking. Those 
concerned or curious about it should reference Federal,\156\ State, or 
tribal law and regulations--or reliable sources of information about 
Federal,\157\ State, or tribal law and regulations--applicable to any 
individual's (or entity's) unauthorized access to or use of another's 
personally identifiable information (PII) in the particular 
jurisdiction(s) and circumstances of potential concern.
---------------------------------------------------------------------------

    \156\ Potentially applicable Federal law and regulations are not 
limited to HIPAA and the HIPAA Privacy Rule, but the HIPAA Privacy 
Rule may be a useful place for those who share interest in the 
question raised by these comments to begin obtaining additional 
information.
    \157\ Authoritative information about the HIPAA Privacy Rule is 
available in the health information privacy section of the HHS 
website, starting at https://www.hhs.gov/hipaa/.
---------------------------------------------------------------------------

    Comments. One commenter suggested creation of a hold-harmless or 
``safe harbor'' policy protecting data recipients from liability for 
actions taken in good faith reliance on information received after 
applying best-practice matching methods.
    Response. The suggestion appears to reference a safe harbor from 
liability for decisions or other actions taken in reliance on the EHI 
in question. That is outside the scope of this rule. Actors should 
implement matching methodologies and practices in full awareness that 
this final rule will not change their responsibility under other 
applicable law for maintaining appropriately reliable medical or other 
business records. This final rule also does not alter clinicians' 
responsibilities for exercising sound professional judgment in making 
clinical decisions based on EHI available to them in context of what 
they know or reasonably believe about the EHI's reliability.
    Comments. Commenters requested, in context and reference to the 
Preventing Harm Exception, guidance regarding what an actor is 
obligated to do if they receive EHI as a result of provider matching 
failure. One commenter specifically requested guidance on what sort of 
good faith efforts to direct the EHI to the correct recipient would be 
expected of an inadvertent recipient of mis-directed EHI.
    Response. A provider or other actor who receives EHI that they have 
reason to believe may have been directed to them by mistake has no 
obligation under part 171 to identify the correct recipient or to 
forward the EHI to the correct recipient. The actor who believes they 
may have received mis-directed EHI should upon forming such belief 
follow their established practices for handling of PHI and PII received 
in known or suspected error. We presume these established practices are 
consistent with Federal, State, or tribal law applicable to the 
particular actor in the particular operational circumstances.
Statement of Finalized Policy for Risks Arising From Misidentified or 
Mismatched EHI
    We are finalizing the substance of this part of the exception as 
proposed, with modifications to how it is expressed in regulation text 
in comparison with the Proposed Rule. We have reorganized the 
regulation text in response to comments requesting our regulatory text 
in general be laid out in a way that is easier to use. For example, we 
have combined risks arising from misidentified or mismatched EHI with 
other data-specific sources of risk of harm in the final Sec.  
171.201(c)(2), instead of splitting them across two paragraphs as was 
the case in Sec.  171.201(a)(1) (``corrupt or inaccurate'' in the 
Proposed Rule) and Sec.  171.201(a)(2) (``misidentified or mismatched'' 
in the Proposed Rule). We believe this makes the finalized text of 
Sec.  171.201 easier to use because misidentified, mismatched, corrupt, 
and otherwise erroneous data are all sources of risk arising from 
issues with the data rather than characteristics unique to a patient or 
their circumstances. As was the case in the Proposed Rule, additional 
conditions must be met for Sec.  171.201 to apply to practices 
implemented to substantially reduce a risk of harm arising from data 
issues (consistent with Sec.  171.201(c)(2)). In the structure of the 
finalized regulation text, these additional conditions are found in 
Sec.  171.201(a) and (b), and as applicable in the particular 
circumstances also in (d)(3) or (4), and (f)(1) or (2). Whether (d)(3) 
or (d)(4) sets out the harm

[[Page 25836]]

standard that applies to a practice an actor believes will 
substantially reduce a risk of harm consistent with Sec.  171.201(c)(2) 
turns on whether the practice is likely to, or does, interfere with a 
patient's own or another other legally permissible access, exchange, or 
use of the patient's EHI. (We note, however, that the harm required to 
satisfy this condition is the same under (d)(3) and (d)(4), as both 
cross-reference Sec.  164.524(a)(3)(i).) Whether (f)(1) or (f)(2) 
applies to a practice an actor believes will substantially reduce a 
risk of harm consistent with Sec.  171.201(c)(2) turns on whether the 
actor implements the practice based on an organizational policy (f)(1) 
or a determination based on facts and circumstances known or reasonably 
believed by the actor at the time the determination was made and while 
the practice remains in use (f)(2).
Determination by a Licensed Health Care Professional That the 
Disclosure of EHI Is Reasonably Likely To Endanger Life or Physical 
Safety (Sec.  171.201(c)(1))
    We proposed that this exception would recognize practices 
interfering with EHI access, exchange, or use in circumstances where a 
licensed health care professional has determined, in the exercise of 
professional judgment, that the access, exchange, or use of the EHI is 
reasonably likely to endanger the life or physical safety of the 
patient or another person (84 FR 7524 and 7525). As we explained, the 
clinician may have in certain cases individualized knowledge stemming 
from the clinician-patient relationship that, given the particular 
patient and that patient's circumstances, harm could result if certain 
EHI were shared or transmitted electronically. We proposed that, 
consistent with the HIPAA Privacy Rule, a decision not to provide 
access, exchange, or use of EHI on this basis would be subject to any 
right that an affected individual is afforded under applicable Federal 
or State laws to have the determination reviewed and potentially 
reversed.
    Comments. Commenters recommended that actors, such as HINs/HIEs, 
implementing practices based on a determination by a health care 
professional, not be required to take steps to review or assess the 
reasonableness of the health care professional's judgment or 
determination that a risk of harm exists or that the harm of which a 
risk was determined to exist met the standard for recognition under 
this exception.
    Response. We did not propose to require that other actors would 
ordinarily need to evaluate whether they agreed with individualized 
determinations of risk made by a licensed health care professional in 
order for the actor's application of practices consistent with that 
determination to be recognized under this exception. The finalized 
exception also does not generally require that actors relying on an 
individualized determination made by a licensed health care 
professional in the exercise of professional judgment take steps to 
review or confirm the health care professional's judgment.\158\ Actors 
other than the licensed health care professional who makes the 
determination--including but not limited to HINs/HIEs or hospitals--
could implement practices based on organizational policy (consistent 
with Sec.  171.201(f)(1) as finalized) to rely on such determinations 
upon becoming aware of the determination and until such time as they 
become aware that the determination has been reversed or revised. Such 
other actors also, either in absence of such policy or in 
particularized facts or circumstances not fully covered by their 
existing policy at the time they became aware of a licensed health care 
professional's individualized determination of risk, could demonstrate 
for those particularized circumstances the reasonable belief required 
by Sec.  171.201(a) by referencing the licensed health care 
professional's determination in making their own determination 
consistent with Sec.  171.201(f)(2).
---------------------------------------------------------------------------

    \158\ To the extent any particular actor may have an obligation 
under other Federal, state, or tribal law or regulations (as may be 
applicable in any particularized circumstances) to afford a patient 
a right of review of the determination--or to facilitate the 
patient's requesting a review of the determination from another 
actor--the actor's practices would need to be in compliance with 
such law or regulations in order for this exception to apply to 
those practices.
---------------------------------------------------------------------------

    Comments. One commenter suggested that this exception should 
recognize determinations of the existence of a risk of harm made by 
licensed health care professionals without requiring a clinician-
patient relationship.
    Response. In order for practices implemented to substantially 
reduce a type of risk consistent with finalized Sec.  171.201(c)(1) to 
be excepted under Sec.  171.201 from the definition of information 
blocking finalized in Sec.  171.103, the individualized determination 
of risk of harm in the exercise of professional judgment must be made 
by a licensed health care professional who has a current or prior 
clinician-patient relationship with the patient whose EHI is affected 
by the determination. In the preamble to the Proposed Rule (84 FR 7524) 
we explained that the clinician may have individualized knowledge 
stemming from the clinician-patient relationship that, for a particular 
patient and for that patient's circumstances, harm could result if 
certain EHI were shared or transmitted electronically. To ensure that 
both the requirement for a clinician-patient relationship and its 
specificity to individualized determinations of risk of harm by 
licensed health care professionals in the exercise of judgment are 
immediately clear to all actors, we have stated it in the finalized 
text of Sec.  171.201(c)(1). We are finalizing this as a requirement 
because a clinician who has never established a clinician-patient 
relationship to the particular patient would not be expected to have 
the same individualized knowledge of the individual patient and that 
patient's circumstances as one who has such a clinician-patient 
relationship.
    In contrast, however, we reiterate that a risk is less 
individualized when it arises from data issues (consistent with Sec.  
171.201(c)(2)) and as a result may be identified by clinicians or by 
other persons with relevant expertise, including but not limited to 
biomedical informaticists who are not licensed health care 
professionals. Nothing in Sec.  171.201 requires the involvement of a 
licensed health care professional with a clinician-patient relationship 
to any patient(s) whose data may be affected by the practices in the 
design of, or decision to implement, practices an actor reasonably 
believes will substantially reduce a risk arising from data issues 
consistent with Sec.  171.201(c)(2).
    Comments. Several commenters recommended that, in the context of a 
clinician-patient relationship, the clinician should have broader 
latitude to consider specifics of a patient's circumstances in 
determining the existence of a risk of harm or potential harm.
    Response. It may be helpful to highlight the significant and broad 
discretion inherent in the policy as we proposed it. An individualized 
determination made in the exercise of professional judgment by a 
licensed health care professional allows for that professional to 
consider a wide array of individual patient characteristics and 
circumstances and to apply all of the knowledge and skills within the 
licensed health care professional's scope of practice. The exception's 
conditions as proposed would provide licensed health care professionals 
broad discretion in how or why they form a reasonable belief that a 
cognizable risk of harm is associated with particular access, exchange, 
or use of their

[[Page 25837]]

patient's EHI (including by the patient or their legal representative). 
We have finalized this aspect of the Preventing Harm Exception as 
proposed, though we have revised how the conditions, and specific 
requirements within particular conditions, are organized and phrased in 
regulation text. Nothing in the finalized Sec.  171.201 would limit the 
types of information on which the licensed health care professional may 
rely, or the factors they may consider, in exercising their 
professional judgment to make individualized determinations of risk of 
harm consistent with Sec.  171.201(c)(1).
    Comments. A few commenters advocated for clinician discretion to 
determine whether a disclosure of health information was in the 
patient's best interest.
    Response. We believe an individual clinician's assessment of the 
patient's best interest is a less objective standard than one based on 
the exercise of professional judgment paired with a defined standard of 
cognizable harm. It would thus render the exception more difficult to 
administer as well as more susceptible to inappropriate use of the 
exception. We are finalizing the substance of this condition of the 
Preventing Harm Exception as proposed: To satisfy the conditions of the 
Preventing Harm Exception, an individualized determination by a 
licensed health care professional in the exercise of professional 
judgment must be that a risk of harm cognizable under this exception is 
associated with particular access, exchange, or use of the patient's 
EHI. The harm cognizable under this exception will be one that would be 
recognized under Sec.  164.524(a)(3)(i) (at this time, danger to the 
life or physical safety of the patient or another person) where a 
practice affects a patient's access, exchange, or use of their EHI, per 
the finalized Sec.  171.201(d)(3). Where Sec.  171.201(d)(1) or Sec.  
171.201(d)(2) applies, the harm cognizable under this exception will be 
one that would be recognized under Sec.  164.524(a)(3)(iii) or Sec.  
164.524(a)(3)(ii), respectively. At this time, the harm standard in 
both Sec.  164.524(a)(3)(iii) and Sec.  164.524(a)(3)(ii) is 
``substantial harm.'' For all legally permissible access, exchange, or 
use of the patient's EHI to which Sec.  171.201(d)(1) through (3) do 
not apply, the finalized Sec.  171.201(d)(4) applies, by cross-
reference, the same Sec.  164.524(a)(3)(i) harm standard of danger to 
the life or physical safety of the patient or another person that is 
applicable to practices interfering with the patient's access to their 
own EHI (that does not include PII of another).
    Comments. Several commenters expressed a concern that the exception 
as proposed might not sufficiently recognize the entire array of 
circumstances where persons should not be granted access, exchange, or 
use of EHI. For instance, commenters suggested no access, exchange, or 
use of a patient's EHI should be available to a person suspected to be 
abusing, or at risk of beginning to abuse, the patient. Commenters also 
suggested that the exception should recognize that broader restrictions 
of EHI access than illustrated by examples in the Proposed Rule would 
in many cases be indicated by available evidence, widely recognized 
clinical practice guidelines, or State laws applicable to instances of 
known or suspected child, intimate partner, elder, or other abuse.
    Response. This exception applies to practices the actor reasonably 
believes will substantially reduce a risk of harm determined on an 
individualized basis in the exercise of professional judgment by a 
licensed health care professional with a clinician-patient relationship 
with the patient whose EHI is affected by the determination (finalized 
Sec.  171.201(c)(1)). Moreover, and as we noted in the Proposed Rule 
(84 FR 7524), this exception would apply when an actor implements 
practices that are likely to interfere with the access, exchange, or 
use of a patient's EHI pursuant to electing to not treat a person as a 
personal representative in accordance with 45 CFR 164.502(g)(5). We 
have finalized the substance of this feature of the exception as 
proposed, though 45 CFR 164.502(g)(5) is not expressly referenced in 
the final regulation text.
    The listed examples described in the Proposed Rule were intended to 
be illustrative, not exhaustive. There are many other situations where 
the Preventing Harm Exception will apply to an actor's practices so 
long as the conditions of the exception are otherwise met. As another 
illustrative example, if a determination of risk of harm consistent 
with Sec.  171.201(c)(1) indicates that a broad withholding of the 
patient's EHI from a known, suspected, or potential abuser is 
reasonably likely to substantially reduce a risk of harm to the patient 
or another person, then the exception will apply to those practices so 
long as its conditions are met in full. Moreover, provided its 
conditions are met in full, this exception will also apply to practices 
that may be likely to, or do, interfere with a legal representative's 
access, exchange, or use of a patient's EHI to a lesser degree than 
might an election not to recognize the representative as the patient's 
personal representative in accordance with Sec.  164.502(g)(5)(i). 
Because the finalized Sec.  171.201(d)(1) applies when a practice is 
likely to, or does, interfere with a legal representative's access to 
the patient's EHI, the harm standard required in such a situation is 
that stated in Sec.  164.524(a)(3)(iii). Currently, that harm standard 
is ``substantial harm.''
    We also expressly note that, although the ``substantial harm'' 
standard applied by Sec.  171.201(d)(1) through cross-reference to 
Sec.  164.524(a)(3)(iii) is not precisely the same as the requirement 
in Sec.  164.502(g)(5)(i), we will interpret as sufficient for purposes 
of Sec.  171.201(c)(1) and (d)(1) a licensed health care professional's 
election not to treat a person as the patient's legal representative in 
accordance with Sec.  164.502(g)(5)(i). Moreover, having noted above 
the broad discretion licensed health care professionals have regarding 
what information to factor into their individualized determinations 
consistent with Sec.  171.201(c)(1), we highlight that this broad 
discretion would allow them to consider any knowledge they might have 
of another licensed health care professional, or other type of covered 
entity, having elected in accordance with Sec.  164.502(g)(5)(i) not to 
treat a person as the patient's representative.
    Comments. Some comments implied concerns about the potential 
conflict between the documentation requirements of this exception and 
those required under other applicable law.
    Response. Provided its conditions are met, this exception is 
applicable in circumstances where a licensed health care professional 
in the exercise of professional judgment has determined that there is a 
risk of abuse beginning, as well as circumstances in which prior or 
ongoing abuse is known or suspected. Actors have significant discretion 
and flexibility in determining how best to document determinations and 
the bases for their determinations. Where other law or regulations--
Federal, State, or tribal--require a specific form, manner, or content 
of documentation in circumstances that would serve as basis for 
individualized determinations consistent with the finalized Sec.  
171.201(c)(1), we would consider that documentation relevant to 
assessing the applicability of this exception to those practices. In 
order to avoid potentially duplicative or other unnecessary burdens on 
licensed health care professionals or other actors, we have decided not 
to establish at this time a specific documentation condition and have 
decided not to establish other

[[Page 25838]]

unique documentation requirements for this exception.
    Comments. In reference to a specific illustrative example in the 
Proposed Rule, one commenter indicated that withholding or delaying 
availability of only specific sensitive data elements may not be 
sufficient in circumstances such as those described in the Proposed 
Rule example, and that revoking a suspected abuser's proxy access on 
the whole may be more clinically appropriate in such circumstances (84 
FR 7525).
    Response. In response to this comment, we first clarify the intent 
and function of the example provided in the Proposed Rule. In the 
example, the licensed health care professional in the exercise of 
professional judgment had determined that only some information within 
the record would need to be withheld from the patient's partner's proxy 
access to her EHI (84 FR 7525). Although not specifically stated in the 
Proposed Rule, the example presumes a mature technical capability to 
sequester data from specific user(s) on an itemized basis. The example 
also presumes that the licensed health care professional, in their 
exercise of professional judgment, had not formed a reasonable belief 
that ceasing to recognize the patient's partner as her personal 
representative, and entirely revoking the partner's proxy access to her 
EHI, would substantially reduce a risk of harm to the patient. We 
intended that the example illustrate that where the licensed health 
care professional determined a risk of harm would arise from making a 
specific piece of information accessible to the patient's proxy, the 
minimum interference necessary to substantially reduce that risk of 
harm would be to withhold that specific piece of information from the 
patient's partner's proxy access to her EHI.
    Comments. A commenter indicated that if a clinician has a suspicion 
(confirmed or not) that the patient is suffering intimate partner or 
elder abuse, it is considered clinically important that notes or other 
data elements indicating the suspicion not be released to the patient 
in the company of the suspected abuser. The commenter stated that such 
disclosure could undermine the clinician's ability to help the patient 
because the patient would likely be forced to switch clinicians. The 
comment also indicated there may be a risk that an abuser could harm 
the patient as a result of the disclosure of the clinician's suspicion.
    Response. Because information blocking policy is specific to the 
access, exchange, and use of EHI, we read the commenter's example as 
suggesting two considerations specific to access, exchange, and use of 
EHI. First, we believe the comment indicates we should expressly 
acknowledge that these types of situations are often legally as well as 
clinically complex. It is not our intent that our policies 
unnecessarily add to this complexity. It is also not our intent that 
our policies undermine the ability of a licensed health care 
professional, or other actor relying on the professional's 
determination, to take appropriate steps to reduce abuse risks to which 
the professional's patients would otherwise be exposed. Nothing in 
Sec.  171.201, or in the information blocking provisions generally, 
requires an actor to disclose their awareness or suspicion of abuse to 
the patient's legal representative in order to satisfy the conditions 
of the Preventing Harm Exception. Second, our understanding of this 
comment indicates that in some particular individualized circumstances 
the licensed health care professional may determine in the exercise of 
professional judgment that to substantially reduce a risk of harm it 
may be necessary to withhold some portions of a patient's EHI from the 
patient's own access through an API or patient portal. We can, for 
example, envision possible circumstances where a licensed health care 
professional with a clinician-patient relationship to the patient knows 
or has reason to believe that a person suspected of abusing a patient 
routinely ``looks over the shoulder'' of the patient while they access 
their EHI, or uses the patient's own credentials to access the 
patient's EHI. In such circumstances, this exception would apply to 
practices interfering with the patient's own access to their EHI to the 
extent the practices are not inconsistent with the HIPAA Privacy Rule 
or the conditions in Sec.  171.201.
    Comments. Several commenters suggested that the Preventing Harm 
Exception should recognize more types of abuse, and a broader array of 
potential types of harm than danger to life or physical safety in the 
context of interfering with access to a patient's EHI by a legal 
representative suspected of abusing the patient. One commenter 
advocated that the Preventing Harm Exception should recognize all types 
of violence and abuse. The commenter provided citations to professional 
specialty expert committee opinions in support of their recommendation.
    Response. As discussed above in reference to comments that 
recommended aligning this rule's harm standards more closely to the 
HIPAA Privacy Rule, we have, by cross-reference in Sec.  171.201(d)(1), 
finalized as the harm standard applicable to practices interfering with 
a legal representative's access to a patient's EHI the same harm 
standard that would apply to denying a personal representative's access 
to an individual's PHI under Sec.  164.524(a)(3)(iii). As Sec.  
164.524(a)(3)(iii) stands at the time this rule is finalized, it 
references ``substantial harm.'' As discussed above, this exception 
will also apply to practices likely to interfere with a legal 
representative's access, exchange, or use that are employed pursuant to 
an election not to treat that legal representative as a personal 
representative in accordance with Sec.  164.502(g)(5)(i). For purposes 
of Sec.  171.201, ``substantial harm'' is interpreted as it is for 
purposes of Sec.  164.524(a)(3)(iii). Thus, for purposes of not 
recognizing a personal representative, or otherwise restricting patient 
EHI access, exchange, or use by a representative known or suspected to 
be abusing the patient, we believe the harm standard applicable under 
this exception to practices affecting a legal representative's access, 
exchange, or use of the patient's EHI is sufficiently broad. We 
interpret the discretion afforded to a licensed health care 
professional in making an individualized determination of risk of harm 
consistent with the finalized Sec.  171.201(c)(1) (type of risk 
condition) as allowing them to take into consideration clinical 
practice guidelines and clinical expert groups' studied opinions 
relevant to abuse-related risks of substantial harm. Only practices 
based on the potential for harms that would not be recognized as 
meeting the ``substantial harm'' standard, as it is interpreted by the 
HHS Office for Civil Rights for purposes of Sec.  164.524(a)(3)(iii), 
would fail to satisfy the type of harm condition finalized in Sec.  
171.201(d)(1). We remind actors that any decision not to provide 
access, exchange, or use of EHI on the basis of determination of risk 
of harm consistent with the finalized Sec.  171.201(c)(1) and Sec.  
171.201(d)(1), (2), (3), or (4) is subject to rights the individual 
patient whose EHI is affected may be afforded by applicable regulations 
or law to have the determination reviewed and potentially reversed. 
(See the ``patient right to request review of individualized 
determination of risk of harm'' condition finalized in Sec.  
171.201(e), for which we also use ``patient review rights condition'' 
as a short form of reference for ease of discussion.) Where Sec.  
164.524(a)(3) applies in addition to Sec.  171.201, Sec.  164.524(a)(4) 
specifically

[[Page 25839]]

provides for review of determinations made by licensed health care 
professionals in the exercise of professional judgment. In 
circumstances where Sec.  171.201 applies but Sec.  164.524 does not, 
Sec.  171.201(e) requires that an actor's practices be consistent with 
any rights of review of individualized determinations of risk of harm 
that the patient may be afforded under applicable Federal, State, or 
tribal law or regulations. However, for purposes of Sec.  171.201(c)(1) 
determinations, the type of harm must be consistent with: The harm 
standard stated in Sec.  164.524(a)(3)(i) (interpreted as it is for 
purposes of Sec.  164.524(a)(3)(i)) where Sec.  171.201(d)(3) or (4) 
apply; the harm standard stated in Sec.  164.524(a)(3)(ii) (interpreted 
as it is for purposes of Sec.  164.524(a)(3)(ii)) where Sec.  
171.201(d)(2) applies; or the harm standard stated in Sec.  
164.524(a)(3)(iii) (interpreted as it is for purposes of Sec.  
164.524(a)(3)(iii)) where Sec.  171.201(d)(1) applies.
Finalized Policy for an Individualized Determination of Risk of Harm by 
a Licensed Health Care Professional in the Exercise of Professional 
Judgment
    We are finalizing the substance of this aspect of the exception 
with modifications to the way it is displayed and phrased in the 
finalized regulation text in comparison to the Proposed Rule. If its 
other conditions are also met, the finalized Preventing Harm Exception 
will apply to a practice an actor reasonably believes will 
substantially reduce a risk of harm consistent with the sub-paragraph 
of Sec.  171.201(d), as finalized, that applies to the specific access, 
exchange, or use, where the risk of harm is determined on an 
individualized basis in the exercise of professional judgment by a 
licensed health care professional who has a current or prior clinician-
patient relationship with the patient whose EHI is affected by the 
determination. In comparison to the proposed text of Sec.  171.201 (84 
FR 7602), we have reorganized the regulation text in response to 
comments requesting our regulatory text, in general, be easier to use 
for purposes such as understanding how the conditions of the exception 
relate to one another and how they apply to practices used in 
particular types of circumstances. We have left the potential sources 
of risk of harm in a single paragraph (finalized Sec.  171.201(c)), but 
separated them from the reasonable belief condition paragraph 
(finalized Sec.  171.201(a)). The sources of risk of harm are also, as 
discussed above, presented in two sub-paragraphs in the finalized text 
of Sec.  171.201(c) (type of harm) instead of being split across three 
sub-paragraphs as they were in the Proposed Rule.
    In subparagraph (a)(3) of the proposed text of Sec.  171.201 (84 FR 
7602), we expressed the additional condition that practices based on 
individualized determinations of risk of harm are subject to any rights 
of review of the determination that the patient may be afforded under 
applicable law. This patient review rights condition is finalized in 
Sec.  171.201(e). As finalized, this condition requires that where a 
risk of harm is determined on an individualized basis (consistent with 
Sec.  171.201(c)(1) as finalized), the actor must honor any rights the 
individual patient whose EHI is affected may have under Sec.  
164.524(a)(4) or any Federal, State, or tribal law applicable in the 
circumstances to have the determination reviewed and potentially 
reversed. We have stated the condition for providing review rights 
afforded by law in the separate paragraph (e) of Sec.  171.201 instead 
of including it within subparagraph (c)(1) because in the context of 
171.201 the patient review rights condition functions as a condition on 
how practices based on such belief are implemented more than as a 
required characteristic of the Sec.  171.201(c)(1) determination 
itself.
    The finalized text of Sec.  171.201(c)(1) also differs from the 
proposed regulation text specific to individualized determinations of 
risk in explicitly stating the requirement that the licensed health 
care professional making the determination must have a current or prior 
clinician-patient relationship with the patient whose EHI is affected 
by the determination. For purposes of Sec.  171.201--as we discussed in 
the Proposed Rule's preamble, and above in this preamble--we believe 
the broad discretion afforded to licensed health care professionals to 
make individualized determinations of risks of harm in the exercise of 
professional judgment is appropriate in the context of the expectation 
that a licensed health care professional with a clinician-patient 
relationship to a patient has the opportunity to have knowledge of the 
patient and their individual circumstances that is not generally 
available outside the context of a clinician-patient relationship. We 
believe that explicitly stating in Sec.  171.201(c)(1) the requirement 
for a clinician-patient relationship accomplishes two purposes: First, 
it ensures that this is immediately clear on the face of the finalized 
regulation text that only determinations made by licensed health care 
professionals who have or have had a clinician-patient relationship 
with the patient will be considered consistent with Sec.  
171.201(c)(1); and, second, it is also clear that the condition for a 
clinician-patient relationship is specific and limited to 
determinations of risks of harm on an individualized basis in the 
exercise of professional judgment by a licensed health care 
professional (Sec.  171.201(c)(1) as finalized). Please note that this 
requirement is specific to the individualized determination of risk of 
harm, and does not limit application of Sec.  171.201 to practices 
implemented directly by the licensed health care professional making a 
determination of risk of harm consistent with Sec.  171.201(c)(1) as 
finalized. Appropriately tailored practices applied because the actor 
has a reasonable belief the practice will substantially reduce a risk 
of harm that was determined on an individualized basis consistent with 
Sec.  171.201(c)(1) will, if all other applicable conditions of Sec.  
171.201 are met, be recognized under this exception whether the 
practices are undertaken by the licensed health care professional 
making the determination or by another actor (e.g., another licensed 
health care professional, a hospital, or a HIN) having custody or 
control of the patient's EHI and knowledge of the individualized 
determination of risk of harm associated with particular access(es), 
exchange(s), or use(s) of that EHI.
    As finalized, Sec.  171.201(d) differs from the proposed policy in 
that it does not uniformly require that the risk determined on an 
individualized basis be to life or physical safety of the patient or 
another person in all circumstances. Instead, through specified cross-
references to the sub-paragraphs of Sec.  164.524(a)(3), the finalized 
Sec.  171.201(d) type of harm condition uses the same harm standards 
for the circumstances where both the Preventing Harm Exception and 
Sec.  164.524(a)(3) apply. Also through cross-references, the type of 
harm condition applies the Sec.  164.524(a)(3) harm standards in 
circumstances similar to those in which Sec.  164.524(a)(3) applies but 
where only Sec.  171.201 actually applies. The finalized Sec.  
171.201(d) does not cross-reference Sec.  164.502(g)(5)(i), but it is 
constructed so that it does apply to practices interfering with a 
personal representative or other legal representative's access to a 
patient's EHI consistent with an actor declining to recognize such a 
representative on the same bases as a HIPAA covered entity could elect 
not to recognize a person as an individual's personal representative 
consistent with Sec.  164.502(g)(5)(i). In order to retain a clear, 
consistent set of

[[Page 25840]]

harm standards throughout the Sec.  171.201 type of harm condition, 
however, we note that where a HIPAA covered entity elects not to 
recognize an individual's personal representative consistent with Sec.  
164.502(g)(5)(ii), the Preventing Harm Exception would not apply.\159\
---------------------------------------------------------------------------

    \159\ Because Sec.  164.502(g)(5)(ii) currently applies a 
standard not of harm but of determination by the covered entity that 
recognizing a person as personal representative is not in the best 
interest of the individual, we have determined it is more 
appropriate to address these circumstances in context of the 
exception for practices promoting privacy of EHI, finalized in Sec.  
171.202 and discussed in Section VIII.D.1.b of this final rule 
preamble.
---------------------------------------------------------------------------

    Consistent with the HIPAA Privacy Rule, a decision not to provide 
access, exchange, or use of EHI on the basis finalized in Sec.  
171.201(c)(1) is subject to the rights the individual patient whose EHI 
is affected may be afforded by applicable law to have the determination 
reviewed and potentially reversed. While any such determination reviews 
may be pending, application of practices interfering with the patient's 
access, exchange, or use of their EHI based on an individualized 
determination by a licensed health care professional (Sec.  171.201(c)) 
that are otherwise compliant with the conditions of Sec.  171.201 as a 
whole will be considered to be covered by the exception.
    Upon becoming aware of a reversal of the determination on which the 
actor's required reasonable belief was based, whether as a result of a 
review requested by the patient or other processes, the actor's 
continued application of practices based on the original determination 
would no longer be consistent with the conditions of Sec.  171.201. 
Likewise, upon becoming aware of a revision of the determination on 
which the actor's required reasonable belief was originally based, 
whether the revision resulted from a review requested by the patient or 
other processes, practices applied to the patient's EHI after the 
revision is made will need to comply with the conditions of Sec.  
171.201 in light of the revised determination in order for the practice 
to continue to be covered under Sec.  171.201.
    For the specific purposes of Sec.  171.201, the rights to obtain 
review or reconsideration of a provider's individualized determination 
of risk of harm reside with the patient whose EHI is affected. The 
rights in many cases may be exercised on the patient's behalf by the 
patient's personal or other legal representative. However, it may not 
be appropriate, or feasible, for the patient's representative to 
exercise the patient's review rights in circumstances where the 
individualized determination of risk of harm is or includes a 
determination that recognizing that same person as the patient's 
representative, or providing specific information to that same 
recognized representative, would pose a risk of cognizable harm. In a 
circumstance where the actor has a reasonable belief that such 
disclosure could create or increase a risk of harm to the patient, this 
exception does not require the candid disclosure to a known, suspected, 
or potential abuser of the rationale for use of particular practices, 
or even the precise practices, interfering with that representative's 
access, exchange, or use of EHI. We would, however, generally expect 
actors to be as candid with the patient per se as is clinically 
appropriate and safely practicable in their individualized 
circumstances.
    Where an actor lacks the technical capability to sequester only 
that EHI the actor reasonably believes poses a risk of cognizable harm 
from other data for which the actor does not pose such risk of harm, 
this lack of segmentation capability would not render Sec.  171.201 
applicable to practices likely to, or that do, interfere with access, 
exchange, or use of the other data. Rather, where such lack of 
segmentation capabilities renders the actor unable to support an 
otherwise legally permissible access, exchange, or use of EHI, the 
actor should reference the Content and Manner Exception (Sec.  171.301) 
or the Infeasibility Exception (Sec.  171.204).
    Licensed health care professionals have discretion to determine how 
to use their EHRs and/or other records kept in their ordinary course of 
business to capture and preserve documentation of and relevant to their 
individualized determinations. Information relevant to determinations 
would include the facts or circumstances that substantially informed 
each determination, and any other decision-making information that the 
professional may otherwise have difficulty recalling or reconstructing 
if later asked to explain how or why they reached their individualized 
determination in a particular case.
Practices Implemented Based on an Organizational Policy or on 
Determination Specific to the Facts and Circumstances
    To qualify for the Preventing Harm Exception, we proposed that an 
actor would be required to have, while engaging in the practice(s) for 
which application of the exception is claimed, a reasonable belief that 
the practice(s) will ``directly and substantially'' \160\ reduce the 
likelihood of harm to a patient or another person. As discussed in the 
Proposed Rule and above, the type of risk and the potential harm must 
also be cognizable under this exception (84 FR 7525 and 7526).
---------------------------------------------------------------------------

    \160\ As, and for the reasons, discussed earlier in this section 
of this preamble, we have removed ``directly and'' from the belief 
standard finalized in Sec.  171.201(a).
---------------------------------------------------------------------------

    Under Sec.  171.201 as proposed, an actor would be able to 
demonstrate having satisfied the condition of reasonable belief that a 
practice will reduce the likelihood of harm (``reasonable belief 
condition'') through a qualifying organizational policy (proposed Sec.  
171.201(b)) and/or a qualifying individualized determination (proposed 
Sec.  171.201(c)). We discuss below the details of our proposal, 
respond to comments, and summarize finalized policy specific to each of 
these approaches to demonstrating the required reasonable belief that a 
practice will substantially \161\ reduce a risk of harm cognizable 
under this exception.
---------------------------------------------------------------------------

    \161\ As, and for the reasons, discussed earlier in this section 
of this preamble, the belief standard finalized in Sec.  171.201(a) 
requires the actor believe the practice will ``substantially 
reduce'' a risk of harm to a patient or another natural person that 
would otherwise arise from the access, exchange, or use of 
electronic health information affected by the practice.
---------------------------------------------------------------------------

Practices Implemented Based on an Organizational Policy
    In the Proposed Rule (84 FR 7525), we proposed that to qualify for 
this exception, an actor must have had a reasonable belief that the 
practice or practices will directly and substantially reduce the 
likelihood of harm to a patient or another person and that the type of 
risk must also be cognizable under this exception. We proposed that an 
actor could meet this condition in two ways: Through a ``qualifying 
organizational policy'' (Sec.  171.201(b) as proposed) or through a 
``qualifying individualized finding'' (Sec.  171.201(c) as proposed). 
We stated in the Proposed Rule that we anticipate that in most 
instances where Sec.  171.201 would apply, the actor would demonstrate 
that the practices it engaged in were consistent with an organizational 
policy that was objectively reasonable and no broader than necessary 
for the type of patient safety risks at issue. We also noted in the 
Proposed Rule that within any type of actor defined in Sec.  171.102, 
organizations may vary significantly in structure, size, and resources. 
Further, even when an organizational policy exists, it may not 
anticipate all of the potential risks of harm that could arise in real-
world clinical or production

[[Page 25841]]

environments of health IT. Thus, we proposed in Sec.  171.201(c) (84 FR 
7602) that in lieu of demonstrating that a practice conformed to a 
policy that met the conditions described in proposed Sec.  171.201(b) 
and the Proposed Rule preamble at 84 FR 7525, the actor could justify 
the practice(s) directly by making a finding in each case, based on the 
particularized facts and circumstances.
    We proposed that where the proposed Sec.  171.201(b) (84 FR 7602) 
would apply, an actor's policy would need to be:
     In writing;
     developed with meaningful input from clinical, technical, 
and other appropriate staff or others who have expertise or insight 
relevant to the risk of harm that the policy addresses;
     implemented in a consistent and non-discriminatory manner; 
and
     no broader than necessary to mitigate the risk of harm.
    We stated that the proposed condition would not be met if, for 
example, a hospital imposed top-down information sharing policies or 
workflows established by the hospital's EHR developer and approved by 
hospital administrators without meaningful input from the medical 
staff, IT department, and front-line clinicians who are in the best 
position to gauge how effective it will be at mitigating patient safety 
risks.
    Comments. Commenters expressed concern that information blocking 
policy and its interaction with other applicable laws and regulations, 
such as the HIPAA Rules, are complex and that there will be costs and 
other burden associated with understanding how the policies affect an 
actor's daily operations. Commenters also expressed concern that it 
would be too burdensome to be required to demonstrate, in any of the 
ways we proposed, that they have a reasonable belief that practices 
would reduce a risk of cognizable harm.
    Response. We understand that complexity can increase difficulty in 
understanding and complying with any regulation. We also understand 
that the interaction between the HIPAA Rules and the information 
blocking provision is inherently complex. However, without an exception 
from the information blocking definition for practices appropriately 
tailored to reduce risks of harm, we believe actors would be subject to 
the greater burden of needing to craft practices that avoid violating 
the information blocking provision without also making EHI available 
for access, exchange, or use in circumstances where that puts patients 
or other natural persons at risk of harm. This exception's conditions 
give actors a framework within which they can develop or refine their 
practices in assurance that practices meeting the conditions in Sec.  
171.201 are excepted from the definition of information blocking 
finalized in Sec.  171.103. At the same time, implementing such an 
exception without appropriate conditions could have the unintended and 
undesirable effect of excusing conduct that would more appropriately 
remain within the definition of information blocking.
    Therefore, in Sec.  171.201, we have finalized conditions that 
strike a practical balance between minimizing burdens on actors and 
ensuring that the interests of patients in the access, exchange, and 
use of their EHI are adequately protected. These conditions are, in 
comparison to the Proposed Rule, more granularly and durably aligned 
with relevant HIPAA right of access provisions (Sec.  164.526(a)(3)) 
and this alignment reduces complexity.
    We have revised the way the regulation text is presented and 
phrased so that it is easier to understand what is required in order 
for a practice to be excepted from the definition of information 
blocking under this exception. Moreover, we have avoided specifying 
particular or unique forms, methods, or content of documentation for 
purposes of this exception. We believe the flexibility this offers 
actors to determine the most efficient approach to documenting their 
practices and determinations relevant to this exception enables them to 
achieve and document satisfaction of the exception's condition with the 
lowest practicable burden.
    Comments. A number of commenters noted that there will be burden 
associated with developing or revising organizational policies and 
training staff so they can use this exception in compliance with its 
conditions. Several of these commenters suggested we provide additional 
guidance and informational resources, in this final rule or otherwise, 
to help actors develop their policies and staff training. Some 
commenters advocated that we develop templates or models that actors 
could use to more efficiently develop policies consistent with the 
conditions for applicability of this exception.
    Response. We appreciate the feedback and do recognize that 
developing or revising internal policies and procedures when compliance 
requirements change due to changes in law requires some effort. While 
recognizing the utility of the types of resource materials suggested by 
commenters, we believe they are best developed and provided outside the 
rulemaking process. We will continue working to engage with the 
stakeholder communities to promote understanding and foster compliance 
with the information blocking provision amongst all actors within the 
definitions in Sec.  171.102. We also believe that in many cases 
voluntary groups with relevant expertise, such as professional 
societies and provider organizations, may be in the best position to 
develop resources tailored to the particular needs and preferences of 
specific segments or communities within any given type of actor.
    Comments. Some commenters stating that developing new or revised 
organizational policies and training staff in the policies requires 
time recommended that we establish a grace period before organizations' 
policies and actual practices must fully comply with Sec.  171.201 
conditions in order to be recognized as reasonable and necessary under 
Sec.  171.201.
    Response. This concern is not unique to Sec.  171.201. Commenters 
also raised this concern in the context of information blocking in 
general. As we stated in section VIII.B.3 of this preamble, we thank 
commenters for their input. Comments related to the overall timing of 
information blocking enforcement have been shared with OIG. We 
emphasize that individuals and entities subject to the information 
blocking provision must comply with the ONC final rule as of the 
compliance date of the information blocking section of this final rule 
(45 CFR part 171). We have finalized a compliance date for 45 CFR part 
171 as a whole that is six months after the date this final rule is 
published in the Federal Register.
    OIG and ONC are coordinating timing of the compliance date of the 
information blocking section of this final rule (45 CFR part 171) and 
the start of information blocking enforcement. We are providing the 
following information on timing for actors. Enforcement of information 
blocking CMPs in section 3022(b)(2)(A) of the PHSA will not begin until 
established by future notice and comment rulemaking by OIG. As a 
result, actors would not be subject to penalties until CMP rules are 
final. At a minimum, the timeframe for enforcement would not begin 
sooner than the compliance date of the information blocking section of 
this final rule (45 CFR part 171) and will depend on when the CMP rules 
are final. Discretion will be exercised such that conduct that occurs 
before that time will not be subject to information blocking CMP.
    Specific to Sec.  171.201, as discussed above in response to other 
comments

[[Page 25842]]

received specific to the Preventing Harm Exception, we have applied 
Sec.  164.524(a)(3) harm standards under Sec.  171.201 to circumstances 
where both sections of 45 CFR would apply, and to circumstances where 
only Sec.  171.201 applies but that are similar in significant respects 
to circumstances where Sec.  164.524(a)(3) applies. In substantial part 
because of this alignment, we do not believe there is a need to delay 
the applicability of any of the conditions for a practice to be 
excepted under Sec.  171.201 from the definition of information 
blocking in Sec.  171.103.
    Actors who are also HIPAA covered entities or business associates 
should already have policies in place consistent with the HIPAA Privacy 
Rule, including but not limited to Sec.  164.524(a)(3). These actors 
and their staff members should be well versed in these policies and 
practices. Where Sec.  164.524(a)(3) would not apply but Sec.  
171.201(d)(3) or (4) would apply, we believe using the same, familiar 
standard for the risk that the actor must believe their practice would 
reduce as would apply to Sec.  164.524(a)(3)(i) should facilitate 
efficient updates to organizational policies and streamline any staff 
training that may be indicated specific to Sec.  171.201. We also note 
that the finalized Preventing Harm Exception also provides, in Sec.  
171.201(f)(2), for coverage of practices implemented in absence of an 
applicable organizational policy or where existing organizational 
policy does not address the particular practice in the particularized 
circumstances. Moreover, although we encourage actors to voluntarily 
conform their practices to the conditions of an exception suited to the 
practice and its purpose, an actor's choice to do so simply provides 
them an enhanced level of assurance that the practices do not meet the 
definition of information blocking. However, failure to meet an 
exception does not necessarily mean a practice meets the definition of 
information blocking. We reiterate, if subject to an investigation by 
HHS, each practice that implicates the information blocking provision 
would be analyzed on a case-by-case basis.
    Comments. Several commenters indicated that providers' current 
organizational policies call for practices that delay the release of 
laboratory results so that the patient's clinician has an opportunity 
to review the results before potentially needing to respond to patient 
questions, or has an opportunity to communicate the results to the 
patient in a way that builds the clinician-patient relationship. Some 
commenters indicated their standard practice is to automatically time-
delay release of results in general, with an automatic release at the 
end of a time period determined by the organizational policy in place 
to ensure that patients can consistently access their information 
within the timeframe targeted by relevant measures under the CMS 
Promoting Interoperability Programs. Commenters requested we clarify 
whether such practices would be recognized under Sec.  171.201 or that 
we recognize such current organizational policies and practices as 
excepted from the definition of information blocking.
    Response. While we recognize the importance of effective clinician-
patient relationships and patient communications, we are not persuaded 
that routinely time-delaying the availability of broad classes of EHI 
should be recognized as excepted from the information blocking 
definition under this exception. Consistent with Sec.  171.201(d)(3) as 
finalized, the harm of which a practice must reduce a risk must, where 
the practice interferes with the patient's access to their own EHI, be 
one that could justify denying the patient's right of access to PHI 
under Sec.  164.524(a)(3). Currently, Sec.  164.524(a)(3)(i) requires 
that for a covered entity to deny an individual access to their PHI 
within the designated record set, the disclosure of that PHI must be 
reasonably likely to endanger the life or physical safety of the 
patient or another person.\162\ No commenter cited evidence that 
routinely delaying EHI availability to patients in the interest of 
fostering clinician-patient relationships substantially reduces danger 
to life or physical safety of patients or other persons that would 
otherwise routinely arise from patients' choosing to access the 
information as soon as it is finalized.
---------------------------------------------------------------------------

    \162\ Note that for purposes of Sec.  164.524(a)(3)(i), 
``individual'' is defined in Sec.  160.103, but for purposes of 
Sec.  171.201 an actor must reasonably believe a practice will 
substantially reduce a risk of cognizable harm to patient(s) or 
other natural person(s).
---------------------------------------------------------------------------

    Moreover, we are independently aware, and some comment submissions 
confirmed, that it is not uncommon to automatically release lab and 
other findings to patients electronically regardless of whether a 
clinician has seen the information or discussed it with the patient 
before the patient can choose to access it electronically. We presume 
these types of automatic releases would not be the case if patients' 
accessing their information on a timeframe that is more of their own 
choosing routinely posed a risk to the life or physical safety of these 
patients or other natural persons. Thus, we believe that where 
applicable law does not prohibit making particular information 
available to a patient electronically before it has been conveyed in 
another way, deference should generally be afforded to patients' right 
to choose whether to access their data as soon as it is available or 
wait for the provider to contact them to discuss their results. Only in 
specific circumstances do we believe delaying patients' access to their 
health information so that providers retain full control over when and 
how it is communicated could be both necessary and reasonable for 
purposes of substantially reducing a risk of harm cognizable under 
Sec.  171.201(d) (as finalized). Circumstances where Sec.  171.201 
would apply to such delay are those where a licensed health care 
professional has made an individualized determination of risk in the 
exercise of professional judgment consistent with Sec.  171.201(c)(1), 
whether the actor implementing the practice is the licensed health care 
professional acting directly on their own determination or another 
actor implementing the delay in reliance on that determination. An 
actor could choose to demonstrate the reasonable belief required by 
Sec.  171.201(a) through an organizational policy (Sec.  171.201(f)(1)) 
with which the practice is consistent, or based on a determination 
based on facts and circumstances known or reasonably believed by the 
actor at the time the determination was made and while the practice 
remains in use (Sec.  171.201(f)(2)), to rely on a determination 
consistent with Sec.  171.201(c)(1).
    Comments. Health care professionals commented that clinical 
experience indicates a systematic and substantial risk that releasing 
some patient data through a patient portal or API without first 
communicating the particular results or diagnosis with the patient in a 
more interactive venue would pose risks of substantial harm to 
patients. One example commenters specifically cited was genetic testing 
results indicating a high risk of developing a neurodegenerative 
disease for which there is no effective treatment or cure. Commenters 
recommended that we define this exception to allowing delay of the 
electronic release of such genetic testing results, as a matter of 
organizational policy, to ensure patients and their families are not 
exposed to this information without appropriate counseling and context. 
One comment indicated that delivery by the clinician of the combined 
results, counseling, and context is clinically appropriate and 
consistent with the conclusions of relevant research.

[[Page 25843]]

    Response. To satisfy the conditions of Sec.  171.201, and actor 
would have to demonstrate that they held a reasonable belief that 
delaying availability of information until the information can be 
delivered in combination with appropriate counseling and context in an 
interactive venue will substantially reduce a risk of harm cognizable 
under this exception. An actor could accomplish such demonstration 
through showing the practice is consistent with either an 
organizational policy meeting Sec.  171.201(f)(1) or a determination 
based on facts and circumstances known or reasonably believed by the 
actor at the time the determination was made and while the practice 
remains in use meeting Sec.  171.201(f)(2). However, for a practice 
likely to, or that does in fact, interfere with the patient's access to 
their own EHI (Sec.  171.201(d)(3)), the actor implementing these 
practices must demonstrate a reasonable belief that the practice will 
substantially reduce a risk of harm to the life or physical safety of 
the patient. The clinician who orders testing of the sort referenced in 
the comment would, we presume, do so in the context of a clinician-
patient relationship. In the context of that relationship, a licensed 
health care professional should be well positioned to make 
determinations consistent with Sec.  171.201(c)(1) as to specifically 
when their patients, or other particular natural persons, would face a 
risk of harm cognizable under Sec.  171.201(d)(3)--or Sec.  
171.201(d)(1) or (2) if or as may be applicable--if the access, 
exchange, or use of a particular testing result or diagnosis were to be 
released electronically before it could be explained and contextualized 
by an appropriately skilled professional, such as a clinician or a 
health educator, in real time.
Summary of Finalized Policy: Practices Implemented Based on an 
Organizational Policy
    We have finalized that to demonstrate the reasonable belief 
required by Sec.  171.201(a) based on an organizational policy, the 
policy must:
    (i) Be in writing;
    (ii) Be based on relevant clinical, technical, and other 
appropriate expertise;
    (iii) Be implemented in a consistent and non-discriminatory manner;
    (iv) Conform each practice to the conditions in paragraphs (a) and 
(b) of this section, as well as the conditions of paragraphs (c) 
through (e) of this section applicable to the practice and its use.
    We have modified the regulation text finalized in Sec.  
171.201(f)(1) consistent with other revisions to Sec.  171.201. We have 
redesignated this paragraph from (b) to (f)(1), and redesignated its 
proposed sub-paragraphs from (1) through (4) to (i) through (iv). We 
have in comparison to the main paragraph language of the proposed Sec.  
171.201(b) modified the phrasing of the finalized paragraph (f) so that 
Sec.  171.201 as finalized is more immediately clear on its face that 
what is finalized in Sec.  171.201(f) is a condition for practices to 
meet the exception, and that paragraph (f) can be satisfied by meeting 
either subparagraph (1) or (2).
    Practices applied based on an organization policy to rely on 
individualized determinations of risk of harm consistent with Sec.  
171.201(c)(1) would be covered under Sec.  171.201 to the extent they 
otherwise meets its conditions. Neither an organizational policy (Sec.  
171.201(f)(1)), nor a determination based on facts and circumstances 
known or reasonably believed by the actor at the time the determination 
was made and while the practice remains in use ((Sec.  171.201(f)(2)) 
would be required to routinely evaluate or otherwise assess the 
licensed health care professional's exercise of professional judgment 
in order for practices implemented in reliance on the professional's 
Sec.  171.201(c)(1) determination to be meet the conditions of Sec.  
171.201.
Practices Implemented Based on a Determination Specific to the Facts 
and Circumstances
    As discussed in the Proposed Rule, we recognize that some actors 
(such as small health care providers and small HINs/HIEs) may not have 
comprehensive and formal policies governing all aspects of EHI and 
patient safety. Additionally, even if an organizational policy exists, 
it may not anticipate all of the potential risks of harm that could 
arise in real-world clinical or production environments of health IT. 
In these circumstances, in lieu of demonstrating that a practice 
conformed to the actor's policies and that the policies met the 
conditions proposed in Sec.  171.201(b), we proposed that the actor 
could justify its use of particular practices by making a finding in 
each case, based on the particularized facts and circumstances, that 
the practice is necessary and no broader than necessary to mitigate the 
risk of harm. To do so, we proposed that the actor would need to show 
that the practices were approved on a case-by-case basis by an 
individual with direct knowledge of the relevant facts and 
circumstances and who had relevant clinical, technical, or other 
appropriate expertise. Such an individual would need to reasonably 
conclude, based on those particularized facts and circumstances and 
his/her expertise and best professional judgment, that the practice was 
necessary, and no broader than necessary, to mitigate the risk of harm 
to a patient or other persons. We further proposed that a licensed 
health care professional's independent and individualized judgment 
about the safety of the actor's patients or other persons would be 
entitled to substantial deference under this proposed exception. So 
long as the clinician considered the relevant facts and determined 
that, under the particular circumstances, the practice was necessary to 
protect the safety of the clinician's patient or another natural 
person, we would not second-guess the clinician's professional 
judgment. To provide further clarity on this point, we provided an 
illustrative example in the preamble to the proposed rule (see 84 FR 
7525).
    Comments. Commenters requested that we clarify, provide guidance, 
or establish specifications for the documentation necessary to 
substantiate applicability of the Preventing Harm Exception based on 
qualifying determinations particularized to specific facts and 
circumstances. Some commenters indicated that such specificity or 
guidance is needed to avoid imposing on actors such as health care 
providers and HINs/HIEs excess burden associated with documentation in 
the absence of such guidance or specification.
    Response. We appreciate these commenters highlighting that the 
potential for uncertainty or confusion about what is minimally 
necessary to demonstrate satisfaction of a new policy can often lead to 
capturing and retaining a wide array of information just in case it may 
be needed or useful later. We have clarified the way in which all of 
the conditions in Sec.  171.201 are stated and organized within the 
section. We also note here that an actor does not need to draft for 
each determination consistent with Sec.  171.201(f)(2) a comprehensive 
defense of their findings. We believe the finalized statement of the 
condition, reinforced by this preamble discussion, provides certainty 
that we do not intend or expect actors to create new records systems or 
types, or to create or retain duplicate information or documentation 
across their current medical and other business records. Ultimately, it 
is the actor's responsibility to demonstrate they met the conditions of 
an exception.

[[Page 25844]]

Summary of Finalized Policy: Practices Implemented Based on a 
Determination Specific to the Facts and Circumstances
    We have finalized the substance of this condition as proposed, with 
modifications to the regulation text. We have also reorganized Sec.  
171.201 so that it is easier to read and understand. We have 
redesignated this paragraph from (c) to (f), and broken it into 
subparagraphs. We have in comparison to the main paragraph language of 
the proposed Sec.  171.201(c) modified the phrasing of the finalized 
paragraph (f) so that Sec.  171.201 as finalized is more immediately 
clear on its face that what is finalized in Sec.  171.201(f)(2) is a 
means to demonstrate a practice implemented in absence of an 
applicable, or perhaps any, organizational policy nevertheless meets 
the conditions to be exempted under Sec.  171.201 from the definition 
of information blocking in Sec.  171.103.
    We have separated from both the requirements applicable to 
individualized determinations of risk (finalized in the type of risk 
condition in Sec.  171.201(c)(1)) and the requirements applicable to 
practices implemented based on organizational policy (Sec.  
171.201(f)(1)) or to practices implemented pursuant to a determination 
based on the facts and circumstances (Sec.  171.201(f)(2)) the patient 
review rights condition expressed in subparagraph (a)(3) of the 
proposed text of Sec.  171.201 (84 FR 7602). We have finalized the 
patient review rights condition in Sec.  171.201(e) instead of the 
finalized (f) because it applies equally to practices implemented based 
on an organizational policy and by practices implemented based on 
determinations based on facts and circumstances, in parallel to the 
other conditions for a practice to be excepted under Sec.  171.201 from 
the definition of information blocking in Sec.  171.103.
    In the finalized patient review rights condition (Sec.  
171.201(e)), in comparison with proposed Sec.  171.201(a)(3) (84 FR 
7602), we have revised the wording in which we state the condition for 
honoring any rights that applicable law may afford patients to have 
these individualized determinations reviewed and potentially reversed. 
The condition finalized in Sec.  171.201(e) is that where the risk of 
harm is consistent with paragraph (c)(1) of this section, the actor 
must implement its practices in a manner consistent with any rights the 
individual patient whose EHI is affected may have under Sec.  
164.524(a)(4) of this title, or any Federal, State, or tribal law, to 
have the determination reviewed and potentially reversed.
    We also revised in finalized Sec.  171.201(e), in comparison with 
the proposed Sec.  171.201(a)(3), the wording of the condition 
finalized in Sec.  171.201(e) in comparison to the wording of this 
condition as proposed in 171.201(a)(3) for two reasons. First, the 
wording has been revised to fit its placement within the finalized 
section. Second, the wording has been revised to more clearly and 
completely state the sources of the review rights that must be 
afforded, if applicable. We note that such review rights will be 
afforded by Sec.  164.524(a)(4) in the circumstances where both Sec.  
164.524(a)(3) and Sec.  171.201 apply. However, rights that must be 
honored to meet the conditions of Sec.  171.201 are not limited to 
those afforded by Sec.  164.24(a)(4) or to circumstances where Sec.  
164.524 applies in addition to Sec.  171.201. Rights of review of an 
individualized determination of risk of harm (Sec.  171.201(c)(1)) 
might also be afforded by Federal, State, or tribal law applicable in 
the particular circumstances.
    We do not believe it is necessary to expressly state in the 
regulation text that we interpret regulations promulgated based on such 
laws, and that have the force and effect of law on individuals and 
entities they regulate, to be within the meaning of ``law'' for 
purposes of Sec.  171.201(e). However, we expressly state this here in 
order to provide the type of assurance we believe many commenters were 
seeking when stating in their comment submissions requests or 
recommendations for additional guidance in the final rule. In order for 
the practice(s) to satisfy the condition in Sec.  171.201(e), where 
otherwise applicable law affords a patient right(s) to request review 
of individualized determinations of risk of harm associated with the 
patient's access, exchange, or use of their EHI, the actor's 
practice(s) be implemented in a manner consistent with those rights--
regardless of which specific law(s) afford the rights applicable in the 
particular circumstances.
b. Privacy Exception--When will an actor's practice of not fulfilling a 
request to access, exchange, or use electronic health information in 
order to protect an individual's privacy not be considered information 
blocking?
    We proposed to establish an exception to the information blocking 
provision for practices that are reasonable and necessary to protect 
the privacy of an individual's EHI, provided certain conditions are met 
(84 FR 7526). The exception and corresponding conditions were set forth 
in the proposed regulation text in Sec.  171.202. We noted that any 
interference practice that an actor is engaged in to protect the 
privacy of an individual's EHI must be consistent with applicable laws 
and regulations related to health information privacy, including the 
HIPAA Privacy Rule, the HITECH Act, 42 CFR part 2, and State laws. We 
emphasized that this exception to the information blocking provision 
does not alter an actor's obligation to comply with applicable laws (84 
FR 7526).
    We noted that this exception is necessary to support basic trust 
and confidence in health IT infrastructure. Without this exception, 
there would be a significant risk that actors would share EHI in 
inappropriate circumstances, such as when an individual has taken 
affirmative steps to request that the EHI not be shared under certain 
conditions or when an actor has been unable to verify a requester's 
identity before sharing EHI.
    We explained that this proposed exception was structured with 
discrete ``sub-exceptions.'' An actor's practice must qualify for a 
sub-exception to be covered by the exception. We noted that the sub-
exceptions were, to a large extent, crafted to closely mirror privacy-
protective practices that are recognized under State and Federal 
privacy laws. In this way, the privacy sub-exceptions to the 
information blocking provision recognize as reasonable and necessary 
those practices that are engaged in by actors to be consistent with 
existing laws, provided that certain conditions are met.
    We proposed four sub-exceptions that address the following privacy 
protective practices: (1) Not providing access, exchange, or use of EHI 
when a State or Federal law requires that a precondition be satisfied 
before an actor provides access, exchange, or use of EHI, and the 
precondition is not satisfied (proposed in Sec.  171.202(b)); (2) not 
providing access, exchange, or use of EHI when the actor is a health IT 
developer of certified health IT that is not covered by the HIPAA 
Privacy Rule in respect to a practice (proposed in Sec.  171.202(c)); 
(3) a covered entity, or a business associate on behalf of a covered 
entity, denying an individual's request to access to their electronic 
protected health information (ePHI) in the circumstances provided in 45 
CFR 164.524(a)(1)(2) or (3) (proposed in Sec.  171.202(d)); and (4) not 
providing access, exchange, or use of EHI pursuant to an individual's 
request, in certain situations (proposed in Sec.  171.202(e)) (84 FR 
7526).
    We proposed that an actor would need to satisfy at least one sub-
exception with respect to a purportedly

[[Page 25845]]

privacy-protective practice that interferes with access, exchange, or 
use of EHI to not be subject to the information blocking provision. 
Each proposed sub-exception has conditions that must be met in order 
for an actor's practice to qualify for protection under the sub-
exception (84 FR 7526).
Modification
    We have changed the title of this exception from ``Exception--
Promoting the privacy of electronic health information'' in the 
Proposed Rule (84 FR 7602) to ``Privacy Exception--When will an actor's 
practice of not fulfilling a request to access, exchange, or use 
electronic health information in order to protect an individual's 
privacy not be considered information blocking?'' Throughout this final 
rule preamble, we use ``Privacy Exception'' as a short form of this 
title, for ease of reference. As stated in Section VIII.D of this final 
rule preamble, we have changed the titles of all of the exceptions to 
questions to improve clarity. We have edited the wording of the 
introductory text in Sec.  171.202 as finalized, in comparison to that 
proposed (84 FR 7602) so that it is consistent with the finalized title 
of Sec.  171.202. We believe these conforming changes in wording of the 
introductory text also improve clarity in this section.
Specific Terminology Used for the Purposes of This Proposed Exception
    We noted that the proposed exception used certain terms that are 
defined by the HIPAA Rules \163\ but that, for purposes of the 
exception, may have a broader meaning in the context of the information 
blocking provision and its implementing regulations as set forth in the 
Proposed Rule. We explained that, in general, the terms ``access,'' 
``exchange,'' and ``use'' have the meaning in proposed Sec.  171.102. 
However, we noted that in some instances we referred to ``use'' in the 
context of a disclosure or use of ePHI under the HIPAA Privacy Rule, in 
which case we explicitly stated that the term ``use'' had the meaning 
defined in 45 CFR 160.103. Similarly, we referred in a few cases to an 
individual's right of access under 45 CFR 164.524, in which case the 
term ``access'' should be understood in that HIPAA Privacy Rule 
context. We emphasized that, for purposes of section 3022 of the PHSA, 
however, the term ``access'' includes, but is broader than, an 
individual's access to their PHI as provided for by the HIPAA Privacy 
Rule (84 FR 7526).
---------------------------------------------------------------------------

    \163\ 45 CFR part 160 and subparts A, C, and E of part 164.
---------------------------------------------------------------------------

    Finally, we noted that the term ``individual'' is defined by the 
HIPAA Rules at 45 CFR 160.103. Separately, under the information 
blocking enforcement provision, we noted that the term ``individual'' 
is used to refer to actors that are health IT developers of certified 
health IT, HINs, or HIEs (see section 3022(b)(2)(A) of the PHSA). We 
clarified that for purposes of this exception (and only this 
exception), we used neither of these definitions. Instead, the term 
``individual'' encompassed any or all of the following: (1) An 
individual defined by 45 CFR 160.103; (2) any other natural person who 
is the subject of EHI that is being accessed, exchanged or used; (3) a 
person who legally acts on behalf of a person described in (1) or (2), 
including as a personal representative, in accordance with 45 CFR 
164.502(g); or (4) a person who is a legal representative of and can 
make health care decisions on behalf of any person described in (1) or 
(2); or (5) an executor or administrator or other person having 
authority to act on behalf of the deceased person described in (1) or 
(2) or the individual's estate under State or other law.
    We clarified that (2) varies from (1) because there could be 
individuals who could be the subject of EHI that is being accessed, 
exchanged, or used under (2), but who would not be the subject of PHI 
under (1). For example, an actor which is not a covered entity or 
business associate as defined under HIPAA such as a health IT developer 
of certified health IT may access, exchange or use a patient's 
electronic health information; however this ``health information'' 
would not meet the definition of PHI, but nonetheless, would be subject 
to this regulation.
    We also clarified that (3) encompasses a person with legal 
authority to act on behalf of the individual, which includes a person 
who is a personal representative as defined under the HIPAA Privacy 
Rule. We explained that we included the component of legal authority to 
act in (3) because the HIPAA Privacy Rule gives rights to parents or 
legal guardians in certain circumstances where they are not the 
``personal representative'' for their child(ren). For instance, a non-
custodial parent who has requested a minor child's medical records 
under a court-ordered divorce decree may have legal authority to act on 
behalf of the child even if he or she is not the child's ``personal 
representative.'' Further, we noted that in limited circumstances and 
if permitted under State law, a family member may have legal authority 
to act on behalf of a patient to make health care decisions in 
emergency situations even if that family member may not be the ``legal 
representative'' or ``personal representative'' of the patient.
    We noted that we adopted this specialized usage to ensure that the 
Privacy Exception extends protection to information about, and respects 
the privacy preferences of, all individuals, not only those individuals 
whose EHI is protected as ePHI by HIPAA covered entities and business 
associates (84 FR 7526 and 7527).
Interaction Between Information Blocking, the Exception for Promoting 
the Privacy of EHI, and the HIPAA Privacy Rule
    We stated in the Proposed Rule that we consulted extensively with 
the HHS Office for Civil Rights (OCR), which enforces the HIPAA 
Privacy, Security and Breach Notification Rules, in developing 
proposals to advance our shared goals of preventing information 
blocking for nefarious or self-interested purposes while maintaining 
and upholding existing privacy rights and protections for individuals. 
We noted that the proposed exception for promoting the privacy of EHI 
(also referred to as the ``privacy exception'') operates in a manner 
consistent with the framework of the HIPAA Privacy Rule. We explained 
that we designed the sub-exceptions to ensure that individual privacy 
rights are not diminished as a consequence of the information blocking 
provision, and to ensure that the information blocking provision does 
not require the use or disclosure of EHI in a way that would not be 
permitted under the HIPAA Privacy Rule. We emphasized that our intent 
was that the information blocking provision would not conflict with the 
HIPAA Privacy Rule. We noted that the sub-exception proposed in Sec.  
171.202(d) reflects a policy that an actor's denial of access to an 
individual consistent with the limited conditions for such denials that 
are described in the HIPAA Privacy Rule at 45 CFR 164.524(a)(1)(2) and 
(3), is reasonable under the circumstances (84 FR 7527).
    We also noted that the information blocking provision may operate 
to require that actors provide access, exchange, or use of EHI in 
situations that the HIPAA Rules would not require access of similar 
information. This is because the HIPAA Privacy Rule permits, but does 
not require, covered entities to disclose ePHI in most circumstances. 
We explained that the information blocking provision, on the other 
hand, requires that an actor provide access to, exchange, or use of EHI 
unless they are prohibited from

[[Page 25846]]

doing so under an existing law or are covered by one of the exceptions. 
As an illustration, we noted that the HIPAA Privacy Rule permits health 
care providers to exchange ePHI for treatment purposes but does not 
require them to do so. Under the information blocking provision, unless 
an exception to information blocking applies, or the interference is 
required by law, a primary care provider would be required to exchange 
ePHI with a specialist who requests it to treat an individual who was a 
common patient of the provider and the specialist, even if the primary 
care provider offered patient care services in competition with the 
specialist's practice, or would usually refer its patients to another 
specialist due to an existing business relationship (84 FR 7527).
Promoting Patient Privacy Rights
    We stated that the information blocking provision would not require 
that actors provide access, exchange, or use of EHI in a manner that is 
not permitted under the HIPAA Privacy Rule or other laws. As such, the 
privacy-protective controls existing under the HIPAA Rules would not be 
weakened by the information blocking provision. Moreover, we described 
that we structured the Privacy Exception to ensure that actors can 
engage in reasonable and necessary practices that advance the privacy 
interests of individuals (84 FR 7527).
    We explained that unless required by law, actors should not be 
compelled to share EHI against patients' expectations under applicable 
law or without adequate safeguards out of a concern that restricting 
the access, exchange, or use of the EHI would constitute information 
blocking. We acknowledged that this could seriously undermine patients' 
trust and confidence in the privacy of their EHI and diminish the 
willingness of patients, providers, and other entities to provide or 
maintain health information electronically. In addition, we noted that 
such outcomes would undermine and not advance the goals of the 
information blocking provision and be inconsistent with the broader 
policy goal of the Cures Act to facilitate trusted exchange of EHI. We 
stated that trusted exchange requires not only that EHI be shared in 
accordance with applicable law, but also that it be shared in a manner 
that effectuates individuals' expressed privacy preferences. We noted 
that an individual's expressed privacy preferences will not be 
controlling in all cases. An actor will not be able to rely on an 
individual's expressed privacy preference in circumstances where the 
access, exchange, or use is required by law (84 FR 7527).
    For these reasons, we proposed that the sub-exception in Sec.  
171.202(e) would generally permit an actor to give effect to 
individuals' expressed privacy preferences, including their desire not 
to permit access, exchange, or use of their EHI. At the same time, 
however, we emphasized that the Privacy Exception must be tailored to 
ensure that protection of an individual's privacy is not used as a 
pretext for information blocking. Accordingly, we proposed that this 
exception would be subject to strict conditions (84 FR 7527).
Privacy Practices Required by Law
    We stated in the Proposed Rule that because the information 
blocking provision excludes from the definition of information blocking 
practices that are required by law (section 3022(a)(1) of the PHSA), 
privacy-protective practices that are required by law do not implicate 
the information blocking provision and do not require coverage from an 
exception. We noted that practices that are ``required by law'' can be 
distinguished from other practices that an actor engages in pursuant to 
a law, but which are not ``required by law.'' Such laws are typically 
framed in a way that permit an access, exchange or use of health 
information to be made only if specific preconditions are satisfied but 
do not expressly require that the actor engage in a practice that 
interferes with access, exchange, or use of EHI. For example, we noted 
that the HIPAA Privacy Rule provides that a covered entity may use or 
disclose PHI in certain circumstances where the individual concerned 
has authorized the disclosure.\164\ The effect of this condition is 
that the covered entity should not use or disclose the PHI in the 
absence of an individual's authorization. However, we noted that 
because the condition does not prohibit the actor from exchanging the 
EHI in all circumstances, the actor would be at risk of engaging in a 
practice that was information blocking unless an exception applied. For 
this reason, we included a sub-exception, proposed in Sec.  171.202(b), 
that provided that an actor will not be engaging in information 
blocking if a State or Federal law imposes a precondition to the 
provision of access, exchange, or use, and that precondition has not 
been satisfied (84 FR 7527 and 7528).
---------------------------------------------------------------------------

    \164\ 45 CFR 164.508 (Uses and disclosures for which an 
authorization is required).
---------------------------------------------------------------------------

    Comments. Commenters recommended that we allow for EHI to be 
withheld if there are contractual privacy restrictions for the actor 
that may define conditions or limits on what the actor may do because 
of those contractual restrictions. In addition, some commenters 
suggested that contractual restrictions should be treated similarly to 
State and Federal privacy laws under the Privacy Exception.
    Response. Please see section VIII.C.6.a (Prevention, Material 
Discouragement, and Other Interference) above regarding interference 
that discusses contracts including business associate agreements where 
this is discussed in depth.
Definitions in This Exception
    As noted above, we stated in the Proposed Rule that we consulted 
extensively with the HHS Office for Civil Rights (OCR), which enforces 
the HIPAA Privacy, Security and Breach Notification Rules, in 
developing proposals to advance our shared goals of preventing 
information blocking for nefarious or self-interested purposes while 
maintaining and upholding existing privacy rights and protections for 
individuals (84 FR 7527).
    This Privacy Exception operates in a manner consistent with the 
framework of the HIPAA Rules. We have finalized the sub-exceptions to 
ensure that individual privacy rights are not diminished as a 
consequence of the information blocking provision, and to ensure that 
the information blocking provision does not require the use or 
disclosure of EHI in a way that would not be permitted under the HIPAA 
Privacy Rule. We emphasize that our intent is that the information 
blocking provision would not conflict with the HIPAA Rules. As such, we 
added in the definitions section of this exception the term ``HIPAA 
Privacy Rule'' to mean 45 CFR parts 160 and 164 to improve readability 
and support the policy goal of alignment with the HIPAA Privacy Rule.
    With regards to the definition of ``individual,'' we have finalized 
this definition as proposed with a minor clarification, and it is not 
contrary to the HIPAA Rules. We note that the term ``individual'' is 
defined by the HIPAA Rules at 45 CFR 160.103. Separately, under the 
information blocking enforcement provision, we noted that the term 
``individual'' is used to refer to actors that are health IT developers 
of certified health IT, HINs, or HIEs (see section 3022(b)(2)(A) of the 
PHSA). We finalized that for purposes of this exception (and only this 
exception), we used neither of these definitions. Instead, the term 
``individual'' encompassed any or all of the following: (1) An 
individual defined by 45 CFR

[[Page 25847]]

160.103; (2) any other natural person who is the subject of EHI that is 
being accessed, exchanged or used; (3) a person who legally acts on 
behalf of a person described in (1) or (2), in making decisions related 
to health care, as a personal representative, in accordance with 45 CFR 
164.502(g); (4) a person who is a legal representative of and can make 
health care decisions on behalf of any person described in paragraph 
(a)(1) or (2); or (5) an executor or administrator or other person 
having authority to act on behalf of a deceased person described in (1) 
or (2) or the individual's estate under State or other law.
    To clarify, we have finalized that Sec.  171.202(a)(2)(iii) 
encompasses only a person who is a personal representative as defined 
under the HIPAA Privacy Rule. We distinguish a ``personal 
representative'' defined under the HIPAA Privacy Rule from all other 
natural persons who are legal representatives and who can make health 
care decisions on behalf of the individual, and thus those persons are 
included in Sec.  171.202(a)(2)(iv). We misstated in the Proposed Rule 
that the HIPAA Privacy Rule gave rights to parents or legal guardians 
in certain circumstances where they are not the ``personal 
representatives.'' We clarify in this final rule that, in limited 
circumstances and if permitted under State law, a family member may be 
the legal representative to act on behalf of a patient to make health 
care decisions in emergency situations even if that family member may 
not be the ``personal representative'' of the patient.
    Comments. We received no comments opposing this condition of the 
proposed definition of ``individual'' in the Privacy Exception.
    Response. We finalized and clarified that Sec.  171.202(a)(2)(iii) 
refers to only persons who meet the definition of a personal 
representative under 45 CFR 164.502(g), and Sec.  171.202(a)(2)(iv) 
refers to all other persons who are legal representatives of and can 
make health care decisions on behalf of any person that was proposed in 
Sec.  171.202(a)(4).
Sub-Exception 1: ``Precondition Not Satisfied''
    We stated in the Proposed Rule that State and Federal privacy laws 
that permit the disclosure of PHI often impose conditions that must be 
satisfied prior to a disclosure being made. In the final rule we are 
deleting the word ``privacy'' when it refers to laws in the regulation 
text in Sec.  171.202(b) in order to alleviate any ambiguity about what 
is meant as a ``privacy law.''
    We proposed to establish a sub-exception to the information 
blocking provision that recognizes that an actor will not be engaging 
in information blocking if the actor does not provide access, exchange, 
or use of EHI because a necessary precondition required by law has not 
been satisfied. We explained that this exception would apply to all 
instances where an actor's ability to provide access, exchange, or use 
is ``controlled'' by a legal obligation required by law that a certain 
condition (or multiple conditions) must be met before access, exchange, 
or use of the EHI may be provided. We emphasized that to be covered by 
this exception, the actor must comply with certain conditions, which 
are discussed below.
    We noted that the nature of the preconditions that an actor must 
satisfy in order to provide access, exchange, or use of EHI will depend 
on the laws that regulate the actor. For example, an actor that is 
regulated by a restrictive State law may need to satisfy more 
conditions than an actor regulated by a less restrictive State law 
before providing access, exchange, or use of EHI (84 FR 7527 and 7528).
    We requested comments generally on this proposed sub-exception. 
More specifically, we sought comment on how this proposed sub-exception 
would be exercised by actors in the context of State laws. We noted our 
awareness that actors that operate across State lines or in multiple 
jurisdictions sometimes adopt organization-wide privacy practices that 
conform with the most restrictive laws regulating their business. We 
stated that we were considering the inclusion of an accommodation in 
this sub-exception that would recognize an actor's observance of a 
legal precondition that the actor is required by law to satisfy in at 
least one State in which it operates. We noted that, in the event that 
we did adopt such an accommodation, we would also need to carefully 
consider how to ensure that before the use of the most stringent 
restriction is applied in all jurisdictions, the actor has provided all 
privacy protections afforded by that law across its entire business. 
This type of approach would ensure that an actor cannot take advantage 
of a more-restrictive law for the benefit of this exception while not 
also fulfilling the privacy-protective obligations of the law being 
relied on. We requested comment on whether there is a need for ONC to 
adopt such an accommodation for actors operating in multiple states and 
encouraged commenters to identify any additional conditions that should 
attach to the provision of such an accommodation. We also requested 
comment on our proposed approach to addressing variation in State laws 
throughout this proposed sub-exception (84 FR 7528).
    We also recognized that some states have enacted laws that more 
comprehensively identify the circumstance in which an individual or 
actor can and cannot provide access, exchange, or use of EHI. We stated 
that we were considering to what extent health care providers that are 
not regulated by the HIPAA Privacy Rule, and would rely instead on 
State laws for this sub-exception, would be able to benefit from this 
sub-exception when engaging in practices that interfere with access, 
exchange, or use of EHI for the purpose of promoting patient privacy. 
We sought comment on any challenges that may be encountered by health 
care providers that are not regulated as covered entities under the 
HIPAA Privacy Rule when seeking to take advantage of this proposed sub-
exception. We also sought comment on whether there exists a class of 
health care provider that is not regulated by any Federal or State law 
that prescribes preconditions that must be satisfied in connection with 
the disclosure of EHI, and whether any such class of health care 
provider would benefit from a sub-exception similar to that proposed in 
Sec.  171.202(c) for health IT developers of certified health IT (84 FR 
7529).
    Comments. Several commenters recommended that actors who operate 
across multiple states with different preconditions for disclosure 
under local laws should be able to adopt uniform requirements across 
their organizations that satisfy the most stringent preconditions of 
those local laws for purposes of this sub-exception. They stated that 
this is appropriate because it is often difficult for organizations 
operating across State lines to develop different workflows for each 
State. However, other commenters requested that actors should be 
permitted to select which portions of a State law should be included in 
procedures implemented across all states rather than being required to 
provide all privacy protections afforded by that law across its entire 
business. Other commenters believed that it should be left to the 
actor's discretion to determine whether it is better to have a uniform 
approach across all the jurisdictions it operates in or whether a 
State-by-State approach is more appropriate. They mentioned that such 
flexibility also would align with the Department's overall goal of 
reducing administrative burden particularly on providers while ensuring 
a high degree of privacy protection for patients.

[[Page 25848]]

    Response. We appreciate the various comments and recognize that it 
is difficult for organizations operating across State lines to have 
different workflows for each State while assuring privacy, particularly 
the individual's right under the HIPAA Rules to obtain their PHI. 
Additionally, it is important that any uniform policies and procedures 
must in fact be implemented across an actor's entire organization and 
not be applied selectively in ways which might be contrary to the 
information blocking provision.
    Balancing these goals, this final rule provides that, except for an 
individual's access to their EHI as discussed below, actors may meet 
this sub-exception if they operate across multiple states and elect to 
adopt and implement uniform policies and procedures required by one 
State that are more restrictive (i.e., provide greater privacy 
protections) than would otherwise be required by another specific State 
or Federal law. To be considered more restrictive in this context, a 
law might require more or different preconditions to the access, 
exchange, or use of EHI than Federal law or the law of another State in 
which the actor operates. Alternatively, an actor could comply with the 
preconditions of each State in which it operates on a State-by-State 
basis with respect to the EHI requested. These alternatives provide 
multi-state actors with significant flexibility without adversely 
impacting an individual's right to obtain EHI as described below.
    An actor that operates in multiple states could either comply with 
the laws of each State in which it operates or comply with the most 
restrictive State laws in which it operates and where applicable, 
comply with Federal law requirements. The actor will need to document 
either approach in its policies and procedures in which the actor has 
adopted and implemented in order to meet the conditions of Sec.  
171.202(b)(1)(i) because the uniform approach will not be available to 
actors that operate on a case by case basis without policies and 
procedures as contemplated by subsection Sec.  171.202(b)(1)(ii). Those 
actors without uniform policies and procedures will need to comply with 
each of the applicable State and Federal laws.
    As noted above, the uniform policy and procedure approach to 
individual access requests for EHI must assure alignment with the HIPAA 
Privacy Rule and individual access implementation specifications to 
help assure that the broader policy goals for individual access to EHI 
are met. Specifically, when an actor receives a request by or on behalf 
of an individual under 45 CFR 164.524 for the individual's EHI, the 
actor must not impose preconditions in its policies and procedures 
which would affect the individual's right to access under the HIPAA 
Rules even when it is operating in multiple states.
    We note that an actor may not inappropriately seek to use State or 
Federal laws as a shield against disclosing EHI. For example, we would 
expect that actors implement State-mandated preconditions consistently 
and in a non-discriminatory manner when fulfilling requests to access, 
exchange, or use EHI. Additionally, we caution actors who repeatedly 
change their privacy policies depending on the EHI requestor or the 
request that such actions may be considered intended to materially 
interfere with, prevent, or discourage the access, exchange, or use of 
EHI.
    We note that we have modified the introductory text in Sec.  
171.202(b) for clarity and precision. The final introductory text reads 
as follows: ``To qualify for the exception on the basis that one or 
more Federal or State preconditions for providing access, exchange, or 
use of electronic health information have not been satisfied, the 
following requirements must be met . . .'' The changes to the final 
introductory text from the proposed introductory text (see 84 FR 7602) 
are not substantive and do not change the meaning of the introductory 
text.
    We also note that we have added ``and actions'' in Sec.  
171.202(b)(3)--``For purposes of determining whether the actor's 
privacy policies and procedures and actions satisfy the requirements of 
subsections (b)(1)(i) and (b)(2) above when the actor's operations are 
subject to multiple laws which have inconsistent preconditions, they 
shall be deemed to satisfy the requirements of the subsections if the 
actor has adopted uniform privacy policies and procedures to address 
the more restrictive preconditions.'' We added this language for 
accuracy and clarity.
    Comments. A commenter requested that we provide clarification on 
all the Federal and State privacy laws considered when developing the 
``applicable State and Federal privacy laws'' threshold condition of 
this sub-exception. They requested that the final rule make clear that 
those State privacy laws that are more restrictive than Federal privacy 
laws (e.g., 42 CFR part 2 and HIPAA) take precedence over the less 
stringent Federal privacy laws.
    Response. As mentioned above, for clarity purposes, we have not 
included the word ``privacy'' in the final regulation text in Sec.  
171.202(b) in order to alleviate any ambiguity regarding what is meant 
as a ``privacy law.'' The HIPAA Privacy Rule provides a Federal floor 
of privacy protections for an individual's individually identifiable 
health information where that information is held by a covered entity 
or by a business associate of the covered entity. This sub-exception 
does not alter an actor's ability to comply with applicable Federal or 
State laws.
    To illustrate this sub-exception, we provided the following 
examples. We note that this list of examples is not exhaustive and that 
preconditions required by law that control access, exchange, or use of 
EHI that are not listed below would still qualify under this proposed 
sub-exception so long as all conditions are met.
     Although the HIPAA Privacy Rule does not have individual 
``consent'' requirements for uses and disclosures of PHI for purposes 
such as treatment, payment, and health care operations, certain Federal 
and State laws do require that a person provide consent before their 
EHI can be accessed, exchanged, or used for specific purposes. For 
example, some State laws require an individual's consent for uses and 
disclosures of EHI regarding some sensitive health conditions such as 
HIV/AIDS, mental health, or genetic testing. Additionally, actors that 
are under ``Part 2 programs,'' which means federally assisted programs 
(``federally assisted'' as defined in 42 CFR 2.12(b) and ``program'' as 
defined in 42 CFR 2.11), generally are required to obtain an 
individual's consent to disclose or re-disclose patient-identifying 
information related to the individual's substance use disorder, such as 
treatment for addiction. The sub-exception would operate to clarify an 
actor's compliance obligations in these situations. In such scenarios, 
it would not be considered information blocking to refuse to provide 
access, exchange, or use of EHI if the actor has not received the 
individual's consent, subject to requirements discussed herein.
     If an actor is required by law to obtain an individual's 
HIPAA authorization before providing access, exchange, or use of the 
individual's EHI, then the individual's refusal to provide an 
authorization would justify the actor's refusal to provide access, 
exchange, or use of EHI. The actor's refusal would, subject to 
conditions discussed herein, be protected under this sub-exception.
     The HIPAA Privacy Rule, and many State laws, permit the 
disclosure of PHI in certain circumstances only once the identity and 
authority of the person requesting the information has been verified. 
We acknowledge that it is

[[Page 25849]]

reasonable and necessary that actors take appropriate steps, consistent 
with Federal and State laws, to ensure that EHI is not disclosed to the 
wrong person or to a person who is not authorized to receive it. Where 
an actor cannot verify the identity or authority of a person requesting 
access to EHI, and such verification is required by law before the 
actor can provide access, exchange, or use of the EHI, the actor's 
refusal to provide access, exchange, or use of the EHI will, subject to 
the conditions discussed herein, will not be information blocking.
     Under the HIPAA Privacy Rule, a health care provider may 
share information with another health care provider for a quality 
improvement project if it has verified that the requesting entity has a 
relationship with the person whose information is being requested. 
Where the actor could not establish if the relationship existed, it 
would not be information blocking for the actor to refuse to provide 
access, exchange, or use, subject to the conditions discussed herein.
    Comments. We received comments on the Privacy Exception expressing 
concern about whether a business associate (as defined under the HIPAA 
Privacy Rule) would be liable for information blocking practices for 
not providing access, exchange, or use of EHI because doing so would 
violate its business associate agreement.
    Response. Please see section VIII.C.6.a. (Prevention, Material 
Discouragement and Other Interference) above regarding interference 
that discusses contracts including business associate agreements where 
this is discussed in depth.
Sub-Exception 1: ``Precondition Not Satisfied'': Conditions To Be Met 
To Qualify for This Sub-Exception
    We noted that in most circumstances, an actor would be in a 
position to influence whether a precondition is satisfied. For example, 
an actor could deprive a person of the opportunity to take some step 
that is a prerequisite for the exchange of their EHI, could assume the 
existence of a fact prejudicial to the granting of access without 
seeking to discover the actual facts, or could make a determination 
that a precondition was not satisfied without properly considering or 
seeking all relevant information. As such, we proposed that this 
exception would be subject to conditions that ensure that the 
protection of an individual's privacy is not used as a pretext for 
information blocking (84 FR 7529).
    We proposed that an actor can qualify, in part, for this sub-
exception by implementing and conforming to organizational policies and 
procedures that identify the criteria to be used by the actor and, as 
applicable, the steps that the actor will take, in order to satisfy the 
precondition.
    We noted that most actors are covered entities or business 
associates for the purposes of the HIPAA Privacy Rule, and are already 
required to have policies, procedures, and training programs in place 
that address how ePHI (as defined in 45 CFR 160.103) is used and 
disclosed. As such, we expected that the overwhelming majority of 
actors will already be in a position to meet this condition or would be 
able to meet this condition with modest additional effort. However, we 
acknowledged that some actors may not, for whatever reason, have 
privacy policies and practices in place, or may have implemented 
privacy policies and practices that do not sufficiently address the 
criteria to be used, and steps to be taken, to satisfy a precondition 
relied on by the actor. As such, we proposed to provide an alternative 
basis on which to qualify, in part, for this sub-exception. We proposed 
to permit actors to instead document, on a case-by-case basis, the 
criteria used by the actor to determine when the precondition will be 
satisfied, any criteria that were not met, and the reason why the 
criteria were not met (84 FR 7529).
    Separately, we proposed that if the precondition that an actor 
purportedly needs to satisfy relies on the provision of a consent or 
authorization from an individual, it is a requirement for the 
condition(s) of this sub-exception that the actor (i) did all things 
reasonably necessary within its control to provide the individual with 
a meaningful opportunity to provide the consent or authorization and 
(ii) did not improperly encourage or induce the individual to not 
provide the consent or authorization (84 FR 7529).
Sub-Exception 1: ``Precondition Not Satisfied'': Practice Must Be 
Implemented in a Consistent and Non-Discriminatory Manner
    We proposed that in order for a practice to qualify for this sub-
exception, the practice must be implemented in a consistent and non-
discriminatory manner (proposed Sec.  171.202(b)(3)(ii)). This 
condition would provide basic assurance that the purported privacy 
practice is directly related to a specific privacy risk and is not 
being used to interfere with access, exchange, or use of EHI for other 
purposes to which this exception does not apply.
    We proposed that this condition requires that the actor's privacy-
protective practices must be based on objective criteria that apply 
uniformly for all substantially similar privacy risks. We explained 
that an actor could not, for example, implement an organizational 
privacy policy that imposed unreasonably onerous requirements on a 
certain class of individuals or entities without a legitimate 
justification for doing so. We explained that this condition provides 
basic assurance that the purported privacy-protective practice is not 
being used to interfere with access, exchange, or use of EHI for other 
purposes to which this proposed exception does not apply (84 FR 7532).
    We requested comment on this proposed condition.
    Comments. Commenters agreed that having an organizational policy 
which outlines patient preference categories and restrictions should be 
created and utilized in a consistent and non-discriminatory manner for 
all patient requests.
    Response. We agree with the commenters, and for clarity, we moved 
this proposed section to finalize in Sec.  171.202(b)(1), in order to 
address when an actor has conformed to its organizational policies and 
procedures and when an actor documents on a case-by-case basis when a 
precondition has been satisfied. In both cases, the actor's practice 
must be implemented in a consistent and non-discriminatory manner. We 
provide the following example to illustrate the requirement that a 
practice must be implemented in a consistent and non-discriminatory 
manner.
    For example, we noted an actor that offered a patient-facing 
software application (app) would not be able to benefit from this 
exception if it refused to exchange EHI with a competitor app because 
the individual failed to meet onerous authorization requirements that 
applied only to the exchange of EHI with the competitor app and did not 
apply to others that presented no greater privacy or security risk.
    In context of this condition of the Privacy Exception, and 
consistent with its interpretation for information blocking exceptions 
defined in part 171 subpart B in general, ``consistent and non-
discriminatory'' should be understood to mean that similarly situated 
actors whose interactions pose the same level of privacy risk should be 
treated consistently with one another under the actor's privacy 
practices. Inconsistent treatment across similarly situated actors 
whose interactions pose the same level of privacy risk based on

[[Page 25850]]

extraneous factors, such as whether they are a competitor of the actor 
implementing the privacy practices, would not be considered 
appropriate.
Sub-Exception 1: ``Precondition Not Satisfied'': Practice Must Be 
Tailored to the Applicable Precondition
    We proposed that for actors who seek to qualify for this sub-
exception, an actor's privacy-protective practice (proposed (Sec.  
171.202(b)(3)(i)) must be tailored to the specific privacy risks that 
the practice actually addresses. This condition necessarily presupposes 
that an actor has carefully evaluated the privacy requirements imposed 
on the actor, the privacy interests to be managed by the actor, and has 
developed a considered response that is tailored to protecting and 
promoting the privacy of EHI. For example, we noted that the HIPAA 
Privacy Rule at 45 CFR 164.514(h) requires that, in certain 
circumstances, the disclosure of PHI is only authorized once the 
identity and authority of the person requesting the information has 
been verified. The privacy issue to be addressed in this instance is 
the risk that PHI will be disclosed to the wrong individual or an 
unauthorized person. We proposed that if an actor chooses not to 
provide access, exchange, or use of EHI on the basis that the actor's 
identity verification requirements have not been satisfied, the actor's 
practice must be tailored to the specific privacy risks at issue. We 
noted that this would require that the actor ensure that it does not 
impose identity verification requirements that are unreasonably onerous 
under the circumstances (84 FR 7531).
    For the purposes of this sub-exception, we proposed that engaging 
in an interference on the basis that a precondition has not been 
satisfied would be a practice that addresses a privacy risk or 
interest, and so tailoring that interference to satisfy a precondition 
could satisfy this requirement if all of the elements are met.
    We requested comment on this proposed condition.
    Comments. Commenters expressed a belief that a requirement that a 
``practice must be tailored to the specific privacy risk or interest 
being addressed'' could lead to unnecessary complexity, and that such a 
policy could be overly prescriptive. In addition, commenters expressed 
that we should provide more use cases to help providers and others 
better understand how this element of the sub-exception could be met.
    Response. We agree. We believe that a precondition should be 
tailored to the applicable legal requirement and not be tied only to a 
privacy risk or interest. To require that an actor's practice be 
tailored to the specific privacy risk or interest without a legally 
imposed requirement could lead to overly strict as well as an ambiguous 
requirement. As such, we believe that it is an important policy 
interest that an actor carefully evaluate the State or Federal law 
requirements imposed upon an actor, and that the actor develop a 
response that is tailored to the legal precondition which protect and 
promote the privacy of EHI. We provide the following use case to 
provide a greater understanding of how this element of the sub-
exception can be met.
     To meet a legal precondition whereby an actor must 
identify a patient before accessing, exchanging or using EHI, an 
actor's policy that a driver's license was the only accepted 
government-issued form of identification (as opposed to other types of 
legally acceptable forms of identification such as a valid passport) 
would not be a practice that is tailored to the applicable precondition 
legal requirement because the provider's preference for one form of 
government-issued identification over another does not meaningfully 
address this legal precondition.
    We have finalized that to qualify for this sub-exception on the 
basis that State or Federal law requires one or more preconditions to 
be met before providing access, exchange, or use of EHI the 
precondition should be based upon the applicable legal requirements.
Sub-Exception 1: ``Precondition Not Satisfied'': Organizational 
Policies and Procedures or Case-by-Case Basis
    We proposed that if an actor seeks to qualify for this sub-
exception, in part, by implementing and conforming to organizational 
policies and procedures, such policies and procedures must be in 
writing, and specify the criteria to be used by the actor, and, if 
applicable, the steps that the actor will take, in order to satisfy the 
precondition relied on by the actor not to provide access, exchange, or 
use of EHI. We emphasized that it would not be sufficient for an actor 
to simply identify the existence of the precondition in their 
organizational policies and procedures.
    We proposed that an actor would only be eligible to benefit from 
this sub-exception if it has implemented and followed its processes and 
policies. This would include taking reasonable steps to ensure that its 
workforce members and agents understand and consistently apply the 
policies and procedures (84 FR 7529 and 7530).
    We requested comment on the proposed condition generally, and 
specifically, on whether an actor's organizational policies and 
procedures provide a sufficiently robust and reliable basis for 
evaluating the bona fides, reasonableness, and necessity of practices 
engaged in to satisfy preconditions required by State or Federal 
privacy laws (84 FR 7529 and 7530).
    Comments. Some commenters recommended that actors should be able to 
have written organization-specific policies that may be more 
restrictive than State or Federal law and that health information 
networks and exchanges should be given an exemption based on their 
existing written governance policies. Other commenters recommended 
adding language indicating that organizational policies must comply 
with Federal, State, and local laws or that the final rule should 
specify that organizations should implement policies which conform to 
the specific State laws in which the information originates.
    Response. As noted above, this final rule includes a limited 
exception that permits an actor that operates in more than one State to 
adopt uniform policies and procedures based on more restrictive 
provisions of State and Federal law, subject to certain conditions. ONC 
reiterates that an actor's organizational policies and procedures 
should not be used as a pretext for information blocking. For example, 
information blocking may exist if an actor's policies and procedures 
impose onerous additional privacy requirements for access, exchange or 
use of EHI beyond what is required by law, or where an actor repeatedly 
changes its privacy policies and procedures to circumvent this 
exception. Further, the actor's policies and procedures must be 
tailored and must be implemented in a consistent and non-discriminatory 
manner.
    We do not agree that health information exchanges or networks 
should be given a blanket exemption based on their existing written 
governance policies because that could lead to a situation involving 
information blocking if those policies imposed conditions that conflict 
with the information blocking provision. Secondly, we expect that an 
actor's organizational policies will conform with applicable laws, 
including the information blocking provision, so it is not necessary to 
further require actors to implement policies which conform to the 
specific laws, including the law of

[[Page 25851]]

the State in which the information originated.
Documenting Criteria and Rationale
    If an actor's practice does not conform to an actor's 
organizational policies and procedures as required by Sec.  
171.202(b)(1)(i), we proposed that an actor can seek to qualify for 
this sub-exception, in part, by documenting how it reached its decision 
that it would not provide access, use, or exchange of EHI on the basis 
that a precondition had not been satisfied. We proposed that such 
documentation must be created on a case-by-case basis proposed in Sec.  
171.202(b)(1)(ii). We noted that an actor will not satisfy this 
condition if, for instance, it sought to document a general practice 
that it had applied to all instances where the precondition had not 
been satisfied. Rather, we stated that the record created by the actor 
must address the specific circumstances of the specific practice (or 
interference) at issue.
    We proposed that the record created by the actor must identify the 
objective criteria used by the actor to determine when the precondition 
is satisfied. Consistent with the condition to this sub-exception that 
the practice must be tailored to the privacy interest at issue, those 
criteria would need to be directly relevant to satisfying the 
requirement. For example, we explained that if the requirement at issue 
was the provision of a valid HIPAA authorization, the actor's 
documented record should reflect, at minimum, that the authorization 
would need to meet each of the requirements specified for a valid 
authorization at 45 CFR 164.508(c). The record would then need to 
document the criteria that had not been met, and the reason why it was 
not met. We noted that the actor could record that the authorization 
did not contain the name or other specific identification of the person 
making the request because the authorization only disclosed the 
person's first initial rather than a first name, and the actor had 
records about multiple people with that same initial and last name.
    We noted that this condition would provide the transparency 
necessary to demonstrate whether the actor has satisfied the conditions 
applicable to this exception. Moreover, we noted that it will help 
ensure that a decision to not provide access, exchange, or use of EHI 
is considered and deliberate, and therefore reasonable and necessary 
(84 FR 7530).
    We requested comment on this proposed condition.
    Comments. Commenters requested that we should provide specificity 
on what type of documentation would suffice to demonstrate that an 
actor met this sub-exception. Commenters were concerned that these were 
stringent documentation requirements and that provider practices may 
inadvertently trigger a violation of information blocking. Other 
commenters suggested that we should remove or consider reducing onerous 
requirements for documentation for qualifying for the privacy sub-
exceptions, and other commenters requested specification on what form 
the documentation must be and to specify whether existing documentation 
required by the HIPAA Rules (e.g., patient informed consent and 
authorization forms, Notice of Privacy Practices, Security Risk 
Analysis, etc.) would satisfy the documentation requirements under this 
Privacy Exception.
    Response. The documentation requirements are for the actor to 
comply with applicable State and Federal laws and to assure that after 
the fact rationalizations are not used to justify practices that have 
already occurred, consistent with the policy objectives of the 
information blocking provision.
    To finalize the documentation requirements we looked to OIG, which 
has authority under section 3022(b) of the PHSA to investigate any 
claim that an actor engaged in information blocking. OIG regulations in 
other contexts include a writing requirement. For example, OIG has 
promulgated the ``safe harbors'' provisions at 42 CFR 1001.952, 
specifying various payment and business practices that would not be 
subject to sanctions under the Anti-Kickback Statute. Several of these 
safe harbors include a writing requirement to document in writing an 
agreement, lease, or other transaction. These documentation 
requirements do not often get into specific terms or requirements, but 
rather tend to be more general in nature. However, the documentation 
requirements do provide indicia of evidence that an entity has met the 
requirements of the safe harbor provisions.
    In addition, we considered the documentation requirements in the 
HIPAA Rules. The HIPAA Privacy Rule at 45 C.F.R 164.530 (j) requires a 
covered entity to maintain its policies and procedures in written or 
electronic form for six years from the date of its creation or the date 
when it last was in effect, whichever is later. In our review of the 
OIG and HIPAA regulations, we believe that the documentation 
requirement for this sub-exception is consistent with the safe harbor 
and HIPAA Privacy Rule documentation requirements. Further, we do not 
believe this documentation requirement would be onerous.
    Therefore, we have finalized the following requirements for this 
sub-exception. An actor must document its organizational policies and 
procedures and specify the criteria used by the actor and as 
applicable, the steps that the actor will take to satisfy the 
precondition. Such steps may include providing the actor's workforce 
members with training on those policies and procedures. Alternatively, 
we have finalized a requirement an actor must document on a case-by-
case basis how it reached its decision that it would not provide 
access, use, or exchange of EHI on the basis that a precondition had 
not been satisfied, including the criteria it used to determine when 
the precondition is satisfied. That is, an actor can provide 
documentation that identifies the objective criteria that the actor 
applied in order to determine whether the precondition had been 
satisfied. Additionally, the actor must provide documentation that the 
practice is tailored to those criteria that are directly relevant to 
satisfying the precondition.
Sub-Exception 1: ``Precondition Not Satisfied'': Precondition Relies on 
a Consent or Authorization
    We proposed that if the precondition that an actor purports to rely 
upon requires the provision of a consent or authorization from an 
individual, it is a condition of this sub-exception that the actor must 
have done all things reasonably necessary within its control to provide 
the individual with a meaningful opportunity to provide that consent or 
authorization. We noted that this requirement will be relevant when, 
for example, a State privacy law or the HIPAA Privacy Rule requires an 
individual to provide consent and/or a HIPAA authorization before 
identifiable information can be accessed, exchanged, or used for 
specific purposes.
    We stated that we were considering addressing this condition in 
further detail, whether by way of additional guidance or in regulation 
text. To this end, we requested comments regarding what actions an 
actor should take, within the actor's control, to provide an individual 
with a meaningful opportunity to provide a required consent or HIPAA 
authorization, and whether different expectations should arise in the 
context of a consent versus a HIPAA authorization. Separately, we 
proposed that to qualify for this sub-exception, to the extent that the 
precondition at issue was the provision of a consent or HIPAA 
authorization by an individual, the actor must not have

[[Page 25852]]

improperly encouraged or induced the individual to not provide the 
consent or HIPAA authorization. We clarified that this does not mean 
that the actor cannot inform an individual about the advantages and 
disadvantages of exchanging EHI and any associated risks, so long as 
the information communicated is accurate and legitimate. However, we 
noted that an actor would not meet this condition in the event that it 
misled an individual about the nature of the consent to be provided, 
dissuaded individuals from providing consent in respect of disclosures 
to the actor's competitors, or imposed onerous requirements to 
effectuate consent that were unnecessary and not required by law.
    We requested comment on whether the proposed condition requiring 
the provision of a meaningful opportunity and prohibiting improper 
encouragement or inducement should apply to preconditions beyond the 
precondition that an individual provide consent or authorization. We 
requested comment on whether the conditions specified for this sub-
exception, when taken in total, are sufficiently particularized and 
sufficiently strict to ensure that actors that are in a position to 
influence whether a precondition is satisfied will not be able to take 
advantage of this sub-exception and seek protection for practices that 
do not promote the privacy of EHI. We also requested comment on whether 
we should adopt a more tailored approach to conditioning the 
availability of this exception. For example, we noted that we were 
considering whether different conditions should apply depending on: (i) 
The nature of the EHI at issue; (ii) the circumstances in which the EHI 
is being access, exchanged, or used; (iii) the interest being protected 
by the precondition; or (iv) the nature of the precondition to be 
satisfied. We encouraged commenters to identify scenarios in which the 
application of the conditions applicable to this sub-exception, as 
proposed, give rise to unnecessary burden, or would require activities 
that do not advance the dual policy interests of preventing information 
blocking and promoting privacy and security (84 FR 7530 and 7531).
    Comments. Some commenters noted that the entire condition was too 
vague and generally inconsistent with current standard industry 
relationships and practices. Several commenters suggested that the 
burden to obtain the consent should be on the organization requesting 
the data rather than on the organization that holds the data. However, 
commenters who suggested this often acknowledged that modifying our 
proposal to fit their suggestion would require an actor to receive 
assurances that consents are legitimate and in their possession before 
sharing any data. These commenters often noted that it was not clear 
how recipients of health care data subject to authorizations and 
consent would be expected to provide individuals with a meaningful 
opportunity to consent if they do not have an existing relationship 
with that individual or means to contact that individual. A few 
commenters recommended modifying this condition so that an actor that 
does not have a direct relationship with patients is not required to 
obtain patient consent or authorization.
    Response. We agree with the commenters and have attempted to 
address concerns about vagueness and consistency with industry 
practices and relationships. This finalized sub-exception requires the 
actor to have used reasonable efforts within its control if the actor 
has already received a form of required consent or authorization that 
does not meet all applicable requirements. Specifically, the actor must 
have used reasonable efforts within its control to provide the 
individual with a consent or authorization form that satisfies all 
applicable requirements or have provided other reasonable assistance 
with respect to the deficiencies. In effect, this places more of an 
obligation on the party requesting the EHI and the individual to 
attempt to satisfy the precondition by providing a consent or 
authorization. This final rule does not require the actor that receives 
the request to obtain a patient's consent or authorization to do all 
things reasonably necessary within its control to provide the 
individual with a meaningful opportunity to provide the consent or 
authorization. Rather, the final rule requires that the actor is 
obligated to take reasonable steps to provide a sufficient consent or 
authorization form or other reasonable assistance.
    Providing other reasonable assistance does not mean that the actor 
needs to ``chase'' the individual to obtain a sufficient consent or 
authorization. Such other reasonable assistance might include notifying 
the individual of elements that are missing in the consent or 
authorization initially provided, such as a witness or an expiration 
date if legally required.
    We believe that setting the standard for an actor's actions with 
respect to an insufficient consent or authorization at reasonable 
efforts is an appropriate standard to use because it aligns with the 
case-by-case approach that is captured in the information blocking 
provision that is the subject of this final rule.
    We recognize that actors must accommodate variations in laws across 
the states in which they operate. As discussed above, this final rule 
provides flexibility to multi-state providers with respect to how they 
may structure uniform policies and procedures regarding consents and 
authorizations provided that they do in fact apply them. We also 
recognize that some types of actors will not have the necessary legal 
rights or the technical access to detailed patient information to 
determine if a consent or authorization is required as a precondition.
    We intend that each actor must do what is reasonable and what is 
within its control. This applies to actors who are providers that have 
a direct patient relationship and to actors that are supporting a 
health care provider with respect to an insufficient consent or 
authorization that must also use reasonable efforts to avoid possible 
information blocking.
    A health information network that receives an insufficient consent 
or authorization might find that this sub-exception helpful if it does 
not have lawful access to the individual's information to determine 
what consent might be required under State or Federal confidentiality 
laws that apply to information about mental health, substance abuse, 
HIV status or other highly confidential diseases or conditions. We also 
note that if a network is not able to review such information under 
applicable law, providing a corrected consent would not be within its 
control.
    Comments. Many commenters were concerned that our definition of 
``meaningful opportunity'' was too broad. These few commenters 
suggested that, as proposed, our definition of ``meaningful 
opportunity'' could place a significant burden on providers. 
Specifically, these commenters suggested that adding a ``meaningful'' 
opportunity to consent to the patient, with its requisite new forms and 
procedures, would add new burdens on actors without appearing to solve 
any existing problems.
    One commenter recommended that we modify this requirement to 
include a reasonable opportunity for the provider to obtain the 
individual's consent the next time the patient visits the office if the 
patient is not present in the office to provide consent.
    Response. We appreciate the comments that we have received on the 
meaningful opportunity provision. After considering the comments, we

[[Page 25853]]

eliminated the ``meaningful opportunity'' provision in this final rule. 
However, this sub-exception still requires the actor to use reasonable 
efforts within its control and to provide reasonable assistance, which 
might include explaining the required elements of a consent or 
authorization, or providing a witness if required by law and requested 
by the patient at an office visit with the actor.
    However, the requirement of reasonable efforts is based on an 
assumption that actors may not use the protection of an individual's 
privacy as pretext for information blocking. If a requestor provides or 
obtains some form of patient documented consent or authorization that 
requires the actor's assistance to satisfy elements that are not 
required by law and the actor does not provide such assistance, the 
actor may be engaged in information blocking.
    We recognize that meeting certain preconditions may be outside the 
direct control of the provider. For example, the actor may have a pre-
existing consent form from the individual that needs to be modified due 
to a change in applicable law. The actor may have a very difficult time 
tracking down a former patient to provide the updated consent form. In 
most cases, it would be reasonable to mail or email the updated form to 
the patient's last address on the actor's records or present it to the 
patient at visit scheduled in the near future. If the patient cancels 
the visit, it may be reasonable for the actor to wait to obtain the 
consent until the next time the patient visits the physical location of 
the actor's office, so long as the actor explains the insufficiency and 
provides a sufficient consent form at the next visit.
    Comments. Commenters have mentioned that a health information 
network (HIN) does not have operational control over or visibility into 
the detailed decision-making of an individual's consent or 
authorization of its participants, and they argue that an actor such as 
a HIN should not be obligated to review or confirm the individuals' 
consent or authorization, and that such confirmation is a requirement 
of the health care provider because health care provider has a direct 
relationship with the patient.
    Response. We believe that actors such as a HIN do have the 
obligation to comply with the conditions of this sub-exception. We have 
taken the approach that each actor must use its ``reasonable efforts'' 
and focus on what reasonable steps they can take to provide their 
reasonable efforts. We do not, however, believe that actors who have a 
direct patient relationship would have a higher standard of reasonable 
efforts than those actors such as HINs which do not have a direct 
relationship with a patient and are acting on behalf of a health care 
provider. However, even actors that do not have a direct relationship 
with an individual, should use their reasonable efforts for the 
activities under their control as it relates to supporting the 
providing or obtaining of a consent or authorization.
    Comments. Commenters expressed concerns that actors would be 
required to create new policies beyond HIPAA aimed at offering patients 
a ``meaningful'' opportunity to consent, and as a result, more 
challenges than solutions would result from this policy. Commenters 
noted unnecessary administrative burdens, confusion with HIPAA 
requirements, and complexity for actors as some of the possible 
challenges.
    Response. As noted above, the ``meaningful opportunity'' 
requirement was not included in this final rule.
    Comments. Many commenters expressed the opinion that actors meeting 
certain preconditions may be outside the direct control of the actor 
and recommended that examples should be provided about what actions are 
sufficient to meet the ``reasonably necessary'' standard. Another 
commenter argued that the reasonably necessary standard for the 
meaningful opportunity requirement only stands to further aggravate the 
burdensome nature of more stringent privacy laws. Other commenters were 
concerned that the requirement that the actor ``did all things 
reasonably necessary within its control to provide the individual with 
a meaningful opportunity to provide the consent or authorization'' was 
too rigid a requirement and that even if one possible action was not 
done, the exception would not apply. Other commenters argued that this 
standard was an extremely onerous requirement and contradicts the 
stated intent of reducing the overall administrative burden on health 
care practices.
    Response. As noted above, the standard is now based on reasonable 
efforts within the actor's control, and it applies only after the actor 
receives a consent or authorization form that does not satisfy all 
applicable conditions. We believe that this change addresses the 
comments noted above. We note that we have slightly modified the 
terminology used in Sec.  171.202(b)(2)(i). We proposed ``a form of 
consent or authorization'' (84 FR 7602) and have change that language 
in the final rule to ``a consent or authorization form'' for clarity. 
This modification does not change the meaning of Sec.  
171.202(b)(2)(i).
    Comments. A commenter expressed concern to modify this exception to 
make it clear that a hospital or health system may claim the exception 
when an entity requesting patient data does not communicate that it has 
obtained consent.
    Response. As noted above, this condition of the sub-exception 
applies only after an insufficient consent or authorization is 
received. This condition of the sub-exception in the final rule does 
not apply when the actor has not received anything regarding the 
individual's consent or authorization. In such cases, the actor would 
not be required to communicate to the entity requesting the EHI that 
the actor has not obtained the individual's consent or authorization in 
order to meet this sub-exception.
    Comments. A commenter argued that actors should provide the 
individual with a ``reasonably convenient opportunity'' to provide the 
consent or authorization, rather than requiring ``all things reasonably 
necessary within its control'' to provide consent or authorization. The 
commenter noted that where entities make the request on behalf of the 
individual, the actor making the request should facilitate the 
gathering of the consent or authorization.
    Response. As noted above, both the ``reasonable opportunity'' and 
the ``all things reasonably necessary'' language are not included in 
this final rule, but the actor must satisfy the reasonable efforts 
standard when an insufficient consent or authorization has been 
received. This might include providing a correct form or reasonable 
assistance to the individual to solve any consent or authorization 
documentation problems necessary to address the insufficiency.
Sub-Exception 1: Precondition Not Satisfied: Did Not Improperly 
Encourage or Induce the Individual To Withhold the Consent or 
Authorization
    We proposed that to qualify for this sub-exception, to the extent 
that the precondition at issue was the provision of a consent or 
authorization by an individual, the actor must not have improperly 
encouraged or induced the individual to not provide the consent or 
authorization. As proposed, an actor would not meet this condition in 
the event that it misled an individual about the nature of the consent 
to be provided, dissuaded individuals from providing consent in respect 
of disclosures to the actor's competitors, or imposed onerous 
requirements to effectuate consent that

[[Page 25854]]

were unnecessary and not required by law.
    We sought comment on whether the proposed condition requiring the 
provision of prohibiting improper encouragement or inducement should 
apply to preconditions beyond the precondition that an individual 
provide consent or authorization. We sought comment on whether the 
conditions specified for this sub-exception, when taken in total, are 
sufficiently particularized and sufficiently strict to ensure that 
actors that are in a position to influence whether a precondition is 
satisfied will not be able to take advantage of this sub-exception and 
seek protection for practices that do not promote the privacy of EHI. 
We also sought comment on whether we should adopt a more tailored 
approach to conditioning the availability of this sub-exception (84 FR 
7531).
    Comments. We received no comments opposing this condition 
applicable to practices that implement the provision of a consent or 
authorization from an individual to an actor.
    Response. Within the sub-exception (Sec.  171.202(b)) applicable to 
practices that implement a consent or authorization, we are finalizing 
in Sec.  171.202(b)(2)(ii) as proposed.
Sub-Exception 2: Sub-Exception: Health IT Developer of Certified Health 
IT Not Covered by HIPAA
    The sub-exception we proposed in Sec.  171.202(b) recognized as 
reasonable and necessary the activities engaged in by actors consistent 
with the controls placed on access, exchange, or use of EHI by Federal 
and State laws. We noted that the sub-exception was limited to actors 
that are subject to those Federal and State laws; an actor that is not 
regulated by HIPAA cannot benefit from the exception proposed in Sec.  
171.202(b).
    We proposed to establish a sub-exception to the information 
blocking provision that would apply to actors that are health IT 
developers of certified health IT but not regulated by the HIPAA 
Privacy Rule in respect to the operation of the actor's health IT 
product or service (referred to as ``non-covered actors'' for this sub-
exception). We noted that we expect that the class of actors to which 
this proposed sub-exception applies will be very small. We explained 
that the vast majority of health IT developers of certified health IT 
operate as business associates to covered entities under HIPAA. As 
business associates, they are regulated by the HIPAA Privacy Rule, and 
may be able to benefit from the exception proposed in Sec.  171.202(b) 
to the extent that the HIPAA Privacy Rule (or applicable State law) 
imposes preconditions to the provision of access, exchange, or use of 
EHI. However, we recognized that direct-to-consumer health IT products 
and services are a growing sector of the health IT market. The privacy 
practices of consumer-facing health IT products and services are 
typically regulated by the Federal Trade Commission Act (FTC Act). 
However, while the FTC Act prohibits unfair or deceptive acts or 
practices in or affecting commerce (15 U.S.C. 45(a)(1)), it does not 
prescribe specific privacy requirements.\165\
---------------------------------------------------------------------------

    \165\ See HHS, Examining Oversight of the Privacy & Security of 
Health Data Collected by Entities Not Regulated by HIPAA, https://www.healthit.gov/sites/default/files/non-covered_entities_report_june_17_2016.pdf.
---------------------------------------------------------------------------

    We proposed that where a health IT developer of certified health IT 
offers a health IT product or service not regulated by the HIPAA 
Privacy Rule, such product or service is still subject to the 
information blocking provision. We wanted to ensure that such non-
covered actors under the information blocking provisions are able to 
avail themselves of the Privacy Exception. As such, we proposed that an 
entity that is not covered by HIPAA will not engage in information 
blocking if the actor declines to provide access, exchange, or use of 
EHI where the practice implements a process that is described in the 
actor's organizational privacy policy and has been disclosed to any 
individual or entity that uses the actor's health IT. We proposed this 
sub-exception in Sec.  171.202(c) which sets forth additional detail 
(84 FR 7532).
    In the final rule, we have finalized that when engaging in a 
practice that promotes the privacy interests of an individual, the non-
covered actor must implement the practice according to a process 
described in the organizational privacy policies, disclosed those 
organizational privacy policies to the individuals and entities that 
use the actor's product or service before they agreed to use them, and 
the non-covered actor's organizational privacy policies must: (1) 
Comply with applicable State or Federal laws; (2) be tailored to the 
specific privacy risk or interest being addressed; and (3) be 
implemented in a consistent and non-discriminatory manner. Public 
comments on specific conditions are summarized below, in context of 
each condition proposed. We believe our responses to these comments 
furnish the clarity non-covered actors need to understand the 
conditions of the sub-exception finalized in Sec.  171.202(c).
Practice Must Implement Privacy Policy
    We proposed that in order to qualify for this sub-exception, the 
practice engaged in by the non-covered actor--the interference with 
access, exchange, or use of EHI--must also implement a process 
described in the actor's organizational privacy policy. This requires 
that a non-covered actor must have documented in detail in its 
organizational privacy policy the processes and procedures that the 
actor will use to determine when the actor will not provide access, 
exchange, or use of EHI. For example, we explained that a non-covered 
actor that proposed to require the provision of written consent for the 
use or disclosure of EHI would need to describe in its organizational 
privacy policy the processes and procedures to be utilized by the actor 
to implement that privacy-protective practice so that the practice be 
considered reasonable and necessary and qualify for this sub-exception. 
We noted that compliance with this condition ensures that the sub-
exception recognizes only legitimate practices that have been tailored 
to the privacy needs of the individuals that use the non-covered 
actor's health IT, and does not recognize practices that are a pretext 
or after-the-fact rationalization for actions that interfere with 
access, exchange, or use of EHI.
    We also proposed that the non-covered actor's practice must 
implement its documented organizational privacy policy. We noted that 
practices that diverge from an actor's documented policies, or which 
are not addressed in an actor's organizational privacy policy, would 
not qualify for this proposed sub-exception (84 FR 7532).
Policies Must Have Been Disclosed to Users
    We proposed that a non-covered actor that seeks to benefit from the 
sub-exception must also ensure that it has previously disclosed the 
privacy-protective practice to the individuals and entities that use, 
or will use, the health IT. These users are affected by the practices 
engaged in by a non-covered actor but may otherwise have no visibility 
of the non-covered actor's approach to protecting the privacy of EHI. 
We noted that we expect that non-covered actors will seek to satisfy 
this condition by using a privacy notice.\166\

[[Page 25855]]

We emphasized that the disclosure must be meaningful. In assessing 
whether a non-covered actor's disclosure was meaningful, we explained 
that regard will be paid to whether the disclosure was in plain 
language and conspicuous, including whether the disclosure was located 
in a place, and presented in a manner, that is accessible and obvious 
to the individuals and entities that use, or will use, the health IT.
---------------------------------------------------------------------------

    \166\ ONC has provided a Model Privacy Notice (MPN) that is a 
voluntary, openly available resource designed to help developers 
clearly convey information about their privacy and security policies 
to their users. The MPN provides a snapshot of a company's existing 
privacy practices encouraging transparency and helping consumers 
make informed choices when selecting products. The MPN does not 
mandate specific policies or substitute for more comprehensive or 
detailed privacy policies. See https://www.healthit.gov/topic/privacy-security-and-hipaa/model-privacy-notice-mpn.
---------------------------------------------------------------------------

    We proposed that to qualify for this sub-exception, a non-covered 
actor would not be required to disclose its organizational privacy 
policy to its customers or to the public generally. Rather, the non-
covered actor need only describe, with sufficient detail and precision 
to be readily understood by users of the non-covered actor's health IT, 
the privacy-protective practices that the non-covered actor has adopted 
and will observe. We explained that this is necessary because a non-
covered actor that is not subject to prescribed privacy standards in 
connection with the provision of health IT will have significant 
flexibility in the privacy-protective practices that it adopts. If a 
non-covered actor is not required to inform the individuals and 
entities that use, or will use, the health IT, about the privacy-
protective practices that it will implement in its product, or when 
providing its service, we noted that there is a risk that the sub-
exception will give deference to policies and processes that are post 
hoc rationalizations used to justify improper practices. We stated that 
this condition also serves as a check on the nature of the 
interferences that a non-covered actor writes into its organizational 
privacy policies; transparency will help to ensure that a non-covered 
actor takes a balanced approach to protecting privacy interests on one 
hand, and pursuing business interests that might be inconsistent with 
the information blocking provision, on the other hand (84 FR 7533).
    We proposed that it will be a matter for non-covered actors to 
determine the most appropriate way to communicate its privacy practices 
to users. We noted that it would be reasonable that non-covered actors 
would, at a minimum, post their privacy notices, or otherwise describe 
their privacy-protective practices, on their websites (84 FR 7533).
Practice Must Be Tailored to Privacy Risk and Implemented in a Non-
Discriminatory Manner
    Finally, we proposed that in order for a practice to qualify for 
this sub-exception, an actor's practice must be tailored to the 
specific privacy risks that the practice actually addresses and must be 
implemented in a consistent and non-discriminatory manner.
    We requested comment on this proposed sub-exception generally. 
Specifically, we requested comment on whether HIEs or HINs would 
benefit from a similar sub-exception. We also requested comment on 
whether the conditions applicable to this sub-exception are sufficient 
to ensure that non-covered actors cannot take advantage of the 
exception by engaging in practices that are inconsistent with the 
promotion of individual privacy. We also requested comment on the level 
of detail that non-covered actors should be required to use when 
describing their privacy practices and processes to user of health IT 
(84 FR 7533).
    Comments. Some commenters believed that this sub-exception could be 
helpful for those developing their own health IT tools, which are 
outside of the electronic health record.
    Response. We agree that this sub-exception would be helpful for 
those developing their own health IT tools. The sub-exception address 
those certified Health IT products not covered by HIPAA and would have 
in place an organizational privacy policy which is tailored to a 
specific privacy risk or interest.
    Comments. Commenters noted that regarding the sub-exception 
proposed for ``non-covered actors'' that develop patient-facing health 
IT, they urged the need to balance the conditions of this sub-exception 
with the requirements placed on actors who institute organizational 
privacy policies.
    Response. We appreciate the comment. In order to meet this sub-
exception, the organizational privacy policies of a non-covered actor 
would need to comply with other applicable State and Federal laws. 
Further, we have finalized that non-covered actors that seek to benefit 
from this sub-exception must also ensure that their organizational 
privacy policies are disclosed to the individuals and entities that use 
their product or service before the individuals and entities agree to 
use them. The organizational privacy policies are important for 
transparency for users of the certified technologies and to demonstrate 
compliance with applicable State and Federal laws. Non-covered actors 
have the discretion to determine the most appropriate way to 
communicate their privacy policies to individuals and users. As stated 
above and in the Proposed Rule (84 FR 7533), it would be reasonable for 
non-covered actors to, at a minimum, post their privacy notices, or 
otherwise describe their privacy-protective practices, on their 
websites.
    Comments. A few commenters stated that it is unclear whether 
application developers are subject to HIPAA if they are not business 
associates or covered entities.
    Response. We appreciate the feedback. Where application developers 
are not defined as a covered entity or business associate as defined 
under 45 CFR 160.103, then the application developer is not covered 
under the HIPAA Privacy Rule or HIPAA Security Rule.
    Comments. Some commenters expressed concern that data will be made 
available to third-party application suppliers, commercial analytics 
companies, and/or entities that are not governed by HIPAA and that such 
availability of data would not serve patients' best interests and could 
result in potential misuse of patient data.
    Response. We appreciate the feedback and agree that an actor who is 
a health IT developer of certified health IT that is not required to 
comply with the HIPAA Privacy Rule must comply with all applicable 
State and Federal laws, including the FTC Act. Further, such actors 
must have an organizational privacy policy that is tailored to the 
privacy risk or interest being addressed in order to meet this sub-
exception. We emphasize that where a health IT developer of certified 
health IT offers a health IT product or service not regulated by the 
HIPAA Privacy Rule, such product or service is subject to the 
information blocking provision. Our goal is to ensure that non-covered 
actors that engage in reasonable and necessary privacy-protective 
practices that interfere with the access, exchange, or use of EHI could 
seek coverage under the sub-exception.
    Comments. Some commenters stated that actors that are not covered 
by HIPAA should make their privacy policies publicly available. Other 
commenters did not believe that the Proposed Rule fully addressed 
patient and consumer privacy protections.
    Response. We appreciate the comments. We believe that it is 
important that users know what to expect when electing to use a non-
covered actor's product or service.

[[Page 25856]]

Sub-Exception 3: Denial of an Individual's Request for Their Electronic 
Protected Health Information in the Circumstances Provided in 45 CFR 
164.524(a)(1) and (2)
    We proposed a limited sub-exception to the information blocking 
provision that would permit a covered entity or business associate to 
deny an individual's request for access to their PHI in the 
circumstances provided under 45 CFR 164.524(a)(1) (2) and (3). We noted 
that this exception would avoid a potential conflict between the HIPAA 
Privacy Rule and the information blocking provision. Specifically, the 
HIPAA Privacy Rule contemplates circumstances under which covered 
entities, and in some instances business associates, may deny an 
individual access to PHI and distinguishes those grounds for denial 
which are reviewable from those which are not. We proposed that this 
exception applies to both the ``unreviewable grounds'' and ``reviewable 
grounds'' of access. We noted that the ``unreviewable grounds'' for 
denial for individuals include situations involving: (1) Certain 
requests that are made by inmates of correctional institutions; (2) 
information created or obtained during research that includes 
treatment, if certain conditions are met; (3) denials permitted by the 
Privacy Act; and (4) information obtained from non-health care 
providers pursuant to promises of confidentiality. In addition, we 
noted that two categories of information are expressly excluded from 
the HIPAA Privacy Rule individual right of access: (1) Psychotherapy 
notes, which are the notes recorded by a health care provider who is a 
mental health professional documenting or analyzing the contents of a 
conversation during a private counseling session and that are 
maintained separate from the rest of the patient's medical record; and 
(2) information compiled in reasonable anticipation of, or for use in, 
a civil, criminal, or administrative action or proceeding.\167\
---------------------------------------------------------------------------

    \167\ See 45 CFR 164.501; 45 CFR 164.524 (a)(1)(i) and (ii).
---------------------------------------------------------------------------

    We noted the ``reviewable grounds'' of access as described in Sec.  
164.524(a)(3), which provides that a covered entity may deny access 
provided that the individual is given a right to have such denials 
reviewed under certain circumstances. We explained that one such 
circumstance is when a licensed health care professional, in the 
exercise of professional judgment, determines that the access requested 
is reasonably likely to endanger the life or physical safety of the 
individual or another person. In addition, we noted that if access is 
denied, then the individual has the right to have the denial reviewed 
by a licensed health professional who is to act as a reviewing official 
and did not participate in the original decision to deny access (see 
generally 45 CFR 164.524(a)(3)) (84 FR 7533 and 7534).
    As mentioned above with regards to the harm exception (Sec.  
171.201) our purpose is to avoid unnecessary complexity. By including 
the ``reviewable grounds'' of 45 CFR 164.524(a)(3) in the harm 
exception at Sec.  171.201, we align these regulations in a way that 
streamlines compliance for actors subject to the HIPAA Privacy Rule and 
this regulation. We removed the 45 CFR 164.524(a)(3) reference in the 
privacy sub-exception in Sec.  171.202(d) and moved it to the harm 
exception in Sec.  171.201 in order to promote clarity and alignment 
with the inter-relationship between this final rule and the HIPAA 
Privacy Rule.
    In restricting this privacy sub-exception to only ``unreviewable 
grounds'' in 45 CFR 164.524(a)(1) and (2), we clarify the regulation 
text so that it is immediately clear that actors who are covered 
entities, and in some instances business associates, may deny an 
individual access to EHI of the individual and such denials would not 
provide an opportunity for review of the denial under certain 
circumstances. We clarify in the final rule that if an individual 
requests EHI under the right of access provision under 45 CFR 
164.524(a)(1) from an actor that must comply with 45 CFR 164.524(a)(1), 
the actor's practice must be consistent with 45 CFR 164.524(a)(2). 
These ``unreviewable grounds'' are related to specific privacy risks or 
interests and have been established for important public policy 
purposes, such as when a health care provider is providing treatment in 
the course of medical research or when a health care provider is acting 
under the direction of a correctional institution.
    Unlike the ``unreviewable grounds,'' the ``reviewable grounds'' 
that are finalized Sec.  171.201 are directly related to the likelihood 
of harm to a patient or another person and requires that actors seeking 
to avail themselves of this exception must have a reasonable belief 
that the practice will substantially reduce a risk of harm that would 
otherwise arise from the specific access, use, or exchange of EHI 
affected by the practice, and the harm must be one that would be 
cognizable under 45 CFR 164.524(a)(3) as a basis for denying an 
individual's right of access to their PHI in analogous circumstances. 
In other words, the ``reviewable grounds'' of access as described in 45 
CFR 164.524(a)(3), provides that a covered entity may deny access 
provided that the individual is given a right to have such denials 
reviewed when a licensed health care professional, in the exercise of 
professional judgment, determines that the access requested is 
reasonably likely to endanger the life or physical safety of the 
individual or another person. In addition, we noted that if access is 
denied, then the individual has the right to have the denial reviewed 
by a licensed health professional who is to act as a reviewing official 
and did not participate in the original decision to deny access and the 
risk to be reduced must be one that would otherwise arise from the 
specific access, use, or exchange of EHI affected by the practice.
    We proposed that if an actor who is a covered entity or its 
business associate denies an individual's request for access to their 
PHI on the basis of these unreviewable grounds, and provided that the 
denial of access complies with the requirements of the HIPAA Privacy 
Rule in each case, then the actor would qualify for this exception and 
these practices would not constitute information blocking (84 FR 7534).
    We requested comment on this proposed sub-exception.
    Comments. Commenters were concerned that HINs that are business 
associates may not be authorized to provide individual access on the 
behalf of covered entity. Further, commenters sought clarification that 
this sub-exception would also apply in circumstances where as a 
business associate, the HIN would deny the individual's request for 
access because of its obligations as a business associate.
    Response. We share this concern. To meet this privacy sub-
exception, if an individual requests their ePHI under 45 CFR 
164.524(a)(1), the actor may deny the request in the circumstances 
provided in 45 CFR 164.524(a)(1) or (2). That is, an actor that is a 
covered entity may deny an individual's request for access to all or a 
portion of the PHI and must meet its requirements under the HIPAA 
Privacy Rule. As we discussed earlier, an individual's right under the 
HIPAA Privacy Rule to access PHI about themselves includes PHI in a 
designated record set maintained by a business associate on behalf of a 
covered entity. However, if the same PHI that is the subject of an 
access request is maintained in both the designated record set of the 
covered entity and the designated record set of the business associate, 
the PHI need only be

[[Page 25857]]

produced once in response to the request for access.\168\
---------------------------------------------------------------------------

    \168\ 45 CFR 164.524(c)(1).
---------------------------------------------------------------------------

    Comments. Commenters requested clarification that covered entities 
and business associates could meet this sub-exception when conducting 
clinical research with a blinded or masked designed. The EHI is 
typically `tagged' as part of a blinded or masked research during a 
research study.
    Response. To meet this privacy sub-exception, if an individual 
requests their ePHI under 45 CFR 164.524(a)(1), the actor may deny the 
request in the circumstances provided in 45 CFR 164.524(a)(1) or (2). 
Under certain limited circumstances under the Privacy Rule, a covered 
entity may deny an individual's request for access to all or a portion 
of the PHI requested. In some of these circumstances, an individual 
does not a right to have the denial reviewed by a licensed health care 
professional. It is known as ``unreviewable grounds'' for denial.\169\ 
One of the ``unreviewable grounds'' involves individual access to ePHI 
in a research study. An actor may deny access to an individual provided 
that the requested PHI is in a designated record set that is part of a 
research study that includes treatment (e.g., clinical trial) and is 
still in progress, provided the individual agreed to the temporary 
suspension of access when consenting to participate in the research. 
The individual's right of access can be reinstated upon completion of 
the research study.
---------------------------------------------------------------------------

    \169\ 45 CFR 164.524(a)(2).
---------------------------------------------------------------------------

Sub-Exception 4: Sub-Exception: Respecting an Individual's Request Not 
To Share Information
    We proposed to establish an exception to the information blocking 
provision that would, in certain circumstances, permit an actor not to 
provide access, exchange, or use of EHI if an individual has 
specifically requested that the actor not do so. This sub-exception was 
proposed in Sec.  171.202(e). We noted that this sub-exception is 
necessary to ensure that actors are confident that they can respect 
individuals' privacy choices without engaging in information blocking, 
and to promote public confidence in the health IT infrastructure by 
effectuating patients' preference about how and under what 
circumstances their EHI will be accessed, exchanged, and used. We 
recognized in the Proposed Rule that individuals may have concerns 
about permitting their EHI to be accessed, exchanged, or used 
electronically under certain circumstances. As a matter of public 
policy, we explained that these privacy concerns, if expressed by an 
individual and agreed to by an actor, would be reasonable and 
necessary, and an actor's conduct in abiding by its agreement would, if 
all conditions are met, be an exception to the information blocking 
provision (84 FR 7534).
    We proposed that this proposed sub-exception would not apply under 
circumstances where an actor interferes with a use or disclosure of EHI 
that is required by law, including when EHI is required by the 
Secretary to enforce HIPAA under 45 CFR 164.502(a)(2)(ii) and 45 CFR 
164.502(a)(4)(i). Stated differently, this sub-exception would not 
operate to permit an actor to refuse to provide access, exchange, or 
use of EHI when that access, exchange, or use is required by law. We 
noted that this sub-exception recognizes and supports the public policy 
objective of the HIPAA Privacy Rule, which identifies uses and 
disclosures of EHI for which the public interest in the disclosure of 
the individual's information outweighs the individual's interests in 
controlling the information.
    We proposed that this sub-exception would permit an actor not to 
share EHI if the following conditions are met: (1) The individual made 
the request to the actor not to have their EHI accessed, exchanged, or 
used; (2) the individual's request was initiated by the individual 
without any improper encouragement or inducement by the actor; and (3) 
the actor or its agent documents the request within a reasonable time 
period.
    We described that to qualify for this sub-exception, the request 
that the individual's EHI not be accessed, exchanged, or used must come 
from the individual. Moreover, the individual must have made the 
request independently and without any improper encouragement or 
inducement by the actor.
    We proposed that if an individual submits a request to an actor not 
to disclose her EHI, and the actor agrees with and documents the 
request, the request would be valid for purposes of this sub-exception 
unless and until it is subsequently revoked by the individual. We 
proposed that once the individual makes the request, she should not, 
subject to the requirements of applicable Federal or State laws and 
regulations, have to continually reiterate her privacy preferences, 
such as having to re-submit a request every year. Likewise, we proposed 
that once the actor has documented an individual's request, the actor 
should not have to repeatedly reconfirm and re-document the request. We 
requested comment, however, regarding whether this approach is too 
permissive and could result in unintended consequences. We also sought 
comment on this proposed sub-exception generally, including on 
effective ways for an individual to revoke their privacy request for 
purposes of this sub-exception.
    We also proposed that in order for a practice to qualify for this 
sub-exception, an actor's practice must be implemented in a consistent 
and non-discriminatory manner. This condition would provide basic 
assurance that the purported privacy practice is directly related to 
the risk of disclosing EHI contrary to the wishes of an individual, and 
is not being used to interfere with access, exchange, or use of EHI for 
other purposes to which this exception does not apply. We noted that 
this condition requires that the actor's privacy-protective practice 
must be based on objective criteria that apply uniformly for all 
substantially similar privacy risks (84 FR 7534 and 7535).
    We noted that under the HIPAA Privacy Rule, individuals have the 
right to request restrictions on how a covered entity will use (as that 
term is defined in 45 CFR 160.103) and disclose PHI about them for 
treatment, payment, and health care operations pursuant to 45 CFR 
164.522(a)(1). Under 45 CFR 164.522(a), a covered entity is not 
required to agree to an individual's request for a restriction (other 
than in the case of a disclosure to a health plan under 45 CFR 
164.522(a)(1)(vi)), but is bound by any restrictions to which it agrees 
(84 FR 7534).
    We proposed that if an individual submitted a request to an actor 
not to disclose her EHI, and the actor agreed with and documents the 
request, the request would be valid for the purposes of this sub-
exception unless and until it was subsequently revoked by the 
individual. We believed that this approach would minimize compliance 
burdens for actors while also respecting individuals' requests. We 
sought comment on this proposed sub-exception generally, including on 
effective ways for individuals to revoke their privacy request for 
purposes of this sub-exception (84 FR 7534). In the final rule, we 
align with the HIPAA Privacy Rule, specifically, 45 CFR 164.522(a)(2) 
which includes specific requirements with respect to the termination of 
an individual's restriction. Similar to the HIPAA Privacy Rule, we 
include Sec.  171.202(e)(4) to address situations where the individual 
terminates its individual's restriction.
    An actor may terminate a restriction with the individual's written 
or oral agreement. If the individual's agreement

[[Page 25858]]

is obtained orally, the actor must document that agreement. A note in 
the certified EHR or similar notation is sufficient documentation. If 
the individual agrees to terminate the restriction, the actor may use 
and disclose EHI as otherwise permitted under this final rule. An actor 
may only access, exchange or use EHI after it informs the individual of 
the termination. The restriction continues to apply to EHI accessed, 
exchanged or used prior to informing the individual of the termination. 
That is, any EHI that had been collected before the termination may not 
be accessed, exchanged or used in a way that is inconsistent with the 
restriction, but any information that is collected after informing the 
individual of the termination of the restriction may be used or 
disclosed as otherwise permitted under the final rule. In Sec.  
171.201(e)(4), we clarify that an actor must document a restriction to 
which it has agreed. We do not require a specific form of 
documentation; a note in the certified EHR or similar notation is 
sufficient.
    A restriction is only binding on the actor that agreed to the 
restriction. We encourage actors to inform others of the existence of a 
restriction when it is appropriate to do so. If a restriction does not 
permit an actor to disclose EHI to a particular person, the actor must 
carefully consider whether disclosing the existence of the restriction 
to that person would also violate the restriction.
    We clarified that for the purposes of this proposed sub-exception, 
the actor may give effect to an individual's request not to have an 
actor disclose EHI even if State or Federal laws would allow the actor 
not to follow the individual's request. We explained that this is 
consistent with our position that, absent improper encouragement or 
inducement, and subject to appropriate conditions, it should not be 
considered information blocking to give effect to patients' individual 
preferences about how their EHI will be shared or how their EHI will 
not be shared.
    We requested comments on this sub-exception generally. 
Specifically, we sought comment on what would be considered a 
reasonable time frame for documentation. In addition, we also sought 
comment on how this sub-exception would affect public health 
disclosures and health care research, if an actor did not share a 
patient's EHI due to a privacy preference, including any effects on 
preventing or controlling diseases, injury, or disability, and the 
reporting of disease, injury, and vital events such as births or 
deaths, and the conduct of public health surveillance and health care 
research (84 FR 7534 and 7535).
    Comments. Commenters recommended that we provide guidance regarding 
what could be considered a ``reasonable time period'' under Sec.  
171.202(e)(3) and to provide clarity to health information 
professionals that will be tasked with documenting the individual's 
privacy preferences in accordance with this regulation.
    Response. In order to align with HIPAA, we looked to the HIPAA 
Privacy Rule at 45 CFR 164.522 for guidance on this issue. The HIPAA 
Privacy Rule requires a covered entity to document a restriction of 
PHI, but gives covered entities the discretion to determine the exact 
timing of the documentation. The documentation requirement is 
consistent with the HIPAA Privacy Rule, which is already being observed 
by covered entities and business associates.
    Under the HIPAA Privacy Rule, a covered entity may voluntarily 
choose, but is not required, to obtain the individual's consent for it 
to use and disclose information about him or her for treatment, 
payment, and health care operations.\170\ A ``consent'' document is not 
a valid permission to use or disclose PHI for a purpose that requires 
an ``authorization'' under the HIPAA Privacy Rule (see 45 CFR 164.508), 
or where other requirements or conditions exist under the HIPAA Privacy 
Rule for the use or disclosure of PHI.
---------------------------------------------------------------------------

    \170\ See 45 CFR 164.506(b).
---------------------------------------------------------------------------

    Similarly, we believe that actors should be given the discretion to 
document an individual's request and such documentation should be 
within a reasonable period of time after making such a request. 
Although we do not require the request form to be dated at the time it 
is signed, we would recommend that it be dated so that actors and 
others can document that the request was obtained prior to an actor's 
agreement for the restriction of the individual's access, exchange or 
use of EHI. What would be deemed as an unreasonable period of time 
would be the unreasonable delay in performance and in documentation by 
the actor as well as whether there were any objective manifestations of 
expectation expressed between the individual and the actor.
    Comments. A commenter recommended that a reasonable time frame 
should balance and not burden an individual or organization such as 
reviewing preferences with the individual each year and that the risk/
benefit profile in the fast-changing health-IT market may well have 
changed and that the individual has a right to have those changes 
disclosed to make an informed decision. Another commenter expressed a 
belief that not asking the individual to reconfirm their preference is 
too permissive.
    Response. We agree that once the individual makes the request to an 
actor, she should not, subject to the requirements of applicable 
Federal or State laws and regulations, have to continually reiterate 
her privacy preferences, such as having to re-submit a request every 
year. Likewise, we finalized that once the actor has documented an 
individual's request within a reasonable period of time, then the actor 
is not required to repeatedly reconfirm and re-document the request.
    Comments. A commenter recommended that the request needs to be in 
writing, and suggested that we provide guidance regarding how the 
individual's request could be documented. Another commenter requested 
that we develop a template consent form whereby patients could indicate 
if they would like to have their health information disclosed to third 
parties and to ensure that the content of this form would be absent of 
any ``improper encouragement or inducement'' and that we should work in 
consultation with OCR to develop the recommended language for a model 
consent form.
    Response. We agree that an individual's request and an individual's 
request for revocation should be in writing assuming such a request is 
not required or prohibited by law. Alternatively, an actor could 
document a conversation with an individual. Such documentation could be 
documented in a certified EHR in some manner, and if the individual was 
provided a specific request form, the form could be included in a 
certified EHR. We believe that an individual should have sufficient 
opportunity to consider whether to provide a request and that an actor 
should minimize the possibility of coercion or undue influence and 
refrain from any improper encouragement or inducement. Any form 
provided by the actor should have information provided in plain 
language that is understandable to the individual.
    For example, we noted that it would be improper to discourage 
individuals from sharing information with unaffiliated providers on the 
basis of generalized or speculative risks of unauthorized disclosure. 
On the other hand, we noted that if the actor was aware of a specific 
privacy or security risk, it would be proper to inform individuals of 
that risk. Likewise, an

[[Page 25859]]

actor would be permitted to provide an individual with general 
information about her privacy rights and options, including for 
example, the option to not provide consent, provided the information is 
presented accurately, does not omit important information, and is not 
presented in a way that is likely to improperly influence the 
individual's decision about how to exercise their rights.
    It is important to note that the sub-exception conditions in the 
regulation are not intended to preempt any applicable Federal, State, 
or local laws that may require additional information to be disclosed 
for an agreement to be legally effective. We will continue to work in 
consultation with OCR to develop resources as necessary to support 
actors' compliance with the conditions of this Privacy Exception.
    Comments. Commenters requested greater clarity on how this 
regulation would affect public health disclosures and health care 
research, if an actor did not share a patient's EHI due to a privacy 
preference, including any effects on preventing or controlling 
diseases, injury, or disability, and the reporting of disease, injury, 
and vital events such as births or deaths, and the conduct of public 
health surveillance and health care research.
    Response. With regard to public health disclosures, to the extent 
that such disclosures are required by law, the actor would not be in a 
position to grant the patient's request for restriction. With regard to 
EHI used for research, the unavailability of the individual's 
information resulting from a restriction would be consistent with the 
patient's right to withhold authorization for research uses and 
disclosures. However, an Institutional Review Board may approve a 
consent procedure that alters some or all of the elements of informed 
consent, or waive the requirement to obtain informed consent under HHS 
regulations at 45 CFR 46.116(c), and to the extent that the researcher 
has obtained a waiver of informed consent, research could be 
compromised by the unavailability of certain EHI. One possible way to 
resolve this issue would be the establishment of a field that actors 
covered could check in a certified EHR that would indicate that 
restrictions have been applied to the individual's EHI (without 
providing detail of the nature of such restriction). In this case, 
actors could exclude the individual's EHI from research.
    Comments. A commenter suggested that EHI should be accessed, 
exchanged or used despite a patient's privacy agreement with an actor 
in emergency treatment situations particularly when an individual is 
unavailable to provide a revocation. The commenter was concerned that 
if the EHI was not disclosed to health care provider in an emergency, 
the individual could be subject to imminent harm or death.
    Response. In the Proposed Rule (proposed Sec.  171.202(e)), we did 
not provide how an individual could revoke her privacy agreement with 
the actor. In response, we included in the final rule in Sec.  
171.202(e)(4) to specifically address the termination of an 
individual's request. In order to address these specific circumstances 
and align with the HIPAA Privacy Rule, we agree that an individual's 
restriction may need to be compromised in emergency treatment 
situations, and we have finalized that an actor may terminate an 
individual's request for a restriction to not provide access, exchange 
or use of EHI under limited circumstances.
    c. Security Exception--When will an actor's practice that is likely 
to interfere with the access, exchange, or use of electronic health 
information in order to protect the security of electronic health 
information not be considered information blocking?
    We proposed in the Proposed Rule (84 FR 7535 through 7538) to 
establish an exception to the information blocking provision that would 
permit actors to engage in practices that are reasonable and necessary 
to promote the security of EHI, subject to certain conditions. We 
explained that, without this exception, actors may be reluctant to 
implement security measures or engage in other activities that are 
reasonable and necessary for safeguarding the confidentiality, 
integrity, and availability of EHI. This could undermine the ultimate 
goals of the information blocking provision by discouraging best 
practice security protocols and diminishing the reliability of the 
health IT ecosystem.
    We noted (84 FR 7535) that robust security protections are critical 
to promoting patients' and other stakeholders' trust and confidence 
that EHI will be collected, used, and shared in a manner that protects 
individuals' privacy and complies with applicable legal requirements. 
We also noted that public confidence in the security of their EHI has 
been challenged by the growing incidence of cyber-attacks in the health 
care sector. More than ever, we explained, health care providers, 
health IT developers, HIEs and HINs must be vigilant to mitigate 
security risks and implement appropriate safeguards to secure the EHI 
they collect, maintain, access, use, and exchange.
    We emphasized (84 FR 7535) that, while the importance of security 
practices cannot be overstated, the proposed exception would not apply 
to all practices that purport to secure EHI. Rather, we stated that the 
exception would only be available when the actor's security-based 
practice satisfies the conditions applicable to this exception.\171\ We 
noted that it would not be appropriate to prescribe a ``maximum'' level 
of security or to dictate a one-size-fits-all approach for all actors 
as that may not be appropriate in all circumstances and may not 
accommodate new threats, countermeasures, and best practices in a 
rapidly changing security landscape. We further noted that we did not 
intend for the proposed exception to dictate a specific security 
approach. Moreover, we emphasized that effective security best 
practices focus on the mitigation and remediation of risks to a 
reasonable and acceptable level.
---------------------------------------------------------------------------

    \171\ In the Proposed Rule (84 FR 7535), we used the phrase 
``conditions applicable to this exception'' to mean the conditions 
(inclusive of requirements within specific conditions) of the 
exception applicable to a particular practice in a particular 
circumstance. Where we are not summarizing what we stated in the 
proposed rule, in this preamble we have generally used plainer-
language phrasings, such as ``the conditions of the exception that 
are applicable to a practice [in the particular circumstances].''
---------------------------------------------------------------------------

    With consideration of the above (84 FR 7535), we proposed that 
actors would be able to satisfy the exception through practices that 
implement either security policies and practices developed by the 
actor, or case-by-case determinations made by the actor. We proposed 
that whether a security-motivated practice meets this exception would 
be determined on a case-by-case basis using a fact-based analysis of 
the conditions set forth in the Proposed Rule.
    We emphasized (84 FR 7535) that the practices implemented by a 
single physician office with limited technology resources, for example, 
will be different to those implemented by a large health system, and 
that this difference does not affect an actor's ability to qualify for 
this exception. The fact-based approach that we proposed would allow 
each actor to implement policies, procedures, and technologies that are 
appropriate for its particular size, organizational structure, and 
risks to individuals' EHI. We noted that a fact-based analysis also 
aligns with the HIPAA Security Rule \172\ concerning the security of 
ePHI. The HIPAA Security Rule requires HIPAA covered entities or 
business associates to develop security practices and implement 
administrative, physical, and

[[Page 25860]]

technical safeguards that take into account: The entity's size, 
complexity, and capabilities; technical, hardware, and software 
infrastructure; the costs of security measures; and the likelihood and 
possible impact of potential risks to ePHI.\173\ We noted (84 FR 7535 
and 7536), however, that while our proposed approach would be 
consistent with the regulation of security practices under the HIPAA 
Security Rule, the fact that a practice complies with the HIPAA 
Security Rule would not establish that it meets the conditions of the 
exception to the information blocking provision. We emphasized (84 FR 
7536) that the HIPAA Security Rule and the proposed exception have 
different foci. The HIPAA Security Rule establishes a baseline by 
requiring certain entities to ensure the confidentiality, integrity, 
and availability of ePHI by implementing security measures, among other 
safeguards, that the entities determine are sufficient to reduce risks 
and vulnerabilities to a reasonable and appropriate level. In contrast, 
we explained that the purpose of the exception to the information 
blocking provision is to provide flexibility for reasonable and 
necessary security practices without excepting from the definition of 
information blocking in Sec.  171.103 practices that purport to promote 
the security of EHI but that are unreasonably broad and onerous on 
those seeking access to EHI, not applied consistently across or within 
an organization, or otherwise may unreasonably interfere with access, 
exchange, or use of EHI.
---------------------------------------------------------------------------

    \172\ 45 CFR 164.306, 308, 310, and 312.
    \173\ 45 CFR 164.306(b)
---------------------------------------------------------------------------

    To qualify for this exception, we proposed that an actor's conduct 
must satisfy threshold conditions. As discussed in detail in the 
Proposed Rule (84 FR 7535 through 7538), the particular security-
related practice must be directly related to safeguarding the 
confidentiality, integrity, and availability of EHI, implemented 
consistently and in a non-discriminatory manner, and tailored to 
identified security risks (84 FR 7535). We also proposed (84 FR 7537) 
that where an actor has documented security policies that align with 
applicable consensus-based standards, and where the policies are 
implemented in a consistent and non-discriminatory manner, a practice's 
conformity with such policies would provide a degree of assurance that 
the practice was reasonable and necessary to address specific security 
risks and thus should not constitute information blocking. We also 
stated in the Proposed Rule (84 FR 7537) that we recognize that EHI 
security may present novel and unexpected threats that even a best-
practice risk assessment and security policy cannot anticipate. We 
stated that if a practice that does not implement an organizational 
security policy is to qualify for this exception; however, it must meet 
certain conditions. The public comments received, our responses to 
these comments, and the conditions as finalized in Sec.  171.203 are 
discussed below in this section of this final rule preamble.
    We encouraged comment on these conditions (84 FR 7538), and our 
overall approach to the proposed exception, including whether our 
proposal provided adequate flexibility for actors to implement measures 
that are commensurate to the threats they face, the technology 
infrastructure they possess, and their overall security profiles and, 
equally important, whether this exception adequately mitigates the risk 
that actors will adopt security policies that are unnecessarily 
restrictive or engage in practices that unreasonably interfere with 
access, exchange, or use of EHI. Commenters were encouraged to propose 
additional conditions that may be necessary to ensure that the 
exception is tailored and does not extend protection to practices that 
are not reasonable and necessary to promote the security of EHI and 
that could present information blocking concerns. We also requested 
comment on whether the use of consensus-based standards and guidance 
provides an appropriate reference point for the development of security 
policies.
    Finally, we asked commenters to offer an alternative basis for 
identifying practices that do not offer a security benefit (compared 
with available alternatives) but that cause an information blocking 
harm by interfering with access, exchange, or use of EHI (84 FR 7538).
    Comments. We received several comments supporting, and did not 
receive any comments opposed to, the establishment of the Security 
Exception. We also received no comments offering an alternative basis 
for identifying practices that do not offer a security benefit 
(compared with other available alternatives) but that cause an 
information blocking harm by interfering with access, exchange, or use 
of EHI to a greater degree than necessary. We received a number of 
comments requesting additional guidance about how the exception's 
conditions can be met in practice. Commenters asked questions about, or 
recommended that we furnish additional guidance on how an actor might 
determine which a security practices meet the conditions in Sec.  
171.203 to qualify for the exception.
    Response. We appreciate commenters' feedback. We have finalized the 
exception in Sec.  171.203, with some modification to the regulation 
text. We have changed the title of the exception from ``Exception--
Promoting the security of electronic health information'' in the 
Proposed Rule (84 FR 7603) to ``Security Exception--When will a 
practice likely to interfere with access, exchange, or use of 
electronic health information in order to protect the security of 
electronic health information not be considered information blocking?'' 
Throughout this final rule preamble, we use ``Security Exception'' as a 
short form of this title, for ease of reference. As stated in Section 
VIII.D of this final rule preamble, we have changed the titles of all 
of the exceptions to questions to improve clarity. We have edited the 
wording of the introductory text of Sec.  171.203 as finalized, in 
comparison to that proposed (84 FR 7603) so that it is consistent with 
the finalized title of Sec.  171.203. We believe these conforming 
changes in wording of the introductory text also improve clarity of 
expression in this section.
    Comments on specific conditions are summarized below, in context of 
each condition proposed. We believe our responses to these comments 
furnish the clarity actors need to understand the conditions and of the 
exception finalized in Sec.  171.203 for practices likely to interfere 
with access, exchange, or use of EHI in order to protect the security 
of EHI to be considered excepted from the definition of information 
blocking in Sec.  171.103.
Condition: The Practice Must Be Directly Related to Safeguarding the 
Confidentiality, Integrity, and Availability of Electronic Health 
Information
    We proposed that, as a threshold condition, the exception would not 
apply to practices that are not directly related (84 FR 7536) to 
safeguarding the security of EHI. We explained that, in assessing the 
practice, we would consider whether and to what extent the practice 
directly addressed specific security risks or concerns. We noted that 
we would also consider whether the practice served any other purposes 
and, if so, whether those purposes were merely incidental to the 
overriding security purpose or provided an objectively distinct, non-
security-related rationale for engaging in the practice.
    We noted (84 FR 7536) that it should not be particularly difficult 
or onerous for an actor to demonstrate that its

[[Page 25861]]

practice was directly related to a specific security risk or concern. 
For example, we explained that the actor may show that the practice was 
a direct response to a known security incident or threat; or that the 
practice directly related to the need to verify a person's identity 
before granting access to EHI; or that the practice was directly 
related to ensuring the integrity of EHI.
    We emphasized (84 FR 7536) that the salient issue under this 
condition, therefore, would be whether the security practice was 
actually necessary and directly related to the specific security risk 
being addressed. To that end, we noted that we would consider the 
actor's purported basis for adopting the particular security practice, 
which could be evidenced by the actor's organizational security policy, 
risk assessments, and other relevant documentation, which most actors 
are already required to develop pursuant to requirements under the 
HIPAA Rules. However, we proposed that the documentation of an actor's 
decision making would not necessarily be dispositive. For example, we 
noted that if the practice had the practical effect of disadvantaging 
competitors or steering referrals, this could be evidence that the 
practice was not directly related and tailored to the specific security 
risk. We proposed that such an inference would also not be warranted 
where the actor has not met the other conditions of this exception, as 
where the actor's policies were not developed or implemented in a 
reasonable manner; its security policies or practices were not tailored 
to specific risks; or it applied its security policies or practices in 
an inconsistent or discriminatory manner.
    Comments. We received a number of comments supporting the 
applicability of this exception to practices directly related to 
safeguarding the confidentiality, integrity, and availability of EHI 
and that are consistent with the HIPAA Security Rule. We received no 
comments recommending that this exception not be applicable to such 
practices.
    Response. We have finalized this condition as proposed. In order to 
meet this specific condition (finalized in Sec.  171.203(a)), a 
practice must be directly related to safeguarding the confidentiality, 
integrity, and availability of EHI.
    Comments. Commenters expressed concerns with what commenters 
described as the complexity of fact-based analysis and use of terms 
such as ``directly related.'' Commenters stated that analyzing their 
policies and practices against such standards could be burdensome, 
especially in the context of the requirement to meet all conditions at 
all relevant times.
    Response. While fact-based analysis may not be as simple as 
determining if a particular security practice does or does not conform 
to a pre-specified approach, we believe that it is the most practical 
approach given the inherent complexity of the regulatory and threat 
landscapes relevant to an actor's cybersecurity practices. This 
landscape complexity contributes substantially to our belief that a 
one-size-fits-all detailed definition or test for security measures or 
methods to be deemed ``directly related'' to safeguarding the 
confidentiality, integrity, and availability of EHI would not be the 
optimal approach at this time. We have not established a specific, 
regulatory definition for ``directly related'' as we are using both 
``directly'' and ``related'' in their ordinary meanings.\174\
---------------------------------------------------------------------------

    \174\ Ordinary meanings of the adverb ``directly'' and the 
adjective ``related'' in American usage can be found in widely 
published dictionaries, such as The American Heritage Dictionary of 
the English Language, Dictionary.com, or Merriam-Webster.com.
---------------------------------------------------------------------------

    With respect to the condition that a practice meet all conditions 
in Sec.  171.203 at all relevant times in order to satisfy the 
exception, we do not believe it would be particularly difficult, in 
context of a fact-specific analysis, for an actor to demonstrate that 
its practice was directly related to a specific security risk or 
concern. For example, the actor may show that the practice was a direct 
response to a known security incident or threat, or that the practice 
was directly related to the need to verify a person's identity before 
granting access to EHI. We also note that, although we encourage actors 
to voluntarily conform their practices to the conditions of an 
exception suited to the practice and its purpose, an actor's choice to 
do so simply provides it an enhanced level of assurance that the 
practices do not meet the definition of information blocking. Failure 
to meet an exception does not necessarily mean a practice meets the 
definition of information blocking. If subject to an investigation by 
HHS, each practice that implicates the information blocking provision 
and that does not meet any exception would be analyzed on a case-by-
case basis.
    The overarching purpose of the Security Exception is to provide 
flexibility for reasonable and necessary security practices while 
screening out practices that purport to promote the security of EHI but 
that otherwise unreasonably and/or unnecessarily interfere with access, 
exchange, and use of EHI. Confidentiality, integrity and availability, 
also known as the CIA triad, is a model designed to guide policies for 
information security practices within an organization. The elements of 
the triad are considered the three most crucial components of 
information security practices.\175\ In assessing whether a practice 
meets the condition finalized in Sec.  171.203(a), the information that 
we would expect to consider includes, but is not necessarily limited 
to, the actor's purported basis for adopting the particular security 
practice, which could be evidenced by the actor's organizational 
security policy, risks assessments the actor had performed that 
informed the actor's security-based practice(s), and other relevant 
documentation that an actor maintains. We also reiterate our 
observation that many actors are also HIPAA covered entities or 
business associates. For that reason, many actors are likely to have, 
pursuant to their meeting the requirements of the HIPAA Security Rule, 
documentation relevant to showing their security-based practice(s) 
satisfy the Security Exception condition that is finalized in Sec.  
171.203(a).\176\
---------------------------------------------------------------------------

    \175\ See NIST Special Publication 800-12, revision 1, An 
Introduction to Information Security.
    \176\ 45 CFR 164.316
---------------------------------------------------------------------------

Condition: The Practice Must Be Tailored to the Specific Security Risk 
Being Addressed
    To meet the exception, we proposed (84 FR 7536) that an actor's 
security-related practice must be tailored to specific security risks 
that the practice actually addressed. We explained that this condition 
necessarily presupposes that an actor has carefully evaluated the risk 
posed by the security threat and developed a considered response that 
is tailored to mitigating the vulnerabilities of the actor's health IT 
or other related systems.
    Comments. Commenters expressed concerns with what commenters 
described as the complexity of fact-based analysis and use of terms 
such as ``tailored.'' Commenters stated that analyzing their policies 
and practices against such standards could be burdensome, especially in 
context of the requirement to meet all conditions at all relevant 
times.
    Response. While fact-specific analysis may not be as simple as 
determining if a particular security practice does or does not conform 
to a pre-specified approach, we believe that it is the most practical 
approach given the inherent complexity of the regulatory and threat 
landscapes relevant to an actor's cybersecurity practices. This 
landscape

[[Page 25862]]

complexity contributes substantially to our belief that a one-size-
fits-all definition or test for security measures or methods to be 
deemed conformant with the condition finalized in Sec.  171.203(b) 
would not be the optimal approach at this time. Instead, we have 
finalized the condition proposed in Sec.  171.201(b) as proposed. We 
believe requiring that the actor's policies and practices be tailored 
to the risk being addressed is currently the most appropriate and 
practical approach. We intend for this exception to be applicable to a 
wide array of practices that are reasonable and necessary to protect 
the security of EHI in various actors' specific operational contexts. 
In assessing whether a practice meets the condition finalized in Sec.  
171.203(b), we would consider whether and to what extent the practice 
directly addresses specific security risks or concerns and whether it 
was tailored to those risks. We would also consider whether the 
practice served any other purposes and if so, whether those purposes 
were merely incidental to an overriding security purpose or provided an 
objectively distinct, non-security related rationale for engaging in 
the practice. We also believe the ordinary meaning of ``tailored'' 
\177\ provides sufficient clarity that we expect the practices to be 
made or adapted to serve the particular purpose or need for which they 
are deployed. With respect to the requirement that a practice meet all 
conditions in Sec.  171.203 at all relevant times in order to satisfy 
the exception, we do not believe it would be particularly difficult, in 
context of a fact-specific analysis, for an actor to demonstrate that 
each practice was made or adapted to serve the particular purpose or 
need for which is was deployed. For example, where a practice meets the 
condition finalized in Sec.  171.203(a) by being a direct response to a 
known security incident or threat, it logically follows that the 
practice should also be made or adapted to the purpose of responding to 
such incident or threat. In which case, the practice's inherent 
characteristics would support the actor's ability to show that it meets 
the condition finalized in Sec.  171.203(b). Similarly, where an 
identity-proofing practice satisfies the condition finalized in Sec.  
171.203(b) by being directly related to the need to verify a person's 
identity before granting access to EHI, it would be logical to expect 
the practice would also be tailored to address that need.
---------------------------------------------------------------------------

    \177\ See, e.g., sense 1.b. of the entry for the verb ``tailor'' 
in the Merriam-Webster dictionary: ``to make or adapt to suit a 
special need or purpose'' (https://merriam-webster.com/dictionary/tailor, last accessed Feb. 6, 2020). See also, e.g., sense 3 of the 
entry for the verb ``tailor'' in The American Heritage Dictionary of 
the English Language: ``to make, alter, or adapt for a particular 
end or purpose'' (https://ahdictionary.com, last accessed Feb 6, 
2020).
---------------------------------------------------------------------------

    Comments. Commenters recommended that actors should be permitted to 
develop and implement security policies that exceed the minimum 
requirements of HIPAA with the intent to promote data security or to 
comply with State law or policies.
    Response. If its conditions are otherwise met, this exception would 
apply to security-based practices that exceed the minimum conditions of 
the HIPAA Security Rule. As would be the case with a practice 
implemented to comply with the HIPAA Security Rule requirements, the 
fact that a practice was implemented to meet another applicable legal 
mandate would be considered in assessing whether a practice meets this 
exception. However, a practice that is consistent with a law or 
regulation setting a minimum requirement for protecting 
confidentiality, integrity, and availability of EHI might not meet this 
exception. For example, a practice that is consistent with a minimum 
legal condition related to the security of EHI might not meet this 
exception if it is not also tailored to avoid interfering with the 
access, exchange, or use of EHI to a greater extent than reasonable and 
necessary to appropriately mitigate the risk it addresses.
    We have finalized this condition in Sec.  171.203(b) without 
modification to the text of this condition as proposed (84 FR 7603).
Condition: The Practice Must Be Implemented in a Consistent and Non-
Discriminatory Manner
    We proposed (84 FR 7536 and 7537) that in order for a practice to 
qualify for this exception, the actor's practice must have been 
implemented in a consistent and non-discriminatory manner. We explained 
that this condition would provide basic assurance that the purported 
security practice is directly related to a specific security risk and 
is not being used to interfere with access, exchange, or use of EHI for 
other purposes to which this exception does not apply.
    As an illustration solely of the non-discriminatory manner 
condition (84 FR 7536 and 7537), we discussed a hypothetical example of 
a health IT developer of certified health IT that offers apps to its 
customers via an app marketplace. We stated that if the developer 
requires that third-party apps sold (or made available) via the 
developer's app marketplace meet certain security requirements, those 
security requirements must be imposed in a non-discriminatory manner. 
We noted that this would mean, for example, that if a developer imposed 
a requirement that third-party apps include two-factor authentication 
for patient access, the developer would need to ensure that the same 
requirement was imposed on, and met by, all other apps, including any 
apps made available by the developer itself. We also noted that such a 
developer requirement must also meet the other conditions of the 
exception (e.g., the condition that the practice be tailored to the 
specific security risk being addressed).
    Comments. We received no comments opposed to the condition that 
practices must be implemented in a consistent and non-discriminatory 
manner. We did receive one comment recommending that we recognize under 
this exception risk-based cybersecurity practices that may result in 
applying different security requirements to different exchange partners 
based on risk posed.
    Response. We intend this exception, including but not limited to 
this specific condition, to allow for recognition of risk-based 
security practices. Assessment of whether practices satisfy the 
conditions of this exception will be fact-based. We also recognize that 
objectively reasonable practices applied on the basis of the 
cybersecurity risks posed by particular system connections or data 
exchanges may result in practices that are tailored to this risk and 
thus not necessarily identical across all connections, interchanges, 
and therefore all individuals or entities with whom an actor engages. 
In context of this condition of the Security Exception, ``consistent 
and non-discriminatory'' should be understood to mean that similarly 
situated actors whose interactions pose the same level of security risk 
should be treated consistently with one another under the actor's 
security practices. Inconsistent treatment across similarly situated 
actors whose interactions pose the same level of security risk based on 
extraneous factors, such as whether they are a competitor of the actor 
implementing the security practices, would not be considered 
appropriate.
    We have finalized this condition as proposed. It is codified in 
Sec.  171.203(c).
Condition Applicable to Practices That Implement an Organizational 
Security Policy
    We discussed in the Proposed Rule (84 FR 7537) that an actor's 
approach to information security management would reflect the actor's 
particular size, organizational structure, and risk

[[Page 25863]]

posture. Because of this, we emphasized that actors should develop and 
implement organizational policies that secure EHI. We proposed that, 
where an actor has documented security policies that align with 
applicable consensus-based standards, and where the policies are 
implemented in a consistent and non-discriminatory manner, a practice's 
conformity with such policies would provide a degree of assurance that 
the practice was reasonable and necessary to address specific security 
risks and thus should not constitute information blocking.
    We stated (84 FR 7537) that a practice that went beyond an actor's 
established policies or procedures by imposing security controls that 
were not documented would not qualify for this exception under this 
condition (although the actor may be able to qualify under the 
alternative basis for practices that do not implement a security 
policy). We further stated that such practices would be suspect under 
the information blocking provision if there were indications that the 
actor's security-related justification was a pretext or after-the-fact 
rationalization for its conduct or was otherwise unreasonable under the 
circumstances.
    We reiterated (84 FR 7537) that, to the extent that an actor seeks 
to justify a practice on the basis of its organizational security 
policies, such policies must be in writing and implemented in a 
consistent and non-discriminatory manner. We emphasized that what a 
policy requires will depend on the facts and circumstances. However, we 
proposed that to support a presumption that a practice conducted 
pursuant to the actor's security policy was reasonable, the policy 
would have to meet conditions stated and discussed in Section VIII.D.3 
of the Proposed Rule (84 FR 7537). The details within paragraph (d) of 
Sec.  171.203 were proposed in regulation text (84 FR 7603). The 
detailed requirements of the condition as proposed in Sec.  171.203(d) 
were: If the practice implements an organizational security policy the 
policy must--
     Be in writing;
     Have been prepared on the basis of, and directly respond 
to, security risks identified and assessed by or on behalf of the 
actor;
     Align with one or more applicable consensus-based 
standards or best practice guidance; and
     Provide objective timeframes and other parameters for 
identifying, responding to, and addressing security incidents.
    We discuss each of these requirements (subparagraphs) within the 
condition applicable to practices that implement an organizational 
security policy (Sec.  171.203(d)) in more detail below.
Paragraph (d)(1): Security Policy in Writing
    We proposed that the actor's security policy must be in writing (84 
FR 7537). This requirement is applicable to practices that implement an 
organizational security policy and is consistent with the HIPAA 
Security Rule.\178\ The importance of written security policies is also 
consistent with consensus-based standard and best practice 
guidance.\179\
---------------------------------------------------------------------------

    \178\ 45 CFR 164.316
    \179\ See SP 800-53 Rev. 5 Security and Privacy Controls for 
Information Systems and Organizations.
---------------------------------------------------------------------------

    Comments. We received no comments opposed to this condition 
proposed in Sec.  171.203(d).
    Response. Within the condition (Sec.  171.203(d)) applicable to 
practices that implement an organizational security policy, we have 
finalized in Sec.  171.203(d)(1) the requirement that the policy must 
be in writing. We have finalized this condition as proposed.
Paragraph (d)(2): Security Risks Identified and Assessed
    We proposed (84 FR 7537) that the actor's security policy must be 
informed by an assessment of the security risks facing the actor. While 
we did not propose any requirements as to a risk assessment, we noted 
that a good risk assessment would use an approach consistent with 
industry standards,\180\ and would incorporate elements such as threat 
and vulnerability analysis, data collection, assessment of current 
security measures, likelihood of occurrence, impact, level of risk, and 
final reporting.\181\
---------------------------------------------------------------------------

    \180\ See OCR, Guidance on Risk Analysis, https://www.hhs.gov/hipaa/for-professionals/security/guidance/guidance-risk-analysis/?language=es.
    \181\ ONC and OCR have jointly launched the HHS HIPAA Security 
Risk Assessment (SRA) Tool, https://www.healthit.gov/providers-professionals/security-risk-assessment-tool.
---------------------------------------------------------------------------

    Comments. We received no comments opposed to requiring a linkage 
between an organization's security policy and a risk assessment. We did 
receive a couple of comments expressing a concern that not all actors 
may yet be proficient in identifying and assessing the risks associated 
with specific health IT functionalities, such as standards-based APIs.
    Response. Within the condition (Sec.  171.203(d)) applicable to 
practices that implement an organizational security policy, we have 
finalized Sec.  171.203(d)(2) with a revision to the wording of the 
regulation text in comparison with that proposed (84 FR 7603). 
Specifically, we have replaced ``and respond directly to'' that 
appeared in the regulation text with ``and be directly responsive to'' 
in the text finalized in Sec.  171.203(d)(2). Thus, the finalized text 
in Sec.  171.203(d)(2) reads: ``have been prepared on the basis of, and 
be directly responsive to, security risks identified and assessed by or 
on behalf of the actor.''
    We made this editorial revision because we believe it makes the 
resulting regulation text easier to read. Although actors may have 
obligations under other existing law or regulations, such as the HIPAA 
Security Rule, to conduct security risk assessments, this condition, 
which is applicable to security-based practices that implement an 
organizational security policy, does not establish a set threshold for 
an actor's proficiency in identifying, assessing, and responding to 
security risks. If any actor believes it may lack the technical or 
other expertise necessary to conduct a risk assessment appropriate to 
its operations and the EHI for which it is responsible, we would 
encourage that actor to seek additional information, training, or 
support from an individual or entity with the required expertise. As 
finalized in Sec.  171.203(d)(2), the requirement that risks have been 
identified and assessed expressly provides for this to have been done 
either by the actor or on the actor's behalf. We are sensitive to the 
possibility that some actors, including but not limited to small 
clinician practices, may not be in a position to meet the condition 
finalized in paragraph (d) of Sec.  171.203 immediately or for all of 
their security-based practices, and we therefore reiterate that we have 
finalized in Sec.  171.203(e) an alternative condition that an actor 
may choose to meet in circumstances where it may not be practical for 
them to meet the condition finalized in Sec.  171.203(d).
    We also reiterate that, while we do encourage actors to voluntarily 
conform their practices to the conditions of an exception suited to the 
practice and its purpose, an actor's choice to do so simply provides 
them an enhanced level of assurance that the practices do not meet the 
definition of information blocking. Failure to meet an exception does 
not necessarily mean a practice meets the definition of information 
blocking. If subject to an investigation by HHS, each practice that 
implicates the information blocking provision and that does not meet 
any exception would be analyzed on a case-by-case basis.

[[Page 25864]]

Paragraph (d)(3): Consensus-Based Standards or Best Practice Guidance
    We proposed (84 FR 7537) that the actor's policy must align with 
one or more applicable consensus-based standards or best practice 
guidance. We noted that at present, examples of relevant best practices 
for development of security policies include, but are not limited to: 
NIST-800-53 Rev. 5; the NIST Cybersecurity Framework; and NIST SP 800-
100, SP 800-37 Rev. 2, SP 800-39, as updated and as interpreted through 
formal guidance. We noted that best practice guidance on security 
policies is also developed by consensus standards bodies such as ISO, 
IETF, or IEC. We stated that HIPAA covered entities and business 
associates may be able to leverage their HIPAA Security Rule compliance 
activities and can, if they choose, align their security policy with 
those parts of the NIST Cybersecurity Framework that are referenced in 
the HIPAA Security Rule Crosswalk to NIST Cybersecurity Framework to 
satisfy this condition. We noted that relevant consensus-based 
standards and frameworks provide actors of varying sizes and resources 
with the flexibility needed to apply the right security controls to the 
right information systems at the right time to adequately address risk.
    Comments. One commenter expressed a concern that a small 
independent clinician practice that conducts a risk analysis consistent 
with its obligation under the HIPAA Security Rule may lack the 
technical expertise or other organizational capabilities needed to 
develop a customized security policy that appropriately applies 
consensus-based standards to each risk identified. This commenter 
recommended that we incorporate in Sec.  171.203(d) regulation text a 
statement that these conditions apply ``subject to the actor's 
sophistication and technical capabilities.''
    Response. We appreciate the point highlighted by the commenter 
that, even within a given type of actor, specific individuals or 
organizations may have different operational contexts that include 
variations in their technical capabilities, expertise, and other 
resources. We do not, however, believe it is necessary to revise the 
regulation text as recommended in order to allow for assessment of 
whether the actor's practices, such as its organizational security 
policy, were objectively reasonable in the circumstances in which they 
were implemented.
    Comments. A number of commenters requested that this exception 
allow providers to be proactive when promoting the security of EHI 
rather than taking a reactive stance. Commenters contended that for 
novel threats, consensus-based standards and best practice guidance may 
not exist, making it impossible for an actor to meet the condition that 
the organizational security policy align with such standards.
    Response. With cybersecurity risk continuously evolving and the 
large number of threat sources active in the modern cybersecurity 
landscape, we recognize that actors must continuously monitor, assess, 
and respond to security risks that can themselves represent an 
impediment to EHI access, exchange, and use. Thus, this exception 
allows actors flexibility in selecting and tailoring their practices to 
mitigate specific security risks, provided each such practice otherwise 
meets the conditions of this exception, notably including that it be 
directly related and tailored to the specific security risk being 
addressed and be implemented in a consistent and non-discriminatory 
manner. We also note that best security practices in security 
mitigation can take a proactive as well as a reactive approach. A 
documented policy that provides explicit references to consensus-based 
standards and best practice guidance (such as the NIST Cybersecurity 
Framework) offers an objective and robust means by which we can 
evaluate the reasonableness of a particular security control for the 
purpose of the exception. We also recognize that, as a practical 
matter, some actors (such as small health care providers or those with 
limited resources) may have organizational security policies that are 
less robust or that otherwise fall short of the minimum conditions 
proposed. In such circumstances an actor can still benefit from this 
exception by demonstrating that the practice met the conditions of this 
exception for circumstances where no formal (organizational) security 
policy was implemented (see our discussion under ``conditions 
applicable to practices that do not implement an organizational 
security policy'' header, below within this section of this final rule 
preamble).
    Comments. A commenter noted that it could be a difficult for an 
actor to meet the standard to that the actor's organizational policy on 
security must align with one or more consensus-based standards or best 
practice guidance because there are many emerging security threats that 
occur that are new and unexpected.
    Response. We do not believe that it would be difficult for an 
actor's organizational policy on security to align with one or more 
consensus-based standards or best practice guidance documents. An 
actor's written security policies should be based on consensus-based 
standards or best practice guidance documents which specifically 
address security risks and threats. A security policy should be clearly 
written and observed and refers to clear, comprehensive, and well-
defined plans, rules, and practices that regulate access to an actor's 
information systems and the EHI included in it. We believe a good 
policy serves as a prominent statement to the outside world about the 
actor's commitment to security, and that such a policy should be based 
on objective consensus-based standards and should not be ad hoc or 
arbitrary.
    We do agree that there are emerging and novel security threats that 
occur, and in those situations which are not specifically addressed by 
an actor's security policies, we included in the exception as proposed 
an alternative condition (proposed in Sec.  171.203(e)) to address 
those situations in which those security risks can be addressed based 
on particularized facts and circumstances.
    Within the condition (Sec.  171.203(d)) applicable to practices 
that implement an organizational security policy, the actor's policy 
must align with one or more applicable consensus-based standards or 
best practice guidance. The finalized condition is codified in Sec.  
171.203(d)(3).
Paragraph (d)(4): Objective Timeframes and Other Parameters
    We proposed that the actor's security policy must provide objective 
timeframes and common terminology used for identifying, responding to, 
and addressing security incidents. We noted examples of acceptable 
sources for development of a security response plan include: NIST 
Incident Response Procedure (https://csrc.nist.gov/publications/detail/sp/800-61/rev-2/final), US-CERT for interactions with government 
systems (https://www.us-cert.gov/government-users/reporting-requirements), and ISC-CERT for critical infrastructure (https://ics-cert.us-cert.gov/) (84 FR 7537).
    As a point of clarification, we noted that an actor's compliance 
with the HIPAA Security Rule (if applicable to the actor) would be 
relevant to, but not dispositive of, whether the actor's policies and 
procedures were objectively reasonable for the purpose of the 
exception. We explained that an actor's documentation of its security 
policies and procedures for compliance with the HIPAA Security Rule may 
not offer a sufficient basis to evaluate whether the actor's security 
practices

[[Page 25865]]

unnecessarily interfere with access, exchange, or use of EHI. We 
further noted that a documented policy that provides explicit 
references to consensus-based standards and best practice guidance 
(such as the NIST Cybersecurity Framework) would offer an objective and 
robust means by which to evaluate the reasonableness of a particular 
security control for the purpose of the exception (84 FR 7537).
    Comments. We received no comments opposing this requirement of the 
condition applicable to practices that implement an organizational 
security policy.
    Response. Within the condition (Sec.  171.203(d)) applicable to 
practices that implement an organizational security policy, we have 
finalized in Sec.  171.203(d)(4) the condition that the actor's 
organizational security policy ``provide objective timeframes and other 
parameters for identifying, responding to, and addressing security 
incidents.'' We have finalized this condition as proposed.
Condition Applicable to Practices That Do Not Implement an 
Organizational Security Policy
    In the Proposed Rule (84 FR 7537), we recognized that, as a 
practical matter, some actors (such as small health care providers or 
those with limited resources) may have organizational security policies 
that are less robust or that otherwise fall short of the minimum 
conditions proposed. We proposed that in these circumstances an actor 
could still benefit from the exception by demonstrating that the 
practice at issue was objectively reasonable under the circumstances, 
without regard to a formal policy. While we noted in the Proposed Rule 
(84 FR 7537) that we expect that most security practices engaged in by 
an actor will implement an organizational policy, we recognized that 
EHI security may present novel and unexpected threats that even a best-
practice risk assessment and security policy cannot anticipate. We 
noted that if a practice that does not implement an organizational 
policy is to qualify for this exception, however, it must meet certain 
conditions. We stated that the actor's practice must, based on the 
particularized facts and circumstances, be necessary to mitigate the 
security risk. Importantly, we proposed that the actor would have to 
demonstrate that it considered reasonable and appropriate alternatives 
that could have reduced the likelihood of interference with access, 
exchange, or use of EHI and that there were no reasonable and 
appropriate alternatives that were less likely to interfere with 
access, exchange or use of EHI.
    We noted (84 FR 7538) that an actor's consideration of reasonable 
and appropriate alternatives will depend on the urgency and nature of 
the security threat in question. We further noted that we anticipate 
that an actor's qualification for the exception would accommodate 
exigent circumstances. For example, we stated that we would not expect 
an actor to delay the implementation of a security practice in response 
to an emergency on the basis that it has not yet been able to initiate 
a fully realized risk assessment process. However, we also stated that 
we would expect that in these exigent circumstances, where the actor 
has implemented a security practice without first considering whether 
there were reasonable and appropriate alternatives that were less 
likely to interfere with access, exchange or use of EHI, the actor 
would expeditiously make any necessary changes to the practice based on 
the actor's re-consideration of reasonable and appropriate alternatives 
that are less likely to interfere with access, exchange or use of EHI. 
We proposed that the exception would apply in these instances so long 
as an actor takes these steps and complies with all other applicable 
conditions.
    Comments. Commenters stated that the absence of a policy means that 
one is dealing with an unexpected and evolving situation as best one 
can (e.g., a sustained and sophisticated attack). Commenters suggested 
we create a further ``safety valve'' for short-lived actions that are 
taken in good faith while a situation is being evaluated and understood 
and that we should recognize the valid need to allow for due diligence 
as distinct from simply delaying access and such due diligence should 
not need the Security Exception to avoid implicating or being judged as 
engaged in information blocking. Commenters stated this is a core need 
for small medical practices with limited resources.
    Response. We anticipate that the exception's conditions as proposed 
and finalized would accommodate exigent circumstances. For example, we 
would not expect an actor to delay the implementation of a security 
measure in response to an emergency such as a cyberattack simply 
because it has not yet been able to implement a fully realized risk 
assessment process. We believe the exception as posed does provide a 
``safety valve'' for situations where an actor in direct response to 
exigent circumstances may have implemented in good faith a security 
practice without first considering whether there were reasonable and 
appropriate alternatives that were less likely to interfere with 
access, exchange, or use of EHI, but where the initial-response 
practice may be in place for only a short while. Presumably, such 
initial-response practices are in place for only a short time precisely 
because, upon more fully identifying and assessing current risks in 
context or as follow-up to the exigent circumstances, the actor will 
have concluded it carried a greater than necessary burden--including 
the burden of interference with access, exchange or use of EHI--and 
consequently modified or replaced its initial-response practice with a 
less onerous alternative that was reasonable and appropriately tailored 
to the specific risk addressed.
    Comments. A commenter agreed that this exception allows for an 
actor to maintain flexibility in its approach to address security 
incidents or threats.
    Response. We agree that this exception provides an actor the 
flexibility to address security incidents or threats based on 
particularized facts and circumstances which are necessary to mitigate 
the security risk to EHI, provided that there are no reasonable and 
appropriate alternatives to the practice that address the security risk 
that are less likely to interfere with, prevent, or materially 
discourage access, exchange or use of EHI.
    We have finalized as proposed, in Sec.  171.203(e), the 
requirements applicable to practices that meet the threshold conditions 
established in Sec. Sec.  171.203(a), (b) and (c) and that do not 
implement an organizational security policy.
    d. Infeasibility Exception--When will an actor's practice of not 
fulfilling a request to access, exchange, or use electronic health 
information due to the infeasibility of the request not be considered 
information blocking?
    We proposed in the Proposed Rule in Sec.  171.205 (84 FR 7542 and 
7603) to establish an exception to the information blocking provision 
that would permit an actor to decline to provide access, exchange, or 
use of EHI in a manner that is infeasible, provided certain conditions 
are met. We proposed that in certain circumstances legitimate practical 
challenges beyond an actor's control may limit its ability to comply 
with requests for access, exchange, or use of EHI. In some cases, the 
actor may not have--and may be unable to obtain--the requisite 
technological capabilities, legal rights, financial resources, or other 
means necessary to provide a particular form of access, exchange, or 
use. In other cases, the actor may be able to comply with the

[[Page 25866]]

request, but only by incurring costs or other burdens that are clearly 
unreasonable under the circumstances (84 FR 7542).
    We proposed that the exception would permit an actor to decline a 
request in certain narrowly-defined circumstances when doing so would 
be infeasible (or impossible) and when the actor otherwise did all that 
it reasonably could do under the circumstances to facilitate 
alternative means of accessing, exchanging, and using the EHI. We 
proposed a structured, fact-based approach for determining whether a 
request was ``infeasible'' within the meaning of the exception. We 
noted that this approach would be limited to a consideration of factors 
specifically delineated in the exception and that the infeasibility 
inquiry would focus on the immediate and direct financial and 
operational challenges of facilitating access, exchange, and use, as 
distinguished from more remote, indirect, or speculative types of 
injuries (84 FR 7542).
    We encouraged comment on these and other aspects of this proposal 
(84 FR 7542).
    Comments. We received several comments in general support of the 
proposed exception.
    Response. We thank commenters for their support of our proposal. We 
note that we have changed the title of this exception from 
``Exception--Responding to requests that are infeasible'' (84 FR 7603) 
to ``When will an actor's practice of not fulfilling a request to 
access, exchange, or use electronic health information due to the 
infeasibility of the request not be considered information blocking?'' 
Throughout this final rule preamble, we use ``Infeasibility Exception'' 
as a short form of this title, for ease of reference. As stated in 
Section VIII.D of this final rule preamble, we have changed the titles 
of all of the exceptions to questions to improve clarity. We have also 
edited the wording of the introductory text in Sec.  171.204 as 
finalized, in comparison to that proposed (84 FR 7603 and 7604), so 
that it is consistent with the finalized title of Sec.  171.204. We 
believe these conforming changes in wording of the introductory text 
also improve clarity in this section.
i. Infeasibility of the Request
    To qualify for the exception, we proposed that compliance with the 
request for access, exchange, or use of EHI must be infeasible. We 
proposed a two-step test that an actor would need to meet in order to 
demonstrate that a request was infeasible. Under the first step of the 
infeasibility test, we proposed that the actor would need to show that 
complying with the particular request in the manner requested would 
impose a substantial burden on the actor. Second, we proposed that the 
actor must also demonstrate that requiring it to comply with the 
request--and thus to assume the substantial burden demonstrated under 
the first part of the test--would have been plainly unreasonable under 
the circumstances (84 FR 7542 and 7543). We proposed that whether it 
would have been plainly unreasonable for the actor to assume the burden 
of providing access, exchange, or use will be highly dependent on the 
particular facts and circumstances. We proposed to rely primarily on 
the following key factors enumerated in proposed Sec.  171.205(a)(1):
     The type of EHI and the purposes for which it may be 
needed;
     The cost to the actor of complying with the request in the 
manner requested;
     The financial, technical, and other resources available to 
the actor;
     Whether the actor provides comparable access, exchange, or 
use to itself or to its customers, suppliers, partners, and other 
persons with whom it has a business relationship;
     Whether the actor owns or has control over a predominant 
technology, platform, health information exchange, or health 
information network through which EHI is accessed or exchanged;
     Whether the actor maintains ePHI on behalf of a covered 
entity, as defined in 45 CFR 160.103, or maintains EHI on behalf of the 
requestor or another person whose access, exchange, or use of EHI will 
be enabled or facilitated by the actor's compliance with the request;
     Whether the requestor and other relevant persons can 
reasonably access, exchange, or use the information from other sources 
or through other means; and
     The additional cost and burden to the requestor and other 
relevant persons of relying on alternative means of access, exchange, 
or use (84 FR 7543).
    We acknowledged in the Proposed Rule that there may be situations 
when complying with a request for access, exchange, or use of EHI would 
be considered infeasible because an actor is unable to provide such 
access, exchange, or use due to unforeseeable or unavoidable 
circumstances that are outside the actor's control. As examples, we 
stated that an actor could seek coverage under this exception if it is 
unable to provide access, exchange, or use of EHI due to a natural 
disaster (such as a hurricane, tornado or earthquake) or war. We 
emphasized that, consistent with the requirements for demonstrating 
that practices meet all the conditions of a proposed exception, the 
actor would need to produce evidence and ultimately prove that 
complying with the request for access, exchange, or use of EHI in the 
manner requested would have imposed a clearly unreasonable burden on 
the actor under the circumstances (84 FR 7543 and 7544).
    We stated that certain circumstances would not constitute a burden 
to the actor for purposes of this exception and would not be considered 
in determining whether complying with a request would have been 
infeasible. We proposed that it would not be considered a burden if 
providing the requested access, exchange, or use of EHI in the manner 
requested would have (1) facilitated competition with the actor; or (2) 
prevented the actor from charging a fee (84 FR 7544).
    We requested comment on the proposed approach for determining 
whether a request is ``infeasible'' within the meaning of the 
exception. We encouraged comment on, among other issues, whether the 
factors we specifically delineated properly focus the infeasibility 
inquiry; whether our approach to weighing these factors is appropriate; 
and whether there are additional burdens, distinct from the immediate 
and direct financial and operational challenges, that are similarly 
concrete and should be considered under the fact-based rubric of the 
exception (84 FR 7544).
    Comments. We received several comments in support of our proposed 
approach for determining whether a request was ``infeasible.'' We also 
received several comments that expressed various concerns and 
suggestions for improvement regarding our proposals. Several commenters 
expressed concern that the language in the proposed exception, 
particularly regarding the ``infeasibility'' of a request, was too 
vague or ambiguous and that the inclusion of undefined terms could 
create uncertainty for actors regarding whether they meet the 
conditions under the exception. Commenters noted that such uncertainty 
could dissuade actors from taking advantage of the exception. 
Commenters requested additional examples and guidance to clarify the 
conditions under the exception.
    A few commenters questioned whether it would be considered 
information blocking if they could not segment EHI to respond to a 
request for a patient's EHI (e.g., when patient consent to share EHI 
subject to 42 CFR part 2 or a State privacy law has not been provided). 
These commenters

[[Page 25867]]

expressed concern about the ability of their technology to segment a 
patient's EHI.
    Response. We thank commenters for their support of our proposed 
approach for determining whether a request is ``infeasible,'' as well 
as the constructive feedback. We agree with commenters that each 
exception should clearly explain the conduct that would and would not 
be covered by each exception. We also reiterate that failure to meet 
the exception does not mean that an actor's practice related to 
infeasible requests necessarily meets the information blocking 
definition. However, as we noted in the Proposed Rule, the broad 
definition of information blocking in the Cures Act means that any 
practice that is likely to interfere with the access, exchange, or use 
of EHI implicates the information blocking provision. As a result, 
practices that do not meet the exception will have to be assessed on a 
case-by-case basis to determine, for example, the actor's intent and 
whether the practice rises to the level of an interference.
    We have restructured this exception to provide further clarity. 
Toward that end, we have eliminated the proposed two-step test that an 
actor would need to meet in order to demonstrate that a request is 
infeasible (84 FR 7542 and 7543). Instead, we have finalized a revised 
framework for this exception that provides two new conditions that must 
be met in order for an actor to be covered by the exception and a 
revised condition that provides an exception for those actors unable to 
meet the new Content and Manner Exception. When the practice by an 
actor meets one of the conditions in Sec.  171.204(a) and the actor 
meets the requirements for responding to requests in Sec.  171.204(b) 
(which are discussed in more detail below), the actor is not required 
to fulfill a request for access, exchange, or use of EHI due to the 
infeasibility of the request.
    The first new condition is that the actor cannot fulfill the 
request for access, exchange, or use of EHI due to events beyond the 
actor's control, namely a natural or human-made disaster, public health 
emergency, public safety incident, war, terrorist attack, civil 
insurrection, strike or other labor unrest, telecommunication or 
internet service interruption, or act of military, civil or regulatory 
authority (Sec.  171.204(a)(1)). This is consistent with our statements 
in the Proposed Rule describing events that an actor could seek 
coverage for under this exception if it is was unable to provide 
access, exchange, or use of EHI due to events beyond its control (84 FR 
7543). This new condition makes clear that such events are all that are 
necessary to meet this exception and no consideration of factors must 
be demonstrated and proven.
    The second new condition is that the actor is not required to 
fulfill a request for access, exchange, or use of EHI if the actor 
cannot unambiguously segment the requested EHI from other EHI: (1) 
Because of a patient's preference or because the EHI cannot be made 
available by law; or (2) because the EHI is withheld in accordance with 
the Harm Exception in Sec.  171.201 (Sec.  171.204(a)(2)). For 
instance, an actor will be covered under this condition if the actor 
could not fulfill a request to access, exchange, or use EHI because the 
requested EHI could not be unambiguously segmented from patient records 
created by federally assisted programs (i.e., Part 2 Programs) for the 
treatment of substance use disorder (and covered by 42 CFR part 2) or 
from records that the patient has expressed a preference not to 
disclose.
    The revised condition in Sec.  171.204(a)(3)(i) specifically aligns 
with our proposal (84 FR 7543) in that an actor would not be required 
to fulfill a request for access, exchange, or use of EHI if the actor 
demonstrates, through contemporaneous written record or other 
documentation, its consideration of the following factors in a 
consistent and non-discriminatory manner, prior to responding to the 
request pursuant to paragraph (b) of this section, that led to its 
determination that complying with the request would be infeasible under 
the circumstances:
     The type of EHI and the purposes for which it may be 
needed;
     The cost to the actor of complying with the request in the 
manner requested;
     The financial and technical resources available to the 
actor;
     Whether the actor's practice is non-discriminatory and the 
actor provides the same access, exchange, or use of EHI to its 
companies or to its customers, suppliers, partners, and other persons 
with whom it has a business relationship;
     Whether the actor owns or has control over a predominant 
technology, platform, health information exchange, or health 
information network through which electronic health information is 
accessed or exchanged; and
     Why the actor was unable to provide access, exchange, or 
use of EHI consistent with the Content and Manner Exception in Sec.  
171.301.
    We note that the above provisions align with our proposal in the 
Proposed Rule that the actor must provide the requestor with a detailed 
written explanation of the reasons why the actor cannot accommodate the 
request (84 FR 7544). The difference in the final language is that we 
have not specified the level of detail required in the written record 
or other documentation, and have clarified that such a written record 
or other documentation must be contemporaneous so that an actor cannot 
use a post hoc rationalization for claiming the request was infeasible 
under circumstances that were not considered at the time the request 
was received.
    We proposed in the Proposed Rule (84 FR 7544) and have finalized in 
this final rule in Sec.  171.204(a)(3)(ii) the following factors that 
may not be considered in the determination: (1) Whether the manner 
requested would have facilitated competition with the actor; and (2) 
whether the manner requested prevented the actor from charging a fee or 
resulted in a reduced fee. We note that we have clarified in the final 
rule that charging ``a'' fee includes a reduced fee as well. Our 
rationale for carving out these considerations is that the purpose of 
the Infeasibility Exception is to provide coverage to actors who face 
legitimate practical challenges beyond their control that limit their 
ability to comply with requests to access, exchange, or use EHI. We do 
not believe that whether the manner requested would have facilitated 
competition with the actor or prevented the actor from charging a fee 
or resulted in a reduced fee qualify as the type of legitimate 
practical challenges beyond the actor's control that should be covered 
by the exception. Regarding the consideration of fees, the actor is 
able to charge fees for costs reasonably incurred, with a reasonable 
profit margin, for accessing, exchanging, or using EHI under the Fees 
Exception in Sec.  171.302.
    We have finalized in Sec.  171.204(a)(3)(i)(F) the criterion that 
considers an actor's ability to provide access, exchange, and use of 
EHI consistent with the Content and Manner Exception in Sec.  171.301 
in order to assure alignment of this exception with the Content and 
Manner Exception. We further discuss the Content and Manner Exception 
in section VIII.D.2.a of this final rule.
    We did not finalize three factors that were proposed in the context 
of the infeasibility analysis: (1) Whether the actor maintains 
electronic protected health information on behalf of a covered entity, 
as defined in 45 CFR 160.103, or maintains electronic health 
information on behalf of the requestor or another person whose access, 
exchange, or use of electronic health information will be enabled or 
facilitated by the

[[Page 25868]]

actor's compliance with the request; (2) whether the requestor and 
other relevant persons can reasonably access, exchange, or use the 
electronic health information from other sources or through other 
means; and (3) the additional cost and burden to the requestor and 
other relevant persons of relying on alternative means of access, 
exchange, or use (see the proposed factors at 84 FR 7543). We removed 
the first factor because it was confusing and was not a strong 
indicator of whether a request was infeasible. We removed the second 
and third factors because we proposed them with the intention that they 
would be indicators of whether the relative burden on the requestor was 
greater than that on the actor. However, we have shifted away from this 
relative burden analysis in the final rule. To illustrate, 
consideration does not have to be given as to whether other means are 
available for access, exchange, or use of EHI or the cost to the 
requestor for that alternative means because of the new Content and 
Manner Exception (Sec.  171.301) and its relationship to this 
exception.
    Comments. One commenter recommended that claims of infeasibility 
based on the classification of EHI as proprietary and claims of 
infeasibility rooted in discriminatory practices should not be included 
in the exception, as they do not support ONC's policy goals of 
promoting competition and innovation in health IT and ultimately 
disadvantage customers and patients.
    Response. We agree with the commenter that claiming the EHI itself 
as proprietary is not a justification for claiming this exception. As 
discussed in more detail in the Fees Exception, we emphasize that 
almost all of the patient EHI found in the U.S. health care system has 
been generated and paid for with either public dollars through Federal 
programs, including Medicare and Medicaid, or directly subsidized 
through the tax preferences for employer-based insurance.
    We explained in the Proposed Rule how use of IP rights for 
interoperability elements can serve to interfere with access, exchange, 
and use of EHI. We also explained in the Proposed Rule that the mere 
fact that EHI is stored in a proprietary format or has been combined 
with confidential or proprietary information does not alter the actor's 
obligations under the information blocking provision to facilitate 
access, exchange, and use of the EHI in response to a request (84 FR 
7517). We emphasize that actors who control proprietary 
interoperability elements and demand royalties or license terms from 
competitors or other persons who are technologically dependent on the 
use of those interoperability elements would also be subject to the 
information blocking provision, unless they meet all conditions of the 
Licensing Exception (Sec.  171.303).
    We note, however, that actors may seek coverage under the 
Infeasibility Exception (Sec.  171.204) or Content and Manner Exception 
(Sec.  171.301) for certain issues related to IP. For instance, an 
actor may claim to be unable to fulfill a request to access, exchange, 
or use EHI because the actor is not the owner of the IP rights and 
lacks requisite authority to provide the requested access, exchange, or 
use of EHI. In such a situation, the actor could claim that the request 
is infeasible under the circumstances (see Sec.  171.204(a)(3)). Under 
Sec.  171.204(a)(3)(i)(E), one factor that can be considered when 
determining whether a practice is infeasible under the circumstances is 
whether the actor owns or has control over a predominant technology, 
platform, HIE, or HIN through which EHI is accessed or exchanged. The 
actor could also seek coverage under the Content and Manner Exception. 
Under Sec.  171.301(b)(2), an actor may provide the EHI requested in an 
alternative manner if responding to the request in the manner requested 
would require the actor to license IP. As we have explained throughout 
this final rule, each information blocking case, and whether the 
actor's practice would meet all conditions of an exception, will depend 
on its own unique facts and circumstances. We refer readers to the 
detailed discussions regarding the Content and Manner Exception 
(VIII.D.2.a) and Licensing Exception (VIII.D.2.c) in this preamble.
    We also agree with the commenter that infeasibility rooted in 
discriminatory practices should not be a justification for claiming 
this exception. It was never our intention to allow such conduct to be 
covered by this exception. In response to this comment, we have 
clarified the factor in Sec.  171.204(a)(3)(i)(D) to explicitly state 
that one consideration for determining whether a request is infeasible 
under the circumstances is whether the actor's practice is non-
discriminatory and the actor provides the same access, exchange, or use 
to its companies or to its customers, suppliers, partners, and other 
persons with whom it has a business relationship.
    Comments. Some commenters expressed concern that this exception 
does not fully consider potential conflicts between valid contracts, 
such as business associate agreements (BAAs), and subsequent requests 
for access, exchange, and use of EHI that are inconsistent with those 
contracts. Commenters urged ONC to specify whether an actor can refuse 
a request to access, exchange, or use EHI as being infeasible due to 
such contractual restrictions and obligations.
    Response. We appreciate these comments. We reiterate, as we 
explained in the Proposed Rule, that one means by which actors restrict 
access, exchange, or use of EHI is through formal restrictions, such as 
contract or license terms, EHI sharing policies, organizational 
policies or procedures, or other instruments or documents that set 
forth requirements related to EHI or health IT (84 FR 7518). We 
emphasize that such restrictions are one of the forms of information 
blocking the Cures Act and our final rule seek to address. We refer 
readers to the discussion of ``Practices that May Implicate the 
Information Blocking Provision'' in section VIII.C.6 of this final rule 
for a more detailed discussion of when contracts and agreements will be 
considered an ``interference'' with access, exchange, or use of EHI.
    Comments. A few commenters encouraged ONC to add a provision to the 
exception that would enable entities who have joined Trusted Exchange 
Framework and Common Agreement (TEFCA) to claim the Infeasibility 
Exception if a requestor or third party refused to join the TEFCA and 
instead demanded a one-off interface.
    Response. We appreciate these comments, but have decided not to 
adopt this suggested addition at this time. The TEFCA is still new, the 
Common Agreement is not yet finalized, and it would be premature to 
establish special treatment for entities that join the TEFCA. We may 
reconsider this suggestion at a later date. We note that this does not 
necessarily mean that actors in these situations will not be covered by 
the exception, as they could still show that a request for a one-off 
interface is infeasible under the circumstances (see Sec.  
171.204(a)(3)). However, not joining TEFCA is not de facto proof of 
infeasibility. We note that in addition to seeking coverage for 
infeasibility under the circumstances, the actor could also seek 
coverage from: (1) The Content and Manner Exception if the actor could 
not fulfill request to access, exchange, or use EHI in the manner 
requested (via a one-off interface), but could fulfill the request 
through an acceptable alternative manner (see Sec.  171.301(b)); or (2) 
the Fees Exception or Licensing Exception if the actor chooses to 
provide the one-off interface as requested, but charges

[[Page 25869]]

fees/royalties related to developing or licensing the one-off 
interface, which could include fees or royalties that result in a 
reasonable profit margin (see Sec.  171.302 and 303).
ii. Responding to Requests--Timely and Written Responses
    We proposed, in addition to demonstrating that a particular request 
was infeasible, that an actor would have to show that it satisfied 
additional conditions. Specifically, we proposed that to qualify for 
the exception, the actor must have timely responded to all requests 
relating to access, exchange, and use of EHI. Further, we proposed that 
for any request that the actor claims was infeasible, the actor must 
have provided the requestor with a detailed written explanation of the 
reasons why the actor could not accommodate the request. We proposed 
that the actor's failure to meet any of these conditions would 
disqualify the actor from the exception and could also be evidence that 
the actor knew that it was engaging in practices that contravened the 
information blocking provision (84 FR 7544).
    We proposed that the duty to timely respond and provide reasonable 
cooperation would necessarily be assessed from the standpoint of what 
is objectively reasonable for an individual or entity in the actor's 
position. We emphasized that we will look at the specific facts and 
circumstances of each case to determine whether the practice is 
objectively reasonable (84 FR 7544).
    We encouraged comment on these conditions and related 
considerations. Specifically, we requested comment regarding potential 
obstacles to satisfying these conditions and improvements we could make 
to the proposed process (84 FR 7544).
    Comments. Many commenters, primarily provider organizations, 
expressed concern that the proposed response requirements could create 
burden on providers, hospitals, and clinical data registries. 
Commenters explained that each time a requester makes a request that an 
actor deems infeasible, the actor would be required to timely respond 
and provide a detailed written explanation of its reasons for denial. A 
commenter also recommended that, in the event a request is infeasible 
and a written explanation is necessary, that such explanation need not 
contain detailed technical information.
    Response. We appreciate these comments and have revised the 
response condition in this exception to address commenters' concerns 
and establish a set timeframe for responding to requests (Sec.  
171.204(b)). We removed the use of the term ``timely'' and restructured 
the provision to more clearly explain ONC's expectations for responding 
to requests. Under the response condition, if an actor does not fulfill 
a request for access, exchange, or use of EHI for any of the reasons in 
Sec.  171.204(a), the actor must, within ten business days of receipt 
of the request, provide to the requestor in writing the reason why 
meeting the request was infeasible. Our decision to finalize a 10-
business day response timeframe was informed by our knowledge of the 
industry, stakeholder commenters, and a desire to create consistent 
timeframes across exceptions, such as alignment with the 10-business 
day response timeframe in the Licensing Exception (see Sec.  
171.303(a)(1)).
    In instances when an actor is unable to respond within 10 business 
days, the actor may be unable to avail themselves of the requirements 
of the exception. As part of an information blocking investigation, ONC 
and OIG may consider documentation or other writings maintained by the 
actor around the time of the request that provide evidence of the 
actor's intent. Additional documentation would not permit the actor to 
avail themselves of this exception, but ONC or OIG could examine the 
actor's intent using this documentation when assessing the information 
blocking claim.
    We have decided not to specify the level of detail or specific type 
of information (such as technical information) that must be contained 
in a written response. We believe it would be imprudent to create such 
boundaries for the written response given that the facts and 
circumstances will vary significantly from case to case. Instead, the 
finalized provision allows actors to determine what content is 
necessary to include in the written response in order to explain the 
reason the request is infeasible. We note that we have revised the 
requirement for the written response from the Proposed Rule. In the 
Proposed Rule an actor was required to provide a ``detailed written 
explanation of the reasons why the actor cannot accommodate the 
request'' (84 FR 7544) whereas we have finalized the requirement that 
the actor must provide ``in writing the reason(s) why the request is 
infeasible'' (Sec.  171.204(b)). We believe this revised requirement 
will alleviate burden on actors by providing them discretion to decide 
the appropriate level of detail to include in their written responses. 
It also places a greater emphasis on establishing that the request was 
infeasible to meet.
Reasonable Alternative
    We proposed that, if the actor could not meet the request for EHI, 
the actor must work with the requesting party in a timely manner to 
identify and provide a reasonable alternative means of accessing, 
exchanging, or using the EHI, as applicable (84 FR 7544).
    Comments. Commenters, primarily provider organizations, were 
supportive of the proposed requirement to provide a reasonable 
alternative. We also received a range of comments related to improving 
ONC's proposals regarding the provision of a reasonable alternative, 
including comments requesting more examples and guidance as to what 
would be considered a ``reasonable alternative.'' Another commenter 
requested that ONC provide greater deference to the actor to determine 
the appropriate format/functionality for sharing the requested EHI when 
a comparable functionality, distinct from the format/functionality 
requested, is made available and enables access, exchange, or use of 
EHI on equivalent terms. One commenter requested ONC place guardrails 
around requests for information sharing, such that if an actor is able 
to share data in an industry-accepted format, the requesting 
organization cannot make an information blocking claim if that format 
does not meet their preferred, specific data transmission standard.
    A few commenters requested that ONC remove the requirement that an 
actor both ``identify'' and ``provide'' a reasonable alternative means 
of accessing EHI, and instead require only that an actor ``identify'' a 
reasonable alternative. One commenter requested that ONC clarify that 
the proposed requirement to identify a reasonable alternative means of 
accessing, exchanging, or using EHI is only necessary where any such 
alternative exists. The commenter noted that there could be instances 
in which no reasonable alternative exists, and the request is in effect 
impossible to comply with. One commenter requested that ONC clarify 
that, regarding the provision of a reasonable alternative, an actor 
must only work with the requestor in a timely manner to identify and 
provide a reasonable alternative means of accessing, exchanging, or 
using the EHI as applicable. One commenter expressed concern that this 
exception could be used to send patients to other sources to get their 
health information because that approach would be less burdensome than 
providing the information to the patient directly. The commenter 
recommended that ONC

[[Page 25870]]

preclude the use of this exception for patient access requests.
    Some provider, hospital, and clinical data registry commenters 
expressed concern regarding the potential burden on the actor related 
to identifying and providing a reasonable alternative means of 
accessing, exchanging or using the EHI. Other commenters, primarily 
health IT developers, expressed concern regarding the potential impact 
and burden on health IT developers, HINs, and HIEs of complying with a 
request to access, exchange, or use EHI, especially when the request 
requires custom development. Commenters explained that if a system, 
even a large system, were required to comply with many custom forms of 
integration, collectively they would cause a significant burden to both 
business and budget. Some commenters also noted that the proposed 
exception seems imbalanced, favoring the requester of the EHI over the 
actor providing the EHI.
    Response. We appreciate the support for our proposal, as well as 
the array of constructive comments. We first note that, in many 
instances, the exceptions, including the finalized third condition of 
this exception (Sec.  171.204(a)(3)), favor the request for EHI because 
the overall information blocking paradigm is to eliminate interference 
with access, exchange, and use of EHI. We have removed the ``reasonable 
alternative'' requirement from this exception and instead have 
finalized the new Content and Manner Exception in Sec.  171.301 that 
establishes the content (i.e., the EHI) required in the response and 
the manner in which the actor may respond to the request for access, 
exchange, or use of EHI. This new exception improves on the 
``reasonable alternative'' requirement in the Proposed Rule by 
clarifying actors' obligations for providing access, exchange, or use 
of EHI in all situations and creating actionable technical procedures.
    We believe the Content and Manner Exception in Sec.  171.301 is 
responsive to the above comments, will reduce burden on actors, and is 
principled and tailored in a manner that will promote basic fairness 
and encourage parties to work cooperatively to implement efficient 
solutions to interoperability challenges. We refer readers to the 
Content and Manner Exception and the discussion of such exception in 
this preamble in sections VIII.C and VIII.D.2.a. With regard to the 
comment suggesting that no reasonable alternative may exist, we believe 
that the new exception will address this concern. However, if the actor 
still could not meet the new exception, the actor could avail itself of 
the third condition in this exception and demonstrate that the request 
was infeasible under the circumstances.
e. Health IT Performance Exception--When will an actor's practice that 
is implemented to maintain or improve health IT performance and that is 
likely to interfere with the access, exchange, or use of electronic 
health information not be considered information blocking?
    We proposed to establish an exception to the information blocking 
provision for certain practices that are reasonable and necessary to 
maintain and improve the overall performance of health IT, provided 
certain conditions are met (84 FR 7550). We stated in the Proposed Rule 
that this exception would apply to the unavailability of health IT 
occasioned by both planned and unplanned maintenance and improvement. 
We noted that planned maintenance or improvements are often carried out 
at regular intervals and address routine repairs, updates, or new 
releases while unplanned maintenance or improvements typically respond 
to urgent or time-sensitive issues. We proposed to codify the 
exception's regulation text in Sec.  171.207 (84 FR 7605).
    To ensure that the actor's practice of making health IT, and in 
turn EHI, unavailable for the purpose of carrying out maintenance or 
improvements is reasonable and necessary, we proposed conditions that 
would need to be satisfied at all relevant times a practice to be 
recognized as excepted from the definition of information blocking 
under this proposed exception.
    Comments. We received numerous comments supporting the 
establishment of this exception. We did not receive comments opposing 
the establishment of this exception. Many of the comments received 
requested clarification or recommended revisions to specific points 
within the proposed exception. The comments requesting clarification or 
making recommendations are summarized below.
    Response. We appreciate the feedback. We have established the 
proposed exception with modifications from the regulation text proposed 
in the Proposed Rule. We have retitled the exception from ``Exception--
Maintaining and improving health IT performance'' (proposed Sec.  
171.207, at 84 FR 7605) to ``Health IT Performance Exception--When will 
a practice that is implemented to maintain or improve health IT 
performance and that is likely to interfere with the access, exchange, 
or use of electronic health information not be considered information 
blocking?'' (Sec.  171.205 as finalized). For ease of reference and 
discussion, we use ``Health IT Performance Exception'' as a short title 
for the finalized exception throughout this preamble. Unless we are 
directly quoting the Proposed Rule or accurate re-statement of Proposed 
Rule content requires otherwise, we use ``Health IT Performance 
Exception'' in this section of this preamble when discussing this 
exception as proposed as well as the finalized exception. As stated in 
section VIII.D of this preamble (under the heading ``modifications''), 
we changed the titles of all of the information blocking exceptions to 
questions for additional clarity. We revised the wording of the 
finalized Sec.  171.205 introductory text in comparison with that 
proposed in Sec.  171.207 so that it is consistent with the finalized 
title of the exception (and Sec.  171.205). Consistent with the 
restructuring of part 171 that is also described in section VIII.D of 
this preamble (under the heading ``modifications''), this exception has 
been redesignated from Sec.  171.207 in the Proposed Rule (84 FR 7605) 
to Sec.  171.205 as finalized. Commenters' requests for clarification 
and suggested revisions on specific points are discussed below. Other 
revisions we have made to the regulation text finalized in Sec.  
171.205 in comparison to that proposed in Sec.  171.207 are also 
discussed below.
Unavailability of Health IT Must Be for No Longer Than Necessary To 
Achieve the Maintenance or Improvements for Which the Health IT Was 
Made Unavailable
    We proposed that any unavailability of health IT must be for a 
period of time no longer than necessary to achieve the maintenance or 
improvement purpose for which the health IT is made unavailable or its 
performance degraded (84 FR 7550 and 7551). We provided as an 
illustrative example that a health IT developer of certified health IT 
that has the right under its contract with a large health system to 
take its system offline for four hours each month to conduct routine 
maintenance would not qualify for this exception if an information 
blocking claim was made about a period of unavailability during which 
no maintenance was performed.
    Comments. We received comments from a variety of stakeholders on 
the proposed requirement that any unavailability of health IT would 
need to be for a period of time no longer than necessary to achieve the 
maintenance or improvements for which the health IT was made 
unavailable. Some commenters agreed that temporary unavailability of 
health IT ``for a period

[[Page 25871]]

of time no longer than necessary'' created an appropriate standard for 
both planned and unplanned downtimes. Other commenters indicated they 
did not support this standard, stating concerns that the requirement 
that the health IT be made unavailable ``for a period of time no longer 
than necessary'' would be too difficult to assess without more specific 
criteria such as defined time periods. Some commenters suggested we 
modify our language to allow for greater flexibility in maintenance 
downtime situations.
    Response. We have finalized within the condition for maintenance 
and improvements to health IT in Sec.  171.205(a)(1) the requirement 
proposed in Sec.  171.201(a)(1), with modifications to the regulation 
text that are described below (immediately preceding the preamble 
discussion of the next subparagraph of Sec.  171.205(a)). When an actor 
choosing to conform its practice to the health IT performance exception 
implements a practice that makes health IT under that actor's control 
temporarily unavailable, or temporarily degrades the performance of 
health IT, in order to perform maintenance or improvements to the 
health IT, the actor's practice must be (Sec.  171.205(a)(1)) 
implemented for a period of time no longer than necessary to complete 
the maintenance or improvements for which the health IT was made 
unavailable or the health IT's performance degraded. We believe that 
establishing specific timeframes applicable to various maintenance and 
improvement purposes would be impractical at this time due to the wide 
variety of system architectures and operational contexts in which 
health IT to which part 171 is applicable is currently, or may in the 
future be, deployed. We have finalized the ``no longer than necessary'' 
requirement of this condition, which we believe provides substantial 
flexibility to consider the particular circumstances of each case, and 
a variety of factors including but not limited to the service level 
agreements in place for the specific health IT at issue, the type of 
maintenance or improvements, the technical resources available to the 
actor, or best practices or other industry benchmarks relevant to the 
particular maintenance or improvements.
    Comments. Noting our use of the phrase ``as soon as possible'' in 
the Proposed Rule's preamble discussion of this condition (84 FR 7551), 
specifically in an example where an actor takes health IT offline in 
response to a software failure, some commenters requested we clarify 
how we interpret that phrase. A commenter described practices such as 
procedures that phased restoration of full functionality across a 
complex system, to manage system loads or confirm the original failure 
is fully resolved, and asked if we would interpret this exception's 
proposed conditions as excluding such procedures. Some comments from 
members of the developer community suggested that we modify our 
proposed language from ``for a period of time no longer than 
necessary'' to ``a reasonable period of time.''
    Response. The ``no longer than necessary'' standard provides actors 
substantial flexibility to address the particular circumstances of each 
case, allowing for consideration of a variety of factors including but 
not limited to the service level agreements in place for the specific 
health IT at issue, the type of maintenance or improvements, the 
technical resources available to the actor, or best practices or other 
industry benchmarks relevant to the particular maintenance or 
improvements. In response to comments requesting we clarify how we 
interpret ``as soon as possible'' and how it would apply to specific 
types of practices, we first ask readers to note that in this final 
rule preamble for the Health IT Performance Exception we use the phrase 
``as soon as possible'' only in summarizing and responding to these 
comments. We see how this phrase could be read as implying that we 
might uniformly expect restarts in a shorter time or more abrupt manner 
than might be consistent with best practices for ensuring the affected 
component(s) or production environment are restored to stable, reliable 
operating status. We do not, however, interpret the finalized condition 
as uniformly mandating immediate full restarts of any or every system. 
In determining whether an actor's practice made health IT under its 
control unavailable, or degraded the health IT's performance, for 
longer than was necessary in the particular circumstances, we would 
consider a variety of factors such as (but not limited to) the service 
level agreements in place for the specific health IT at issue, the type 
of maintenance or improvements, the technical resources available to 
the actor, or best practices or other industry benchmarks relevant to 
the particular maintenance or improvements.
    Comments. Several commenters recommended that this exception apply 
to downtime necessary for testing whether a maintenance or improvement 
activity, such as deploying a new or updated application into a 
particular production environment for the first time, will operate in 
that environment as it is intended to operate or without adversely 
affecting other functions of the system.
    Response. We interpret ``minimum time necessary'' to complete a 
maintenance or improvement purpose, objective, or activity to include 
reasonable and necessary practices, such as confirmatory testing and 
phased restart protocols, to ensure that a newly deployed or newly 
updated application functions in a particular production environment as 
it is intended to perform and does not adversely affect system 
stability or the performance of critical functions or components of 
that system. In determining whether an actor's practice affected health 
IT's availability or performance for longer than was necessary in the 
particular circumstances, we reiterate that we would consider a variety 
of factors such as (but not limited to) the service level agreements in 
place for the specific health IT at issue, the type of maintenance or 
improvements, the technical resources available to the actor, or best 
practices or other industry benchmarks relevant to the particular 
maintenance or improvements.
    Comments. Some commenters recommended that we recognize there may 
be circumstances where an instance of downtime may exceed service level 
agreements but still be no longer than necessary to address the issue. 
These commenters suggested such violations of service level agreements 
and other provisions of contracts between the parties should remain to 
be resolved through contractual mechanisms and not automatically 
considered information blocking on basis of exceeding the terms of the 
agreements. One commenter suggested actors who make their health IT 
temporarily unavailable under this exception be held to industry 
standards for necessary timeframes to complete any maintenance or 
improvements.
    Response. For purposes of determining whether a period of health IT 
unavailability or performance degradation is (or was) no longer than 
necessary to accomplish its purpose, we note that service level 
agreements and industry practices would be relevant information to be 
considered but not necessarily dispositive. For example, a period of 
health IT unavailability or performance degradation could be within the 
parameters of applicable service level agreements but still be longer 
than necessary to accomplish the maintenance or improvement purpose for 
the health IT was made unavailable or its performance degraded. For a 
contrasting example, a period of health IT unavailability or 
performance

[[Page 25872]]

degradation could be outside the parameters of applicable service level 
agreements--a contractual matter for the parties to resolve through 
other appropriate channels--without being ``longer than necessary'' in 
the totality of applicable circumstances and, therefore, without 
necessarily constituting information blocking as defined in Sec.  
171.103.
    Comments. Several commenters requested we clarify whether this 
exception would apply to practices that degrade some aspects of a 
health IT system's performance, without making it entirely unavailable, 
for purposes of conducting maintenance and improvement of the health IT 
system or some of its components.
    Response. We appreciate the feedback. We agree that there may be 
circumstances where the minimum disruption of an overall health IT 
system's availability needed to accomplish particular maintenance or 
improvement purposes may be less than total. We do not intend that this 
exception would apply only to complete unavailability of health IT. We 
intend the exception to apply to reasonable and necessary practices 
that disrupt EHI access, exchange, or use not only for the shortest 
time but also to the least extent practicable to accomplish their 
specific maintenance or improvement purposes under the particular 
circumstances. Accordingly, we have modified the language of Sec.  
171.205(a)(1) as finalized to expressly include temporary performance 
degradation as well as temporary unavailability of health IT affected 
by maintenance and improvement practices.
Discussion of Finalized Text of Sec.  171.205(a)(1)
    The regulation text finalized in Sec.  171.205(a)(1) has been 
modified in comparison to the regulation text proposed in Sec.  
171.207(a)(1) in several ways. The finalized regulation text expressly 
includes ``or the health IT's performance degraded,'' for the reasons 
stated in response to comments (above). In the text of this provision, 
finalized at Sec.  171.205(a)(1), we have also replaced the verb ``to 
achieve'' with the verb ``to complete.'' Reflecting on the comments 
received, we have reviewed the dictionary definition of ``achieve'' and 
now believe that our use of ``achieve'' in the regulation text proposed 
in in Sec.  171.207(a)(1) may have contributed to commenters' concerns 
about whether we would interpret time for confirmatory testing of 
system performance or phased restart protocols as falling within the 
``minimum time necessary'' for any particular maintenance or upgrade.
    We believe ``complete'' less ambiguously expresses our intent that 
this requirement of this condition encompasses the minimum time 
necessary, in the totality of the particular circumstances, to fully 
complete the maintenance or improvement activity, including any 
confirmatory testing or other protocols necessary to ensure an orderly 
and reliable restoration of normal operating status. We have also 
revised the wording of Sec.  171.205(a) as finalized so that it is 
consistent with the title and introductory text of Sec.  171.205 as 
finalized.\182\ We made modifications to the titles and introductory 
text of all of the finalized exceptions for reasons described in 
section VIII.D of this preamble (under the heading ``modifications''). 
As finalized, Sec.  171.205(a)(1) requires, in order to meet the 
condition in Sec.  171.205(a), that when an actor implements a practice 
that makes health IT under that actor's control temporarily 
unavailable, or temporarily degrades the performance of health IT, in 
order to perform maintenance or improvements to the health IT, the 
actor's practice must be implemented for a period of time no longer 
than necessary to complete the maintenance or improvements for which 
the health IT was made unavailable or the health IT's performance 
degraded.
---------------------------------------------------------------------------

    \182\ As noted above in this section of this preamble, titles of 
all the finalized exceptions have been revised to be more clear and 
easy to understand.
---------------------------------------------------------------------------

Unavailability of Health IT for Maintenance or Improvements Must Be 
Implemented in a Consistent and Non-Discriminatory Manner
    We proposed (in proposed Sec.  171.207(a)(2)) that any 
unavailability of health IT occasioned by the conduct of maintenance or 
improvements must be implemented in a consistent and non-discriminatory 
manner (84 FR 7551). We explained that this condition provides a basic 
assurance that when health IT is made unavailable for the purpose of 
performing maintenance or improvements the unavailability is not abused 
by the actor that controls the health IT. However, we indicated that 
this condition would not require that actors conduct all planned 
maintenance or improvements simultaneously, or require that every 
health IT contract provide the same promises in regard to planned 
maintenance or improvements. We further noted that a recipient of 
health IT could agree to a longer window for unavailability in exchange 
for a reduced fee for system maintenance, which would not contravene 
this condition of this exception.
    Comments. Several commenters expressed support for requiring 
practices be implemented in a non-discriminatory manner to meet the 
conditions of the Health IT Performance Exception. One commenter 
supported the requirement but stated that they believed practices 
applied selectively against an actor or third-party application 
inappropriately accessing interoperability resources should be exempt 
from this condition.
    Response. We appreciate the opportunity to clarify two points. 
First, we want to reiterate that there is an important distinction 
between conduct of individuals or entities (or the behavior of 
applications) that poses a security risk and conduct or behavior that 
may merely adversely affect performance of a health IT system or its 
core functions. If an actor or an application is making or attempting 
unauthorized access to systems or to EHI, the actor with control of the 
system subject to that security risk should take prompt action to 
address that risk. As stated in the finalized Sec.  171.205(d), the 
Health IT Performance Exception expressly does not apply to security-
related practices. If the unavailability of health IT for maintenance 
or improvements is initiated by an actor in response to a security risk 
to electronic health information, the actor does not need to satisfy 
the conditions of Sec.  171.205, but must comply with all applicable 
conditions of Sec.  171.203 at all relevant times if they wish to seek 
the added assurance of conforming their practices to an exception to 
the information blocking provision. Second, we recognize there are 
circumstances where an application's behavior does not pose a security 
risk but does adversely impact the performance of a health IT system's 
overall or core functions performance. We decline to modify Sec.  
171.205(a)(2) in the manner the commenter recommended in order to 
address adverse impacts on health IT performance. Instead, in response 
to this and other comments, we have finalized in Sec.  171.205(b) an 
alternative condition that expressly provides for the finalized Health 
IT Performance Exception to apply to practices implemented to mitigate 
a third-party application's negative impact on an actor's health IT's 
performance.

[[Page 25873]]

Unavailability of Health IT for Maintenance or Improvements Must Be 
Agreed
    In order to benefit from this exception, we proposed that the 
unavailability of health IT due to maintenance or improvements 
initiated by a health IT developer of certified health IT, HIE, or HIN, 
must be agreed to by the individual or entity to whom the health IT is 
supplied (84 FR 7551). We noted that the availability of health IT is 
typically addressed in a written contract or other written agreements, 
that puts the recipient of the health IT on notice about the level of 
EHI and health IT unavailability that can be expected for users of the 
health IT. By such agreements, the recipient of the health IT willfully 
agrees to that level of planned and unplanned unavailability (typically 
referred to in health IT contracts as ``downtime''). We proposed that 
in circumstances where health IT needs to be taken offline for 
maintenance or improvements on an urgent basis and in a way that is not 
expressly permitted under a health IT contract an actor could satisfy 
the proposed condition so long as the maintenance or improvements are 
agreed to by the recipient of the health IT. We proposed that this 
could be achieved by way of an oral agreement such as reached between 
the parties by telephone, but we noted that because an actor must 
demonstrate that it satisfies the conditions of this exception, it 
would be best practice for an actor to ensure the agreement was in 
writing or, at minimum, contemporaneously documented.
    We proposed that this condition would only apply when the 
unavailability of health IT is caused by a health IT developer of 
certified health IT, HIE, or HIN because it is the supplier of the 
health IT and thus controls if and when health IT is intentionally 
taken offline for maintenance or improvements. We proposed that this 
condition would not apply when health IT is made unavailable for 
maintenance or improvements at the initiative of a recipient (or 
customer) of health IT, noting that when it is a customer of health IT 
who initiates unavailability, the unavailability would not need to be 
the subject of an agreement with the supplier of that health IT, nor 
anyone else, in order for the customer of health IT to benefit from 
this exception.
    Comments. Several commenters from the provider community 
recommended advance notice of downtime. Several commenters from the 
provider community suggested that planned downtimes should be 
documented, scheduled, and executed within a predefined window of time. 
One commenter recommended that actors create a public website that 
displays planned and unplanned system downtime and allow other actors 
to subscribe to notifications of these downtimes. One commenter 
suggested we explicitly prohibit an entity from regularly scheduling 
extensive time periods where query and response services are 
unavailable. Another commenter suggested we make allowances within the 
conditions of this exception for an actor who may fall slightly out of 
compliance with terms agreed to regarding downtime in a service level 
agreement if the impact is de minimis and the actor was acting in good 
faith. One commenter contended that the information blocking provisions 
should not regulate the level of service provided by health IT 
developers to their customers. We also received several comments from 
members of the HIE and HIN community that recommended against any 
requirement to include specific details such as dates and times for 
maintenance because such a requirement could result in HIEs and HINs 
having to undertake the process of amending thousands of legal 
agreements.
    Response. We do not believe it is necessary to dictate the 
availability or health IT or other contractually defined details of the 
business relationship between parties for the purposes of this 
exception. Parties to a health IT contract can determine and 
communicate their respective service level needs and capabilities or 
commitments in legally enforceable contracts. Contractual provisions 
can establish specific details of service levels, planned downtime, 
unplanned downtime, and communications regarding planned and unplanned 
downtime, that are practical and appropriate to the context of a 
particular contract. In the event parties do not honor such contract 
provisions, remedies are available to the parties outside and 
independent of part 171. We also agree with commenters' observations 
that any specific requirements, such as those recommended by some other 
commenters, could require amending contracts in ways that could create 
significant burden and costs for actors. Thus, we did not modify this 
exception in response to commenters' recommendations that we require 
service level or other contractual agreements between parties conform 
to specific prescribed timeframes, scheduling (including specifically 
or query and response services), notice, and scope of planned downtimes 
expectations in order for maintenance and improvement health IT 
downtimes to meet the information blocking exception for maintenance 
and improvement. Similarly, we have not modified the exception in 
response to recommendations from some commenters that we require 
display of planned and unplanned downtime on publicly available 
websites. We are not persuaded such measures would generally render 
benefits commensurate with the time and effort that would be needed for 
actors to implement and maintain them.
    Comments. Two commenters disagreed with our proposed requirement 
that temporary unavailability initiated by a health IT developer of 
certified health IT, HIE, or HIN must be agreed to by the individual or 
entity to whom the health IT developer of certified health IT, HIE, or 
HIN supplied the health IT. Both commenters recommended removing the 
``agreed upon with user'' provision we proposed and recommended that 
ONC eliminate the requirement for prior agreement of planned downtime 
in order to meet the conditions of this exception. These commenters 
suggested that we instead allow for unilateral notice to organizations 
at least 10 days prior to scheduled maintenance.
    Response. We continue to believe that unplanned downtime must be 
done with the agreement of the individual or entity to which the health 
IT is supplied. This condition protects health care providers and other 
uses or health IT under the specific circumstance of health IT being 
made temporarily unavailable due to unplanned maintenance or 
improvements. It also reduces the potential for downtime purportedly 
for purposes of health IT maintenance or improvement to be a pretext 
for information blocking and thus makes it less likely that this 
exception will be abused. However, the conditions of this exception 
finalized in Sec.  171.205 can be met by unplanned downtime in the 
absence of contemporaneous agreement so long as it is consistent with 
an existing service level agreement. We also note that specific 
agreement by all users to temporary unavailability is not required in 
all instances of unplanned downtime not already covered by an existing 
service level or other contractual agreement, such as downtime 
resulting from events beyond the actor's control that prevent it from 
meeting the requirement, and practices that are consistent with the 
conditions of the Preventing Harm Exception (Sec.  171.201),

[[Page 25874]]

Security Exception (Sec.  171.203), or Infeasibility Exception (Sec.  
171.204).
    Comments. Several commenters from the developer community expressed 
appreciation for the opportunity to comment on throttling, arguing that 
it is a reasonable approach to maintain access to functionality. Many 
of these commenters stated that, when applied with the agreement of 
health IT users, strategies such as throttling or metering certain 
health IT functions should not be considered information blocking. One 
commenter suggested that throttling should not be considered 
information blocking if the health IT developer or health care provider 
is forced to throttle access so as not to negatively impact hospital 
operations. The commenter recommended that when requests for EHI from 
third-party applications created an unreasonable and significant burden 
on health IT and the installed infrastructure, the two contracting 
parties could mutually agree that the third-party application was 
poorly designed and could be throttled or even denied access. Another 
commenter suggested that the practice of throttling should only occur 
if that portion of the health IT affected by an application is 
impacting highly critical functions such as inpatient or emergency 
department care delivery and documentation. The commenter stated that 
it was important to distinguish between the practice of throttling 
generally and the practice of throttling as a response to impact on 
critical functions because the practice of throttling generally could 
be applied too broadly.
    Response. We appreciate commenters' input. We recognize that in 
some circumstances it may be appropriate for actors to take action 
(e.g., deny access, throttle, or meter) to limit the negative impact on 
the performance of health IT that may result from the technical design, 
features, or behavior of a third-party application. This would include, 
but not be limited to, third-party applications that a patient might 
choose to use to access their EHI. The regulation text finalized in 
Sec.  171.205 has been expanded, in comparison to the text proposed in 
Sec.  171.207 (84 FR 7605), to include paragraph (b), which we have 
titled ``assured level of performance.'' As finalized, Sec.  171.205(b) 
establishes a condition expressly applicable to actions taken against a 
third-party application that is negatively impacting the health IT's 
performance. The specific requirements for action against a third-party 
application to meet the condition finalized in Sec.  171.205(b) and 
thus be excepted from the definition of information blocking parallel 
the requirements finalized in Sec.  171.205(a), the condition 
applicable to practices that make health IT temporarily unavailable, or 
its performance degraded, for purposes of maintenance and improvement.
    To meet the Health IT Performance Exception under the assured level 
of performance condition, an action against a third-party application 
(Sec.  171.205(b)) must be: (1) For a period of time no longer than 
necessary to resolve any negative impacts; (2) implemented in a 
consistent and non-discriminatory manner; and (3) consistent with 
existing service level agreements, where applicable. For example, if 
the service level agreement stated how and to what extent negative 
impacts should be addressed (e.g., over-capacity), then it is expected 
that such provisions of an existing service level agreement would be 
followed unless they violated one of the other requirements of the 
(Sec.  171.205(b)) assured level of performance condition (e.g., 
resulted in discriminatory application or lasted longer than necessary 
to resolve the negative impacts). We believe this approach will help to 
address situations where actions such as throttling become necessary to 
protect the overall performance of health IT.
Interaction With the Preventing Harm and Security Exceptions
    We proposed that when health IT is made unavailable for maintenance 
or improvements aimed at preventing harm to a patient or other person, 
or securing EHI, an actor must comply with the conditions specified in 
the proposed Harm Exception or proposed Security Exception, 
respectively, in order for these particular practices to be excepted 
from the definition of information blocking in Sec.  171.103.
    Comments. We received a few comments that expressed concern that 
our maintenance exception, as proposed, did not address unplanned 
downtime without notice in the instance of a potential threat to 
security of EHI.
    Response. Unplanned downtime or other practices reasonable and 
necessary in response to exigent threats to EHI security should be 
implemented consistent with the conditions for the Security Exception 
as finalized in Sec.  171.203. We expressly stated in the proposed 
regulation text at Sec.  171.207(c), and have finalized in Sec.  
171.205(d), that if the unavailability of health IT for maintenance or 
improvements is initiated by an actor in response to a security risk to 
EHI, the actor does not need to satisfy the conditions of the Health IT 
Performance Exception, but must comply with all conditions of Sec.  
171.203 at all relevant times for such practices to be excepted from 
the definition of information blocking in Sec.  171.103. We believe 
this paragraph of the finalized Health IT Maintenance Exception's 
regulation text (finalized in Sec.  171.205(d)) provides ample clarity 
that this exception is not intended to apply to unplanned downtime 
implemented specifically in response to emergent security threats. We 
have finalized this approach to the relationship between the Health IT 
Performance Exception and Security Exception as proposed, because we 
continue to believe it ensures that the Health IT Performance Exception 
cannot be used to avoid compliance with conditions applicable under the 
Security Exception when the practice leading to unplanned downtime is 
implemented specifically in response to a risk to security of EHI.
    Comments. We received several comments from stakeholders in the 
developer community that it would be impossible for certified health IT 
developers, HIEs, or HINs to meet the conditions of this exception as 
proposed in the event of downtime as a result of something like a 
natural disaster because those parties would be unable to secure 
agreement from entities and individuals prior to uncontrollable 
downtime.
    Response. The Infeasibility Exception finalized in Sec.  171.204 
has been revised, in comparison to the proposed regulation text in the 
Proposed Rule, to expressly address uncontrollable events. In cases of 
natural or human-made disaster, public health emergency, public safety, 
incident war, terrorist attack, civil insurrection, strike or other 
labor unrest, telecommunication or internet service interruption, or 
act of military, civil or regulatory authority, an actor can avail 
itself of the Infeasibility Exception. We determined these situations 
should be addressed in the Infeasibility Exception rather than the 
Health IT Performance Exception in part because the breadth of 
circumstances where access, exchange, or use of EHI may be interfered 
with due to these uncontrollable events is more consistent with the 
intent and function of the Infeasibility Exception. Thus, we have not 
modified the Health IT Maintenance Exception (Sec.  171.205) to address 
uncontrollable events of the type expressly addressed by the finalized 
Infeasibility Exception (Sec.  171.204).
    We have finalized the substance of the relationship between the 
Health IT Maintenance Exception and the Preventing Harm and Security 
Exceptions as proposed. We have also

[[Page 25875]]

finalized as proposed the provisions of the Health IT Maintenance 
Exception specific to ``practices that prevent harm'' and ''security-
related practices,'' but have redesignated them within the structure of 
the Health IT Maintenance Exception as finalized in Sec.  171.205 in 
comparison to the structure proposed at Sec.  171.207 (84 FR 7605). 
Specifically, the ``practices that prevent harm'' provision is 
finalized in paragraph (c) of the finalized Health IT Maintenance 
Exception in Sec.  171.205 instead of paragraph (b) as was the case in 
the Proposed Rule (84 FR 7605). Likewise, the ``security-related 
practices'' provision is finalized in paragraph (d) of the finalized 
Health IT Maintenance Exception in Sec.  171.205 instead of paragraph 
(c) as was the case in the Proposed Rule (84 FR 7605). Both of these 
provisions were moved down to accommodate the addition of the ``assured 
level of performance'' condition as paragraph (b) of Sec.  171.205 as 
finalized.
    The paragraph of the Health IT Maintenance Exception finalized in 
Sec.  171.205(c), specific to ``practices that prevent harm,'' 
continues to provide that if the unavailability of health IT for 
maintenance or improvements is initiated by an actor in response to a 
risk of harm to a patient or another person, the actor does not need to 
satisfy the requirements of this section, but must comply with all 
conditions of Sec.  171.201 at all relevant times to qualify for an 
exception. Likewise, the paragraph of the Health IT Maintenance 
Exception finalized in Sec.  171.205(d), specific to ``security-related 
practices,'' continues to provide that if the unavailability of health 
IT for maintenance or improvements is initiated by an actor in response 
to a security risk to electronic health information, the actor does not 
need to satisfy the requirements of this section, but must comply with 
all conditions of Sec.  171.203 at all relevant times to qualify for an 
exception.
Request for Comment
    We requested comments on the exception in general, and on whether 
the proposed conditions would impose appropriate limitations on actor-
initiated health IT maintenance or improvement activities that lead to 
temporary unavailability of EHI.
    Comments. We did not receive comments generally opposed to the 
establishment of this exception. One commenter recommended that if a 
patient is affected by a practice that could be recognized under this 
exception, such as unavailability of health IT for an app registration, 
the patient should be provided an opportunity to access the EHI through 
another means, such as the patient portal.
    Response. The Health IT Performance Exception is applicable to a 
variety of specific practices making health IT unavailable. It does not 
recognize only downtime or performance degradation of an actor's entire 
health IT system. An actor who takes down one means of EHI access to 
conduct health IT maintenance or improvement could provide alternative 
access to EHI, in circumstances where this may be practical, and remain 
in compliance with the requirements for their practices to be excepted 
under Sec.  171.205 from the definition of information blocking in 
Sec.  171.103. However, we stress that an actor conducting maintenance 
or improvement of health IT in the actor's control is not required to 
provide an alternative electronic health information access mechanism 
during the downtime in order for the Health IT Performance Exception to 
apply to the actor's maintenance or improvement practices. We are aware 
that actors' operational contexts and existing health IT capabilities 
vary substantially throughout the health IT ecosystem. In a variety of 
circumstances where downtime or performance degradation may be 
reasonable and necessary to maintain or improve health IT performance, 
an actor may not have the capability needed to meet a requirement that 
EHI must always be immediately available in response to every patient 
request. For example, in some circumstances it may be impossible to 
achieve a particular maintenance or improvement purpose within a 
specific system without temporarily rendering all EHI in the system 
unavailable to all functions, services, and other components of the 
system (such as APIs and portals) through which EHI is ordinarily 
accessed, exchanged, or used.
    2. Exceptions that involve procedures for fulfilling requests to 
access, exchange, or use EHI
a. Content and Manner Exception--When will an actor's practice of 
limiting the content of its response to or the manner in which it 
fulfills a request to access, exchange, or use electronic health 
information not be considered information blocking?
    In this final rule, we have established a new exception in Sec.  
171.301 (referred to as the Content and Manner Exception) under section 
3022(a)(3) of the PHSA as a means to identify reasonable and necessary 
activities that do not constitute information blocking. Although we did 
not propose this exception in the Proposed Rule, it is related to our 
proposals and requests for comment in the Proposed Rule regarding the 
proposed EHI definition (84 FR 7513) and the proposed requirement to 
identify and provide a reasonable alternative means for accessing, 
exchanging, or using EHI as part of the proposed Infeasibility 
Exception (84 FR 7544). We discuss below the connection between these 
proposals and requests for comment in the Proposed Rule and the 
conditions in the Content and Manner Exception.
    We note that a failure to meet the Content and Manner Exception 
does not mean that an actor's practice meets the information blocking 
definition. However, as we noted in the Proposed Rule, the broad 
definition of information blocking in the Cures Act means that any 
practice that is likely to interfere with the access, exchange, or use 
of EHI implicates the information blocking provision (see 84 FR 7515). 
As a result, practices that do not meet the Content and Manner 
Exception will have to be assessed on a case-by-case basis to 
determine, for example, the actor's intent and whether the practice 
rises to the level of an interference. We discuss the comments received 
regarding the proposals related to the EHI definition (84 FR 7513) and 
the requirement to identify and provide a reasonable alternative means 
for accessing, exchanging, or using EHI under the Infeasibility 
Exception (84 FR 7544) below.
    Comments. As discussed in more detail section VIII.C.3, we received 
many comments expressing concerns regarding the breadth of the proposed 
EHI definition and requesting flexibility in the implementation of the 
information blocking provision. Many commenters stated that it would be 
difficult for actors to provide the full scope of EHI as it was 
proposed to be defined, particularly as soon as the final rule was 
published. Some commenters opined that we were trying to do too much 
too fast. Commenters requested that we provide flexibility for actors 
to adjust to the scope of the EHI definition, as well as the 
exceptions. Commenters asserted that such an approach would permit them 
to adapt their processes, technologies, and systems to enable the 
access, exchange, and use of EHI as required by the Cures Act and this 
final rule. Some commenters suggested that EHI under the information 
blocking provision should be limited to ePHI as defined in 45 CFR 
160.103, while others requested that ONC consider constraining the EHI 
covered by the information blocking provision to only the data included 
in the USCDI.

[[Page 25876]]

    We also received a range of comments requesting clarification and 
concerning improvements to our proposal in the Infeasibility Exception 
that, for any request that the actor claims is infeasible, the actor 
must work with the requesting party in a timely manner to identify and 
provide a reasonable alternative means of accessing, exchanging, or 
using the EHI, as applicable (proposed in Sec.  171.205(d), 84 FR 
7604). Commenters, primarily provider organizations, were supportive of 
the proposed condition. Some commenters requested clarification and 
additional examples about what manner of response would constitute a 
``reasonable alternative'' and when it would be acceptable to enable 
requestors to access, exchange, or use EHI in an alternative manner. 
One commenter requested that ONC place guardrails around requests for 
information sharing, such that if an actor is able to share data in an 
industry-accepted format, the requesting organization cannot make an 
information blocking claim if that format does not meet the 
organization's preferred, specific data transmission standard. One 
commenter requested that ONC clarify that the proposed requirement to 
identify a reasonable alternative means of accessing, exchanging, or 
using EHI is only necessary where any such alternative exists. The 
commenter noted that there could be instances in which no reasonable 
alternative exists, and the request is in effect impossible to comply 
with.
    A few commenters requested that ONC remove the requirement that an 
actor both ``identify'' and ``provide'' a reasonable alternative means 
of accessing EHI, and instead require only that an actor ``identify'' a 
reasonable alternative. One commenter expressed concern that this 
exception could be used to send patients to other sources to get their 
health information because that approach would be less burdensome than 
providing the information to the patient in the manner requested. The 
commenter recommended that ONC preclude the use of this exception for 
patient access requests.
    Some provider, hospital, and clinical data registry commenters 
expressed concern regarding the potential burden on the actor related 
to identifying and providing a reasonable alternative means of 
accessing, exchanging or using the EHI. Other commenters, primarily 
health IT developers, expressed concern regarding the potential impact 
and burden on health IT developers, HINs, and HIEs of complying with a 
request to access, exchange, or use EHI, especially when the request 
requires custom development. Some commenters also noted that the 
proposed exception seems imbalanced, favoring the requester of the EHI 
over the actor providing the EHI.
    Response. The Content and Manner Exception in Sec.  171.301 
addresses the two groups of comments noted above: (1) Comments 
expressing concerns regarding the breadth of the proposed EHI 
definition (proposed in Sec.  171.102, 84 FR 7601) and requesting 
flexibility in the implementation of the information blocking 
provision; and (2) comments requesting clarification concerning and 
improvement to our proposal in the Infeasibility Exception regarding 
the provision of a reasonable alternative (proposed in Sec.  
171.205(d), 84 FR 7604). In response to these comments, we have removed 
the reasonable alternative provision from the Infeasibility Exception 
and we have finalized the Content and Manner Exception in Sec.  171.301 
which describes the content (i.e., the EHI) required to be provided in 
an actor's response to a request to access, exchange, or use EHI and 
the manner in which an actor must fulfill the request in order to 
satisfy the exception. We believe this new exception will address the 
broad range of comments we received about the content of an actor's 
response to and manner for fulfilling a request to access, exchange, or 
use EHI, and will provide the clarity and transparency sought by 
commenters. We also believe, as discussed in more detail below, that 
this new exception provides market participants the ability to reach 
and maintain market negotiated terms for the access, exchange, and use 
of EHI.
Content
    The first condition of this exception (``content condition'') in 
Sec.  171.301(a) establishes the content an actor must provide in 
response to a request to access, exchange, or use EHI in order to meet 
this exception. As discussed in section VIII.C.3 of this preamble, we 
have focused the scope of the EHI definition in this final rule to ePHI 
as defined in 45 CFR 160.103 to the extent that it would be included in 
a designated record set as defined in 45 CFR 164.501, with limited 
exception. We also address commenter concerns regarding the scope of 
the EHI definition and the pace at which we are implementing the 
information blocking provision through the Content and Manner 
Exception. Specifically, section 171.301(a)(1) states that for up to 
May 2, 2022, an actor must respond to a request to access, exchange, or 
use EHI with, at a minimum, the EHI identified by the data elements 
represented in the United States Core Data for Interoperability (USCDI) 
standard adopted in Sec.  170.213. Section 171.301(a)(2) states that on 
and after May 2, 2022, an actor must respond to a request to access, 
exchange, or use EHI with EHI as defined in Sec.  171.102.
    We explained in section VIII.C of this final rule that we have 
finalized a new paragraph in the information blocking definition in 
Sec.  171.103 that aligns with the content condition described above. 
That new paragraph, which is finalized in Sec.  171.103(b), states 
that, until May 2, 2022, EHI for purposes of part 171 is limited to the 
EHI identified by the data elements represented in the USCDI standard 
adopted in Sec.  170.213. We have included a detailed discussion in 
section VIII.C of our rationale for including the content condition in 
the Content and Manner Exception and for including paragraph (b) in 
Sec.  171.103. That discussion includes an explanation of how those 
provisions address the commenters' concerns detailed above. We refer 
readers to the discussion in section VIII.C.
Manner
    The second condition of this exception (``manner condition'') in 
Sec.  171.301(b) establishes the manner in which an actor must fulfill 
a request to access, exchange, or use EHI in order to meet this 
exception. This condition is similar to our proposal in the 
Infeasibility Exception in the Proposed Rule that, for any request the 
actor claims is infeasible, the actor must have worked with the 
requesting party in a timely manner to identify and provide a 
reasonable alternative means of accessing, exchanging, or using the 
EHI, as applicable (see proposed Sec.  171.205(d), 84 FR 7604). We 
explained in the Proposed Rule that this proposed condition would 
minimize the risk that the Infeasibility Exception could protect 
improper refusals to enable access, exchange or use of EHI, including 
discriminatory blanket refusals as well as other practices, such as 
improper delays for access or exchange that would present information 
blocking concerns (84 FR 7544).
    After review of comments, further consideration of proposed 
conditions, and taking into account the revised structure of the 
exceptions, we determined that the concept of providing a ``reasonable 
alternative'' fits better in the Content and Manner Exception than in 
the Infeasibility Exception. As such, we removed the ``reasonable 
alternative'' requirement from the Infeasibility Exception and 
incorporated the general concept into

[[Page 25877]]

the Content and Manner Exception. We believe this approach improves on 
the ``reasonable alternative'' requirement in the Proposed Rule by 
clarifying actors' obligations for providing access, exchange, or use 
of EHI in all situations; creating actionable technical procedures; and 
aligning the requirement for providing an alternative with the Fees and 
Licensing Exceptions.
    Under Sec.  171.301(b)(1), an actor must fulfill a request 
described in the content condition (paragraph (a) of the exception) in 
any manner requested, unless the actor is technically unable to fulfill 
the request or cannot reach agreeable terms with the requestor to 
fulfill the request (Sec.  171.301(b)(1)(i)). If an actor fulfills a 
request described in the content condition in any manner requested: (1) 
Any fees charged by the actor in relation to its response are not 
required to satisfy the Fees Exception in Sec.  171.302; and (2) any 
license of interoperability elements granted by the actor in relation 
to fulfilling the request is not required to satisfy the Licensing 
Exception in Sec.  171.303 (Sec.  171.301(b)(1)(ii)).
    Section 171.301(b)(2) provides requirements for fulfilling a 
request to access, exchange, or use EHI in an alternative manner than 
the manner requested. If an actor does not fulfill a request described 
in the content condition of this exception in any manner requested 
because it is technically unable to fulfill the request or cannot reach 
agreeable terms with the requestor to fulfill the request, the actor 
must fulfill the request in an alternative manner in order to satisfy 
the exception. Section 171.301(b)(2)(i) states that the actor must 
fulfill the request without unnecessary delay in the following order of 
priority, starting with the first paragraph and only proceeding to the 
next consecutive paragraph if the actor is technically unable to 
fulfill the request in the manner identified in a paragraph. That order 
of priority is as follows: (1) Using technology certified to 
standard(s) adopted in part 170 that is specified by the requestor 
(Sec.  171.301(b)(2)(i)(A)); (2) using content and transport standards 
specified by the requestor and published by the Federal Government or a 
standards developing organization accredited by the American National 
Standards Institute (ANSI) \183\ (Sec.  171.301(b)(2)(i)(B)); and (3) 
using an alternative machine-readable format, including the means to 
interpret the EHI, agreed upon with the requestor (Sec.  
171.301(b)(2)(i)(C)). Section 171.301(b)(2)(ii) requires that any fees 
charged by the actor in relation to fulfilling the request must satisfy 
the Fees Exception in Sec.  171.302. Similarly, Sec.  
171.301(b)(2)(iii) requires that any license of interoperability 
elements granted by the actor in relation to fulfilling the request is 
required to satisfy the Licensing Exception in Sec.  171.303.
---------------------------------------------------------------------------

    \183\ See https://www.ansi.org/.
---------------------------------------------------------------------------

    We chose this approach because we believe actors should, first and 
foremost, attempt to fulfill requests to access, exchange, or use EHI 
in the manner requested. This principle is central to our information 
blocking policies (e.g., it was part of the proposed Infeasibility 
Exception) and will help ensure that EHI is made available where and 
when it is needed. Our approach acknowledges, however, that there may 
be instances when an actor should not be required to respond in the 
manner requested.
    First, if an actor is technically unable to fulfill a request to 
access, exchange, or use EHI in the manner requested, the actor is 
allowed to fulfill the request in an alternative manner (Sec.  
171.301(b)(1)(i)). We emphasize that we use ``technically unable'' in 
this context to mean that actors cannot fulfill a request to access, 
exchange, or use EHI due to technical limitation. For example, if an 
individual requested their EHI via an API and the actor could not 
fulfill the request via the API, but the individual then requested the 
EHI be provided via email and the actor was technically able to do so, 
we expect that the actor would fulfill the request in that ``manner 
requested.'' This standard sets a very high bar, and would not be met 
if the actor is technically able to fulfill the request, but chooses 
not to fulfill the request in the manner requested due to cost, burden, 
or similar justifications. If, for instance, under the alternative 
manner, fulfilling the request would prove costly for the actor, the 
actor would be able to charge a fee that results in a reasonable profit 
margin under the Fees Exception in Sec.  171.302 or license any 
requisite interoperability elements and make reasonable royalties under 
the Licensing Exception in Sec.  171.303. If the burden on the actor 
for fulfilling the request is so significant that the actor chooses not 
to fulfill the request at all, the actor could seek coverage under the 
Infeasibility Exception in Sec.  171.204. We believe this framework for 
utilizing this exception, which works in harmony with the Infeasibility 
Exception (Sec.  171.204), Fees Exception (Sec.  171.302), and 
Licensing Exception (Sec.  171.303), is principled and tailored in a 
manner that will promote basic fairness and encourage parties to work 
cooperatively to implement efficient solutions to interoperability 
challenges.
    Second, we establish that an actor is not required to fulfill a 
request to access, exchange, or use EHI in the manner requested if the 
actor cannot reach agreeable terms with the requestor to fulfill the 
request (Sec.  171.301(b)(1)(i)). We also establish that if an actor 
fulfills a request to access, exchange, or use EHI in any manner 
requested, the fees or licenses associated with fulfilling such 
requests will not be limited by the conditions in the Fees Exception or 
Licensing Exception. These provisions will allow actors to first 
attempt to negotiate agreements in any manner requested with whatever 
terms the actor chooses and at the ``market'' rate--which supports 
innovation and competition. We then allow flexibility for actors to 
still satisfy the exception by fulfilling the request in an alternative 
manner if the actor cannot reach agreeable terms with the requestor to 
fulfill the request. For instance, under the exception, actors who 
cannot reach agreeable terms with the requestor to fulfill the request 
are not required to license their IP to proprietary technology in order 
to satisfy the exception.
    In contrast, Sec.  171.301(b)(2)(ii) and (iii) require that any 
fees charged or licenses granted by the actor in relation to fulfilling 
a request to access, exchange, or use EHI in an alternative manner must 
satisfy the Fees Exception in Sec.  171.302 and the Licensing Exception 
in Sec.  171.303. We recognize that it is possible that responding in 
an alternative manner may require licensing of interoperability 
elements. However, we do not believe that, in most cases, licensing 
certified technology (Sec.  171.301(b)(2)(i)(A)) or standards-based 
technology (Sec.  171.301(b)(2)(i)(B)) would involve the type of 
licensing of proprietary interoperability elements that concerned the 
majority of commenters because the standards in Sec.  
171.301(b)(2)(i)(a) and (B) are ``open'' standards. Therefore, it is 
our understanding that a health IT developer of certified health IT 
would not normally be required to license its IP in order to meet the 
requirements for fulfilling a request to access, exchange, or use EHI 
in those alternative manners. On the other hand, the technology/
software that the developer uses to fulfill a request in any manner 
requested could constitute the developer's IP, depending on the 
request. We emphasize that this exception does not require developers 
to open-source their technology/software.
    For instance, if a health IT developer of certified health IT 
enables access to

[[Page 25878]]

EHI using HL7 (which is an ANSI-accredited standards developing 
organization) FHIR Release 2 (R2) Standard, that means the developer 
will provide EHI in the format specified in FHIR R2. In this example, 
the actual software code that is used by the developer to convert the 
EHI from the developer's proprietary format to FHIR R2 is the 
developer's IP and is not required to be provided to the requestor. We 
also note that our experience and knowledge of the health IT landscape 
indicate that the market is increasingly moving toward open standards, 
and we believe this movement will further decrease the need to license 
IP in the future. We believe this framework and approach are supportive 
of innovation and address commenter concerns regarding their ability to 
protect their IP.
    We included in Sec.  171.301(b)(2)(i) that an actor must fulfill 
the request without unnecessary delay in order to make clear that 
actors seeking coverage under this exception by responding in an 
alternative manner will be held to same unnecessary delay or 
``timeliness'' considerations as all actors are in determining whether 
there is an interference under the information blocking provision. The 
fact that an actor responds in an alternative manner does not entitle 
that actor to any additional time to respond to a request to access, 
exchange, or use of EHI that the actor would not be afforded if 
responding in any manner requested. As such, any unnecessary delays 
related to responding in an alternative manner could disqualify an 
actor from meeting the alternative manner condition in the same way 
that an unnecessary delay in responding to a request to access, 
exchange, or use EHI in any manner requested could constitute an 
interference. We refer readers to the discussion of ``Limiting or 
Restricting the Interoperability of Health IT'' in section 
VIII.C.6.c.ii.
    Under Sec.  171.301(b)(2)(i)(A), if an actor does not fulfill a 
request described in the content condition of this exception in any 
manner requested because it is technically unable to fulfill the 
request or cannot reach agreeable terms with the requestor to fulfill 
the request, the actor must fulfill the request in an alternative 
manner. Specifically, the actor must attempt to fulfill the request 
using technology certified to standards adopted in part 170 specified 
by the requestor. This manner of response is given precedence because 
it advances a certified, standards-based approach that supports the 
Promoting Interoperability Programs (previously Medicare and Medicaid 
EHR Incentive Programs) administered by the Centers for Medicare & 
Medicaid Services (CMS), other Federal and State programs that use 
certified health IT, and other Federal Departments (Department of 
Defense and Veterans Affairs). In addition, the certification criteria 
under the ONC Health IT Certification Program (the Program) include 
robust oversight, including technical and interoperability 
requirements, ONC-Authorized Certification Body (ONC-ACB) in-the-field 
surveillance expectations, and cost transparency and other disclosure 
requirements. To illustrate how this would work, if the requestor only 
requests the EHI using the C-CDA 2.1 content standard, then the actor 
would not have to also use the Direct transport standard to provide the 
EHI. However, if the requestor requests the EHI through the use of both 
standards, then the actor would be expected to respond in such a manner 
if the actor has certified health IT that supports both standards.
    If the actor is technically unable to respond using technology 
certified to standards adopted in part 170 specified by the requestor, 
then the actor may respond using content and transport standards 
specified by the requestor and published by the Federal Government or a 
standards developing organization accredited by the ANSI (Sec.  
171.301(b)(2)(i)(B)). We chose to specify that standards published by a 
standards developing organization accredited by ANSI would qualify for 
this manner of response because ANSI oversees the development of 
voluntary consensus standards in the United States and it accredits 
standards that are developed by representatives of other standards 
organizations. ANSI accreditation signifies that the procedures used by 
standards developing organizations meet the institute's requirements 
for openness, balance, consensus, and due process. Voluntary consensus 
standards developed by an ANSI-accredited standards developing 
organization carry a high degree of acceptance both in United States 
and internationally. ANSI has broad membership across government 
agencies, industry, academia, and international bodies and is the 
official United States representative to the International Organization 
of Standards (ISO). This manner of response also advances 
interoperability through standards-based exchange, even if the standard 
is not certified under the Program.
    As noted above, the ``manner'' of response specific in Sec.  
171.301(b)(2)(i)(B) includes two distinct components: (1) Content 
standard; and (2) transport standard. The content standard deals with 
whether the information is in an appropriate format and is universally 
understood. This standard includes the structure (i.e., syntax) and 
terminology (i.e., semantics) of the EHI. Examples of content standards 
include: US Fast Healthcare Interoperability Resources (FHIR) Core IG; 
Consolidated Clinical Document Architecture (C-CDA 2.1); HL7 V2.5.1; 
HL7 v2.7 (which is a standard that is not part of certification from an 
ANSI-accredited standards developing organization); and Argonaut Data 
Query Implementation Guide. The transport standard is the method to 
connect two or more parties without a focus on the data that is 
transported from one party to another. Put another way, the transport 
standard is the method by which information moves from one point to 
another. Examples of transport standards include: Direct Project 
Standard, ONC Applicability Statement for Secure Health Transport, 
Version 1.0 (incorporated by reference in Sec.  170.299) (Sec.  
170.202(a)); and Simple Object Access Protocol (SOAP) based exchange 
specifications such as ``Nationwide Health Information Network 
Messaging Platform Specification.'' \184\ Under the manner condition, 
an actor could proceed to the next consecutive ``manner'' under Sec.  
171.301(b)(2)(i) if the actor was technically unable to respond with 
either the content standard or the transport standard requested.
---------------------------------------------------------------------------

    \184\ See ONC, Connecting Health and Care for the Nation, A 
Shared Nationwide Interoperability Roadmap, FINAL Version 1.0, 
https://www.healthit.gov/sites/default/files/hie-interoperability/nationwide-interoperability-roadmap-final-version-1.0.pdf; ONC, 2015 
Interoperability Standards Advisory, https://www.healthit.gov/isa/sites/default/files/2015interoperabilitystandardsadvisory01232015final_for_public_comment.pdf.
---------------------------------------------------------------------------

    Last, if an actor is technically unable to fulfill a request for 
access, exchange, or use of EHI using a content and transport standard 
specified by the requestor and published by the Federal Government or a 
standards developing organization accredited by ANSI, only then can the 
actor respond using an alternative machine-readable format, including 
the means to interpret the EHI, agreed to by the actor and requestor 
(Sec.  171.301(b)(2)(i)(C)). This option to respond using an agreed 
upon alternative machine-readable format is a flexible option for 
actors who cannot meet the ``manner'' requirements in Sec.  
171.301(b)(2)(i)(A) and (B), but still want to be responsive to the 
requestor and seek coverage under this exception. Examples of 
alternative machine readable formats include CSV, public domain 
standards, public advisory

[[Page 25879]]

standards, and other community efforts used to represent the data.
    We emphasize two key components of Sec.  171.301(b)(2)(i)(C). 
First, the alternative machine-readable format must include the means 
to interpret the EHI. The goal with this requirement is to ensure that, 
if an actor fulfills a request for access, exchange, or use of EHI 
using an alternative machine-readable format, the EHI provided through 
that format will be usable by the requestor. As an example, the format 
used for the EHI Export functionality (Sec.  170.315(b)(10)) discussed 
earlier in this final rule could be used to fulfill such a request. 
Second, the alternative machine-readable format must be agreed upon 
with the requestor. This condition ensures that, even if the actor is 
technically unable to meet the requirements in Sec.  
171.301(b)(2)(i)(A) and (B), the actor is still providing the requestor 
the opportunity to access, exchange, or use the EHI in a manner that is 
amenable to the requestor.
b. Fees Exception--When will an actor's practice of charging fees for 
accessing, exchanging, or using electronic health information not be 
considered information blocking?
    We proposed in the Proposed Rule to establish an exception at Sec.  
171.204 (84 FR 7589) to the information blocking provision that would 
permit the recovery of certain costs reasonably incurred for the 
access, exchange, or use of EHI. We interpreted the definition of 
information blocking to include any fee that is likely to interfere 
with the access, exchange, or use of EHI. We noted that this 
interpretation may be broader than necessary to address genuine 
information blocking concerns and could have unintended consequences on 
innovation and competition. Specifically, unless we establish an 
exception, actors may be unable to recover costs that they reasonably 
incur to develop technologies and provide services that enhance 
interoperability. This could undermine the ultimate goals of the 
information blocking provision by diminishing incentives to invest in, 
develop, and disseminate interoperable technologies and services that 
enable more robust access, exchange, and use of EHI. Therefore, we 
proposed to establish an exception that would permit the recovery of 
certain costs that we believe are unlikely to present information 
blocking concerns and would generally promote innovation, competition, 
and consumer welfare, provided certain conditions are met. We 
emphasized that actors can make a reasonable profit under this 
exception, provided that all applicable conditions are met (84 FR 7538 
through 7541).
    We proposed that the exception would be subject to strict 
conditions to prevent its potential abuse. Specifically, we explained 
our concern that a broad or insufficiently tailored exception for the 
recovery of costs could protect rent-seeking, opportunistic fees, and 
exclusionary practices that interfere with the access, exchange, and 
use of EHI. We explained that these practices fall within the 
definition of information blocking and reflect some of the most serious 
concerns that motivated its enactment (see 84 FR 7538 and section 
VIII.B of this preamble). For example, in the Information Blocking 
Congressional Report,\185\ we cited evidence of wide variation in fees 
charged for health IT products and services. While we cautioned that 
the issue of fees is nuanced, and that variations in fees could be 
attributable in part to different technology architectures, service 
models, capabilities, service levels, and other factors, we concluded 
that these factors alone could not adequately explain all of the 
variation in prices that we had observed. Based on these and other 
indications, we concluded that some actors were engaging in 
opportunistic pricing practices or, in some cases, charging prices 
designed to deter connectivity or exchange with competing technologies 
or services. In the time since we published the Information Blocking 
Congressional Report, these practices have persisted and, in certain 
respects, become more pronounced. In a national survey of HIE 
executives published in 2017, 47 percent of respondents reported that 
EHR developers ``often/routinely'' charge high fees for exchange that 
are unrelated to cost, and another 40 percent reported that they 
``sometimes'' do.\186\ Meanwhile, we have continued to receive credible 
evidence of rent-seeking and other opportunistic behaviors, such as 
fees for data export and data portability that are not plausibly 
related to any time, materials, or other costs that a developer would 
reasonably incur to provide these services. And, while some practices 
described in the Information Blocking Congressional Report have become 
less prevalent (such as the charging of per-transaction fees), other 
practices have emerged that are equally concerning (84 FR 7538).
---------------------------------------------------------------------------

    \185\ ONC, Information Blocking Congressional Report (April 
2015), https://www.healthit.gov/sites/default/files/reports/info_blocking_040915.pdf.
    \186\ Julia Adler-Milstein and Eric Pfeifer, Information 
Blocking: Is It Occurring And What Policy Strategies Can Address 
It?, 95 Milbank Quarterly 117, 124-25 (Mar. 2017), available at 
https://onlinelibrary.wiley.com/doi/10.1111/1468-0009.12247/full.
---------------------------------------------------------------------------

    As just one illustration, some EHR developers have begun 
conditioning access or use of customer EHI on revenue-sharing or 
royalty agreements that bear no plausible relation to the costs 
incurred by the EHR developer to grant access to the EHI. We have also 
heard of discriminatory pricing policies that have the obvious purpose 
and effect of excluding competitors from the use of interoperability 
elements. Many of the industry stakeholders who shared their 
perspectives with us in listening sessions prior to the Proposed Rule, 
including several health IT developers of certified health IT, 
condemned these practices and urged us to swiftly address them (84 FR 
7538).
    In light of these concerns, we proposed that this exception would 
apply only to the recovery of certain costs and only when the actor's 
methods for recovering such costs comply with certain conditions at all 
relevant times. In general, these conditions would require that the 
costs the actor recovered were reasonably incurred, did not reflect 
costs that are speculative or subjective, were appropriately allocated, 
and based on objective and verifiable criteria. Further, the exception 
would not apply to certain fees, such as those based on the profit or 
revenue associated with the use of EHI (either being earned by the 
actor, or that could be realized by another individual or entity) that 
exceed the actor's reasonable costs for providing access, exchange, or 
use of the EHI (84 FR 7539 through 7541).
    Finally, the exception would provide additional conditions 
applicable to fees charged in connection with: (1) The certified APIs 
described in Sec.  170.404 (84 FR 7594); and (2) the EHI export 
criterion proposed in Sec.  170.315(b)(10) (84 FR 7590) to support 
single patient EHI export and to support the export of all EHI when a 
health care provider chooses to migrate information to another health 
IT system. We emphasized that access to EHI that is provisioned by 
supplying some form of physical media, such as paper copies (where the 
EHI is printed out), or where EHI is copied onto a CD or flash-drive, 
would not be a practice that implicated the information blocking 
provision provided that the fee(s) charged for that access complied 
with the HIPAA Privacy Rule (45 CFR 164.524(c)(4)) (84 FR 7539).
Clarification
    We clarify that the Fees Exception we have finalized in this rule 
in no way supports or encourages the sale of EHI.

[[Page 25880]]

We emphasize that this exception permits the recovery of certain costs 
reasonably incurred for the access, exchange, or use of EHI. We note 
that many individuals and entities who are considered ``actors'' under 
the information blocking provision are also subject to the HIPAA 
Privacy Rule and therefore prohibited from selling PHI unless certain 
conditions are met, and in particular, receiving remuneration for a 
disclosure of PHI in accordance with 45 CFR 164.502(a)(5)(ii). This 
exception to the information blocking definition in no way affects 
existing HIPAA Privacy Rule compliance responsibilities of entities 
subject to the HIPAA Rules.
    Comments. We received many comments in general support of the 
proposed exception. Commenters appreciated ONC's goal of addressing 
rent-seeking, opportunistic fees, and exclusionary practices that 
interfere with the access, exchange, and use of EHI. Some commenters 
suggested that ONC should take additional steps and measures to ensure 
that the requirements under this exception are clear. A couple of 
commenters recommended that fees and costs of information exchange 
should be made publicly available. Another commenter suggested that ONC 
develop a process for actors to routinely report their use of this 
exception, including specific timeframes for actors to submit 
information to ONC and for ONC to determine whether the exception can 
be applied under specific circumstances.
    Response. We thank commenters for their support of and feedback on 
this exception. We appreciate the suggestions for improved transparency 
under this exception. We believe actors should have discretion to 
decide if they would like to enhance transparency by making fees and 
costs of information exchange publicly available. We believe that 
choosing not to disclose fees, on its own, would not likely implicate 
the information blocking provision. Further, while we wholeheartedly 
support the goal of enhanced transparency and commend commenters' 
desire to enhance transparency in the final rule, we believe their 
suggestions could create additional burden for actors and such burden 
could outweigh the benefits of the measures they suggest. We will 
continue to consider steps to further promote transparency regarding 
our information blocking policies in future rulemakings.
    We appreciate the comment that we should develop a process for 
letting actors know whether this exception could be applied under 
certain circumstances. We may consider developing materials in the 
future regarding the application of the exceptions should the need 
arise. However, we believe the final rule clearly describes the 
conditions actors must meet in order to be covered by each exception, 
and informational materials are not necessary at this time.
Requirement That Costs Be Reasonably Incurred
    In the Proposed Rule, we stated that, regardless of the type of 
cost at issue, a basic condition of the proposed exception was that any 
costs the actor seeks to recover must have been reasonably incurred to 
provide the relevant interoperability elements for the access, 
exchange, or use of EHI. Whether a cost was reasonably incurred will 
ultimately depend on the particular facts and circumstances. We 
requested comment on considerations that may be relevant to assessing 
the reasonableness of costs incurred for purposes of this exception (84 
FR 7539).
    Comments. Several commenters requested additional clarity in the 
final rule regarding various terms and concepts in the proposed 
exception. Commenters noted that many terms and concepts regarding the 
reasonableness of fees, and which fees would or would not be considered 
``reasonably incurred'' under the exception, were ambiguous and overly 
broad. Some commenters were concerned that such ambiguity and vagueness 
could undercut ONC's overall intent to prevent rent-seeking and 
opportunistic fees and could create a loophole that would enable actors 
to use the exception to continue to charge unreasonably high fees. Some 
commenters requested additional examples of ``costs reasonably 
incurred'' under the exception. One commenter asked that ONC outline 
different cost categories (such as development costs, deployment costs, 
usage costs) and indicate which of those costs would or would not fall 
under the exception. A couple of commenters requested that ONC 
explicitly state that fees the actor pays to a developer for ``Release 
of Information'' (ROI) services and technology would be considered 
``costs reasonably incurred.''
    Response. We appreciate these comments. Actors may choose to 
satisfy the conditions of this exception to be certain that the fees 
they charge for the access, exchange, or use of EHI do not implicate 
the information blocking provision. We reiterate that failure to meet 
the exception does not mean that an actor's practice related to 
charging fees meets the information blocking definition. However, as we 
explained in the Proposed Rule, we interpret the broad definition of 
information blocking in section 3022(a) of the PHSA to encompass any 
fee that is likely to interfere with the access, exchange, or use of 
EHI (84 FR 7521). Fees that do not meet this exception may implicate 
the information blocking provision and will have to be assessed on a 
case-by-case basis to determine, for example, the actor's intent and 
whether the practice rises to the level of an interference. Consistent 
with the conditions of this exception, an actor seeking the significant 
protection afforded by this exception will have to assess the fees they 
charge in light of the costs incurred.
    We emphasize that our intention with this exception is not to set 
any particular fees related to products or services for accessing, 
exchanging, or using EHI, but rather to allow the market to define the 
appropriate price for such products or services so long as certain 
methods are followed and certain criteria are met. We believe this 
approach is appropriate for this exception in light of the considerable 
diversity in the types of costs actors might incur and the range of 
factors that could bear on the reasonableness of those costs. For 
example, the costs of developing software may vary with the purposes it 
is intended to serve, the settings in which it will be deployed, the 
types and scope of capabilities included, and the extent to which these 
development efforts build on existing development efforts and know-how. 
Additionally, the costs of providing services, including the 
implementation of technology in production environments, may vary based 
on the technology design or architecture, individual customer needs, 
local implementation conditions, and other factors. An analysis of the 
approach for recovering costs will also account for different 
distribution and service models under which the costs are calculated. 
For these reasons, we have decided not to specify cost categories, such 
as development costs, deployment costs, usage costs, or ROI services 
and technology costs. However, we note that if an actor meets all 
necessary conditions of the finalized exception, the actor could 
recover such categories of cost under the exception.
    We have taken a few distinct steps to clarify this exception and 
address the overall concern from commenters regarding the clarity of 
this exception. First, we have restructured the exception for clarity. 
We have changed the title of the exception from ``Exception--Recovering 
costs reasonably incurred'' to ``When will an actor's practice of 
charging fees for

[[Page 25881]]

accessing, exchanging, or using electronic health information not be 
considered information blocking?'' Throughout this final rule preamble, 
we use ``Fees Exception'' as a short form of this title, for ease of 
reference. As stated in Section VIII.D of this final rule preamble, we 
have changed the titles of all of the exceptions to questions to 
improve clarity. We have also edited the wording of the introductory 
text in Sec.  171.302, in comparison to that proposed (84 FR 7603), so 
that it is consistent with the finalized title in Sec.  171.302. We 
believe these conforming changes in wording of the introductory text 
also improve clarity in this section.
    We have also divided the exception into three conditions in Sec.  
171.302--(a) Basis for fees condition; (b) Excluded fees condition; and 
(c) Compliance with the Conditions of Certification condition. We 
explain upfront in the introductory sentence of the exception that, 
pursuant to these conditions, an actor may charge fees, including fees 
that result in a reasonable profit margin, for the access, exchange, or 
use of EHI without implicating the information blocking provision. We 
believe this framework provides actors with a clear roadmap for 
voluntarily satisfying the conditions of the exception. We discuss the 
substantive changes we have made to these provisions in the discussion 
of each condition later in this section of the preamble.
    We also note that we have further clarified the fees allowed under 
this exception by focusing the scope of the EHI definition (discussed 
in section VIII.C.3 of this preamble) and adding paragraph (b) to the 
information blocking definition in Sec.  171.103 (discussed in section 
VIII.C of this preamble). By changing the definition of EHI to 
electronic protected health information (ePHI) as defined in 45 CFR 
160.103 included in a designated record set as defined in 45 CFR 
164.501, we have focused the scope of information covered by the 
information blocking provision. In addition, under the finalized 
information blocking definition, for up to 18 months after the six-
month delayed compliance date of the information blocking section of 
this final rule (part 171) (a total of 24 months after the publication 
date of this final rule), EHI for purposes of the information blocking 
definition is limited to the EHI identified by the data elements 
represented in the USCDI standard adopted in Sec.  170.213 (see (Sec.  
171.103(b)).
Basis for Fees Condition
    To qualify for this exception, we proposed that the method by which 
the actor seeks to recover its costs must meet certain conditions. We 
proposed that this would require that the actor base its recovery of 
costs on objective and verifiable criteria that are uniformly applied 
for all substantially similar or similarly situated classes of persons 
and requests. We proposed that any differences in prices or price terms 
would have to be based on actual differences in the costs that the 
actor incurred or other reasonable and non-discriminatory criteria. We 
further proposed to require that the method by which the actor recovers 
its costs must be reasonably related to the actor's costs of providing 
the type of access, exchange, or use to, or at the request of, the 
person or entity to whom the fee is charged (84 FR 7539).
    We also proposed that the costs must be reasonably allocated among 
all customers to whom the technology or service is supplied, or for 
whom the technology is supported. A reasonable allocation of costs 
would require that the actor allocate its costs in accordance with 
criteria that are reasonable and between only those customers that 
either cause the costs to be incurred or benefit from the associated 
supply or support of the technology (84 FR 7539).
    We proposed that the exception would not apply if the method by 
which the actor recovers its costs is based, in any part, on whether 
the requestor or other person is a competitor, potential competitor, or 
will be using the EHI in a way that facilitates competition with the 
actor. The use of such criteria would be suspect because it suggests 
the fee the actor is charging is not based on its reasonable costs to 
provide the services and may have the purpose or effect of excluding or 
creating impediments for competitors, business rivals, or other persons 
engaged in developing or enabling the use of interoperable technologies 
and services (84 FR 7539).
    Last, we stated that the method by which the actor recovers its 
costs must not be based on the sales, profit, revenue, or other value 
that the requestor or other persons derive or may derive from the 
access to, exchange of, or use of EHI, including the secondary use of 
such information, that exceeds the actor's reasonable costs for the 
access, exchange, or use of EHI (84 FR 7539).
    We requested comment on the proposed conditions and other issues we 
should consider in assessing whether the methodology by which an actor 
distributes costs and charges fees should be considered reasonable and 
necessary for purposes of the exception. In particular, we noted that 
we were considering whether to introduce specific factors and methods 
for assessing when profit will be reasonable. We requested comment on 
whether the pro-competitive or efficiency-adding aspect of an actor's 
approach to providing access, exchange, or use of EHI should be taken 
into account when assessing the reasonableness of profits. We asked 
commenters to consider whether there are specific use cases for which 
actors' profits should be limited or prohibited for purposes of meeting 
the exception (84 FR 7539).
    We also asked commenters to consider alternate approaches to the 
exception that would also achieve the goal of allowing actors to 
recover certain types of costs that would promote innovation, 
competition and consumer welfare and that are unlikely to present 
information blocking concerns. In assessing other potential approaches 
to this exception, we encouraged commenters to contemplate such 
considerations as enforceability, potential burden on the parties, and 
overall effectiveness in meeting the above stated goals (84 FR 7539).
    Comments. We received several comments regarding our proposed 
approach for cost recovery and profits. Some commenters supported our 
proposed approach. A couple of commenters recommended that we prohibit 
all profits under the exception to ensure that actors cannot continue 
rent-seeking and exclusionary pricing practices. Several commenters 
requested clarification regarding the profits that would be allowed 
under the exception and expressed concern that the regulation text does 
not clearly state that profits are allowed under the exception. Several 
other commenters, primarily health IT developers, disagreed with the 
proposed cost recovery approach and limits on profits, expressing 
concern that ONC's proposals will serve as a barrier to innovation, 
competition, and interoperability. Some commenters stated that ONC's 
proposals regarding fees and profits go beyond the congressional intent 
in the Cures Act and questioned whether ONC has regulatory authority to 
regulate costs and profits.
    We received some comments that recommended we take a different 
approach for assessing whether an actor's costs recovered are 
reasonable. Commenters recommended using an approach that 
distinguishes, as appropriate, between: (1) Pure cost or expense 
recovery, with no provision for margin or profit; (2) ``cost-based 
pricing'' or ``cost plus accounting,'' where margin or profit is 
allowed; and (3) ``market-based pricing,'' where there

[[Page 25882]]

are no restrictions on pricing. A couple of commenters recommended that 
where a cost-based pricing mechanism is required, the method for 
assessing the cost basis should be reasonably associated with the 
complexity or cost of providing the capabilities. Such methods could 
include reasonable heuristics, estimates, or other commonly used 
methods.
    Commenters recommended that we distinguish ``basic access'' (with 
no profits or limited profits) from ``value-added'' access, exchange, 
or use (which would allow for increased profits). A couple of 
commenters recommended that allowed fees for ``basic access'' be on a 
pure direct cost recovery basis only. Those commenters recommended that 
the cost to develop and/or map to standards should not be part of the 
cost basis for fees for ``basic access;'' rather any such costs should 
be a part of the fees for the health IT. The commenters recommended 
that when the outputs of value-added services are incorporated into, or 
from, an essential part of the legal medical record, or are routinely 
used for decision making, they constitute part of the set to which 
basic access is required. The commenters also recommended that we 
distinguish between intellectual property (IP) rights that are 
essential to access EHI and IP rights that allow for value-added 
services.
    Response. We thank commenters for their support of our proposals 
and for the thoughtful comments on this aspect of the exception. We 
appreciate that commenters were concerned both about the elimination of 
rent-seeking, opportunistic fees, and exclusionary pricing practices 
that interfere with the access, exchange, and use of EHI as well as the 
importance of finalizing policies that support and promote innovation. 
We have finalized the proposed approach for determining whether the 
basis for fees charged is acceptable under this exception, with some 
clarifications and updates detailed below.
    As we discussed in the Proposed Rule, we believe our approach will 
provide actors that seek to meet this exception certainty that charging 
fees to recover certain costs reasonably incurred for the access, 
exchange, or use of EHI will not implicate the information blocking 
provision, provided the actor's practice meets the conditions of the 
exception. We reiterate that an actor who seeks to comply with the 
conditions of this exception will not be prevented from making a 
reasonable profit in connection with the access, exchange, or use of 
EHI, provided that all applicable conditions are met. We emphasize that 
our intention with this exception is not to set any particular costs 
that would be considered ``reasonably incurred,'' but rather to allow 
the market to define the appropriate price so long as certain methods 
are followed and certain criteria are met as established by the 
conditions. To be responsive to comments, we have added text in the 
introductory sentence of this exception that clarifies that fees that 
result in a reasonable profit margin will be covered by this exception 
so long as they are in compliance with the conditions in the exception 
(Sec.  171.302).
    We also appreciate the comments that encouraged us to prohibit all 
profits under this exception. We considered this approach, but believe 
that actors should be able to make a reasonable profit margin, subject 
to the conditions in this exception. The allowance of a reasonable 
profit margin is necessary to incentivize innovation and allow 
innovators to earn returns on the investments they have made to 
develop, maintain, and update innovations that ultimately improve 
health care delivery and benefit patients. We believe the finalized 
approach strikes the appropriate balance of addressing the rent-seeking 
and exclusionary pricing practices noted by the commenters while 
enabling and supporting innovation. However, to be responsive to these 
comments related to limiting profits, we added a provision in Sec.  
171.302(a)(1)(iv) that the fees an actor charges must be based on costs 
not otherwise recovered for the same instance of service to a provider 
and third party. The intent of this provision is that the exception 
will not apply to practices where an actor charges twice for the same 
exact service. For example, the exception likely would not apply where 
an actor charges a hospital for providing a third party that the 
hospital contracts with access to certain EHI, and then charges that 
same third party an additional fee for access to the same EHI. This 
condition creates a necessary guardrail to address potential misuse of 
this exception that could result in a windfall for certain actors who 
charge fees for the same services multiple times.
    We have also modified other aspects of this final rule that address 
commenter concerns regarding this exception. First, as discussed 
previously in this section and in more detail in section VIII.C.3 of 
this preamble, we have focused the scope of the EHI definition. This 
change addresses commenters' concerns regarding potential ambiguity 
regarding the types of information for which profits could be realized. 
Actors seeking certainty about their practices related to charging fees 
only need to comply with this exception if their practices interfere 
with the access, exchange, and use of EHI. We emphasize that we are not 
limiting the fees and/or profits related to the access, exchange, or 
use of information outside the scope of EHI. We refer readers to 
section VIII.C.3 of this preamble for a detailed discussion of focused 
scope of the EHI definition.
    Second, under the finalized information blocking definition, for up 
to 18 months after the six-month delayed compliance date of the 
information blocking section of this final rule (part 171) (a total of 
24 months after the publication date of this final rule), EHI for 
purposes of part 171 is limited to the EHI identified by the data 
elements represented in the USCDI standard adopted in Sec.  170.213 
(see (Sec.  171.103(b)). The fees an actor charges during that time 
will only be limited pursuant to the conditions in this exception for 
that subset of EHI.
    We note that we revised Sec.  171.302(a)(1)(i) for clarity by 
limiting the requirement to ``objective and verifiable criteria that 
are uniformly applied for all similarly situated classes of persons and 
requests'' instead of ``objective and verifiable criteria that are 
uniformly applied for all substantially similar or similarly situated 
classes of persons and requests.'' We believe the final standard 
achieves the same goal as the proposed standard and provides a clearer 
condition for the regulated community to follow. We updated Sec.  
171.302(a)(2)(ii) by removing the illustrative language regarding the 
``secondary use of such information'' and by removing the proposed 
language about exceeding the actor's reasonable costs for providing 
access, exchange, or use of EHI (see 84 FR 7539). The provision 
finalized in Sec.  171.302(a)(1)(ii)--that an actor's fees must be 
reasonably related to the actor's costs of providing the type of 
access, exchange, or use of EHI to, or at the request of, the person or 
entity to whom the fee is charged--achieves the same purpose of 
limiting fees to those necessary to recover the costs reasonably 
incurred.
    We removed the ``secondary use'' language because it seemed 
superfluous to include in the regulation text; however, we emphasize 
that we maintain that the fees an actor charges must not be based on 
the sales, profit, revenue or other value that the requestor or other 
persons derive or may derive from the subsequent use of EHI. Our policy 
on this point has not changed from the Proposed Rule. Practices that 
use this method to recover costs will not

[[Page 25883]]

benefit from this exception and may implicate the information blocking 
provision. Last, we note that we have added ``or entities'' to follow 
``person'' to align with the language in Sec.  171.302(a)(1)(ii).
    We note, with regard to the ``basis for fees'' and ``excluded 
fees'' conditions (Sec.  171.302(a) and (b), respectively), that each 
provision under these conditions was proposed in the Proposed Rule with 
the exception of two new provisions: (1) The fees an actor charges must 
be based on costs not otherwise recovered for the same instance of 
service to a provider and third party (Sec.  171.302(a)(1)(iv)); and 
(2) the fees an actor charges must not be based on any costs that led 
to the creation of IP, if the actor charged a royalty for that IP 
pursuant to Sec.  171.303 and that royalty included the development 
costs for the creation of the intellectual property (Sec.  
171.302(a)(2)(vi)). We discuss each of these additions in the 
discussion below. Regarding the conditions that were included in the 
proposed exception, we note that some of the conditions were in 
different subsections of the proposed exception and/or have been 
updated for clarity and consistency with other sections of this final 
rule. We describe all the substantive changes to these provisions in 
this preamble, but refer readers to the proposed exception to review 
the full scope of structural changes and clarifications we have made 
(see 84 FR 7603).
    Comments. We received some comments regarding the scaling of fees 
and the proposed condition that the method by which the actor recovers 
its costs must be reasonably allocated among all customers to whom the 
technology or service is supplied or for whom the technology is 
supported. Some commenters stated that the notion that costs can be 
evenly divided among clients is flawed. Commenters requested that ONC 
allow a fee scale as opposed to a blanket fee structure. Commenters 
noted that a sliding scale structure would ensure that smaller entities 
would not be limited by a restrictive pricing application that 
threatens their operating costs, which may exist on a slim margin. A 
couple of commenters requested that ONC recognize that for many 
organizations, especially non-profits, it is common and appropriate for 
fees to scale with the size of a member/participant organization.
    Several HIEs and HINs expressed concern that the proposed condition 
regarding the reasonable allocation of costs could have the unintended 
effect of prohibiting the fee structure of many public HIEs/HINs. 
Commenters noted that many HIEs/HINs choose to charge fees to only a 
subset of their participants. However, as proposed, the condition that 
costs be reasonably allocated among all customers could undercut this 
ability. Commenters emphasized that the ability to offer free services 
to smaller providers, particularly as HIEs/HINs work to engage 
providers across the care continuum, is an important flexibility for 
such organizations. Commenters requested that HIE/HIN membership/
participation costs and subscription fees not be considered restricted 
fees under the information blocking provision.
    Response. We thank commenters for these thoughtful comments. We 
maintain that the condition regarding reasonable allocation of costs in 
Sec.  171.302(a)(iii) is necessary to ensure that actors do not 
allocate fees in an arbitrary or anti-competitive manner. The final 
condition requires that an actor allocate its costs in accordance with 
criteria that are reasonable and between only those customers that 
either cause the costs to be incurred or benefit from the associated 
supply or support of the technology. We have finalized this condition 
with a modification discussed below.
    We agree with commenters that there may be situations when it would 
be reasonable for an actor to allocate costs differently for different 
classes of customers. In response to these comments, we have revised 
the condition in Sec.  171.302(a)(1)(iii) so that the fees an actor 
charges must be reasonably allocated among all similarly situated 
customers to whom the technology or service is supplied, or for whom 
the technology is supported. This addition addresses commenters' 
concerns by providing actors with the discretion to allocate costs 
differently for different classes of customers, while ensuring that any 
differences in cost allocation are based on actual differences in the 
class of customer. For instance, under this provision, fees must be 
reasonably allocated among all similarly situated large hospital 
systems (above a certain established size threshold) to whom a 
technology or service is supplied, or for whom the technology is 
supported. However, the allocation of fees for the same technology or 
service could be quite different for a small, non-profit, rural health 
clinic.
    We also note that we have replaced ``customers'' with ``persons or 
entities'' in Sec.  171.302(a)(1)(iii) in order to align the language 
with Sec.  171.302(a)(1)(i) and (ii). We believe aligning the 
provisions within Sec.  171.302(a) will strengthen the exception and 
provide actor's with clarity regarding what is necessary to meet the 
exception.
    Comments. We received many comments, primarily from providers and 
provider organizations, regarding the potential financial burden the 
proposed exception will place on actors. Commenters recommended that 
ONC carefully consider the downstream financial impact of new 
requirements, especially that providers, including providers without 
certified health IT and who do not participate in CMS programs, will 
bear the brunt of the financial burden of these policies. More 
specifically, commenters expressed concern regarding potential 
recordkeeping and administrative burden caused by this exception. 
Commenters explained that actors may need to retain extensive records 
to document all of the costs that the actor incurred so that it can 
prove that its fees only constitute those costs plus a reasonable 
profit. Further, commenters stated that the administrative burden 
required to assess and monitor this exception would be significant and 
not sustainable. Commenters explained that cost accounting is 
challenging for even very large and well-resourced organizations and 
there is concern that the exception will result in unintended negative 
consequences for many actors.
    Response. We appreciate these comments. We reiterate that actors 
may choose to satisfy the conditions of this exception to be certain 
that the fees they charge for the access, exchange, or use of EHI do 
not implicate the information blocking provision. We also reiterate 
that failure to meet the exception does not mean that an actor's 
practice related to charging fees meets the information blocking 
definition. However, as we explained in the Proposed Rule, we interpret 
the broad definition of information blocking in section 3022(a) of the 
PHSA to encompass any fee that is likely to interfere with the access, 
exchange, or use of EHI (84 FR 7521). Fees that do not meet this 
exception may implicate the information blocking provision and will 
have to be assessed on a case-by-case basis to determine, for example, 
the actor's intent and whether the practice rises to the level of an 
interference. This exception, as well as the other finalized 
exceptions, strike a balance by identifying, as the Cures Act requires, 
activities that interfere with access, exchange, or use of EHI but 
which are reasonable and necessary.
    We believe the overwhelming benefits of the information blocking 
provision and the exceptions to the information blocking definition--
which enable patients to access, exchange, and use their EHI where and 
when it is

[[Page 25884]]

needed--far outweigh the potential burden on actors. We believe the 
revisions we have made to this exception, the addition of paragraph (b) 
in the information blocking definition (see Sec.  171.103(b)) and the 
discussion in section VIII.C of this preamble), the addition of the 
Content and Manner Exception, as well as the revisions we have made to 
the other exceptions and relevant terms will have the overall effect of 
reducing burden on actors. The fact the information blocking section of 
this rule (part 171) has a 6-month delayed compliance date from the 
publication date of this final rule will also relieve the burden on 
actors and give them time to prepare for administrative changes.
    Comments. We received comments about the interplay and potential 
overlap between the proposed Fees Exception and Licensing Exception. 
Some commenters suggested that we combine the two exceptions for 
clarity. Some commenters requested clarification as to whether an actor 
may charge both a fee to recover reasonable costs associated with EHI 
services and a reasonable royalty for licensing interoperability 
elements. One commenter expressed concern that the overlap between the 
two exceptions creates the potential for actors to recover the same 
costs twice. The commenter explained that licensing of IP is intended 
to recoup the costs of development of that IP, so where the IP is an 
interoperability element, the costs reasonably incurred for its 
development should be incorporated into the royalty rate. The commenter 
recommended that we should be clearer that, in these circumstances, 
only a single recovery is permitted.
    Response. We thank commenters for the thoughtful feedback and agree 
that the distinction between the Fees Exception and the Licensing 
Exception (Sec.  171.303) must be clear. We emphasize that both 
exceptions deal with the fees actors may charge regarding the access, 
exchange, or use of EHI and under both exceptions actors use 
interoperability elements (as defined in Sec.  171.102) to facilitate 
the access, exchange, or use of EHI. The exception for recovering costs 
reasonably incurred enables actors to recover their costs to develop 
technologies and provide services that enhance interoperability. On the 
other hand, the exception for licensing interoperability elements 
specifically addresses circumstances when it is necessary for an actor 
to license interoperability elements in order fulfill a request to 
access exchange, or use EHI. The Licensing Exception deals with the 
requisite licensing conditions. We believe there should be a 
distinction made between these two exceptions, and have therefore 
decided not to combine the two exceptions.
    We agree with the commenter that actors should not be able to 
recover the same costs twice and have added a provision in Sec.  
171.302(a)(2)(vi) that the fees an actor charges must not be based on 
any costs that led to the creation of IP, if the actor charged a 
royalty for that IP pursuant to Sec.  171.303 and that royalty included 
the development costs for the creation of the intellectual property.
Excluded Fees Condition
    We proposed that certain costs should be explicitly excluded from 
the exception regardless of the method for recovering the costs (84 FR 
7540).
    Comments. We did not receive comments regarding the overall 
proposed approach of excluding certain costs from this exception.
    Response. We have finalized the structure of this exception to 
exclude certain fees with the changes described in the discussions 
above and below. We note that we have substituted the ``or'' that 
preceded the final excluded fee in the proposed exception (see 84 FR 
7603) with an ``and'' in the final exception. This is not a substantive 
change, as our intent has always been that the exception does not apply 
to each of ``excluded fees.'' This revision clarifies that point.
Costs Due to Non-Standard Design or Implementation Choices
    We proposed that this exception would not permit the recovery of 
any cost that the actor incurred due to the health IT being designed or 
implemented in non-standard ways that unnecessarily increase the 
complexity, difficulty or burden of accessing, exchanging, or using 
EHI. To the extent that such costs can be reasonably avoided, we stated 
that we believe that actors should internalize the costs of such 
behaviors, which do not benefit consumers, and which create unnecessary 
impediments to access, exchange, and use of EHI. We requested comments 
on the proposed exclusion of these types of costs from the exception 
(84 FR 7540).
    Comments. We received several comments regarding the proposed 
exclusion of costs due to non-standard design or implementation choices 
from this exception. A couple of commenters expressed support for the 
proposal. A couple of other commenters disagreed with the proposal and 
recommended that actors should be able to recover all reasonable 
implementation costs independent of design decisions. One commenter 
requested additional clarity about what ``non-standard'' means. A 
couple of commenters noted that requestors may prefer information in a 
non-standard manner to meet their business purposes, due to their own 
constraints, or for other reasons.
    Response. We thank commenters for their support of this proposal, 
as well as the constructive feedback. We emphasize that the problematic 
nature of non-standard implementation choices was identified by 
Congress in the Cures Act. Section 3022(a)(2)(B) of the PHSA states 
that information blocking may include implementing health IT in non-
standard ways that are likely to substantially increase the complexity 
or burden of accessing, exchanging, or using EHI. Due to Congress's 
clear objective to restrict these practices, along with our continued 
concern that these practices will lead to unnecessary complexity and 
burden related to the access, exchange, or use of EHI, we have 
finalized the proposed provision regarding non-standard design and 
implementation choices. We have updated Sec.  171.302(a)(2)(iii) to 
address comments indicating that requestors may prefer information in a 
non-standard manner to meet their business purposes, due to their own 
constraints, or for other reasons. We agree with commenters that in 
those situations--when the requestor requests access, exchange or use 
of EHI in the non-standard way--the exception should allow the actor to 
charge fees for the reasonable costs associated with the requested non-
standard design or implementation. We emphasize, however, and make 
clear in Sec.  171.302(a)(2)(iii), that such fees related to non-
standard design or implementation are only covered by the exception 
when the requestor agreed to the fee associated with the non-standard 
design or implementation to access, exchange, or use EHI. We note that 
this provision was proposed as an ``excluded cost'' but has been 
finalized within the ``Basis for fees condition'' for clarity and to 
align with the revised structure of this exception.
    We also note that the new Content and Manner Exception in Sec.  
171.301 further addresses commenter concerns because it provides actors 
with clear procedures regarding the manner in which they may provide 
access, exchange, or use of EHI if they are technically unable to 
respond in the manner requested or the manner requested requires the 
actor to license intellectual property and the actor cannot reach 
agreeable terms with the requestor (discussed in section VIII.D.2.a of 
this preamble). If an actor

[[Page 25885]]

meets that exception, its practice would not implicate the information 
blocking provision. For instance, if a requestor requested that the 
actor provide EHI in a non-standard manner, but the actor is 
technically unable to provide the EHI in the manner requested, the 
actor's response to the request would not implicate the information 
blocking provision if it provides the EHI via an alternative manner in 
accordance with Sec.  171.301(b). The actor could also potentially seek 
coverage under the Infeasibility Exception if the request is infeasible 
and the actor meets all the conditions in Sec.  171.204.
    Regarding the comment concerning additional clarity about what 
``non-standard'' means, we explained and provided examples in the 
Proposed Rule of practices related to implementing health IT in non-
standard ways that substantially increase the complexity or burden of 
accessing, exchanging, or using EHI, and therefore implicate the 
information blocking provision (84 FR 7521). In addition, the Cures Act 
specifically describes information blocking practices to include 
implementing health IT in nonstandard ways that are likely to 
substantially increase the complexity or burden of accessing, 
exchanging, or using electronic health information (see section 
3022(a)(2)(B) of the PHSA). Therefore, the Proposed Rule discussion 
regarding non-standard ways of implementing health IT also applies for 
purposes of the Fees Exception. As explained in the Proposed Rule, non-
standard implementation of health IT may arise where an actor chooses 
not to adopt, or to materially deviates from, relevant standards, 
implementation specifications, and certification criteria adopted by 
the Secretary under section 3004 of the PHSA (84 FR 7521). Even where 
no federally adopted or identified standard exists, if a particular 
implementation approach has been broadly adopted in a relevant industry 
segment, deviations from that approach will be suspect unless strictly 
necessary to achieve substantial efficiencies. For further discussion 
regarding our rationale for this provision, as well as specific, non-
exhaustive examples of conduct that would be likely to interfere with 
the access, exchange, or use of EHI, we refer readers to the Proposed 
Rule (84 FR 7521).
Subjective or Speculative Costs
    We proposed to limit this exception to the recovery of costs that 
an actor actually incurred to provide the relevant interoperability 
element or group of elements (which may comprise either products or 
services). We proposed that the exception would not permit the recovery 
of certain types of costs that are subjective or speculative. We noted 
two important examples of this limitation. First, we proposed that an 
actor would not be permitted to recover any costs associated with 
intangible assets (including depreciation or loss of value), other than 
the actual development or acquisition costs of such assets. For 
example, an actor could not charge a customer a fee based on the 
purported ``cost'' of allowing the customer to use the actor's patented 
technology, computer software, databases, trade secrets, copyrighted 
works, and the like. We noted that the customer's use of the asset 
could be considered a ``cost'' in the sense that, were it not for the 
information blocking provision, the actor could charge a royalty or 
other fee for the use of its intangible assets. For this reason we 
proposed to permit an actor to license most interoperability elements 
on reasonable and non-discriminatory terms, subject to certain 
conditions. For purposes of this more general exception, however, we 
explained that it would be inappropriate to permit an actor to charge a 
fee based on these considerations, which are inherently subjective and 
could invite the kinds of rent-seeking and opportunistic pricing 
practices that fall squarely within the definition of information 
blocking. We proposed that an actor's practices could qualify for both 
this exception (Fees Exception) and the Licensing Exception (finalized 
in Sec.  171.303). In that case, the actor could recover costs under 
both exceptions (84 FR 7540).
    Second we stated the exception would not apply to ``opportunity 
costs,'' such as the revenues that an actor could have earned had it 
not provided the interoperability elements. We clarified that the 
exclusion of opportunity costs would not preclude an actor from 
recovering its reasonable forward-looking cost of capital (84 FR 7540).
    Comments. We did not receive any comments on our proposals 
regarding subjective or speculative costs.
    Response. We have finalized this provision as proposed with some 
modifications for clarity. We have modified the provision regarding 
intangible assets in Sec.  171.301(a)(2)(iv) by removing the 
parenthetical that noted that such costs include the depreciation or 
loss of value. The parenthetical was illustrative and was not necessary 
in the regulation text, as it is just one of the many types of 
intangible assets on which a fee must not be based. We have also 
modified the provision regarding opportunity costs in Sec.  
171.301(a)(2)(v) by clarifying that the specific opportunity costs on 
which a fee must not be based are those unrelated to the access, 
exchange, or use of EHI instead of the proposed qualifying language of 
``except for the reasonable forward-looking cost of capital'' (see 84 
FR 7603). We believe this finalized language is clearer than the 
proposed language. In addition, it is more precise than the proposed 
language because it creates a connection to the information blocking 
definition. We note that we proposed these provisions as ``excluded 
costs'' (see 84 FR 7603) but have finalized them within the ``Basis for 
fees condition'' for clarity.
Fee Prohibited by 45 CFR 164.524(c)(4)
    We also proposed that the exception would not apply to fees 
prohibited by 45 CFR 164.524(c)(4). We noted in the Proposed Rule that 
the HIPAA Privacy Rule permits a covered entity to impose a reasonable, 
cost-based fee if the individual requests a copy of the PHI (or agrees 
to receive a summary or explanation of the information). The fee may 
include only the cost of: (1) Labor for copying the PHI requested by 
the individual, whether in paper or electronic form; (2) supplies for 
creating the paper copy or electronic media (e.g., CD or USB drive) if 
the individual requests that the electronic copy be provided on 
portable media; (3) postage, when the individual requests that the 
copy, or the summary or explanation, be mailed; and (4) preparation of 
an explanation or summary of the PHI, if agreed to by the individual 
(45 CFR 164.524(c)(4)). The fee may not include costs associated with 
verification; documentation; searching for and retrieving the PHI; 
maintaining systems; recouping capital for data access, storage, or 
infrastructure; or other costs not listed above even if such costs are 
authorized by State law (84 FR 7540).
    Comments. We received a couple of comments regarding copying fees 
allowed under the HIPAA Privacy Rule. One commenter stated that 
reasonable, cost-based fees for certain costs, consistent with the 
HIPAA Privacy Rule individual access provisions, should not be allowed 
under the exception. One commenter requested that ONC harmonize the 
exception with the HIPAA Privacy Rule provisions that govern the 
charging of fees for electronic copies of medical records.
    Response. We appreciate these comments. We have decided to finalize 
the provision as proposed, which harmonizes this part of the exception 
(Sec.  171.302) with those provisions of the HIPAA Privacy Rule. The 
exception does not apply to fees prohibited by 45 CFR 164.524(c)(4). 
Consistent with the

[[Page 25886]]

HIPAA Privacy Rule's individual access fee implementation 
specification, an actor can charge a reasonable, cost-based fee related 
to certain costs (described above) if a patient requests a copy of her 
records.
Individual Electronic Access
    We proposed that the exception would not apply if the actor charged 
a fee based in any part on the electronic access by an individual or 
their personal representative, agent, or designee to the individual's 
EHI. We stated that such fees are distinguished from the cost-based 
fees that a covered entity is permitted to charge individuals for the 
provision of copies of ePHI under the HIPAA Privacy Rule access 
provisions (45 CFR 164.524(c)(4)), and similar allowable costs under 
State privacy laws, which would not be excluded from the costs 
recoverable under the exception. We clarified that access to EHI that 
is provisioned by supplying some form of physical media, such as paper 
copies (where the EHI is printed out), or where EHI is copied onto a CD 
or flash-drive, would not be a practice that implicated the information 
blocking provision provided that the fee(s) charged for that access 
complied with the HIPAA Privacy Rule access provisions (45 CFR 
164.524(c)(4)) (84 FR 7540).
    We stated that a fee based on electronic access by an individual or 
their personal representative, agent, or designee to the individual's 
EHI, in contrast, would arise if an actor sought to impose on 
individuals, or their personal representatives, agents, or designees, a 
fee that operated as a toll to electronically access, exchange, or use 
EHI. For example, a health care provider that charges individuals a fee 
in order for the individuals to receive access to their EHI via the 
health care provider's patient portal or another internet-based method, 
would not be able to benefit from this exception. Similarly, where an 
individual authorizes (approves) a consumer-facing app to receive EHI 
on the individual's behalf, the exception would not apply to practices 
where an actor charges the app or its developer a fee to access or use 
APIs that enable an individual's access to the individual's EHI. We 
explained that this would be true whether the actor is a supplier of 
the API technology or an individual or entity that has deployed the API 
technology, such as a health care provider (84 FR 7540).
    Comments. Commenters expressed overwhelming support for our 
proposal regarding individual electronic access. Commenters from across 
stakeholder groups emphasized that patients have a fundamental right to 
access their data and should be able to access, exchange, and use their 
EHI at no charge. Commenters emphasized that the EHI belongs to the 
patient, and neither health care providers, EHR developers, nor payers 
should profit from the sale of EHI, as that will only serve to limit 
data transfer, increase health care costs, and adversely affect patient 
care.
    Commenters strongly supported our proposal (within the API 
Condition of Certification) that API fees should not be a barrier in 
allowing patient access to their EHI (see proposed Sec.  170.404 and 84 
FR 7487 through 7491). They stressed that neither individuals nor app 
developers (i.e., API Users) should be charged a fee for API uses that 
are associated with the access, exchange, and use of EHI by patients or 
their applications, technologies, or services. Several commenters 
supported our efforts to bolster patient access, noting that the 
capacity to offer a patient access to EHI, through an API, without 
cost, is well-supported in the Proposed Rule. One commenter requested 
that we differentiate between an individual electronically accessing 
EHI and third parties, at the direction of the individual, 
electronically accessing EHI.
    Response. We thank commenters for the support and have finalized 
this provision as proposed with a slight modification to the text in 
Sec.  171.302(b)(2) and clarification of the meaning of electronic 
access, which we have codified in Sec.  171.302(d). We have reordered 
the language for clarity and, in order to clarify the terms ``agent'' 
and ``designee,'' we have replaced them with ``another person or entity 
designated by the individual.'' These other individuals or entities 
(e.g., a third-party app) receive access to EHI at the direction of the 
individual and individuals control whether the third-party receives 
access to the individual's EHI. This modification is merely a 
clarification of our proposal and is not a substantive change as we 
clearly stated in the Proposed Rule that, as summarized above, this 
exception would not apply to practices where an actor charges the app 
or its developer a fee to access or use APIs that enable access to the 
individual's EHI. Fees can be a method of interfering with the access, 
exchange, and use of EHI, as we have emphasized in the Proposed Rule 
and this final rule. When it comes to an individual's electronic access 
to their EHI, we believe that any fee, whether direct or indirectly 
passed on through a fee charged to a third-party app that the 
individual has chosen to facilitate access to their EHI, could 
interfere with an individual's access and use of their EHI. ONC's 
implementation of the Cures Act is predicated on an understanding that 
access to EHI should not be treated as a commodity that should be 
traded or sold. ONC takes this approach because we view patients as 
having an overwhelming interest in EHI about themselves, and because we 
understand that the true value of EHI can only be realized if it is 
available where and when it is needed, including providing electronic 
access to patients. Patients have already effectively paid for their 
health information, either directly or through their employers, health 
plans, and other entities that negotiate and purchase health care items 
and services on their behalf. We have codified this provision in Sec.  
170.302(b)(2) to not permit ``[a] fee based in any part on the 
electronic access of an individual's EHI by the individual, their 
personal representative, or another person or entity designated by the 
individual.''
    For purposes of the Fees Exception, we define electronic access to 
mean an internet-based method that makes EHI available at the time the 
EHI is requested and where no manual effort is required to fulfill the 
request (Sec.  171.302(d)). We discussed the meaning of ``electronic 
access'' in the Proposed Rule (see 45 FR 7540). We have defined 
``electronic access'' in Sec.  171.302(d) in this final rule consistent 
with the Proposed Rule, including distinguishing it from the methods 
and efforts we cited in the Proposed Rule that we did not consider 
electronic access and for which a fee could be charged (see 45 FR 
7540). We have chosen ``internet-based method'' in lieu of the proposed 
``web-based delivery'' because it more technically aligns with the 
concept we were attempting to convey in the Proposed Rule. Such methods 
would be, as described in part in the Proposed Rule, access via an API, 
patient portal, or other internet-based means. To note, the 2015 
Edition ``view, download, and transmit to 3rd party'' certification 
criterion uses this same concept of ``internet-based'' to convey that 
``patients (and their authorized representatives) must be able to use 
internet-based technology to view, download, and transmit. . . .'' In 
terms of fulfilling a request without manual effort, we clarify that it 
entails the completion of the process where there is no manual effort 
involved to meet the request at the time of the request. To illustrate 
the inverse, we recognize that there are times that manual effort may 
be involved in collating or assembling EHI from various systems in 
response to a request. In such instances, this provision (Sec.  
170.302(b)(2)) would not

[[Page 25887]]

apply to the costs of those efforts because the efforts would not fall 
under the definition of ``electronic access.''
    We reaffirm that this exception would not apply to an actor that 
charges individuals a fee in order for the individuals to receive 
access to their EHI using an internet-based delivery method, including 
where an individual uses consumer-directed technology (e.g., patient-
chosen apps, personal health apps, standalone/untethered personal 
health records (PHR), email) to request and/or receive their EHI. This 
includes sharing it with an entity designated by the individual (e.g., 
allowing individuals to donate/share EHI with a biomedical research 
program of the individual's choice). Practices that involve an actor 
charging an individual (or the individual's personal representative or 
another person or entity designated by the individual) a fee to access, 
exchange, or use their EHI would be inherently suspect and would be 
extremely likely to implicate the information blocking provision. We 
emphasize that practices that do not meet this condition, or any other 
conditions in the Fees Exception, would be subject to case-by-case 
review (unless another exception applies). We further refer readers to 
our discussion of ``interfere with'' or ``interference,'' including 
examples of practices that would likely interfere with access, 
exchange, and use of EHI (section VIII.C.6).
Export and Portability of EHI Maintained in EHR Systems
    We explained in the Proposed Rule that the definition of 
information blocking specifically mentions transitions between health 
IT systems and the export of complete information sets as protected 
forms of access, exchange, and use (see section 3022(a)(2)(C)(i) of the 
PHSA). We noted that in our experience, health care providers 
frequently encounter rent-seeking and opportunistic pricing practices 
in these and other contexts in which they are attempting to export EHI 
from their systems for use in connection with other technologies or 
services that compete with or could reduce the revenue opportunities 
associated with an EHR developer's own suite of products and services. 
We explained that most EHI is currently maintained in EHRs and other 
source systems that use proprietary data models or formats; this puts 
EHR developers in a unique position to block the export and portability 
of EHI for use in competing systems or applications, or to charge rents 
for access to the basic technical information needed to facilitate the 
conversion or migration of data for these purposes. We emphasized that 
our concerns are compounded by the fact that EHR developers rarely 
disclose in advance the fees they will charge for data export and data 
portability services (see 80 FR 62719; 80 FR 16880 and 81).
    For these reasons, we proposed that fees charged for the export, 
conversion, or migration of data from an EHR technology would not 
qualify for this exception unless they also meet two additional 
conditions. First, we proposed that health IT developers of certified 
health IT would, for purposes of the exception, be precluded from 
charging a fee to perform an export of EHI via the capability of health 
IT certified to the proposed 2015 Edition ``EHI export'' certification 
criterion for the purposes of supporting single patient EHI export upon 
a valid request from that patient or a user on the patient's behalf, or 
supporting the export of all EHI when health care provider chooses to 
transition or migrate information to another health IT system. We 
stated that, as part of the ``Assurances'' Condition of Certification, 
health IT developers that produce and electronically manage EHI would 
need to be certified to the criterion and provide the functionality to 
its customers. We stated that fees or limitations associated with the 
use of the ``EHI export'' certification criterion (as distinguished 
from deployment or other costs reasonably incurred by the developer) 
would not receive protection under the exception and may be suspect 
under the information blocking provision (84 FR 7541).
    We clarified that the condition would not preclude a developer from 
charging a fee to deploy the ``EHI export'' certification criterion in 
a health care provider's production environment, or to provide 
additional services in connection with this capability other than those 
reasonably necessary to enable its intended use. For example, we 
explained that this condition would not preclude a developer from 
charging a fee to perform an export of EHI via the capability of health 
IT certified to the proposed Sec.  170.315(b)(10) for a third-party 
analytics company. We noted in the Proposed Rule that, because the 
certification criterion provides only a baseline capability for 
exporting data, we anticipated that health IT developers of certified 
health IT will need to provide other data portability services to 
facilitate the smooth transition of health care providers between 
different health IT systems. We proposed that such fees may qualify for 
protection under the exception, but only if they meet the other 
conditions described above and in proposed Sec.  171.205(a).
    Second, we proposed that the exception would not apply to a fee to 
export or convert data from an EHR technology unless such fee was 
agreed to in writing at the time the technology was acquired, meaning 
when the EHR developer and the customer entered into a contract or 
license agreement for the EHR technology (84 FR 7541).
    Comments. A commenter requested clarification regarding the 
proposal to exclude from the exception costs related to fees to export 
or convert data from an EHR technology, unless such fee was agreed to 
in writing at the time the technology was acquired. The commenter asked 
that ONC clarify if this provision is applicable to export or the 
conversion of EHI from certified health IT or if it is applicable to 
any export or conversion of EHI from any health IT. The commenter also 
requested that ONC clarify if this provision is prospective in nature, 
meaning it would only apply to agreements entered into after the 
effective date of a final rule. The commenter recommended that ONC 
change the focus of this proposal so that it only requires that the 
parties agree in writing that fees of a particular nature may be 
charged for the export of EHI.
    Response. We appreciate this comment. In response to the comment, 
we clarify that this exclusion from the exception is not limited to the 
export of EHI from certified health IT. Instead, this provision applies 
to the export or conversion of any EHI from an actor's technology(ies). 
As we discuss elsewhere in this Final Rule, we interpret the 
information blocking provision broadly such that practices of a health 
IT developer of certified health IT that do not pertain specifically to 
certified health IT may implicate the information blocking provision. 
Consistent with this interpretation of the information blocking 
provision, the exception will not protect practices where an actor 
charges fees to export or convert data from any EHR technology, unless 
such fee was agreed to in writing at the time technology was acquired. 
Further, we clarify that if a fee to export or convert data is not 
subject to this exclusion in Sec.  171.302(b)(4) because it was agreed 
to in writing, it still must meet the other applicable conditions in 
Sec.  171.302 to be covered by the Fees Exception.
    Without this exclusion, actors may seek to take advantage of the 
exception and enable rent-seeking or opportunistic pricing practices. 
Thus, we have decided not to limit the condition so that it only 
requires that the parties

[[Page 25888]]

agree in writing that fees of a particular nature may be charged for 
the export of EHI as suggested by the commenter. Only requiring the 
parties to agree to the fee in writing (without applying the other 
conditions in this exception), may allow an actor to charge an 
unreasonable fee or engage in a practice that is likely to interfere 
with the access, exchange, or use of EHI. While a party may agree to 
pay a fee under specific circumstances, that agreement does not change 
the fact that the fee must be reasonably related to the actor's costs 
or may otherwise interfere with the access, exchange, or use of EHI.
    We have finalized these provisions as proposed with a slight 
modification. We changed the condition from ``A fee to export or 
convert data from an EHR technology, unless such fee was agreed to in 
writing at the time the technology was acquired'' (see 84 FR 7603) to 
``A fee to export or convert data from an EHR technology that was not 
agreed to in writing at the time the technology was acquired'' (Sec.  
171.302(b)(4)). We made this change for clarity based on the change we 
made to the introductory language in the exception, that a practice 
will not be considered information blocking when the practice meets the 
conditions in paragraph (a), does not include any of the excluded fees 
in paragraph (b), and, as applicable, meets the condition in paragraph 
(c). This modification does not change the substance of this condition 
in any way.
Compliance With the Conditions of Certification
    We stated in the Proposed Rule that health IT developers of 
certified health IT subject to the API Condition of Certification may 
not charge certain types of fees and are subject to more specific cost 
accountability provisions than apply generally under this proposed 
exception. We noted that the failure of developers to comply with these 
additional requirements would impose impediments to consumer and other 
stakeholder access to EHI without special effort and would be suspect 
under the information blocking provision. We proposed, therefore, that 
a health IT developer of certified health IT subject to the API 
Condition of Certification must comply with all requirements of that 
condition for all practices and at all relevant times in order to 
qualify for the exception (84 FR 7541).
    We also stated that a health care provider that acts as an API Data 
Provider should be subject to the same constraints. We noted that the 
API Condition of Certification prohibits a health IT developer from 
charging a usage fee to patient-oriented apps. We noted that 
information blocking concerns would arise if a provider were to charge 
such a fee, notwithstanding the fact that the provider is not subject 
to the certification requirements. For this reason, we proposed that, 
if the actor is an API Data Provider, the actor would only be permitted 
to charge the same fees that an API Technology Supplier would be 
permitted to charge to recover costs consistent with the permitted fees 
specified in the Condition of Certification (84 FR 7541).
    Comments. We did not receive comments on these proposals.
    Response. We have finalized the first provision detailed above as 
proposed with a slight modification for clarity. The final provision in 
Sec.  171.302(c) states: Notwithstanding any other provision of this 
exception, if the actor is a health IT developer subject to the 
Conditions of Certification in Sec.  170.402(a)(4), Sec.  170.404, or 
both of this subchapter, the actor must comply with all requirements of 
such conditions for all practices and at all relevant times. We added 
``or both'' into the final language because a health IT developer could 
be subject to both Sec.  170.402(a)(4) and Sec.  170.404 and in such 
instances would be covered by this provision.
    We have removed the second provision detailed above regarding a 
health care provider that acts as an API Data Provider (see the 
Proposed Rule at 84 FR 7603) for clarity, as not all of the permitted 
fees specified in the API Condition of Certification (Sec.  170.404) 
are applicable for API Data Providers.
Application of the Exception to Individual Practices
    We stated in the Proposed Rule that the conditions of this 
exception, including those governing the methodology and criteria by 
which an actor calculates and distributes its costs, must be satisfied 
for each and every fee that an actor charges to a customer, requestor, 
or other person for accessing, exchanging, or using EHI. All applicable 
conditions of the exception must be met at all relevant times for each 
practice (84 FR 7541).
    Comments. We did not receive any comments on this proposed policy.
    Response. We have finalized this policy as proposed.
c. Licensing Exception--When will an actor's practice to license 
interoperability elements in order for electronic health information to 
be accessed, exchanged, or used not be considered information blocking?
    We proposed in the Proposed Rule in Sec.  171.206 to establish an 
exception to the information blocking provision that would permit 
actors to license interoperability elements on reasonable and non-
discriminatory (RAND) terms, provided that certain conditions are met. 
We proposed that the information blocking provision would be implicated 
if an actor were to refuse to license or allow the disclosure of 
interoperability elements to persons who require those elements to 
develop and provide interoperable technologies or services--including 
those that might complement or compete with the actor's own technology 
or services (84 FR 7544). Moreover, we proposed that the information 
blocking provision would be implicated if the actor licensed such 
interoperability elements subject to terms or conditions that have the 
purpose or effect of excluding or discouraging competitors, rivals, or 
other persons from engaging in these pro-competitive and 
interoperability-enhancing activities. Thus, we proposed the Licensing 
Exception would apply in both vertical and horizontal relationships and 
provided an example emphasizing that point in the Proposed Rule (see 84 
FR 7544).
    We noted in the Proposed Rule that some licensees do not require 
interoperability elements to develop products or services that can be 
interoperable with the actor's health IT. We explained that there may 
be firms that simply want to license the actor's technology for use in 
developing their own interoperability elements. Their interest would be 
for access to the technology itself--not for the use of the technology 
to interoperate with either the actor or its customers to enable the 
access, exchange, or use of EHI. We emphasized that in such cases, the 
actor's licensing of its intellectual property (IP) in such a context 
would not implicate the information blocking provision (in other words, 
would not be in scope for information blocking). For a non-exhaustive 
list of examples of situations that would implicate the information 
blocking provision, see the Proposed Rule (84 FR 7544-45).
    In our experience, contractual and IP rights are frequently used to 
extract unreasonable rents for access to EHI or to prevent competition 
from developers of interoperable technologies and services. These 
practices frustrate access, exchange, and use of EHI and stifle 
competition and innovation in the health IT sector. As a case in point, 
we noted in the Proposed Rule that even following the enactment of the 
Cures Act, some health IT developers had been selectively prohibiting--
whether expressly or through commercially unreasonable terms--the 
disclosure or

[[Page 25889]]

use of technical interoperability information required for third-party 
applications to access, exchange, and use EHI maintained in EHR 
systems. We noted that such practices limit health care providers' use 
of the EHI maintained on their behalf to the particular capabilities 
and use cases that their EHR developer happens to support. More than 
this, by limiting the ability of providers to choose what applications 
and technologies they can use with their EHR systems, we indicated that 
these practices close off the market to innovative applications and 
services that providers and other stakeholders need to deliver greater 
value and choice to health care purchasers and consumers (84 FR 7545).
    Despite these serious concerns, we recognized in the Proposed Rule 
that the definition of information blocking may be broader than 
necessary and could have unintended consequences. We proposed that it 
is generally appropriate for actors to license their IP on RAND terms 
that do not interfere with access, exchange, or use of EHI provided 
certain conditions were met. We explained that these practices would 
further the goals of the information blocking provision by allowing 
actors to protect the value of their innovations and earn returns on 
the investments made to develop, maintain, and update those 
innovations. We explained that this would protect future incentives to 
invest in, develop, and disseminate interoperable technologies and 
services. Conversely, we explained that if actors cannot (or believe 
they cannot) protect and commercialize their innovations, they may not 
engage in these productive activities that improve access, exchange, 
and use of EHI (84 FR 7545).
    We proposed that the exception would be subject to strict 
conditions to ensure, among other things, that actors license 
interoperability elements on RAND terms and that actors do not impose 
collateral terms or engage in other practices that would impede the use 
of the interoperability elements or otherwise undermine the intent of 
the exception (84 FR 7545). We acknowledged that preventing IP holders 
from extracting rents for access to EHI may differ from standard IP 
policy. We proposed that absent specific circumstances, IP holders are 
generally free to negotiate with prospective licensees to determine the 
royalty to practice their IP, and this negotiated royalty frequently 
reflects the value the licensee would obtain from exercising those 
rights. However, in the context of EHI, we proposed that a limitation 
on rents is essential due to the likelihood that rents will frustrate 
access, exchange, and use of EHI, particularly because of the power 
dynamics that exist in the health IT market (84 FR 7545).
    We also emphasized that actors are not required to seek the 
protection under this (or any other) exception. We explained that if an 
actor does not want to license a particular technology in accordance 
with the exception, it may choose to comply with the information 
blocking provision in another way, such as by developing and providing 
alternative means of accessing, exchanging, and using EHI that are 
similarly efficient and efficacious (84 FR 7545).
    Comments. We received many comments in support of this proposed 
exception. One commenter highlighted the significance of the exception, 
noting that data is often locked in proprietary software systems, at 
times preventing providers from being able to connect and exchange 
information. Some commenters requested additional examples and that ONC 
issue guidance to assist actors in understanding how they can determine 
whether a request to license is valid, when this exception would apply, 
and what steps actors would be required to take to attain coverage 
under the exception. A couple of commenters suggested that there should 
be a distinction between requests to license interoperability elements 
to facilitate a patient's treatment or individual access versus 
requests that are simply for the requestor's own business purposes, 
such as commercializing a competing product. A couple of commenters 
requested additional provisions in the final rule to improve 
transparency regarding licensing of interoperability elements. 
Commenters recommended that ONC require regulated actors who engage in 
RAND licensing of interoperability elements to publish either standard 
licensing rate offers or actual licenses.
    Response. We thank commenters for their support for this exception 
as well as the constructive feedback. We may consider developing 
materials in the future regarding the application of the exceptions 
should the need arise. However, we believe the final rule clearly 
describes the conditions actors must meet in order to be covered by 
each exception, and informational materials are not necessary at this 
time.
    We appreciate the comments that recommended that there should be a 
distinction between requests for licensing of interoperability elements 
to facilitate a patient's treatment or individual access versus 
requests that are simply for the requestor's own business purposes. We 
emphasize that we made such a distinction in the Proposed Rule and we 
reiterate that distinction here in the final rule. In order for an 
actor to consider licensing its interoperability elements under this 
exception, the requestor would need to have a claim to the underlying, 
existing EHI for which the interoperability element would be necessary 
for access, exchange, or use (see the Privacy Exception discussion in 
VIII.D.1.b). An actor will not implicate the information blocking 
provision and does not need to seek coverage under this exception in 
circumstances where the entity requesting to license or use the 
interoperability element is not seeking to use the interoperability 
element to interoperate with either the actor or the actor's customers 
in order for EHI to be accessed, exchanged, or used. For instance, an 
actor would not need to consider licensing its interoperability 
elements in accordance with this exception to a firm that requested a 
license solely for that firm's use in developing its own technologies 
or business when no EHI is sought to be accessed, exchanged, or used. 
In other words, if there is no nexus between a requestor's need to 
license an interoperability element and existing EHI on one or more 
patients, an actor does not need to consider licensing the 
interoperability element requested in accordance with this exception. 
For example, if a developer of certified health IT included proprietary 
APIs in its product to support referral management, it would not need 
to license the interoperability element(s) associated with those 
referral management APIs simply because a requestor ``knocked on the 
actor's door'' and asked for a license with no EHI involved. The 
license request from a requestor must always be based on a need to 
access, exchange, or use EHI at the time the request is made--not on 
the requestor's prospective intent to access, exchange, or use EHI at 
some point in the future.
    We appreciate the recommendation that ONC should require regulated 
actors who license interoperability elements to publish either standard 
licensing rate offers or actual licenses. However, we have decided not 
to finalize such a requirement because we believe actors should have 
discretion to decide whether to publish their licensing rates and/or 
licenses. We believe this exception will still effectively regulate the 
licensing of interoperability elements even if it does not require the 
publication of such rates and licenses. Nonetheless, we commend

[[Page 25890]]

commenters' desire to enhance transparency in the final rule and will 
continue to consider steps to further promote transparency regarding 
our information blocking policies in future rulemakings.
    We note that we have changed the title of this exception from 
``Exception--Licensing of interoperability elements on reasonable and 
non-discriminatory terms'' to ``When will an actor's practice to 
license interoperability elements in order for electronic health 
information to be accessed, exchanged, or used not be considered 
information blocking?'' Throughout this final rule preamble, we use 
``Licensing Exception'' as a short form of this title, for ease of 
reference. As stated in Section VIII.D of this final rule preamble, we 
have changed the titles of all of the exceptions to questions to 
improve clarity. We have also edited the wording of the introductory 
text in Sec.  171.303, in comparison to that proposed (84 FR 7602), so 
that it is consistent with the finalized title in Sec.  171.303. We 
believe these conforming changes in wording of the introductory text 
also improve clarity in this section.
    Comments. We received many comments requesting greater clarity and 
precision regarding key terms within the proposed exception in order to 
clarify the scope and application of the exception.
    Response. We appreciate these comments and agree with commenters 
that it is essential that our final policies are clear, administrable, 
and actionable. Accordingly, we have made several updates to this 
exception as well as to terms and concepts that apply broadly 
throughout the information blocking section. Notably, we have: (1) 
Revised the definition of interoperability element (see section 
VIII.C.3.b); (2) clarified the process and timeframe for negotiating a 
license (see the discussion later in this section of the preamble); (3) 
removed the ``RAND'' framework, which commenters noted was confusing 
(see the discussion later in this section of the preamble); and (4) 
clarified the relationship between this exception and the Fees 
Exception (see Sec.  171.302 and the discussion later in this section 
of the preamble).
    Comments. A few commenters requested clarification regarding 
whether the information blocking provision, and particularly this 
exception, applies to all licensing agreements already in effect; only 
licensing agreements that were entered into following the effective 
date of the Cures Act; or only those licensing agreements entered into 
after the effective date of ONC's final rule. Commenters recommended 
that licensing agreements that were entered into prior to the effective 
date of the final rule should be considered valid and effective. 
Commenters also recommended that all negotiations and licensing 
agreements entered into after the effective date of ONC's final rule 
should comply with the requirements of the final rule. Commenters 
requested that if ONC plans to enforce provisions of the final rule 
retroactively, ONC should allow actors to review and renegotiate 
licensing agreements for compliance with the terms at the request of 
the licensee.
    Response. We thank commenters for these comments. We emphasize that 
actors are expected to be in full compliance with the information 
blocking provision when this rule becomes effective. We note that the 
information blocking section of this final rule (part 171) will not 
become effective until 6 months after the publication date of the final 
rule. We believe this delayed compliance date will provide actors with 
adequate time to assess their existing licensing contracts or 
agreements and make appropriate changes and amendments to comply with 
this final rule.
    OIG and ONC are coordinating timing of the compliance date of the 
information blocking section of this final rule (45 CFR part 171) and 
the start of information blocking enforcement. We are providing the 
following information on timing for actors. Enforcement of information 
blocking CMPs in section 3022(b)(2)(A) of the PHSA will not begin until 
established by future notice and comment rulemaking by OIG. As a 
result, actors would not be subject to penalties until CMP rules are 
final. At a minimum, the timeframe for enforcement would not begin 
sooner than the compliance date of this final rule and will depend on 
when the CMP rules are final. Discretion will be exercised such that 
conduct that occurs before that time will not be subject to information 
blocking CMPs.
    We are aware that some actors may currently have in place licensing 
agreements that contravene the information blocking provision and do 
not meet the requisite conditions for this exception. We expect actors 
in these situations to take immediate steps to come into compliance 
with the information blocking provision by amending their contracts or 
agreements to eliminate or void any clauses that contravene the 
information blocking provision. We emphasize that an existing license 
is no excuse or justification for information blocking. One of the ways 
we have heard that actors interfere with the access, exchange, and use 
of EHI is through formal restrictions, such as discriminatory licensing 
agreements, and this final rule, as well as this exception, seek to 
address those very circumstances and situations.
    Comments. One commenter expressed concern about this exception on 
privacy and security grounds. The commenter noted that a proliferation 
of EHI to a multitude of entities who have not and cannot be vetted is 
likely to increase the risks to the privacy and security of such data 
and create secondary and tertiary markets for such data without clear 
regulation and oversight.
    Response. We appreciate this comment and understand that the 
secondary use of data creates privacy and security challenges in the 
health care industry and beyond. We refer readers to section VIII.C.6 
of this preamble for a detailed discussion of how we are addressing 
this issue in this rule.
i. Responding to Requests
    We proposed that, upon receiving a request to license or use 
interoperability elements, an actor would be required to respond to the 
requestor within 10 business days from receipt of the request. We noted 
that the request could be made to ``license'' or ``use'' the 
interoperability elements because a requestor may not always know that 
``license'' is the legal mechanism for ``use'' when making the request 
(84 FR 7546).
    In order to meet this condition, we proposed that the actor would 
be required to respond to the requestor within 10 business days from 
the receipt of the request by: (1) Negotiating with the requestor in a 
RAND fashion to identify the interoperability elements that are needed; 
and (2) offering an appropriate license with RAND terms, consistent 
with its other obligations under the exception. We emphasized that, in 
order to qualify for the proposed exception, the actor would only be 
required to negotiate with the requestor in a RAND fashion and to offer 
a license with RAND terms. We proposed that the actor would not be 
required to grant a license in all instances. We did not propose a set 
timeframe for when the negotiations must be resolved (84 FR 7546).
    We requested comment on whether 10 business days is an appropriate 
amount of time for the actor to respond to the requestor. We noted that 
we considered proposing response timeframes ranging from 5 business 
days to 15 business days. We also considered proposing two separate 
timeframes for: (1) Negotiating

[[Page 25891]]

with the requestor; and (2) offering the license. We stated that if 
commenters prefer a different response timeframe or approach than 
proposed, we requested that commenters explain their rationale with as 
much detail as possible. In addition, we requested comment on whether 
we should create set limits for: (1) The amount of time the requestor 
has to accept the actor's initial offer or make a counteroffer; (2) if 
the requestor makes a counteroffer, the amount of time the actor has to 
accept the requestor's counteroffer or make its own counteroffer; and 
(3) an allowable number of counteroffers in negotiations (84 FR 7546).
    Comments. We received many comments regarding the proposed 
framework and timeframe for responding to requests to license or use 
interoperability elements. Some commenters were supportive of our 
proposal and stated that 10 business days is an appropriate amount of 
time for the actor to respond to the requestor. Other commenters 
disagreed with the proposed timeframe, explaining that 10 business days 
is insufficient time to begin a license negotiation. Commenters 
suggested various alternate timeframes ranging from 20 to 90 business 
days. One commenter requested that ONC consider differentiating the 
timeline expected for making an offer predicated on an interoperability 
element being available as an existing capability, as opposed to an 
interoperability element requiring new formal licensure or requiring 
one off ``custom'' or ``spec'' development. Another commenter 
recommended that the process be divided into a series of steps with a 
requirement that a request for information be acknowledged and 
negotiations begin within 10 business days and completed within 20 
business days. One commenter recommended that the 10-day timeframe be 
for beginning negotiations with the intent to furnish a quotation for a 
license. Some commenters stated that timeframes should not be set, as 
the license negotiation process is highly variable based on the 
specific requestor and circumstances. One commenter expressed concern 
that the proposed exception would increase the administrative burden on 
covered entities, particularly regarding the response timeframe and the 
actor's inability to review and/or vet the appropriateness of a request 
before responding.
    Response. We thank commenters for these thoughtful comments. To be 
responsive to comments, we have updated the response and license 
negotiation framework and timeframe. The finalized provision in Sec.  
171.303(a) states that, upon receiving a request to license an 
interoperability element for the access, exchange, or use of EHI, the 
actor must: (1) Begin license negotiations with the requestor within 10 
business days from receipt of the request (Sec.  171.303(a)(1)); and 
(2) negotiate a license with the requestor, subject to the licensing 
conditions in paragraph (b) of the exception, within 30 business days 
from receipt of the request (Sec.  171.303(a)(2)). We note that the 
expectation in (2) above is that the actor will negotiate with the 
requestor in good faith. If it is determined that the negotiation is 
not in good faith, the actor would not qualify for this exception. 
These provisions create a clear and administrable timeline for actors 
to follow that is informed by stakeholder comments and will reduce 
potential burden on actors. Further, it provides actors with 
appropriate flexibility for negotiating a good faith license, taking 
into consideration the potential complexity and variability associated 
with negotiations for licensing interoperability elements.
    In instances when an actor is unable to negotiate a good faith 
license subject to the requirements in Sec.  171.303(a)(2), the actor 
may not meet the conditions of this exception. As part of an 
information blocking investigation, ONC and OIG may consider 
documentation or other writings maintained by the actor around the time 
of the request that indicate why the actor was unable to meet the 
conditions. This would not permit the actor to be covered by this 
exception, but discretion in determining whether to enforce the 
information blocking provision may be exercised.
    We note that we have revised paragraph Sec.  171.303(a) by changing 
``a request to license or use'' to ``a request to license'' for 
clarity. We emphasize, however, that this change does not alter the 
meaning or application of the provision. We reiterate, as we proposed, 
that the request could be made to ``license'' or ``use'' the 
interoperability elements because a requestor may not always know that 
``license'' is the legal mechanism for ``use'' when making the request 
(see 84 FR 7546). We believe it is unnecessary to include ``or use'' in 
the regulation text because actors should know that a request to 
``use'' would be synonymous with a request to ``license'' and would 
thus be covered by this exception. Further, the inclusion of ``or use'' 
could be confusing since ``use'' is a defined term in the context of 
``access, exchange, or use'' of EHI, but would carry different meaning 
in the context of ``using'' an interoperability element, as opposed to 
``using'' EHI.
ii. Licensing Conditions
    We proposed to require, as a condition of this exception, that any 
terms upon which an actor licenses interoperability elements must be 
reasonable and non-discriminatory (RAND). We recognized in the Proposed 
Rule that strong legal protections for IP rights can promote 
competition and innovation. Nevertheless, IP rights can also be abused 
in ways that undermine these goals. We explained that we believe this 
potential for abuse is heightened when the IP rights pertain to 
functional aspects of technology that are essential to enabling 
interoperability. We emphasized that to the extent that the 
interoperability elements are essential to enable the efficient access, 
exchange, or use of EHI by particular persons or for particular 
purposes, any practice by the actor that could impede the use of the 
interoperability elements for that purpose--or that could unnecessarily 
increase the cost or other burden of using the elements for that 
purpose--would give rise to an obvious risk of interference with 
access, exchange, or use of EHI under the information blocking 
provision (84 FR 7546).
    We explained that our goal was to balance the need for IP 
protections with the need to ensure that this proposed exception does 
not permit actors to abuse their IP or other proprietary rights in 
inappropriate ways that would block the development, adoption, or use 
of interoperable technologies and services. The abuse of IP rights in 
such ways is incompatible with the information blocking provision, 
which protects the investments that taxpayers and the health care 
industry have made to adopt technologies that will enable the efficient 
sharing of EHI to benefit consumers and the health care system. We 
emphasized that while actors are entitled to protect and exercise their 
IP rights, to benefit from the exception to the information blocking 
provision they must do so on terms that do not undermine these efforts 
and prevent the appropriate flow of EHI. We proposed that these 
requirements would apply to both price terms (such as royalties and 
license fees) and other terms, such as conditions or limitations on 
access to interoperability elements or the purposes for which they can 
be used (see 84 FR 7546).
    Comments. Several health IT developers strongly disagreed with the 
framework and conditions of this exception. These commenters stated 
that compulsory licensing of health IT on RAND terms is inconsistent 
with the usual use of RAND with regards to

[[Page 25892]]

standards development. The commenters opined that the proposed 
exception is a significant overstep that exceeds Congressional intent 
in the Cures Act and would have a detrimental effect on innovation in 
the industry. Commenters stated that IP rights would not be adequately 
protected under the exception, as the exception would allow 
unprecedented access to IP, and requested that ONC better protect IP 
rights in the final rule. One commenter recommended that ONC make clear 
that there are other ways for actors to be in compliance with the 
information blocking provision besides licensing interoperability 
elements to all.
    Response. We appreciate these comments. Responsive to these 
comments, we have removed all references to ``RAND.'' However, we have 
finalized the majority of the substantive conditions for the licensing 
of interoperability elements under this exception (Sec.  171.303(b)) as 
proposed (i.e., the sections on scope of rights, reasonable royalty, 
non-discriminatory terms, collateral terms, and non-disclosure 
agreement), with slight modifications discussed below.
    In response to comments regarding compulsory licensing, we 
emphasize that we do not view this exception as constituting compulsory 
licensing. Each exception is voluntary and actors may choose whether or 
not they want to seek coverage under an exception. The exceptions 
operate to the benefit of actors and are intended to provide actors 
with certainty that certain practices that would normally constitute 
information blocking will not be considered information blocking, 
provided the actor's practice meets the conditions of the exception. 
The fact that a practice to license interoperability elements does not 
meet the conditions of an exception does not mean that the practice 
would necessarily constitute information blocking. As a result, 
practices that do not meet the exception will have to be reviewed on a 
case-by-case basis in order to assess the specific facts and 
circumstances and to determine, for example, the actor's intent and 
whether the practice rises to the level of an interference.
    In addition, under the Content and Manner Exception (Sec.  
171.301), we establish that an actor is not required to respond to a 
request to access, exchange, or use EHI in the manner requested if the 
actor would be required to license IP and cannot reach agreeable terms 
for the license with the requestor (Sec.  171.301(b)(1)(ii)). This 
provision allows actors who do not want to license their IP to respond 
in an alternative manner that does not require the licensing of 
proprietary IP. Further, if the actor chooses to respond in the manner 
requested, and such manner requires the licensing of an 
interoperability element(s), the actor could license the 
interoperability elements(s) with whatever terms the actor chooses, so 
long as the actor is able to reach agreeable terms with the requestor. 
We refer readers to the discussion in the Content and Manner Exception 
in VIII.D.2.a, which highlights how the Content and Manner Exception 
supports an actor's ability to protect their IP.
    We understand and appreciate that health IT developers and other 
entities have invested significant resources to innovate and our 
policies aim to support these innovations and advancements regarding 
the access, exchange, and use of EHI. We stress that this exception was 
drafted with innovation in mind and operates to benefit health IT 
developers and other actors by allowing them to obtain remuneration for 
their IP. The Cures Act did not create a specific carve out to the 
information blocking provision for IP rights, but did provide HHS with 
the authority to establish reasonable and necessary exceptions that do 
not constitute information blocking. We interpret the definition of 
information blocking in the Cures Act (section 3022(a) of the PHSA) to 
encompass any fee that materially discourages or otherwise inhibits the 
access, exchange, or use of EHI, so long as the actor has the requisite 
intent in the statute. Thus, without clarifying this exception, an 
actor could implicate the information blocking provision whenever it 
charged any royalty to license its interoperability elements. We 
believe this broad interpretation of the information blocking provision 
would have a detrimental effect of innovation, competition, and 
consumer welfare. As such, we established this exception to provide 
assurances to actors that licensing of interoperability elements for 
access, exchange, or use will not be considered information blocking, 
so long as the actor's practice meets all conditions in the exception. 
We reiterate that the actor would also need to have the requisite 
intent, as set forth in the statute. We emphasize that actors are able 
to make reasonable profits from the licensing of interoperability 
elements, so long as such profits comply with the ``reasonable 
royalty'' provision in this exception in Sec.  171.303(b)(2). We also 
note that the non-disclosure agreement provision in Sec.  171.303(b)(5) 
establishes additional IP protections.
    We emphasize that, in the context of information blocking, control 
of interoperability elements is often a proxy for control of access, 
exchange and use of EHI. For example, where EHI is stored in a 
proprietary format, the EHI cannot be accessed or used if information 
about the proprietary format does not accompany the EHI. Similarly, 
when EHI is stored electronically, a technological solution must exist 
to make the EHI available for use by others. We clarify that health IT 
developers are not required to license all of their IP. As discussed 
earlier in this section, an actor would not need to seek coverage under 
this exception if the actor's practice is not likely to interfere with 
the access, exchange, or use of actual EHI. Thus, an essential element 
of the information blocking provision is that there is actual EHI at 
stake. Further, as discussed above, there would also need to be a nexus 
between a requestor's need to license an interoperability element and 
the existing EHI. If there is not such a nexus, the actor would not 
need to seek coverage under this exception (see the Privacy Exception 
discussion in VIII.D.1.b).
    We clarify that, if an actor licenses an interoperability element 
to one requestor, the actor must license that same interoperability 
element to future similarly situated requestors with the same terms. 
Once an actor has granted a license for a particular interoperability 
element, an actor cannot choose to license an interoperability element 
to one requestor and then refuse or use different terms to license the 
same interoperability element to a second similarly situated requestor, 
even if the actor offers to provide the EHI via an alternative manner 
in accordance with the Content and Manner Exception in Sec.  171.301. 
In other words, an actor cannot pick and choose who can license a given 
interoperability element or who gets favorable license terms based on 
the actor's relationship with the requestor.
    Comments. A couple of commenters noted that there is a wide-
spectrum of perspectives among stakeholders of common license agreement 
terms such as limitations on liability and indemnification, which may 
make reasonableness and non-discriminatory aspects challenging to 
interpret.
    Response. We appreciate these concerns and understand that there is 
the potential for significant variability in the terms included in 
license agreements, particularly for licensing interoperability 
elements. We believe the conditions adopted in this final exception are 
clear, equitable, and implementable. We emphasize that each information 
blocking case will turn on its own unique facts and circumstances.

[[Page 25893]]

This fact-based approach is appropriate for this exception particularly 
due to the potential variability in interoperability elements and 
licensing terms noted by the commenters.
Scope of Rights
    To qualify for the proposed exception, we proposed that the actor 
must license the requested interoperability elements with all rights 
necessary to access and use the interoperability elements for the 
following purposes, as applicable:
     All rights necessary to access and use the 
interoperability elements for the purpose of developing products or 
services that are interoperable with the actor's health IT or with 
health IT under the actor's control and/or any third party who 
currently uses the actor's interoperability elements to interoperate 
with the actor's health IT or health IT under the actor's control. 
These rights would include the right to incorporate and use the 
interoperability elements in the licensee's own technology to the 
extent necessary to accomplish this purpose.
     All rights necessary to market, offer, and distribute the 
interoperable products and services described above to potential 
customers and users, including the right to copy or disclose the 
interoperability elements as necessary to accomplish this purpose.
     All rights necessary to enable the use of the 
interoperable products or services in production environments, 
including using the interoperability elements to access and enable the 
exchange and use of EHI (84 FR 7546 and 7547).
    We requested comment on whether these rights are sufficiently 
inclusive to support licensees in developing interoperable 
technologies, bringing them to market, and deploying them for use in 
production environments. We also requested comment on the breadth of 
these required rights and if they should be subject to any limitations 
that would not interfere with the uses we have described above (84 FR 
7547).
    Comments. We received a couple of comments regarding the scope of 
rights under this exception. One commenter recommended that ONC specify 
that actors can require that licensees of the proprietary IP embodied 
in an interoperability element use that IP only for the licensed 
purpose, or ONC should allow actors to decline to license that IP at 
all. One commenter suggested that we broaden the scope of rights 
regarding the development of products or services that are 
interoperable so that interoperability does not need to be tied to the 
actor's health IT, health IT under the actor's control, or any third 
party who currently uses the actor's interoperability elements to 
interoperate with the actor's health IT or health IT under the actor's 
control.
    Response. We thank commenters for these thoughtful comments. We 
have streamlined the ``scope of rights'' section of this exception for 
clarity and to align with the overarching goal throughout the 
information blocking section of enabling the access, exchange, and use 
of EHI. The finalized ``scope of rights'' section in Sec.  
171.303(c)(1) states that the license must provide all rights necessary 
to: (1) Enable the access, exchange, or use of EHI; and (2) achieve the 
intended access, exchange, or use of EHI via the interoperability 
element(s). These rights replaced the rights we proposed in the ``scope 
of rights'' section (see proposed Sec.  171.206(b)(1)(i)-(iii) and 84 
FR 7546 and 7547) because they more clearly and succinctly explain the 
scope of rights we were trying to convey in the Proposed Rule. The 
proposed scope of rights included examples that are not necessary in 
the regulatory text.
    Regarding the comment that we should specify that actors can 
require that licensees of the proprietary IP embodied in an 
interoperability element use that IP only for the licensed purpose, or 
ONC should allow actors to decline to license that IP at all, we 
clarify that actors may require that licensees of the proprietary IP 
embodied in an interoperability element only use that IP for the 
licensed purpose, so long as such limits are in compliance with all the 
conditions in Sec.  171.303, including the scope of rights provisions 
in Sec.  171.303(c)(1). For instance, an actor could place a limitation 
in the license that the license only covers a one-time use of the 
interoperability element for accessing and exchanging certain EHI. In 
this scenario, this limitation could be allowed under the exception if: 
(1) Despite the limitation, the licensee's request for access, 
exchange, or use of EHI is met; and (2) the limitation complies with 
the conditions in Sec.  171.303. Similarly, if an app developer 
requests to license a health IT developer's interoperability element in 
order to enable the exchange of EHI by integrating the app developer's 
CDS software into Provider A's EHR, the health IT developer could scope 
the rights in the license to restrict the app developer from using the 
license to complete the same integration for Provider B, so long as the 
license complies with the conditions in Sec.  171.303. We also 
emphasize that under the Content and Manner Exception (Sec.  171.301), 
actors are decline to license their proprietary IP so long as they are 
able to respond to the request to access, exchange, or use EHI through 
an alternative manner specified in Sec.  171.301(b)(2)(ii)(A)-(C).
    We have decided not to broaden the scope of rights regarding the 
development of products or services that are interoperable as suggested 
by the commenter because we believe this provision, as proposed, is 
appropriately tailored to addresses information blocking and should be 
focused on health IT under the actor's control or any third party who 
currently uses the actor's interoperability elements to interoperate 
with health IT under the actor's control.
Reasonable Royalty
    As a condition of this exception, we proposed that if an actor 
charges a royalty for the use of interoperability elements, the royalty 
base and rate must be reasonable. Importantly, we proposed that the 
reasonableness of any royalties would be assessed solely on the basis 
of the independent value of the actor's technology to the licensee's 
product, not on any strategic value stemming from the actor's control 
over essential means of accessing, exchanging, or using EHI (84 FR 
7547).
    In evaluating the actor's assertions and evidence that the royalty 
was reasonable, we proposed that ONC may consider the following 
factors:
     The royalties received by the actor for the licensing of 
the proprietary elements in other circumstances comparable to RAND-
licensing circumstances.
     The rates paid by the licensee for the use of other 
comparable proprietary elements.
     The nature and scope of the license.
     The effect of the proprietary elements in promoting sales 
of other products of the licensee and the licensor, taking into account 
only the contribution of the elements themselves and not of the 
enhanced interoperability that they enable.
     The utility and advantages of the actor's interoperability 
element over the existing technology, if any, that had been used to 
achieve a similar level of access, exchange, or use of EHI.
     The contribution of the elements to the technical 
capabilities of the licensee's products, taking into account only the 
value of the elements themselves and not the enhanced interoperability 
that they enable.
     The portion of the profit or of the selling price that may 
be customary in the particular business or in comparable businesses to 
allow for the use of the proprietary elements or analogous

[[Page 25894]]

elements that are also covered by RAND commitments.
     The portion of the realizable profit that should be 
credited to the proprietary elements as distinguished from non-
proprietary elements, the manufacturing process, business risks, 
significant features or improvements added by the licensee, or the 
strategic value resulting from the network effects, switching costs, or 
other effects of the adoption of the actor's technology.
     The opinion testimony of qualified experts.
     The amount that a licensor and a licensee would have 
agreed upon (at the time the licensee began using the elements) if both 
were considering the RAND obligation under the exception and its 
purposes, and had been reasonably and voluntarily trying to reach an 
agreement (84 FR 7547).
    We noted that these factors mirror those used by courts that have 
examined the reasonableness of royalties charged pursuant to a 
commitment to a standards developing organization to license standard-
essential technologies on RAND terms (see Microsoft Corp. v. Motorola, 
Inc.; \187\ In re Innovatio IP Ventures, LLC Patent Litig.; \188\ and 
Realtek Semiconductor Corp. v. LSI Corp. \189\ ). We noted, however, 
that we adapted the factors to the information blocking context (84 FR 
7547).
---------------------------------------------------------------------------

    \187\ Case No. 10-cv-1823 JLR, 2013 WL 2111217 (W.D.Wash. Apr. 
25, 2013).
    \188\ MDL 2303, 2013 WL 5593609 (N.D.Ill. Oct. 3, 2013).
    \189\ Case No. 5:12-cv-03451-RMW, 2014 WL 46997 (N.D.Cal. Jan. 
6, 2014).
---------------------------------------------------------------------------

    We proposed that the RAND inquiry should focus on whether the 
royalty demanded by the actor represents the independent value of the 
actor's proprietary technology. We proposed that if the actor has 
licensed the interoperability element through a standards developing 
organization in accordance with such organization's policies regarding 
the licensing of standards-essential technologies on RAND terms, the 
actor may charge a royalty that is consistent with such policies. We 
proposed that we would ask whether the actor is charging a royalty that 
is not based on the value of its technology (embodied in the 
interoperability elements) but rather includes the strategic value 
stemming from the adoption of that technology by customers or users. We 
proposed that we would consider the technical contribution of the 
actor's interoperability elements to the licensee's products--such as 
any proprietary capabilities or features that the licensee uses in its 
product--but would screen out any functional aspects of the actor's 
technology that are used only to establish interoperability and enable 
EHI to be accessed, exchanged, and used. Additionally, we proposed that 
to address the potential risk of royalty stacking, we would need to 
consider the aggregate royalties that would apply if owners of other 
essential interoperability elements made royalty demands of the 
implementer. Specifically, we proposed that, to qualify for the 
exception, the actor must grant licenses on terms that are objectively 
commercially reasonable taking into account the overall licensing 
situation, including the cost to the licensee of obtaining other 
interoperability elements that are important for the viability of the 
products for which it is seeking to license interoperability elements 
from the actor (84 FR 7547 and 7548).
    We clarified that this condition would not preclude an actor from 
licensing its interoperability elements pursuant to an existing RAND 
commitment to a standards developing organization. We also noted that, 
in addition to complying with the requirements described above, to meet 
this proposed condition, any royalties charged must meet the condition, 
proposed separately below, that any license terms be non-discriminatory 
(84 FR 7548).
    We requested comment on these aspects of the proposed exception. We 
encouraged commenters to consider, in particular, whether the factors 
and approach we described will be administrable and appropriately 
balance the unreasonable blocking by actors of the use of essential 
interoperability elements with the need to provide adequate assurance 
to investors and innovators that they will be able to earn a reasonable 
return on their investments in interoperable technologies. Further, we 
noted that if our proposed approach did not adequately balance these 
concerns or would not achieve our stated policy goals, we asked that 
commenters suggest revisions or alternative approaches. We asked that 
such comments be as detailed as possible and provide rigorous economic 
justifications for any suggested revisions or alternative approaches 
(84 FR 7548).
    Comments. We received many comments regarding reasonable royalties 
and the ability of actors to make a profit. Some commenters supported 
the proposed framework. A couple of commenters recommended that we not 
allow any royalty for licensing interoperability elements. One of those 
commenters suggested we require ``RAND-Zero'' licensing, by which the 
copyright holder may still impose non-discriminatory licensing terms on 
the licensee but may not charge a royalty. The commenter also expressed 
concern that the overlap between this exception and the exception for 
recovering costs reasonably incurred creates the potential for actors 
to earn a double recovery. The commenter explained that licensing of IP 
is intended to recoup the costs of development of that IP, so where the 
IP is an interoperability element, the costs reasonably incurred for 
its development should be incorporated into the royalty rate. The 
commenter recommended that we be clearer that in these circumstances, 
only a single recovery is permitted. Provider and registry 
organizations were concerned that the ability to charge reasonable 
royalties to license interoperability elements may present an opening 
for health IT developers to charge unreasonably high fees for 
exchanging information with provider groups and registries. As such, 
the commenters recommended that ONC require actors to disclose the 
methodology behind their fees.
    Alternatively, other commenters, consisting primarily of health IT 
developers, expressed concern that the proposals regarding reasonable 
royalties were too restrictive. Commenters were concerned that the 
exception, as proposed, would have a detrimental effect on innovation 
in the industry as it provides disincentives for established companies 
to develop new, forward-leaning solutions. A few commenters recommended 
that the value of the actor's technology must be constructed on a 
``fair market'' basis. Commenters stated that ONC should not set or 
determine the reasonableness of royalties. However, if ONC decided to 
set or define the reasonableness of royalties, the primary factor for 
such a determination should be the willingness of licensees to agree to 
a given royalty rate. A couple of commenters requested clarification 
regarding ONC's approach for calculating reasonable royalties and ONC's 
basis for determining whether a royalty is ``reasonable.''
    Response. We thank commenters for these thoughtful comments. First, 
we note, as discussed previously in this section, we have removed all 
references to ``RAND.'' However, we have finalized this reasonable 
royalty provision (Sec.  171.303(c)(2)) as proposed, with a slight 
modification for consistency and the addition of a paragraph in Sec.  
171.303(c)(2)(iv). The slight modification was made to Sec.  
171.303(c)(2)(iii), in which we deleted ``on reasonable and non-
discriminatory terms'' in order to align with the overall approach of 
removing ``RAND''

[[Page 25895]]

throughout the exception. In response to comment, we added a paragraph 
in Sec.  171.303(c)(2)(iv) to address the potential for double recovery 
in this exception and the Fees Exception (Sec.  171.302). The new 
paragraph states that an actor may not charge a royalty for IP if the 
actor recovered any development costs pursuant to Sec.  171.302 that 
led to the creation of the IP.
    In response to the commenters who expressed concern that our 
approach for allowing reasonable royalties is too restrictive and could 
slow innovation, we emphasize that our regulatory approach to 
implementing the information blocking provision of the Cures Act is 
informed by years of research and stakeholder engagement indicating 
that information blocking undermines public and private sector 
investments in the nation's health IT infrastructure and frustrates 
efforts to use modern technologies to improve health care quality and 
efficiency, accelerate research and innovation, and provide greater 
value and choice to health care consumers. In our experience, 
contractual and IP rights are frequently used to extract rents for 
access to EHI or to prevent competition from health IT developers of 
interoperable technologies and services. These practices frustrate 
access, exchange, and use of EHI and stifle competition and innovation 
in the health IT sector.
    We believe the general claim that the limits on licensing royalties 
within this exception would inhibit innovation misstates the 
experiences many stakeholders face today. Our experience in the health 
IT industry has highlighted that innovation has struggled under current 
market practices, in which there is no limit on fees and royalties for 
access and use of interoperability elements. In fact, the ability of 
large entities with significant market power to prevent access and use 
of essential interoperability elements has prevented and continues to 
prevent large amounts of potential investment in innovative solutions 
for the United States health care market. We also refer readers to the 
Content and Manner Exception (Sec.  171.301), where we further address 
commenter concerns regarding protections for their proprietary IP.
    We also appreciate the comments that suggested we not allow any 
royalty for licensing interoperability elements because allowing a 
royalty could create an opening for actors to continue to charge 
unreasonably high fees for the exchange of EHI. We have decided to 
allow reasonable royalties that must meet certain requirements (see 
Sec.  171.303(b)(2)) because the allowance of such royalties will 
promote competition, consumer welfare, and investment in innovation. 
The conditions we have finalized in Sec.  171.303(b)(2) are 
specifically tailored to address the type of abuse about which 
commenters expressed concern. Under the finalized reasonable royalty 
provision, it would generally be appropriate for actors to license 
their IP on terms that are non-discriminatory and do not interfere with 
the access, exchange, or use of EHI so long as the actor meets all of 
the conditions in Sec.  171.303. We emphasize that actors are able to 
make reasonable profits from the licensing of interoperability 
elements, so long as such profits comply with Sec.  171.303(b)(2). 
These licensing practices will further the goals of the information 
blocking provision by allowing actors to protect the value of their 
innovations and earn returns on the investments they have made to 
develop, maintain, and update those innovations. This approach will 
also protect future incentives to invest in, develop, and disseminate 
interoperable technologies and services that could improve the lives 
and safety of patients nationwide.
    We acknowledge that limiting the royalties IP holders can charge 
for access, exchange, or use of EHI departs from IP policy. Absent 
specific circumstances, IP holders are generally free to negotiate with 
prospective licensees to determine the royalty to practice their IP, 
and this negotiated royalty frequently reflects the value the licensee 
would obtain from exercising those rights. However, in the context of 
EHI, a limitation on royalties is essential due to the likelihood that 
unreasonable royalties would frustrate access, exchange, and use of the 
EHI, particularly because of the imbalanced power dynamics that 
currently exist in the health IT market.
    In response to commenters who requested clarification regarding 
ONC's approach for calculating reasonable royalties, we emphasize that 
each case of potential information blocking, as well as the 
``reasonableness'' of a royalty, will hinge on the specific facts and 
circumstances of the case. We explained in the Proposed Rule that the 
actor would need to show that the royalty base was reasonable and that 
the royalty was within a reasonable range for the interoperability 
elements at issue. Importantly, we explained that the reasonableness of 
any royalties would be assessed solely on the basis of the independent 
value of the actor's technology to the licensee's product, not on any 
strategic value stemming from the actor's control over essential means 
of accessing, exchanging, or using EHI (84 FR 7547 and 7548). For 
additional clarification regarding the specific factors to be 
considered in evaluating an actor's assertion and evidence that a 
royalty was reasonable, we refer reader to the discussion above and the 
discussion in the Proposed Rule regarding reasonable royalties (see 84 
FR 7547 and 7548).
Non-Discriminatory Terms
    We proposed that for the exception to apply, the terms on which an 
actor licenses and otherwise provides interoperability elements must be 
non-discriminatory. We explained that this condition would apply to 
both price and non-price terms, and thus would apply to the royalty 
terms discussed immediately above as well as other types of terms that 
may be included in licensing agreements or other agreements related to 
the provision or use of interoperability elements (84 FR 7548).
    We proposed that to comply with this condition, the terms on which 
the actor licensed the interoperability elements must be based on 
criteria that the actor applied uniformly for all substantially similar 
or similarly situated classes of persons and requests. In order to be 
considered non-discriminatory, such criteria would have to be objective 
and verifiable, not based on the actor's subjective judgment or 
discretion. We emphasized that this proposal does not mean that the 
actor must apply the same terms for all persons or classes of persons 
requesting a license. However, any differences in terms would have to 
be based on actual differences in the costs that the actor incurred or 
other reasonable and non-discriminatory criteria. Moreover, we proposed 
that any criteria upon which an actor varies its terms or conditions 
would have to be both competitively neutral--meaning that the criteria 
are not based in any part on whether the requestor or other person is a 
competitor, potential competitor, or will be using EHI obtained via the 
interoperability elements in a way that facilitates competition with 
the actor--and neutral as to the revenue or other value that the 
requestor may derive from access, exchange, or use of the EHI obtained 
via the interoperability elements, including any secondary use of such 
EHI (84 FR 7548). For a detailed example regarding this proposed 
condition, see the Proposed Rule (84 FR 7548).
    We noted that the foregoing conditions were not intended to limit 
an actor's flexibility to set different terms based on legitimate 
differences in the

[[Page 25896]]

costs to different classes of persons or in response to different 
classes of requests, so long as any such classification was in fact 
based on neutral criteria (in the sense described above) that are 
objectively verifiable and were applied in a consistent manner for 
persons and/or requests within each class. For instance, the proposed 
condition would not preclude an actor from pursuing strategic 
partnerships, joint ventures, co-marketing agreements, cross-licensing 
agreements, and other similar types of commercial arrangements under 
which it provides more favorable terms than for other persons with whom 
it has a more arms-length relationship. We explained that in these 
instances, the actor should have no difficulty identifying substantial 
and verifiable efficiencies that demonstrate that any variations in its 
terms and conditions were based on objective and neutral criteria (84 
FR 7548).
    We proposed that a health IT developer of certified health IT who 
is an ``API Technology Supplier'' under the Condition of Certification 
proposed in Sec.  170.404 would not be permitted to offer different 
terms in connection with the APIs required by that Condition of 
Certification. We proposed that API Technology Suppliers are required 
to make these APIs available on terms that are no less favorable than 
provided to their own customers, suppliers, partners, and other persons 
with whom they have a business relationship (84 FR 7548 and 7549).
    We requested comments on the foregoing conditions (84 FR 7549).
    Comments. One commenter disagreed with the proposal that the terms 
must not be based in any part on revenue or other value the requestor 
may derive from access, exchange, or use of EHI obtained via the 
interoperability elements, including the secondary use of such EHI. The 
commenter stated that such information should be considered.
    Response. We thank the commenter for this feedback, but have 
decided to finalize this provision as proposed, with slight 
modification. We continue to believe that license terms for licensing 
interoperability elements required for the access, exchange, or use of 
EHI should not be based in any part of the revenue or other value the 
requestor may derive from access, exchange, or use of EHI obtained via 
the interoperability elements, including the subsequent use of such 
EHI. The allowance of such terms could enable the type of opportunistic 
pricing and anti-competitive behavior that this exception seeks to 
address. We note that we have removed the proposed example about 
``secondary use'' from the regulation text because such an example is 
not necessary in the regulation text (see 84 FR 7604). We emphasize, 
however, that we continue to maintain that the terms must not be based 
on revenue or other value derived from the subsequent use of EHI. Our 
policy on this point has not changed from the Proposed Rule. The terms 
and conditions could vary based on neutral, objectively verifiable, and 
uniformly applied criteria. These might include, for example, 
significantly greater resources consumed by certain types of apps, such 
as those that export large volumes of data on a continuous basis, or 
the heightened risks associated with apps designed to ``write'' data to 
the EHR database or to run natively within the EHR's user interface.
    We emphasize that health IT developers that license 
interoperability elements in order for EHI to be accessed, exchanged, 
or used could not vary the license terms and conditions based on 
subjective criteria, such as whether it thinks an app will be 
``popular'' or is a ``good fit'' for its ecosystem. Nor could 
developers offer different terms or conditions on the basis of 
objective criteria that are not competitively neutral, such as whether 
an app ``connects to'' other technologies or services, provides 
capabilities that the EHR developer plans to incorporate in a future 
release of its technology, or enables an efficient means for customers 
to export data for use in other databases or technologies that compete 
directly with the EHR developer. Similarly, the EHR developer could not 
set different terms or conditions based on how much revenue or other 
value the app might generate from the information it collects through 
the APIs, such as by introducing a revenue-sharing requirement for apps 
that use data for secondary purposes that are very lucrative and for 
which the EHR developer would like a ``piece of the pie.'' Such 
practices would disqualify the actor from this exception and would 
implicate the information blocking provision.
    We note that we made a slight modification to Sec.  
171.303(c)(3)(i) in that we removed ``substantially similar.'' We 
believe ``similarly situated,'' without ``substantially similar'' is 
clearer, maintains the intended effect, and is consistent with language 
used in other exceptions.
Collateral Terms
    We proposed five additional conditions that would reinforce the 
requirements of the proposed exception. We explained that these 
additional conditions would provide bright-line prohibitions for 
certain types of collateral terms or agreements that we believe are 
inherently likely to interfere with access, exchange, or use of EHI. We 
proposed that any attempt to require a licensee or its agents or 
contractors to do or agree to do any of the following would disqualify 
the actor from the exception and would be suspect under the information 
blocking provision (84 FR 7549).
    First, we proposed that the actor must not require the licensee or 
its agents or contractors to not compete with the actor in any product, 
service, or market, including markets for goods and services, 
technologies, and research and development. We explained that we are 
aware that such agreements have been used to either directly exclude 
suppliers of interoperable technologies and services from the market or 
to create exclusivity that reduces the range of technologies and 
options available to health care providers and other health IT 
customers and users (84 FR 7549).
    Second, we proposed that the actor must not require the licensee or 
its agents or contractors to deal exclusively with the actor in any 
product, service, or market, including markets for goods and services, 
technologies, and research and development (84 FR 7549).
    Third, we proposed that the actor must not require the licensee or 
its agents or contractors to obtain additional licenses, products, or 
services that are not related to or can be unbundled from the requested 
interoperability elements. We explained that without this condition, we 
believe that an actor could require a licensee to take a license to 
additional interoperability elements that the licensee does not need or 
want, which could enable the actor to extract royalties that are 
inconsistent with its RAND obligations under this exception. We 
clarified that this condition would not preclude an actor and a willing 
licensee from agreeing to such an arrangement, so long as the 
arrangement was not required (84 FR 7549).
    Fourth, we proposed that the actor must not condition the use of 
interoperability elements on a requirement or agreement to license, 
grant, assign, or transfer the licensee's own IP to the actor. We 
explained that it would raise information blocking concerns for an 
actor to use its control over interoperability elements as leverage to 
obtain a ``grant back'' of IP rights or other consideration whose value 
may exceed that of a reasonable royalty. We proposed that, consistent 
with our approach under other conditions of this exception, this 
condition would not preclude an actor

[[Page 25897]]

and a willing licensee from agreeing to a cross-licensing, co-
marketing, or other agreement if they so choose. However, the actor 
could not require the licensee to enter into such an agreement. We 
proposed that the actor must offer the option of licensing the 
interoperability elements without a promise to provide consideration 
beyond a reasonable royalty (84 FR 7549).
    Finally, we proposed that the actor must not condition the use of 
interoperability elements on a requirement or agreement to pay a fee of 
any kind whatsoever unless the fee meets either the narrowly crafted 
condition to this exception for a reasonable royalty, or, 
alternatively, the fee satisfies the separate exception in Sec.  
171.302, which permits the recovery of certain costs reasonably 
incurred (84 FR 7549).
    We requested comment on these categorical exclusions. In 
particular, we encouraged commenters to weigh in on our assumption that 
these practices are inherently likely to interfere with access, 
exchange, or use of EHI. We also encouraged commenters to suggest any 
conceivable benefits that these practices might offer for 
interoperability or for competition and consumers that we might have 
overlooked. Again, we asked that to the extent possible commenters 
provide detailed economic rationale in support of their comments (84 FR 
7549).
    Comments. One commenter noted that situations exist where licensors 
do not have the ability to lawfully confer rights or licenses to 
information or products without the agreement of a third party. The 
commenter recommended that we add ``except as required by law'' to the 
collateral terms provisions in order to clarify that the expectation is 
not that an actor must obtain such rights on behalf of the requestor.
    Response. We appreciate this comment, but have decided not to make 
the suggested edit because we do not believe such an addition is 
necessary. The collateral terms provisions do not address whether an 
actor is expected to obtain rights from a third party to lawfully 
confer rights or licenses to interoperability elements. Instead, the 
collateral terms provisions describe conditions that the actors must 
not require of the licensee or its agents or contractors to do because 
such conditions are inherently likely to interfere with access, 
exchange, or use of EHI. We note that we have revised the definition of 
``interoperability element'' (see Sec.  171.102) to clarify that in 
order to meet the definition, the element must be ``controlled by the 
actor,'' which addresses the commenter's concern. We have also defined 
``controlled by the actor'' in Sec.  171.102 in the context of the 
interoperability element definition for clarity. If the actor could not 
lawfully confer a right or authorization, the actor would not have the 
requisite ``control'' under the ``interoperability element.'' Last, we 
emphasize that in situations when an actor does not have the ability to 
lawfully confer rights or licenses to enable the access, exchange, or 
use of EHI, the actor could seek coverage under the Infeasibility 
Exception (see Sec.  171.204(a)(3)) or the Content and Manner Exception 
(see Sec.  171.301(b)).
    Comments. We did not receive any other comments regarding the 
proposed collateral terms proposals except those noted in the comment 
summary above.
    Response. We have finalized the collateral terms as proposed.
Non-Disclosure Agreement
    We proposed that an actor would be permitted under this exception 
to require a licensee to agree to a confidentiality or non-disclosure 
agreement (NDA) to protect the actor's trade secrets, provided that the 
NDA is no broader than necessary to prevent the unauthorized disclosure 
of the actor's trade secrets. Further, we proposed that the actor would 
have to identify (in the NDA) the specific information that it claims 
as trade secrets, and that such information would have to meet the 
definition of a trade secret under applicable law. We noted that if the 
actor is a health IT developer of certified health IT, it may be 
subject to the Condition of Certification that prohibits certain health 
IT developer prohibitions and restrictions on communications about a 
health IT developer's technology and business practices. We emphasized 
that the exception would not in any way abrogate the developer's 
obligations to comply with that condition. We encouraged comment on 
this condition of the proposed exception (84 FR 7549).
    Comments. We received a couple of comments regarding the proposed 
NDA provision. One commenter recommended that we state in the final 
rule that interoperability elements themselves may not be protected as 
trade secrets. Another commenter expressed concern that this exception 
acts to require NDAs in certain circumstances. The commenter also 
suggested edits to preamble language that would allow the actor to 
``generally'' identify the information that it claims as trade secrets, 
as opposed to the proposed language of identifying the ``specific'' 
information that it claims as trade secrets.
    Response. We thank commenters for these thoughtful comments. We 
clarify that interoperability elements may be protected as trade 
secrets. Trade secrets are a type of IP that consist of information and 
can include a formula, pattern, compilation, program, device, method, 
technique or process,\190\ and could fall within the definition of 
``interoperability element'' (see Sec.  171.102). We note, as discussed 
in more detail in VIII.C.5.b, that we have leveraged the definition of 
``health information technology'' from section 3000(5) of the PHSA for 
the definition of ``interoperability element'' in Sec.  171.102, and 
that IP is included in that definition of ``health information 
technology.'' The PHSA defines ``health information technology'' as 
``hardware, software, integrated technologies or related licenses, 
intellectual property, upgrades, or packaged solutions sold as services 
that are designed for or support the use by health care entities or 
patients for the electronic creation, maintenance, access, or exchange 
of health information.''
---------------------------------------------------------------------------

    \190\ USPTO, Trade Secret Policy, https://www.uspto.gov/patents-getting-started/international-protection/trade-secrets-policy.
---------------------------------------------------------------------------

    In response to the commenter that expressed concern that this 
exception acts to require NDAs in certain circumstances, we emphasize 
that we are not requiring NDAs. We included this provision in order to 
help actors protect their IP and actors may draft the NDA in a manner 
that best suits their needs so long as the NDA meets the requisite 
conditions in Sec.  171.303(b)(5). We have decided not to allow actors 
to ``generally'' identify the information that they claim as trade 
secrets because such a change could enable actors to make broad 
assertions of trade secret protection that exceed the actual trade 
secrets. The safeguards we have finalized in the NDA provision (e.g., 
that the agreement is no broader than necessary to prevent unauthorized 
disclosure of the actor's trade secrets and the agreement states with 
particularity all information the actor claims as trade secrets) are 
necessary to ensure that the NDA is not used to impose restrictions or 
burdensome requirements that are not actually necessary to protect the 
actor's trade secrets and that impede the use of the interoperability 
elements. We emphasize that the use of an NDA for such purposes would 
preclude an actor from qualifying for this exception and would 
implicate the information blocking provision.

[[Page 25898]]

iii. Additional Requirements Relating to the Provision of 
Interoperability Elements
    We proposed that an actor's practice would need to comply with 
additional conditions that ensure that actors who license 
interoperability elements on RAND terms do not engage in separate 
practices that impede the use of those elements or otherwise undermine 
the intent of this exception. We explained that these conditions are 
analogous to the conditions described in our proposal concerning 
collateral terms but address a broader range of practices that may not 
be effected through the license agreements themselves or that occur 
separately from the licensing negotiations and other dealings between 
the actor and the licensee. Specifically, we proposed that an actor 
would not qualify for this exception if it engaged in a practice that 
had the purpose or effect of impeding the efficient use of the 
interoperability elements to access, exchange, or use EHI for any 
permissible purpose; or the efficient development, distribution, 
deployment, or use of an interoperable product or service for which 
there is actual or potential demand. We explained that the exception 
would not apply if the developer licensed its proprietary APIs for use 
by third-party apps but then prevented or delayed the use of those apps 
in production environments by, for example, restricting or discouraging 
customers from enabling the use of the apps, or engaging in ``gate 
keeping'' practices, such as requiring apps to go through a vetting 
process and then applying that process in a discriminatory or 
unreasonable manner. Finally, to ensure the actor's commitments under 
this exception are durable, we proposed one additional safeguard: An 
actor could not avail itself of this exception if, having licensed the 
interoperability elements, the actor makes changes to the elements or 
its technology that ``break'' compatibility or otherwise degrade the 
performance or interoperability of the licensee's products or services 
(84 FR 7549 and 7550).
    We emphasized that this proposed condition would in no way prevent 
an actor from making improvements to its technology or responding to 
the needs of its own customers or users. However, to benefit from the 
exception, the actor's practice would need to be necessary to 
accomplish these purposes and the actor must have afforded the licensee 
a reasonable opportunity under the circumstances to update its 
technology to maintain interoperability (84 FR 7550).
    Comments. One commenter stated that the proposed restriction 
regarding breaking compatibility or otherwise degrading the performance 
or interoperability of the licensee's products or services is too 
broad. The commenter suggested that ONC add procedural safeguards to 
avoid misuse and unpredictable enforcement. Specifically, the commenter 
recommended that ONC: (1) Institute a grace period for licensors to 
provide fixes where interoperability elements are inadvertently 
unavailable due to software changes; (2) permit health IT developers to 
maintain their existing processes to notify customers about upgraded 
standards on a reasonable timeframe; (3) allow, with a year's notice, 
retirement of functionality in future versions of the software; (4) 
acknowledge that the use of interoperability elements will always 
require some initial work and ongoing upkeep by the licensee, such as 
testing and continuous work to deploy technology at health systems with 
different workflows; and (5) the ONC-administered advisory opinion 
process should account for review of RAND licensing terms to provide 
clarity to the regulated actors.
    Response. We agree with the commenter that it is critical that the 
final exceptions are transparent and cannot be misused. Each exception 
should clearly explain what conduct would be covered by the exception 
and what conduct falls outside the scope of the exception. In response 
to the commenter, we note that we have not prevented health IT 
developers from maintaining their existing processes to notify 
customers about upgraded standards on a reasonable timeframe, nor have 
we instituted any new policies regarding the retirement of 
functionality in future versions of software. Further, we acknowledge 
that the use of interoperability elements may require some initial work 
and ongoing upkeep by the licensee, such as testing and continuous work 
to deploy technology in health systems with different workflows. 
However, we emphasize that such initial work, ongoing upkeep, or any 
additional burden on licensees must meet all the conditions of this 
exception as all relevant times.
    We have decided not to institute a grace period for licensors to 
provide fixes where interoperability elements are inadvertently 
unavailable due to software changes because we do not believe such a 
grace period is necessary. Having consulted with OIG, we note that OIG 
generally does not pursue civil monetary penalties for actors who make 
innocent mistakes or for accidental conduct. Future notice and comment 
rulemaking by OIG will provide more additional detail regarding 
information blocking enforcement.
    We may consider developing materials in the future regarding the 
application of the exceptions should the need arise. However, we 
believe the final rule clearly describes the conditions actors must 
meet in order to be covered by each exception, and informational 
materials are not necessary at this time.
iv. Compliance With Conditions of Certification
    As a final condition of the proposed exception, we proposed that 
health IT developers of certified health IT who are subject to the 
Conditions of Certification proposed in Sec. Sec.  170.402, 170.403, 
and 170.404 must comply with all requirements of those Conditions of 
Certification for all practices and at all relevant times (84 FR 7550).
    Comments. We did not receive any comments on this proposed 
condition.
    Response. We have removed this proposed condition from the final 
rule for consistency with other exceptions and for clarity, as the 
condition is not necessary.

E. Additional Exceptions--Request for Information

1. Exception for Complying With Common Agreement for Trusted Exchange
    In the Proposed Rule, we included a request for information (RFI) 
regarding whether we should propose, in a future rulemaking, a narrow 
exception to the information blocking provision for practices that are 
necessary to comply with the requirements of the Common Agreement (84 
FR 7552). The most recent draft Trusted Exchange Framework and Common 
Agreement was released for public comment on April 19, 2019.\191\
---------------------------------------------------------------------------

    \191\ ONC, Draft 2 Trusted Exchange Framework and Common 
Agreement, https://www.healthit.gov/sites/default/files/page/2019-04/FINALTEFCAQTF41719508version.pdf.
---------------------------------------------------------------------------

    Comments. We received over 40 comment submissions on this RFI 
expressing various viewpoints on the purpose, need, and structure of a 
TEFCA exception.
    Response. We thank commenters for their feedback. As noted in the 
Proposed Rule, we may use this feedback to inform a future rulemaking.
2. New Exceptions
    In the Proposed Rule, we included an RFI regarding any potential 
new exceptions we should consider for future rulemaking (84 FR 7552).

[[Page 25899]]

    Comments. We received a number of requests for a new exception to 
cover sensitive and/or privileged information. A health IT developer 
suggested a new exception to allow actors to withhold sensitive 
information. The commenter expressed concern that EHI at a certain data 
class or data element level will require health care providers to exert 
substantial manual effort to mediate disclosure. Health care providers 
and provider organizations suggested an exception that would exempt 
actors from the information blocking provision if they are protecting 
privileged information. One commenter expressed concern about providing 
access, exchange, or use of quality program and reporting data. A 
hospital suggested that requiring providers to waive privilege in order 
to avoid information blocking would have a detrimental effect on peer 
reviews and safety assessments that help providers resolve adverse 
events.
    Response. We thank commenters for these suggestions. We first note 
that the health information must fall within the EHI definition, which 
aligns with the ePHI definition contained in the HIPAA Rules. We note 
that actors faced with a request to access, exchange, We note that 
actors faced with a request to access, exchange, or use sensitive and/
or privileged information can seek coverage under the exceptions for 
preventing harm (Sec.  171.201), promoting the privacy of EHI (Sec.  
171.202), promoting the security of EHI (Sec.  171.203), or 
infeasibility (Sec.  171.204), depending on the specific information at 
issue and the circumstances of the case. We refer readers to those 
exceptions, as well as the preamble discussions at sections VIII.D.1 
(Preventing Harm Exception), VIII.D.2 (Privacy Exception), VIII.D.3 
(Security Exception), and VIII.D.4 (Infeasibility Exception). We also 
note that an actor would not be required to share EHI if the 
interference with access, exchange, or use of the EHI is explicitly 
required by State or Federal law (see the discussion regarding 
``required by law'' at section VIII.C.1 of this preamble). We emphasize 
that this final rule does not require actors to waive privilege 
provided by law.
    Comments. Some commenters expressed concern about the effect of the 
information blocking provision on research. Public health organizations 
proposed an exception to exclude research (as defined by 45 CFR 
164.501) and non-direct clinical care conducted by public health 
authorities, from implicating the information blocking provision. A 
hospital requested that we establish a new sub-exception under the 
exception for preventing harm that would allow health care providers 
who conduct research at their institutions to require that other 
providers who request EHI are also collaborators in that research. One 
commenter suggested an exception for health care providers who cannot 
send data to a public health registry when the public health agency is 
not ready to onboard the provider due factors outside of the provider's 
control (e.g., lack of resources or a backup in the onboarding queue).
    Response. We thank commenters for these suggestions. We note that 
actors faced with a request to access, exchange, or use EHI related to 
research can seek coverage under the exceptions for promoting the 
privacy of EHI (Sec.  171.202) or infeasibility (Sec.  171.204), 
depending on the specific research being conducted and EHI at issue. We 
refer readers to those exceptions, as well as the preamble discussions 
at sections VIII.D.2 (Privacy Exception) and VIII.D.4 (Infeasibility 
Exception). We also note that an actor would not be required to share 
EHI if the interference with access, exchange, or use of the EHI is 
explicitly required by State or Federal law (see the discussion 
regarding ``required by law'' at section VIII.C.1 of this preamble).
    Comments. Some commenters requested a new exception to protect 
actors who seek independent opinions from external validators regarding 
their business practices, in case one of those practices falls within 
the definition of information blocking.
    Response. We appreciate this suggestion. With regard to private 
``external validators,'' we note that we are not restricting an actor's 
ability to hire private companies to assess its business practices.
    Comments. A commenter recommended an exception for standard 
business practices. The commenter explained that examples of such 
conduct include suspending the access of any health IT developer or e-
prescribing application that is not compliant with State laws or uses 
the provider's technology platform for reasons that compromises the 
integrity of the provider's network (e.g., using the network for 
commercial messaging).
    Response. We appreciate this suggestion. While we would need more 
facts to properly assess these scenarios, we believe that such 
situations could likely be covered by either the exception for 
promoting the privacy of EHI (Sec.  171.202) or the exception for 
promoting the security of EHI (Sec.  171.203). We refer readers to 
those exceptions, as well as the preamble discussions at sections 
VIII.D.2 (Privacy Exception) and VIII.D.3 (Security Exception). We also 
note that the actor would not be required to share EHI if the 
interference with access, exchange, or use of the EHI is explicitly 
required by State or Federal law (see the discussion regarding 
``required by law'' at section VIII.C.1 of this preamble).

F. Complaint Process

    We explained in the Proposed Rule that section 3022(d)(3)(A) of the 
PHSA directs the National Coordinator to implement a standardized 
process for the public to submit reports on claims of information 
blocking (84 FR 7552). Section 3022(d)(3)(B) further requires that the 
complaint process provide for the collection of such information as the 
originating institution, location, type of transaction, system and 
version, timestamp, terminating institution, locations, system and 
version, failure notice, and other related information.
    In the Proposed Rule, we stated that we intend to implement and 
evolve the complaint process by building on existing mechanisms, 
including the process for providing feedback and expressing concerns 
about health IT that is currently available at https://www.healthit.gov/healthit-feedback (84 FR 7553). We requested comment 
on this approach and any alternative approaches that would best 
effectuate this aspect of the Cures Act. In addition to any other 
comments that the public may have wished to submit, we specifically 
requested comment on several specific questions. The scope of these 
questions was specific to the information blocking complaint submission 
process and the information collection necessary to enable effective 
investigations and safeguard the confidentiality of information 
submitted through the complaint process.
    Comments. We received over 25 comment submissions that included 
suggestions for the information blocking complaint process. A few 
commenters responded to one or more of the specific questions in the 
Proposed Rule, offering suggestions for specific data elements that 
complainants should be able to enter as part of a complaint. Some 
commenters suggested specific features such as: A dedicated secure 
online portal for entry of information blocking complaints and any 
supporting documents; a dedicated email box or toll-free phone number 
for submission of information blocking complaints; the ability to batch 
multiple instances of potential information blocking activity by the 
same actor into one complaint submission; and a user interface of pick-
lists to help submitters more easily categorize their concerns and/or 
mark specific portions of or attachments to

[[Page 25900]]

their complaints according to their level of sensitivity or requested 
confidentiality. Numerous commenters expressed support for the 
existence of a publicly available, user-friendly complaint process and 
recommended that the development and publication of the complaint 
process include robust educational and informational materials. A few 
commenters requested an opportunity for public comment on the complaint 
process's operational details prior to it going live.
    Response. We note that the complaint process is not required by 
statute to be established through rulemaking and we did not intend to 
give an impression that it would by including the request for 
information about the complaint process in the Proposed Rule. Rather, 
as was the intended outcome, we have received thoughtful suggestions 
that have informed our initial rollout of the information blocking 
complaint process as well as have provided considerations for further 
evolution of the process.
    We have identified several themes and specific suggestions in the 
comments that we will address below for the purposes of transparency 
and to inform stakeholders. We have developed a dedicated complaint 
process that is based upon and informed by our experience with our 
current health IT feedback process and the comments received on the 
Proposed Rule. We also plan to publish informational materials to 
accompany the rollout of this dedicated information blocking complaint 
process so that potential complainants across the affected stakeholder 
categories can successfully use it to submit complaints where they 
believe they have experienced or observed conduct that constitutes 
information blocking. While we do not anticipate publishing potential 
operational details of the complaint process and submission mechanism 
in advance of its rollout, we would like to amplify a point we noted in 
the Proposed Rule, which is that we intend to implement and evolve the 
complaint process. After we launch the information blocking complaint 
process, we anticipate using our own experience and users' feedback 
about the information blocking complaint process to identify 
opportunities to further evolve and enhance all aspects of the 
information blocking complaint process, including but not limited to 
its associated informational materials.
    Comments. Several commenters requested that all information 
blocking complaints be publicly posted and available. Conversely, many 
commenters were in strong support of ONC ensuring adequate 
confidentiality for those who submit information blocking complaints.
    Response. Section 3022(d)(2) of the PHSA exempts from public 
disclosure ``any information that is received by the National 
Coordinator in connection with a claim or suggestion of possible 
information blocking and that could reasonably be expected to 
facilitate identification of the source of the information'' except as 
may be necessary to carry out the purpose of PHSA section 3022. We 
believe the publishing of complaints could lead to the identification 
of the source of the information or reasonably facilitate 
identification of the source; therefore, we do not intend to make 
complaints publicly available. In specific reference to health IT 
developers of certified health IT, however, we note that we publish in 
the Certified Health IT Product List (CHPL) information about non-
conformities with Program requirements, which would include any non-
conformities with the Information Blocking Condition of Certification 
requirement. We also note that the information blocking complaint 
process offers the option for users to submit anonymously, explaining 
in multiple places types of submission information to exclude for those 
who would like to maintain confidentiality.
    Comments. Several commenters requested that complainants be 
required to submit sufficient evidence of intentional information 
blocking in the complaint submission process. Another commenter 
suggested complainants be required to meet particular qualifications in 
order to submit a formal complaint.
    Response. We thank commenters for their input. However, we do not 
believe requiring a complaint submission to include more than the 
minimum information necessary to understand the complainant's concern 
would best serve the purpose of the complaint process. We believe that 
requiring that a complainant meet a proof, evidentiary, or 
qualification standard as a pre-requisite to them submitting a 
complaint would inappropriately discourage or prevent many individuals 
and organizations who are subjected to conduct that may meet the 
definition of information blocking from sharing their concerns with us.

G. Disincentives for Health Care Providers--Request for Information

    Section 3022(b)(2)(B) of the PHSA provides that any health care 
provider determined by OIG to have committed information blocking shall 
be referred to the appropriate agency to be subject to appropriate 
disincentives using authorities under applicable Federal law, as the 
Secretary sets forth through notice and comment rulemaking. We 
requested comment on potential disincentives and whether modifying 
disincentives already available under existing Department programs and 
regulations would provide for more effective deterrents (84 FR 7553).
    We also sought information on the implementation of section 
3022(d)(4) of the PHSA, which provides that in carrying out section 
3022(d) of the PHSA, the Secretary shall, to the extent possible, not 
duplicate penalty structures that would otherwise apply with respect to 
information blocking and the type of individual or entity involved as 
of the day before December 13, 2016--enactment of the Cures Act.
    Comments. We received over 40 submissions on this RFI. We have 
organized and summarized the comments by topic below.
Need for Disincentives
    Views on the need for additional disincentives generally diverged 
based on stakeholder type. Health care providers were generally opposed 
to additional disincentives. Provider organizations were opposed to any 
new disincentives. Nearly all these organizations stated that any 
additional disincentives would be duplicative of disincentives for 
information blocking put in place through the QPP and Promoting 
Interoperability Programs. In particular, hospitals noted concerns that 
they are already subject to a 75 percent negative adjustment to their 
market basket increase if they are unable to make the Medicare Access 
and CHIP Reauthorization Act of 2015 (MACRA)-mandated attestation that 
they have not engaged in information blocking. However, a few provider 
organizations noted that any new disincentives would only be 
duplicative for providers that are eligible for these specific CMS-
administered programs, recognizing that the existing disincentives 
under Medicare would not reach providers that do not participate in QPP 
or PI Programs.
    Multiple provider organizations stated that additional 
disincentives would be duplicative of fines for HIPAA Rules violations 
and mentioned that the Office for Civil Rights (OCR) has expressed an 
intent to increase HIPAA Rules enforcement on providers.
    A patient-facing app developer commented that the HIPAA Rule's 
disincentives, attestation, and public reporting are not enough to 
discourage information blocking.
    Several health IT developers were neutral on the topic, stating 
that it was

[[Page 25901]]

unclear if additional disincentives would duplicate disincentives in 
other programs.
    One payer, one patient advocacy organization, and one HIN were 
supportive of additional provider disincentives.
    The HITAC recommended that ONC work with CMS to build information 
blocking disincentives into a broad range of CMS programs, and that ONC 
work with other Federal departments and agencies that contract with 
providers (e.g., Veterans Health Administration, Department of Defense 
Military Health System, Indian Health Service, Centers for Disease 
Control and Prevention) to similarly build information blocking 
disincentives into contracting and other programs. The HITAC also 
recommended that providers be required to attest to compliance with 
requirements to avoid information blocking as part of Conditions of 
Participation, Conditions for Coverage, contracts, and other similar 
relationships, covering fee-for-service (FFS), value-based care, and 
direct payment relationships. The HITAC noted that such an attestation 
requirement could potentially allow for pursuit of serious penalties 
should OIG find the provider engaged in information blocking.
Magnitude of Penalties
    While health care providers were generally opposed to 
disincentives, some did offer recommendations for keeping penalties to 
a minimum. About half of the provider organizations commenting stated 
that any fines for providers should not be at the same level as those 
levied against health IT developers, HINs, and HIEs. Other provider 
organizations had more specific recommendations, including a tiered 
approach to penalties. One provider organization recommended a two-
tiered approach, with more significant financial penalties for large 
hospitals and health systems and public reporting or QPP score 
reductions for physicians. Another provider organization recommended a 
tiered approach that mimics the approach used under HIPAA (as modified 
by HITECH), in which penalties increase based on the nature and extent 
of the violation and resulting harm. Another provider organization 
recommended that organizations found to engage in information blocking 
be disqualified from the PI category in QPP.
    Some health IT developers recommended significant penalties for 
providers. Several health IT developers recommended that ONC work with 
CMS to utilize and enhance existing disincentive mechanisms, with one 
developer specifically recommending utilization of the Conditions of 
Participation, Conditions for Coverage, and Requirements for 
Participation. One app developer recommended that fines for information 
blocking be substantial and per record blocked. The HITAC stated that 
fines should be significant enough to discourage problematic behavior, 
encourage compliance, and incent providers to address and remediate 
problematic behavior. A payer commented that fines should be consistent 
with those levied against developers, HINs, and HIEs.
Enforcement
    Most health care providers and provider organizations recommended 
that providers be given the opportunity to become compliant before 
being subject to any fines, except in instances of clear, egregious 
violations. Some provider organizations recommended that there be an 
appeals process for disincentives or findings that health care 
providers had violated the information blocking provision, with one 
organization noting that an appeals process is especially needed for 
small and rural practices.
    Response. We have shared all the comments received with the 
appropriate agencies and offices within the Department for 
consideration in subsequent rulemaking to implement section 
3022(b)(2)(B) and (d) of the PHSA.

IX. Registries Request for Information

    In the Proposed Rule, we included a Request for Information (RFI) 
on how health IT solutions and the proposals in the Proposed Rule could 
aid bidirectional exchange with registries for a wide range of public 
health, quality reporting, and clinical quality improvement initiatives 
(84 FR 7553). We received 75 comments in response to this RFI. We thank 
commenters for their input and we may consider including this 
information in a future rulemaking.

X. Patient Matching Request for Information

    Patient matching is a critical component to interoperability and 
the nation's health IT infrastructure. In the Proposed Rule, we 
included a Request for Information (RFI) on additional opportunities 
that may exist in the patient matching space and ways that ONC can lead 
and contribute to coordination efforts with respect to patient matching 
(84 FR 7554). We received 128 comments in response to this RFI. We 
appreciate the input provided by commenters and may use this 
information to inform future rulemaking.

XI. Incorporation by Reference

    The Office of the Federal Register has established requirements for 
materials (e.g., standards and implementation specifications) that 
agencies incorporate by reference in the Code of Federal Regulations 
(79 FR 66267; 1 CFR 51.5). Specifically, Sec.  51.5(b) requires 
agencies to discuss, in the preamble of a final rule, the ways that the 
materials they incorporate by reference are reasonably available to 
interested parties and how interested parties can obtain the materials, 
and to summarize, in the preamble of the final rule, the material they 
incorporate by reference.
    To make the materials we intend to incorporate by reference 
reasonably available, we provide a uniform resource locator (URL) for 
the standards and implementation specifications. In many cases, these 
standards and implementation specifications are directly accessible 
through the URLs provided. In instances where they are not directly 
available, we note the steps and requirements necessary to gain access 
to the standard or implementation specification. In most of these 
instances, access to the standard or implementation specification can 
be gained through no-cost (non-monetary) participation, subscription, 
or membership with the adopted standards developing organization (SDO) 
or custodial organization. In certain instances, where noted, access 
requires a fee or paid membership. As an alternative, a copy of the 
standards may be viewed for free at the U.S. Department of Health and 
Human Services, Office of the National Coordinator for Health 
Information Technology, 330 C Street SW, Washington, DC 20201. Please 
call (202) 690-7171 in advance to arrange inspection.
    The National Technology Transfer and Advancement Act (NTTAA) of 
1995 (15 U.S.C. 3701 et seq.) and the Office of Management and Budget 
(OMB) Circular A-119 require the use of, wherever practical, technical 
standards that are developed or adopted by voluntary consensus 
standards bodies to carry out policy objectives or activities, with 
certain exceptions. The NTTAA and OMB Circular A-119 provide exceptions 
to selecting only standards developed or adopted by voluntary consensus 
standards bodies, namely when doing so would be inconsistent with 
applicable law or otherwise impractical. As discussed in section IV of 
this preamble, we have followed the

[[Page 25902]]

NTTAA and OMB Circular A-119 in adopting standards and implementation 
specifications for adoption, including describing any exceptions in the 
adoption of standards and implementation specifications. Over the years 
of adopting standards and implementation specifications for 
certification, we have worked with SDOs, such as HL7, to make the 
standards we adopt and incorporate by reference in the Federal Register 
available to interested stakeholders. As described above, this includes 
making the standards and implementation specifications available 
through no-cost memberships and no-cost subscriptions.
    As required by 1 CFR 51.5(b), we provide summaries of the standards 
we have adopted and incorporate by reference in the Code of Federal 
Regulations (CFR). We also provide relevant information about these 
standards and implementation specifications throughout the preamble.
    We have organized the standards and implementation specifications 
that we have adopted through this rulemaking according to the sections 
of the Code of Federal Regulation (CFR) in which they will be codified 
and cross-referenced for associated certification criteria and 
requirements that we have adopted.

Content Exchange Standards and Implementation Specifications for 
Exchanging Electronic Health Information--45 CFR 170.205

 CMS Implementation Guide for Quality Reporting Document 
Architecture Category I Hospital Quality Reporting Implementation Guide 
for 2019, May 4, 2018
    URL: https://ecqi.healthit.gov/system/files/QRDA_HQR_2019_CMS_IG_final_508.pdf.
    This is a direct access link.
    Summary: This guide is a CMS Quality Reporting Document 
Architecture Category I (QRDA I) implementation guide to the HL7 
Implementation Guide for CDA Release 2: Quality Reporting Document 
Architecture Category I, Release 1, STU Release 5 (published December 
2017), and referred to as the HL7 QRDA IG STU R5 in this guide. This 
guide describes additional conformance statements and constraints for 
electronic health record (EHR) data submissions that are required for 
reporting information to the Centers for Medicare & Medicaid Services 
(CMS) for the Hospital Inpatient Quality Reporting Program 2019 
Reporting Period. The purpose of this guide is to serve as a companion 
to the base HL7 QRDA I STU R5 for entities such as Eligible Hospitals 
(EH), Critical Access Hospitals (CAH), and developers to submit QRDA I 
data for consumption by CMS systems including for Hospital Quality 
Reporting (HQR).
 CMS Implementation Guide for Quality Reporting Document 
Architecture Category III Eligible Clinicians and Eligible 
Professionals Programs Implementation Guide for 2019, October 8, 2018
    URL: https://ecqi.healthit.gov/system/files/2019_CMS_QRDA_III_Eligible_Clinicians_and_EP_IG-508.pdf.
    This is a direct access link.
    Summary: The Health Level Seven International (HL7) Quality 
Reporting Document Architecture (QRDA) defines constraints on the HL7 
Clinical Document Architecture Release 2 (CDA R2). QRDA is a standard 
document format for the exchange of electronic clinical quality measure 
(eCQM) data. QRDA reports contain data extracted from EHRs and other 
information technology systems. The reports are used for the exchange 
of eCQM data between systems for quality measurement and reporting 
programs. This QRDA guide contains the CMS supplemental implementation 
guide to the HL7 Implementation Guide for CDA Release 2: Quality 
Reporting Document Architecture, Category III, STU Release 2.1 (June, 
2017) for the 2019 performance period. This HL7 base standard is 
referred to as the HL7 QRDA-III STU R2.1.
 Health Level 7 (HL7[supreg]) CDA R2 Implementation Guide: C-
CDA Templates for Clinical Notes R2.1 Companion Guide, Release 2-US 
Realm, October 2019
    URL: https://www.hl7.org/implement/standards/product_brief.cfm?product_id=447.
    Access requires a ``user account'' and a license agreement. There 
is no monetary cost for a user account and license agreement.
    Summary: The Companion Guide to Consolidated Clinical Document 
Architecture (C-CDA) R2, provides essential implementer guidance to 
continuously expand interoperability for clinical information shared 
via structured clinical notes. The guidance supplements specifications 
established in the Health Level Seven (HL7) CDA[supreg] R2.1 IG: C-CDA 
Templates for Clinical Notes. This additional guidance is intended to 
make implementers aware of emerging expectations and best practices for 
C-CDA document exchange. The objective is to increase consistency and 
expand interoperability across the community of data sharing partners 
who utilize C-CDA for information exchange.
 National Council for Prescription Drug Programs (NCPDP), 
SCRIPT Standard Implementation Guide, Version 2017071 (Approval Date 
for ANSI: July 28, 2017)
    URL: https://www.ncpdp.org/Standards/Standards-Info.
    Access requires registration, a membership fee, a user account, and 
a license agreement to obtain a copy of the standard.
    Summary: NCPDP SCRIPT standards are developed for transmitting 
prescription information electronically between prescribers, 
pharmacies, payers, and other entities for new prescriptions, changes 
of prescriptions, prescription refill requests, prescription fill 
status notifications, cancellation notifications, relaying of 
medication history, transactions for long-term care, electronic prior 
authorization and other transactions. New transactions in this update 
include Prescription drug administration message, New prescription 
requests, New prescription response denials, Prescription transfer 
message, Prescription fill indicator change, Prescription 
recertification, Risk Evaluation and Mitigation Strategy (REMS) 
initiation request, REMS initiation response, REMS request, and REMS 
response.

Standards for Health Information Technology To Protect Electronic 
Health Information Created, Maintained, and Exchanged--45 CFR 170.210

 ASTM E2147-18 Standard Specification for Audit and Disclosure 
Logs for Use in Health Information Systems, approved May 1, 2018
    URL: https://www.astm.org/Standards/E2147.htm.
    This is a direct access link. However, a fee is required to obtain 
a copy of the standard.
    Summary: This specification describes the security requirements 
involved in the development and implementation of audit and disclosure 
logs used in health information systems. It specifies how to design an 
access audit log to record all access to patient identifiable 
information maintained in computer systems, and includes principles for 
developing policies, procedures, and functions of health information 
logs to document all disclosure of confidential health care information 
to external users for use in manual and computer systems. This 
specification has two main purposes, namely: To define the nature, 
role, and function of system access audit logs and

[[Page 25903]]

their use in health information systems as a technical and procedural 
tool to help provide security oversight; and to identify principles for 
establishing a permanent record of disclosure of health information to 
external users and the data to be recorded in maintaining such record 
of disclosure.

United States Core Data for Interoperability--45 CFR 170.213

 United States Core Data for Interoperability (USCDI), February 
2020, Version 1 (v1)
    URL: https://www.healthit.gov/USCDI.
    This is a direct access link.
    Summary: The United States Core Data for Interoperability (USCDI) 
establishes a minimum set of data classes that are required to be 
interoperable nationwide and is designed to be expanded in an iterative 
and predictable way over time. Data classes listed in the USCDI are 
represented in a technically agnostic manner.

Application Programming Interface Standards--45 CFR 170.215

 HL7 FHIR[supreg] US Core Implementation Guide STU 3.1.0, 
November 6, 2019
    URL: https://hl7.org/fhir/us/core/STU3.1/.
    This is a direct access link.
    Summary: The US Core Implementation Guide STU 3.1.0 is based on 
FHIR Version R4 and defines the minimum conformance requirements for 
accessing patient data. The Argonaut pilot implementations, ONC 2015 
Edition Common Clinical Data Set (CCDS), and the latest ONC United 
States Core Data for Interoperability (USCDI) provided the requirements 
for this guide. The prior Argonaut search and vocabulary requirements, 
based on FHIR DSTU2, are updated in this guide to support FHIR Version 
R4.
 Health Level 7 (HL7) Version 4.0.1 Fast Healthcare 
Interoperability Resources Specification (FHIR) Release 4, October 30, 
2019
    URL: https://hl7.org/fhir/R4/.
    This is a direct access link.
    Summary: The HL7 Version 4.0.1 Fast Healthcare Interoperability 
Resources (FHIR) Release 4, which also includes technical corrections 
to R4, provides the first set of normative FHIR resources. This 
normative designation means that the future changes will be backward 
compatible for the first time. These resources define the content and 
structure of core health data which can be used by developers to build 
standardized applications. Release 4 provides new standard operation on 
how to obtain data from multiple patients via FHIR. API services that 
focus on multiple patients would enable health care providers to manage 
various internal patient populations as well as external services a 
health care provider may contract for to support quality improvement, 
population health management, and cost accountability vis-[agrave]-vis 
the provider's partners (e.g., health plans).
 HL7 FHIR Bulk Data Access (Flat FHIR) (v1.0.0: STU 1), August 
22, 2019
    URL: https://hl7.org/fhir/uv/bulkdata/.
    This is a direct access link.
    Summary: This implementation specification defines a standardized, 
HL7 FHIR-based approach for exporting health information for multiple 
patients from a server compliant with the HL7 FHIR standard. This 
implementation specification is intended to be used by apps to request 
information on multiple patients. The implementation specification 
includes OperationDefinitions, which define how the multiple patient 
export operations are invoked by clients, and the SMART Backend 
Services: Authorization Guide, which describes how a client can 
register with and obtain an access token from a server compliant with 
the implementation specification.
 HL7 FHIR SMART Application Launch Framework Implementation 
Guide Release 1.0.0, November 13, 2018
    URL: https://hl7.org/fhir/smart-app-launch/.
    This is a direct access link.
    Summary: SMART on FHIR provides reliable, secure authorization for 
a variety of app architectures through the use of the OAuth 2.0 
standard. This Authorization Guide supports the four use cases defined 
for Phase 1 of the Argonaut Project. This profile is intended to be 
used by developers of apps that need to access FHIR resources by 
requesting access tokens from OAuth 2.0 compliant authorization 
servers. The profile defines a method through which an app requests 
authorization to access a FHIR resource, and then uses that 
authorization to retrieve the resource. Other security mechanisms 
required by the HIPAA Security Rule, such as end-user authentication, 
session time-out, security auditing, and accounting of disclosures, are 
outside the scope of this profile.
 OpenID Connect Core 1.0 Incorporating Errata Set 1, November 
8, 2014
    URL: https://openid.net/specs/openid-connect-core-1_0.html.
    This is a direct access link.
    Summary: OpenID Connect 1.0 is a simple identity layer on top of 
the OAuth 2.0 protocol. It enables clients to verify the identity of 
the end user based on the authentication performed by an authorization 
server, as well as to obtain basic profile information about the end 
user in an interoperable and REST-like manner. This specification 
defines the core OpenID Connect functionality: Authentication built on 
top of OAuth 2.0 and the use of claims to communicate information about 
the end user. It also describes the security and privacy considerations 
for using OpenID Connect.

Incorporation by Reference--45 CFR 170.599

 ISO/IEC 17025:2017(E)--General Requirements for the Competence 
of Testing and Calibration Laboratories, (Third Edition), November 2017
    URL: https://www.iso.org/standard/66912.html.
    This is a direct access link. However, a fee is required to obtain 
a copy of the standard.
    Summary: This document has been developed with the objective of 
promoting confidence in the operation of laboratories. This document 
contains requirements for laboratories to enable them to demonstrate 
they operate competently and are able to generate valid results. 
Laboratories that conform to this document will also operate generally 
in accordance with the principles of ISO 9001. This document requires 
the laboratory to plan and implement actions to address risks and 
opportunities. Addressing both risks and opportunities establishes a 
basis for increasing the effectiveness of the management system, 
achieving improved results, and preventing negative effects. The 
laboratory is responsible for deciding which risks and opportunities 
need to be addressed. This third edition cancels and replaces the 
second edition (ISO/IEC 17025:2005), which has been technically 
revised.
 ISO/IEC 17065:2012 (E)--Conformity Assessment--Requirements 
for Bodies Certifying Products, Processes and Services (First Edition), 
September 2012
    URL: https://www.iso.org/standard/46568.html.

[[Page 25904]]

    This is a direct access link. However, a fee is required to obtain 
a copy of the standard.
    Summary: This International Standard specifies requirements, the 
observance of which is intended to ensure that certification bodies 
operate certification schemes in a competent, consistent and impartial 
manner, thereby facilitating the recognition of such bodies and the 
acceptance of certified products, processes, and services on a national 
and international basis and so furthering international trade.

XII. Collection of Information Requirements

    Under the Paperwork Reduction Act of 1995 (PRA), codified as 
amended at 44 U.S.C. 3501 et seq., agencies are required to provide a 
60-day notice in the Federal Register and solicit public comment on a 
proposed collection of information before it is submitted to the Office 
of Management and Budget for review and approval. In order to fairly 
evaluate whether an information collection should be approved by the 
OMB, the PRA requires that we solicit comment on the following issues:
    1. Whether the information collection is necessary and useful to 
carry out the proper functions of the agency;
    2. The accuracy of the agency's estimate of the information 
collection burden;
    3. The quality, utility, and clarity of the information to be 
collected; and
    4. Recommendations to minimize the information collection burden on 
the affected public, including automated collection techniques.
    Under the PRA, the time, effort, and financial resources necessary 
to meet the information collection requirements referenced in this 
section are to be considered. We solicited comment on these issues in 
the Proposed Rule (84 FR 7558 and 7559) for the matters discussed in 
detail below.

A. ONC-ACBs

    In the Proposed Rule, we proposed to add new ONC--Authorized 
Certification Bodies (ONC-ACB) collection and reporting requirements 
for the certification of health IT to the updated 2015 Edition (and any 
subsequent edition certification) in Sec.  170.523(p), (q), (t), and 
Sec.  170.550(1).
    As stated in the Proposed Rule per Sec.  170.550(l), ONC-ACBs would 
not be able to certify health IT until they review and verify health IT 
developers' attestations confirming that the developers are compliant 
with Conditions and Maintenance of Certification requirements. ONC-ACBs 
would also submit the health IT developer attestations to ONC per Sec.  
170.523(q).
    As stated in the Proposed Rule for Sec.  170.523(p)(3), ONC-ACBs 
would be required to collect and report certain information to ONC 
related to real world testing plans and results. ONC-ACBs would be 
required to verify that the health IT developer submits an annual, 
publicly available real world testing plan and perform a completeness 
check for both real world testing plans and results.
    In the Proposed Rule, we stated for Sec.  170.523(t), ONC-ACBs 
would ensure health IT developers opting to take advantage of the 
Standard Version Advancement Process flexibility per Sec.  170.405(b) 
provide timely advance written notice to the ONC-ACB and all affected 
customers. ONC-ACBs would maintain a record of the date of issuance and 
the content of developers' notices, and timely post content of each 
notice received publicly on the CHPL attributed to the certified Health 
IT Module(s) to which it applies.
    In the 2015 Edition proposed rule (80 FR 16894), we estimated fewer 
than ten annual respondents for all of the regulatory ``collection of 
information'' requirements that applied to the ONC-ACBs, including 
those previously approved by OMB. In the 2015 Edition final rule (80 FR 
62733), we concluded that the regulatory ``collection of information'' 
requirements for the ONC-ACBs were not subject to the PRA under 5 CFR 
1320.3(c).
    Comments. We did not receive any comments specific to the new ONC-
ACB collection and reporting requirements for the certification of 
health IT to the 2015 Edition (and any subsequent edition 
certification) in Sec.  170.523(p), (q), (t), and Sec.  170.550(1).
    Response. We continue to maintain our past determinations in that 
we estimate less than ten annual respondents for all of the regulatory 
``collection of information'' requirements for ONC-ACBs under part 170 
of title 45, including those previously approved by OMB and in this 
final rule, and that the regulatory ``collection of information'' 
requirements under the Program described in this section are not 
subject to the PRA under 5 CFR 1320.3(c). For the cost estimates of 
these new regulatory requirements, we refer readers to section XIII 
(Regulatory Impact Analysis) of this final rule.

B. Health IT Developers

    We proposed two separate collections from health IT developers in 
the Proposed Rule. First, we proposed in 45 CFR 170.580(a)(2)(iii) that 
ONC may take action against a health IT developer for failure to comply 
with Conditions and Maintenance of Certification requirements. As 
stated in the Proposed Rule, we proposed to generally use the same 
processes previously codified in regulation (Sec. Sec.  170.580 and 
170.581) to take administrative enforcement action. These processes 
would require health IT developers to submit information to ONC to 
facilitate and conclude ONC's review. The PRA, however, exempts these 
information collections. We explained in the Proposed Rule that, 
specifically, 44 U.S.C. 3518(c)(1)(B)(ii) excludes collection 
activities during the conduct of administrative actions or 
investigations involving the agency against specific individuals or 
entities.
    Secondly, we proposed in 45 CFR 170.402(b)(1) that a health IT 
developer must, for a period of 10 years beginning from the date each 
of a developer's health IT is first certified under the Program, retain 
all records and information necessary to demonstrate initial and 
ongoing compliance with the requirements of the Program for each health 
IT product. We stated in the Proposed Rule that it would take 
approximately two hours per week, on average, to comply with our 
proposed record retention requirement. We welcomed comments on whether 
more or less time should be included in our estimate.

[[Page 25905]]



Table 4--Estimated Annualized Total Burden Hours for Health IT Developers To Comply With Records and Information
                                             Retention Requirements
----------------------------------------------------------------------------------------------------------------
                                                                     Number of
               Code of Federal Regulations section                   health IT        Average          Total
                                                                    developers     burden hours
----------------------------------------------------------------------------------------------------------------
45 CFR 170.402(b)(1)............................................             458             104          47,632
                                                                 -----------------------------------------------
    Total Burden Hours..........................................  ..............  ..............          47,632
----------------------------------------------------------------------------------------------------------------

    Comments. We did not receive any comments specific to either 
collection of information from health IT developers or our 
corresponding PRA determinations.
    Response. For the first information collection, we continue to 
maintain that information collected pursuant to an administrative 
enforcement action is not subject to the PRA under 44 U.S.C. 
3518(c)(1)(B)(ii), which excludes collection activities during the 
conduct of administrative actions or investigations involving the 
agency against specific individuals or entities. For the second 
information collection, we continue to believe it will take 
approximately two hours per week on average to comply with our records 
and information retention requirements as reflected in Table 4. We 
refer readers to section XIII (Regulatory Impact Analysis) of this 
final rule for the cost estimates of the second information collection.

XIII. Regulatory Impact Analysis

A. Statement of Need

    This final rule is necessary to meet our statutory responsibilities 
under the 21st Century Cures Act (Cures Act) and to advance HHS policy 
goals to promote interoperability and mitigate burden for stakeholders. 
The provisions finalized in this rule that could result in monetary 
costs for stakeholders include the: (1) Updates to the 2015 Edition 
health IT certification criteria; (2) Conditions and Maintenance of 
Certification requirements for a health IT developer; (3) oversight for 
the Conditions and Maintenance of Certification requirements; and (4) 
information blocking.
    While much of the costs of this final rule will fall on health IT 
developers that seek to certify health IT under the ONC Health IT 
Certification Program (Program), we believe the implementation and use 
of health IT certified to the 2015 Edition (including the new and 
updated criteria in this final rule), compliance with the Conditions 
and Maintenance of Certification requirements, and the limited 
exceptions to information blocking would ultimately result in 
significant benefits for health care providers and patients. We outline 
some of these benefits below. We emphasize in this regulatory impact 
analysis (RIA) that we believe this final rule will create 
opportunities for health IT innovation through new market entrants and 
remove barriers to interoperability and electronic health information 
exchange. These efforts would greatly benefit health care providers and 
patients by increasing access to important health information and new 
technologies resulting in improvements in health care delivery and 
patient outcomes.
    The provisions in this final rule seek to advance an interoperable 
health system that empowers individuals to use their electronic health 
information (EHI) to the fullest extent and enable health care 
providers and communities to deliver smarter, safer, and more efficient 
care. Given this goal, there will be instances where the benefits and 
costs are multifaceted and unquantifiable. We note in this RIA when we 
had difficulty quantifying benefits and costs due to lack of applicable 
research or data. Additionally, there are ongoing regulatory and policy 
activities outside of this final rule that might influence the rule's 
impact in an unquantifiable manner. When possible, we acknowledge these 
complexities as well. Unquantifiable costs and benefits identified in 
this rule are summarized in Table 31.

B. Alternatives Considered

    In the Proposed Rule, we noted that we were unable to identify 
alternatives to our proposals that would appropriately implement our 
responsibilities under the Cures Act and support interoperability. At 
the time, we assessed whether there were alternatives to our proposals, 
specifically our proposals concerning EHI export, application 
programming interfaces (APIs), and real world testing. We concluded 
that our proposals took the necessary steps to fulfill the mandates 
specified in the Public Health Service Act (PHSA), as amended by the 
Health Information Technology for Economic and Clinical Health (HITECH) 
Act and the Cures Act, in the least burdensome way. We welcomed 
comments on our assessment and any alternatives that we should 
consider.
    Comments. We received comments suggesting alternatives to our 
proposals. Specifically, some commenters stated that we should consider 
an alternative approach to the EHI export (Sec.  170.315(b)(10)) 
certification criterion's scope to align with other regulations and 
data standards, such as the USCDI. Other commenters requested we 
reconsider the adoption of the consent management for APIs (Sec.  
170.315(g)(11)) certification criterion or use a different platform 
because the consent2share (C2S) platform was not mature enough. We also 
received comments requesting we consider alternative definitions for 
various information blocking terms and reconsider our approach to 
certain information blocking exceptions. Commenters recommended that we 
consider these alternatives in order to provide clarity to and reduce 
potential burden for the regulated community.
    Response. Based on comments received, we considered and adopted 
revisions to our proposals that will substantially reduce real and 
perceived burden. For the certification criteria, we revised and 
narrowed the scope of the EHI export certification criterion so that it 
is more manageable and less administratively burdensome for health IT 
developers. The criterion will link the data exported to the focused 
definition of EHI as finalized (see section IV.B.6.c). We also 
reevaluated and determined, consistent with commenter input, that there 
is continued work to be done to ballot and field test the C2S platform 
and the Consent Implementation Guide and, therefore, did not adopt the 
consent management for APIs (Sec.  170.315(g)(11)) certification 
criterion in this final rule (see section IV.B.9.b).
    Within the information blocking section, we have focused the scope 
of many terms to address commenter concerns and reduce potential burden 
on actors. We have focused the definition of EHI (Sec.  171.102) (see 
VIII.C.3). We have also focused the

[[Page 25906]]

Health Information Network (HIN) definition in consideration of 
comments in four ways. First, we combined the definitions of HIN and 
Health Information Exchange (HIE) to create one functional definition 
that applies to both statutory terms in order to clarify the types of 
individuals and entities that would be covered. Second, we limited the 
types of actions that would be necessary for an actor to meet the 
definition of HIN or HIE. Third, we have revised the definition to 
specify that to be a HIN or HIE there must be exchange among more than 
two unaffiliated individuals or entities besides the HIN/HIE that are 
enabled to exchange with each other. Fourth, we focused the definition 
on treatment, payment, and health care operations, as each are defined 
in the HIPAA Rules (45 CFR 164.501) (see VIII.C.2.c). We have also 
clarified the scope of the ``access,'' ``exchange,'' and ``use'' 
definitions and refer readers to the discussion of those changes in 
section VIII.C.5.a.
    We have also considered and finalized alternatives relating to the 
information blocking exceptions. Of note, we have finalized the new 
Content and Manner Exception (see Sec.  171.301 and the preamble 
discussion in section VIII.D.2.a), which will significantly reduce 
burden on actors. First, the content condition (Sec.  171.301(a)) 
establishes that, in order to satisfy the exception, for up to May 2, 
2022, an actor must respond to a request to access, exchange, or use 
EHI with, at a minimum, the EHI identified by the data elements 
represented in the USCDI standard adopted in Sec.  170.213. Second, the 
manner condition (Sec.  171.301(b)) explains acceptable alternative 
manners for fulfilling a request to access, exchange, or use EHI when 
an actor is technically unable to fulfill a request in any manner 
requested or cannot reach agreeable terms with the requestor to fulfill 
the request in any manner requested. This exception creates a 
transparent and flexible framework for actors to fulfill requests for 
access, exchange, or use of EHI. We refer readers to the discussion of 
the Content and Manner Exception in section VIII.D.2.a, as well as the 
broader discussion within the information blocking section where we 
discuss various other changes we have made in response to comments that 
will reduce burden (see section VIII.D).

C. Overall Impact

    We have examined the impact of this final rule as required by 
Executive Order 12866 on Regulatory Planning and Review (September 30, 
1993), Executive Order 13563 on Improving Regulation and Regulatory 
Review (January 18, 2011), Executive Order 13771 on Reducing Regulation 
and Controlling Regulatory Costs (January 30, 2017), the Regulatory 
Flexibility Act (5 U.S.C. 601 et seq.), section 202 of the Unfunded 
Mandates Reform Act of 1995 (2 U.S.C. 1532), and Executive Order 13132 
on Federalism (August 4, 1999).
1. Executive Order 13771--Reducing Regulation and Controlling 
Regulatory Costs
    Executive Order 13771 on Reducing Regulation and Controlling 
Regulatory Costs was issued on January 30, 2017 and directs agencies to 
repeal two existing regulations for each new regulation issued in 
fiscal year (FY) 2017 and thereafter. It further directs agencies, via 
guidance issued by the Office of Management and Budget (OMB), that the 
total incremental costs of all regulations should be no greater than 
zero in FY 2018. The analysis required by Executive Order 13771, as 
supplemented by Executive Order 13777, adds additional requirements for 
analysis of regulatory actions. The new requirements under Executive 
Orders 13771 and 13777 do not change or reduce existing requirements 
under Executive Orders 12866 or 13563. This final rule is an E.O. 13771 
regulatory action. We estimate this rule generates $0.84 billion in 
annualized costs in 2016 dollars, discounted at 7 percent relative to 
year 2016 over a perpetual time horizon.
2. Executive Orders 12866 and 13563--Regulatory Planning and Review 
Analysis
    Executive Orders 12866 on Regulatory Planning and Review and 13563 
on Improving Regulation and Regulatory Review direct agencies to assess 
all costs and benefits of available regulatory alternatives and, if 
regulation is necessary, to select regulatory approaches that maximize 
net benefits (including potential economic, environmental, public 
health and safety effects, distributive impacts, and equity). A 
regulatory impact analysis (RIA) must be prepared for major rules with 
economically significant effects ($100 million or more in any one 
year). Pursuant to the Congressional Review Act (5 U.S.C. 801 et seq.), 
the Office of Information and Regulatory Affairs designated this rule 
as a `major rule' as defined by 5 U.S.C. 804(2). OIRA has also 
determined that this final rule is an economically significant rule as 
we have estimated the costs to implement this final rule may be greater 
than $100 million per year. Accordingly, we have prepared an RIA that 
to the best of our ability presents the costs and benefits of this 
final rule.
a. Costs and Benefits
    We have estimated the monetary costs and benefits of this final 
rule for health IT developers, health care providers, patients, ONC--
Authorized Certification Bodies (ONC-ACBs), ONC--Authorized Testing 
Laboratories (ONC-ATLs), and the Federal Government (i.e., ONC), and 
have broken those costs and benefits out into the following categories: 
(1) Deregulatory actions (no associated costs); (2) updates to the 2015 
Edition health IT certification criteria; (3) Conditions and 
Maintenance of Certification requirements for a health IT developer; 
(4) oversight for the Conditions and Maintenance of Certification 
requirements; and (5) information blocking.
    In accordance with Executive Order 12866, we have included the RIA 
summary table as Table 30. In addition, we have included a summary to 
meet the regulatory reform analysis requirements under Executive Order 
13771.
    Cost and benefit calculations were performed in 2017 dollars, as 
this year was the most recent data available to address all cost and 
benefit estimates consistently. For summary tables 29 through 31, all 
estimates are rounded to the nearest dollar and expressed in 2016 
dollars to meet regulatory reform analysis requirements under Executive 
Order 13771.
    We note that estimates presented in the following ``Employee 
Assumptions and Hourly Wage,'' ``Quantifying the Estimated Number of 
Health IT Developers and Products,'' and ``Number of End Users that 
Might Be Impacted by ONC's Final Rule'' sections are used throughout 
this RIA.
    In this final rule, we used a number of methods to quantify direct 
and indirect benefits of our provisions. For provisions where no such 
research was available, we developed estimates based on a reasonable 
proxy. Interoperability, for example, can positively impact patient 
safety, care coordination, and improve health care processes and health 
outcomes.\192\ However, achieving interoperability is a function of 
several factors, not just the capability of the technology used by 
health care providers. Therefore, to assess some of the benefits of 
this final rule, we used regression analysis to assess their

[[Page 25907]]

respective effects on interoperability holding other factors constant.
---------------------------------------------------------------------------

    \192\ https://www.qualityforum.org/Publications/2017/09/Interoperability_2016-2017_Final_Report.aspx.
---------------------------------------------------------------------------

    One example of this approach is the methodology used to quantify 
the benefits of our real world testing and API provisions on 
interoperability. We used regression analysis to calculate the impact 
of our real world testing and API provisions on interoperability. We 
assumed that the real world testing and API provisions would 
collectively have the same impact on interoperability as upgrading 
health IT certified to the 2014 Edition. Therefore, we estimated linear 
probability models that identified the impact of 2014 Edition certified 
health IT on hospitals' interoperability.\193\ We used data from the 
2014 and 2015 American Hospital Association (AHA) Annual Survey 
Information Technology Supplement (IT Supplement), which consists of an 
analytic sample of 4,866 observations of non-Federal acute care 
hospitals that responded to the IT Supplement.\194\ We controlled for 
additional factors such as participation in a health information 
exchange organization, hospital characteristics, and urban/rural 
status. More specifically, we used the following explanatory variables:
---------------------------------------------------------------------------

    \193\ The interoperability dependent variable is a binary 
indicator for whether a hospital routinely sends, receives, and 
integrates summary of care records electronically outside of its 
system and finds any health information electronically outside of 
its system.
    \194\ American Hospital Association Health IT Supplement Survey, 
https://www.ahadata.com/aha-healthcare-database/.

Edition = 1 if a hospital adopted 2014 Edition EHR, 0 otherwise
RHIO = 1 if a hospital participates in health information exchange 
organization, 0 otherwise
Government = 1 if a hospital is publicly owned, 0 otherwise
Alt_teaching = 1 if a hospital is teaching, 0 otherwise
Nonprofit = 1 if a hospital is not for profit, 0 otherwise
Largebed = 1 if a hospital has more than 399 beds, 0 otherwise
Medbed = 1 if a hospital's number of beds is between 100 and 399, 0 
otherwise
Urban_rural = 1 if a hospital is urban, 0 otherwise
CAH = 1 if a hospital is critical access, 0 otherwise
Year = year of the data (2014 and 2015)
S = state fixed effects

    We found a statistically significant marginal effect of using 2014 
Edition certified health IT associated with a five percentage point 
increase in interoperability.\195\
---------------------------------------------------------------------------

    \195\ Results were similar when we used logit or Probit 
specifications. Note, the percentage point refers to the arithmetic 
difference between two percentages.
---------------------------------------------------------------------------

    While we acknowledge that there might be shared benefits across 
provisions, we have taken steps to ensure that the benefits attributed 
to each provision is unique to the provision referenced. For example, 
in the case of assessing the impact of our real world testing and API 
provisions on interoperability, we assumed that the marginal effect is 
true and distributed the five percentage point benefit across our 
provisions at (0.1-1) to (1-4) percentage points respectively. Given 
data limitations, we believe this approach allowed us to estimate the 
benefits of our final provisions without double counting the impact 
each provision might have on interoperability.
Employee Assumptions and Hourly Wage
    We have made employee assumptions about the level of expertise 
needed to complete the requirements in this section of the final rule. 
For wage calculations for Federal employees and ONC-ACBs, we have 
correlated the employee's expertise with the corresponding grade and 
step of an employee classified under the General Schedule (GS) Federal 
Salary Classification, relying on the associated employee hourly rates 
for the Washington, DC locality pay area as published by the Office of 
Personnel Management for 2017.\196\ We have assumed that overhead costs 
(including benefits) are equal to 100 percent of pre-tax wages. 
Therefore, we have doubled the employee's hourly wage to account for 
overhead costs. We have concluded that a 100 percent expenditure on 
overhead costs which includes benefits is an appropriate estimate based 
on research conducted by HHS.\197\
---------------------------------------------------------------------------

    \196\ https://www.opm.gov/policy-data-oversight/pay-leave/salaries-wages/salary-tables/pdf/2017/DCB_h.pdf.
    \197\ See U.S. Department of Health and Human Services, Office 
of the Assistant Secretary for Planning and Evaluation (ASPE), 
Guidelines for Regulatory Impact Analysis, at 28-30 (2016), 
available at https://aspe.hhs.gov/system/files/pdf/242926/HHS_RIAGuidance.pdf.
---------------------------------------------------------------------------

    We have used Bureau of Labor Statistics (BLS) data to calculate 
private sector employee wage estimates (e.g., health IT developers, 
health care providers, health information networks (HINs), attorneys, 
etc.), as we believe BLS provides the most accurate and comprehensive 
wage data for private sector positions. Just as with the General 
Schedule Federal Salary Classification calculations, we have assumed 
that overhead costs (including benefits) are equal to 100 percent of 
pre-tax wages.
    We estimated using 2016 dollars in the Proposed Rule. However, we 
stated in the Proposed Rule that we would consider using 2017 and even 
2018 dollars, if available, for our cost and benefit estimates in the 
final rule. Therefore, in this final rule, we updated our estimates 
using 2017 dollars for the GS Federal Salary Classification and the BLS 
data.
Quantifying the Estimated Number of Health IT Developers and Products
    We derived our estimates for the potential impact of the new 2015 
criteria on the number of certified products in the health IT market. 
This analysis is based on the number of certified health IT products 
(i.e., Health IT Modules), product capability, and the number of health 
IT developers that left, merged, and/or entered the ONC Health IT 
Certification Program between the 2011 Edition health IT certification 
criteria (2011 Edition) and the implementation of the 2014 Edition 
health IT certification criteria (2014 Edition).\198\
---------------------------------------------------------------------------

    \198\ Availability of 2014 CEHRT for Meaningful Users Providers, 
Health IT Policy Committee Data Update (Sept. 9, 2015), available at 
https://www.healthit.gov/FACAS/sites/faca/files/HITPC_Data_Update_Presentation_Final_2015-09-09.pdf.
---------------------------------------------------------------------------

    In Table 5, we quantify the extent to which the certified health IT 
market consolidated between the 2011 Edition and 2014 Edition. We found 
that the number of health IT developers certifying products between the 
2011 Edition and 2014 Edition decreased by 22.1 percent and the number 
of products available decreased by 23.2 percent.

[[Page 25908]]



           Table 5--Certified Health IT Market Consolidation From the 2011 Edition to the 2014 Edition
----------------------------------------------------------------------------------------------------------------
                                                                                                      Market
                                                                   2011 Edition    2014 Edition    consolidation
                                                                                                        (%)
----------------------------------------------------------------------------------------------------------------
Health IT Developers............................................           1,017             792           -22.1
Products Available..............................................           1,408           1,081           -23.2
----------------------------------------------------------------------------------------------------------------
\A\ For the purposes of these market consolidation calculations, we included the total number of active or
  suspended health IT products and their developers. Withdrawn products and their developers were excluded from
  this total.

    Using the rates identified in Table 5, we then applied our estimate 
for market consolidation to estimate the number 2015 Edition certified 
health IT products and health IT developers that would be impacted by 
our policies in this final rule. Specifically, to estimate the number 
of 2015 Edition products and health IT developers in the market, we 
assumed:
     Products capable of recording EHI will include new 
certification criteria. We assume that products capable of recording 
patient health data will be the types of products most likely to be 
impacted by and include the new certification criteria.
     Products capable of recording EHI data available in 2015 
equal the number of products available in 2014. In 2014, there were 710 
products by 588 developers capable of recording EHI. Since the new 
criteria involve the access to and movement and exchange of EHI, we 
used only products that record EHI as a basis for our estimates. We 
believe the 2014 totals reflect a realistic estimate of the currently 
available products and their developers that could include the new 2015 
certification criteria.
     Market consolidation rates denoted in Table 5 hold 
constant. We assume that the rate of market consolidation for products 
(-23.2 percent) and health IT developers (-22.1 percent) from the 2011 
Edition to the 2014 Edition holds constant for the 2015 Edition. 
Although we are using this number to estimate product availability, we 
are unable to assess how market consolidation might impact other 
production costs such as the supply and demand for personnel over time.
    As shown in Table 6, based on the assumptions, we have estimated 
the total number of 2015 products (545) and their developers (458).

 Table 6--Total Number of Health IT Developers and Products by Scenario
------------------------------------------------------------------------
                                             Estimated
                                             number of       Estimated
                Scenario                     health IT       number of
                                            developers       products
------------------------------------------------------------------------
2015 Edition Projection--All Products...             617             830
2015 Edition Projection--Products                    458             545
 Capable of Recording EHI...............
------------------------------------------------------------------------

Number of End Users That Might Be Impacted by ONC's Final Rule
    For the purpose of this analysis, the population of end users 
differs according to the regulatory action finalized. In many cases, 
the end-user population impacted is the number of hospitals and health 
care providers that possess certified health IT. Due to data 
limitations, our analysis regarding the number of hospitals and health 
care providers impacted by the regulatory action is based on the number 
of hospitals and health care providers that have historically 
participated in the Centers for Medicare & Medicaid Services (CMS) EHR 
Incentive Programs (now Promoting Interoperability (PI) Programs).
    One limitation of this approach is that we are unable to account 
for the impact of our provisions on users of health IT that were 
ineligible or did not participate in the CMS EHR Incentive Programs. 
For example, in 2017, 78 percent of home health agencies and 66 percent 
of skilled nursing facilities reported adopting an EHR.\199\ Nearly 
half of these facilities reported engaging aspects of health 
information exchange. However, we are unable to quantify, specifically 
the use of certified health IT products, among these provider types.
---------------------------------------------------------------------------

    \199\ Henry, J., Pylypchuck, Y., & Patel, V. (November 2018) 
Electronic Health Record Adoption and Interoperability among U.S. 
Skilled Nursing Facilities in 2017. ONC Data Brief, no. 41. Office 
of the National Coordinator for Health Information Technology: 
Washington, DC.
---------------------------------------------------------------------------

    Despite these limitations, participants in the CMS EHR Incentive 
Programs represent an adequate sample on which to base our 
estimates.\200\ There were 439,187 health care providers \201\ in 
95,470 clinical practices \202\ and 4,519 hospitals \203\ that 
participated in the CMS EHR Incentive Program. We estimate that these 
entities will be impacted by our rule.
---------------------------------------------------------------------------

    \200\ See Office of the National Coordinator for Health 
Information Technology, Office-based Health Care Professionals 
Participating in the CMS EHR Incentive Programs (Aug. 2017), 
dashboard.healthit.gov/quickstats/pages/FIG-Health-Care-Professionals-EHR-Incentive-Programs.php; Office of the National 
Coordinator for Health Information Technology, Hospitals 
Participating in the CMS EHR Incentive Programs (Aug. 2017), 
dashboard.healthit.gov/quickstats/pages/FIG-Hospitals-EHR-Incentive-Programs.php.
    \201\ This estimate is the total number of eligible providers 
that ever participated in the CMS Medicare and Medicaid Electronic 
Health Record Incentive Program.
    \202\ This number was estimated based on the de-duplicated 
number of practices that had at least one clinician participate in 
the CMS Medicare Electronic Health Record Incentive Program.
    \203\ This estimate is the total number of eligible hospitals 
that ever participated in the CMS Medicare Electronic Health Record 
Incentive Program.
---------------------------------------------------------------------------

General Comments on the RIA
    Comments. Several commenters expressed concern that the estimated 
costs and developer hours in the proposed rule were significantly 
underestimated. One commenter stated that the cost estimates did not 
accurately reflect provider implementations costs, including those 
related to ensuring compliance with the HIPAA Rules, 42 CFR part 2 and 
other Federal and State privacy laws. Some commenters were concerned 
about the impact of the requirements, as proposed in the Proposed Rule, 
on existing small health IT developers and their ability to

[[Page 25909]]

compete with large developers, as well as the impact on potential new 
market entrants. One commenter stated that this environment will result 
in only a small number of health IT developers surviving while also 
limiting market entry. One commenter expressed concern that the 
Proposed Rule will provide unfettered access to the intellectual 
property of health IT developers while increasing their compliance 
costs, which will limit their potential investment returns and create 
barriers to market entry. A few commenters expressed concern that the 
costs incurred by health IT developers to improve interoperability and 
comply with other aspects of the rule as proposed will be passed on to 
providers and patients.
    Response. We thank commenters for their input regarding our 
estimated costs and developer hours in the Proposed Rule. We considered 
and adopted revisions to our proposals based on comments that would 
substantially reduce any real or perceived burden. We reanalyzed our 
approach and made adjustments for this final rule. For instance, we 
have included additional developer hours for the additional data 
elements we finalized in this final rule. We have also included 
additional costs for the bulk data standard support and API support. 
Lastly, with regards to the comment that the cost estimates did not 
accurately reflect implementation costs to providers, when possible ONC 
has quantified provider costs associated with the deployment of new 
certified health IT functionalities and the optional acquisition of 
emerging API technologies. Costs that are not quantifiable are noted in 
Table 31. However, costs related to ensuring compliance with the HIPAA 
Rules, 42 CFR part 2 and other Federal and State privacy laws, are 
beyond the scope of the certification criteria and are not included in 
the final rule.
    We understand commenters' concerns about the impact of the 
provisions as proposed on small health IT developers and the potential 
impact on new market entrants. However, we continue to believe that 
while much of the costs of the final rule will fall on health IT 
developers seeking to certify health IT under the Program, the 
implementation and use of health IT certified to the 2015 Edition 
(including the updated and new criteria in this final rule), compliance 
with the Conditions and Maintenance of Certification requirements, and 
the limited exceptions to information blocking would ultimately result 
in significant benefits for health care providers and patients. We also 
emphasize that we believe the final rule will create opportunities for 
new market entrants and will remove barriers to interoperability and 
electronic health information exchange, which will greatly benefit 
health care providers and patients as well.
(1) Deregulatory Actions
Costs
    We do not expect incurred costs to be associated with the 
deregulatory actions in this final rule, but rather cost savings as 
detailed further in this Regulatory Impact Analysis.
Benefits
    We expect the deregulatory actions of the rulemaking to result in 
benefits for health IT developers, providers, ONC-ACBs, ONC-ATLs, and 
ONC.
(i) Removal of the Randomized Surveillance Minimum Threshold 
Requirements
    In this final rule, we have revised Sec.  170.556(c) to specify 
that ONC-ACBs may conduct in-the-field, randomized surveillance. We 
have removed Sec.  170.556(c)(2), which specifies that ONC-ACBs must 
conduct randomized surveillance for a minimum of two percent of 
certified health IT products per year. Additionally, we have removed 
the requirement that ONC-ACBs make a good faith effort to complete 
randomized surveillance and the circumstances permitted for exclusion 
from the requirement found in Sec.  170.556(c)(5).
    In the 2015 Edition final rule, we did not independently estimate 
the costs for randomized surveillance. Rather, we relied on prior 
regulatory cost estimates for all surveillance actions. One of our four 
ONC-ACBs charges a $3,000 annual fee per product for surveillance due 
to the new randomized surveillance requirements and to help normalize 
their revenue stream during down cycles between certification editions. 
Using this fee as a cost basis and assuming it would apply to all 
certified health IT (as opposed to the market-adjusted universe of 
health IT that is used in other calculations in this RIA), we estimated 
that the removal of the randomized surveillance ``two percent minimum 
threshold'' requirements will result in cost savings between $6.8 and 
$13.7 million for all stakeholders. To arrive at this estimate, we 
multiplied the $3000 annual fee per product for surveillance by the 
total number of products certified to the 2014 Edition which was 4,559 
products at the time ($3,000*4,559 = $13.7 million). We anticipate the 
number of products certified for 2014 to decrease to a little as half 
of the original count over time. Therefore, we estimated the low end to 
be half of the $13.7 million (0.5*$13.7 million = $6.8 million). This 
estimate is based on feedback we received from our ONC-ATLs and ONC-
ACBs. ONC-ACBs performed randomized surveillance an average of 22 times 
the first year the requirement was in effect. The following year 
surveillance was performed an average of two times. We cannot predict 
how many randomized surveillance events the ONC-ACBs will perform now 
that we are not enforcing the requirement. It will be completely at the 
discretion of the ONC-ACBs.
    In the Proposed Rule, we noted that we considered other potential 
benefits that we were unable to quantify. For instance, we considered 
that health care provider burden may decrease from the elimination of 
the two percent minimum threshold requirements because a provider would 
previously aid the ONC-ACB in software demonstrations.
    We welcomed comments on potential means, methods, and relevant 
comparative studies and data that we could use to better quantify these 
benefits.
    Comments. We did not receive any comments specific to the 
calculation of benefits of the elimination of the two percent minimum 
threshold requirements.
    Response. We have maintained our approach in calculating the 
benefits of this provision in this final rule. We believe the removal 
of the randomized surveillance minimum threshold requirements will 
reduce the burden on health care providers by reducing their exposure 
to randomized in-the-field surveillance of their health IT products. 
Health care providers previously expressed concern about the time 
commitment to support ONC-ACB randomized surveillance of health IT 
products, particularly if no non-conformities with certified health IT 
were found. Providers have generally stated that reactive surveillance 
(e.g., complaint-based surveillance) is a more logical and economical 
approach to surveillance of health IT products implemented in a health 
care setting. We also believe the removal of these requirements will 
provide health IT developers more time to focus on interoperability, 
and will provide ONC-ACBs more time to respond to reactive 
surveillance, including health care provider complaints about certified 
health IT.
(ii) Removal of the 2014 Edition From the Code of Federal Regulations
    We estimate that health IT developers would realize monetary 
savings from no

[[Page 25910]]

longer supporting the 2014 Edition certification criteria due to a 
reduction in activities related to maintaining certification and 
surveillance. We are aware that one of our ONC-ACBs charges an 
inherited certified status (ICS) fee of $1,000. This fee has been 
applied over the last calendar year. Over that time period, the number 
of new, unique 2014 Edition products has been declining (24 products, 
and no new products in the last four months) compared to the number of 
ICS certifications (569). Just assuming the cost of continued ICS 
certification, health IT developers would be paying approximately 
$569,000 each year to keep their 2014 Edition products up to date. 
Based on recent analysis of the number of unique 2014 Edition products, 
our assumptions hold true.
    We are not aware of comparable fees charged by ONC-ATLs; however, 
based on our experience with the Program, we expect health IT 
developers would realize similar cost savings associated with ONC-ATL 
maintenance of the testing component associated with ICS. Thus, we 
estimate an additional $569,000 cost savings for health IT developers 
due to the reduced testing requirements.
    We also attempted to identify a potential reduction in maintenance 
and administrative costs as a result of removing 2014 Edition 
certification criteria. We could not obtain data to conduct a full 
quantitative analysis specific to the reduction of health IT developer 
and health care provider costs related to supporting and maintaining 
the 2014 Edition. However, we invited comments on methods to quantify 
potential costs for maintaining and supporting products to previous 
editions.
    We did conduct a review of academic literature and qualitative 
analysis regarding potential savings from no longer supporting the 2014 
Edition. We looked at data in IT industry systems as whole, which 
showed that upgrading outdated legacy systems saves resources otherwise 
spent on maintaining compatibilities to multiple systems and also 
increases quality and efficiency.\204\ Furthermore, as technology 
evolves, newer software and products allow for smoother updates 
compared to their predecessors. Newer products provide better security 
features that can address both new and existing issues. In addition, 
older software has an increased risk of failure, which, in the health 
IT industry, increases risk to patient safety.
---------------------------------------------------------------------------

    \204\ James Crotty and Ivan Horrocks, Managing legacy system 
costs: A case study of a meta-assessment model to identify solutions 
in a large financial services company, Applied Computing and 
Informatics (2017), at 1-9.
---------------------------------------------------------------------------

    From the implementer's perspective, the research indicated that 
retaining legacy systems tends to inhibit scalability and growth for 
businesses. The perpetuity of outdated legacy systems increases 
connection and system integration costs and limits the ability to 
realize increased efficiency through IT implementation. Newer products 
are developed to current specifications and updated standards, which 
decreases barriers and marginal cost of ancillary product 
implementation and increases the accessibility of data in ancillary 
systems--including via mobile devices and the latest applications. 
Finally, office staff in a health care setting would no longer need to 
be trained to accommodate differing data access needs or workarounds 
required to integrate to the legacy product.\205\
---------------------------------------------------------------------------

    \205\ Id.
---------------------------------------------------------------------------

    The research also indicates that retaining legacy software would 
not be beneficial or profitable to the health IT market. Prolonging 
backwards compatibility of newer products to legacy systems encourages 
market fragmentation.\206\ We intend to encourage the health IT market 
to keep progressing with a baseline expectation of functionalities that 
evolve over time. This requires limiting fragmentation by no longer 
supporting outdated or obsolete legacy software.\207\
---------------------------------------------------------------------------

    \206\ Il-Horn Hann, Byungwan Koh, and Marius F. Niculescu, The 
Double-Edged Sword of Backward Compatibility: The Adoption of 
Multigenerational Platforms in the Presence of Intergenerational 
Services, Inform. Systems Res. (2016), at 112-30.
    \207\ Id.
---------------------------------------------------------------------------

    We also estimate that additional savings could be realized by 
reducing regulatory complexity and burden caused by having two 
certification editions. We observed that the task of managing two 
different editions within different rules increases complexity and 
burden for ONC staff, contractors, ONC-ACBs, CMS programs referencing 
the certification criteria, and other stakeholders, as compared to 
removing the 2014 Edition certification criteria. However, we were 
unable to estimate these benefits because we have no means for 
quantifying the benefits gained from only using the 2015 Edition.
    We also expect that health care providers would benefit from 
removing the 2014 Edition certification criteria because such action 
would likely motivate health IT developers to certify health IT 
products to the 2015 Edition, thus enabling providers to use the most 
up-to-date and supported systems to care for patients.
    Comments. We did not receive comments specific to our methods for 
quantifying the potential costs for maintaining and supporting products 
to previous editions.
    Response. We have maintained our approach for quantifying costs for 
health IT developers maintaining and supporting products to the 
previous 2014 Edition. We have also emphasized again that the research 
indicates that retaining legacy software would not be beneficial or 
profitable to the health IT market.
(iii) Removal of the ONC-Approved Accreditor From the ONC Health IT 
Certification Program
    We expect ONC to realize monetary cost savings from removing the 
ONC-Approved Accreditor (ONC-AA) from the Program. We expect ONC to 
realize costs savings from no longer: (1) Developing and publishing a 
Federal Register Notice and listserv; (2) monitoring the open 
application period and reviewing and making decisions regarding 
applications; and (3) oversight and enforcement of the ONC-AA. We have 
calculated the estimated annual cost savings for removing the ONC-AA 
from the Program, taking into consideration that the ONC-AA renewed its 
status every three years.
    For our calculations, we used the estimated hours for collaborating 
with and informing an ONC-AA in 2017 (using 2017 wage estimates). We 
estimated that ONC spent approximately 110 hours collaborating with the 
ONC-AA in 2017, which includes (all at the GS-13, Step 1 level): Annual 
assessments; providing appropriate guidance; implementing new 
requirements and initiatives; and consultations as necessary. The 
hourly wage with benefits for a GS-13, Step 1 employee located in 
Washington, DC is approximately $91. Therefore, we estimated the annual 
cost savings to be $3,337.
    We estimate that ONC would commit approximately eight hours of 
staff time to develop the Federal Register Notice, which would include 
approximately: Four hours for drafting and review by an analyst at the 
GS-13, Step 1 level; two hours for review and analysis by senior 
certification staff at the GS-14, Step 1 level; and two hours for 
review and submittal for publication by Immediate Office staff at the 
GS-15, Step 1 level. The hourly wage with benefits for a GS-13, Step 1 
employee located in Washington, DC is approximately $91. The hourly 
wage with benefits for a GS-14, Step 1 employee located in

[[Page 25911]]

Washington, DC is approximately $107. The hourly wage with benefits for 
a GS-15, Step 1 employee located in Washington, DC is approximately 
$126. Therefore, we estimate the annual cost savings to be $277. 
Additionally, we estimate a cost of $477 to publish each page in the 
Federal Register, which includes operational costs. The Federal 
Register Notice for ONC-AAs requires, on average, one page in the 
Federal Register (every three years), so we estimated an additional 
annual cost savings of $159.
    We estimated that ONC will commit approximately two hours of staff 
time by an analyst at the GS-13, Step 1 level to draft, review, and 
publish the listserv to announce the Federal Register Notice. The 
hourly wage with benefits for a GS-13, Step 1 employee located in 
Washington, DC is approximately $91. Therefore, we estimate the annual 
cost savings to be $61.
    We estimated that ONC would commit approximately 25 hours of staff 
time to manage the open application process, review applications and 
reach application decisions, which would include approximately: 20 
hours by an analyst at the GS-13, Step 1 level; three hours by senior 
certification staff at the GS-14, Step 1 level; and two hours for 
review and approval by Immediate Office staff at the GS-15, Step 1 
level. The hourly wage with benefits for a GS-13, Step 1 employee 
located in Washington, DC is approximately $91. The hourly wage with 
benefits for a GS-14, Step 1 employee located in Washington, DC is 
approximately $107. The hourly wage with benefits for a GS-15, Step 1 
employee located in Washington, DC is approximately $126. Therefore, we 
estimated the annual cost savings to be $798.
    Taking all of these potential costs savings into consideration, we 
estimated the overall annual costs savings for removing the ONC-AA from 
the Program to be $4,632.
(iv) Removal of Certain 2015 Edition Certification Criteria
    In section III.B.4 of this final rule, we removed the following 
certification criteria from the 2015 Edition: Sec.  170.315(b)(4) 
``Common Clinical Data Set summary--create;'' (b)(5) ``Common Clinical 
Data Set summary--receive'' and Sec.  170.315(a)(11) ``Smoking 
status.'' We did not finalize the proposal to remove of Sec.  
170.315(a)(10) ``Drug formulary and preferred drug list checks,'' Sec.  
170.315(a)(13) ``Patient-specific education resources'' and Sec.  
170.315(e)(2) ``Secure messaging'' but rather will only permit ONC-ACBs 
to issue certificates for these criteria until January 1, 2022 to align 
with requirements of the CMS Medicaid PI Program.
    For determining calculations for the majority of the 2015 Edition 
certification criteria we removed, we used the following assumptions. 
(For the removal of Sec.  170.315(b)(4) Common Clinical Data Set 
summary--create and (b)(5) Common Clinical Data Set summary--receive, 
we outlined the slightly different approach used).
    In the 2015 Edition final rule, we estimated the costs for 
developing and preparing health IT to meet the 2015 Edition 
certification criteria. The development and preparation costs we 
estimated were derived through a health IT developer per criterion 
cost. We estimated the development and preparation costs over a four-
year period, and we projected the costs would be unevenly distributed. 
In figuring out the cost savings for the deregulatory actions, we 
initially used the distribution from the 2015 Edition, but then 
adjusted the percentages of development and preparation costs due to 
current empirical and anecdotal evidence. The distribution was 
reevaluated to account for 2019 and we estimated the actual development 
and preparation distribution for 2018 to be 35 percent and for 2019 to 
be 15 percent. We took the average development and preparation cost 
estimates (low and high) per criterion from Table 14 of the 2015 
Edition final rule (80 FR 62737). We then used our new distribution to 
identify the cost per year for years 2018 and 2019. We took the total 
estimated costs for 2018 and 2019 and divided that by 12 to determine 
the cost savings per month and took a range of 6 to 12 months. Based on 
analysis of recent data, our assumptions continue to hold true.
    To determine the testing costs of the deregulatory actions, we took 
the number of health IT developers who develop products for 
certification for the identified criteria from the 2015 Edition final 
rule and then figured out the average cost per criterion. Based on the 
costs that one of the ONC-ATLs charges for testing, we estimated the 
average cost for testing per criterion and determined subsequent cost 
savings. In 2017, only about five to ten percent of products have been 
tested and certified compared to the number of certified 2014 Edition 
products. Therefore, up to 90 to 95 percent of products remain to be 
tested and certified to the 2015 Edition. Based on analysis of recent 
data, our assumptions continue to hold true.
    We estimated the total cost savings by multiplying the number of 
health IT developers who developed products for certification to a 
certain criterion by the estimated cost per criterion, $475. We then 
took five percent of that number to identify the high end for the cost 
savings. We then took 10 percent to identify the low end. The five 
percent was derived from looking at the number of unique developers who 
have at least one active 2014 Edition product and the number of unique 
developers who have at least one active 2015 Edition. The denominator 
is the number of unique developers who have at least one active 2014 
Edition product, which is 793. The numerator is the number of unique 
developers who have at least one active 2015 Edition product and one 
active 2014 edition product, which is 41. (41/793 = 0.0517024 or 5 
percent).
(A) Common Clinical Data Set Summary Record Criteria
    In this final rule, we removed the Common Clinical Data Set 
summary--create (Sec.  170.315(b)(4)) and Common Clinical Data Set 
summary--receive (Sec.  170.315 (b)(5)) criteria.
    Our expectation was for ONC to realize cost savings associated with 
internal infrastructure support and maintenance, which would include 
actions such as: (1) Developing and maintaining information regarding 
these criteria on the ONC website; (2) creating documents related to 
these criteria and making those documents 508 compliant; (3) updating, 
revising, and supporting Certification Companion Guides, test 
procedures, and test tools; and (4) responding to inquiries concerning 
these criteria. Based on ONC data on the number of inquiries received 
since early 2016, we estimated approximately 12 annual inquiries about 
Sec.  170.315(b)(4) and (5) respectively, (24 total inquiries for two 
criteria). We estimate it will take an analyst at the GS-13, Step 1 
level an average of two hours to conduct all tasks associated with each 
inquiry. The hourly wage with benefits for a GS-13, Step 1 employee 
located in Washington, DC is approximately $91. Based on analysis of 
recent data, our assumptions continue to hold true.
    Therefore, we estimated the annual cost savings to be $4,360.
    We do not expect cost savings associated with software maintenance 
because both criteria incorporate the Common Clinical Data Set and 
essentially the same data input and validation requirements as the 
transitions of care criterion (Sec.  170.315(b)(1)). The removal of 
these two criteria would not affect the test data and software 
maintenance costs, as the same test data and software validation 
elements remain in

[[Page 25912]]

Sec.  170.315(b)(1) and the Common Clinical Data Set used in other 
criteria.
    ONC-ACBs could realize minimal savings, as they would need to 
conduct slightly less surveillance based on the two products that are 
currently certified to these criteria. We estimated the overall annual 
costs savings for removing the Common Clinical Data Set summary record 
certification criteria from the 2015 Edition to be $4,368.
    Comments. We did not receive comments specific to the removal of 
the Common Clinical Data Set summary--create (Sec.  170.315(b)(4)) and 
Common Clinical Data Set summary--receive (Sec.  170.315 (b)(5)) 
criteria.
    Response. We maintained our approach and estimates for removing the 
Common Clinical Data Set summary record certification criteria from the 
2015 Edition. However, we did update estimates to 2017 dollars.
(B) Smoking Status
    In this final rule, we removed the 2015 Edition ``smoking status'' 
criterion (Sec.  170.315(a)(11)), which would include removing it from 
the 2015 Edition Base EHR definition. To calculate the cost savings for 
removing this criterion, we used the 2015 Edition estimated costs of 
developing and preparing the criterion to the 2015 Edition, between 
$15,750 and $31,500 and estimated that 35 percent of developers would 
be newly certified in 2018 and 15 percent in 2019. We estimated the 
cost of development and preparation costs to be between $5,512.50 and 
$11,025 for 2018 and $2,362.50 and $4,725 for 2019. We calculated the 
cost per month for years 2018 and 2019 and using the high point 
estimates, estimated the development and preparation costs over a 6 to 
12 month period between August 2018 and August 2019. We estimated the 
costs to be between $4,068.75 at six months and $6,825 at 12 months. 
Based on analysis of recent data, our assumptions continue to hold 
true.
    To calculate the cost for testing for this criterion, five 
developers were estimated in the 2015 Edition to develop products to 
this criterion. We multiplied the five developers by our estimated cost 
to test per criterion of $475. This estimated cost per criterion was 
based on what one ONC-ATL charged for testing and averaged per 
criterion. To be conservative, we reduced the number by ten percent and 
five percent respectively resulting in $2,137.50 and $2,256.25.
    Taking these estimated costs into account we expect the cost 
savings for removing the 2015 Edition ``smoking status'' criterion to 
be between $8,962.50 and $9,081.25.
    Comments. We did not receive comments specific to the removal of 
the 2015 Edition ``smoking status'' criterion (Sec.  170.315(a)(11)).
    Response. We maintain our approach and estimates for removing the 
2015 Edition ``smoking status'' criterion (Sec.  170.315(a)(11)) from 
the 2015 Edition. However, we did update estimates to 2017 dollars.
(v) Removal of Certain Certification Requirements
    In this final rule, we removed Sec.  170.523(k)(1)(iii)(B), which 
requires ONC-ACBs to ensure that certified health IT includes a 
detailed description of all known material information concerning 
limitations that a user may encounter in the course of implementing and 
using the certified health IT, whether to meet ``meaningful use'' 
objectives and measures or to achieve any other use within the scope of 
the health IT's certification. We also removed Sec.  
170.523(k)(1)(iv)(B) and (C), which state that the types of information 
required to be disclosed include, but are not limited to: (B) 
Limitations, whether by contract or otherwise, on the use of any 
capability to which technology is certified for any purpose within the 
scope of the technology's certification; or in connection with any data 
generated in the course of using any capability to which health IT is 
certified; (C) limitations, including, but not limited to, technical or 
practical limitations of technology or its capabilities, that could 
prevent or impair the successful implementation, configuration, 
customization, maintenance, support, or use of any capabilities to 
which technology is certified; or that could prevent or limit the use, 
exchange, or portability of any data generated in the course of using 
any capability to which technology is certified.
    To calculate the savings related to removing these two disclosure 
requirements, we estimated 830 products certified to the 2015 Edition. 
We did so by applying the market consolidation rate of -23.2 percent 
which was the rate observed between 2011 and 2014 Editions. If an ONC-
ACB spends 1 hour on average reviewing costs, limitations and mandatory 
disclosures, we estimated the time saved by no longer having to review 
the limitations to be two-thirds of an hour. The hourly wage with 
benefits for a GS-13, Step 1 employee located in Washington, DC is 
approximately $91 and we assume this to be the hourly rate for an ONC-
ACB reviewer. We multiplied 830, the projected number of certified 
products, by two-thirds of an hour and the assumed hourly rate and 
calculated the cost savings to be $50,353.
(2) Updates to the 2015 Edition Certification Criteria
    The following section details the costs and benefits for updates to 
the 2015 Edition health IT certification criteria, which includes costs 
and benefits to update certain 2015 Edition criteria to due to the 
adoption of the United States Core Data for Interoperability (USCDI) as 
a standard, and costs for new or revised 2015 Edition criteria for: EHI 
export, API, privacy and security transparency attestations, and 
security tags.
(i) United States Core Data for Interoperability
    In order to advance interoperability by ensuring compliance with 
new structured data and code sets that support the data, we have 
replaced the ``Common Clinical Data Set'' (CCDS) definition and its 
references with the ``United States Core Data for Interoperability'' 
(USCDI) standard, naming Version 1 (v1) in Sec.  170.213 and 
incorporated it by reference in Sec.  170.299. The USCDI will replace 
the CCDS 24 months after the publication date of this final rule. The 
USCDI v1 establishes a minimum set of data classes (including 
structured data) that are required for health IT to be interoperable 
nationwide and is designed to be expanded in an iterative and 
predictable way over time.
    The USCDI v1 adds three new data classes, ``Allergies and 
Intolerances,'' ``Clinical Notes,'' and ``Provenance;'' and adds to 
``Patient Demographics'' the data elements ``Previous Address,'' 
``Phone Number,'' ``Phone Number Type,'' and ``Email Address'' that 
were not defined in the CCDS. This requires updates to the Consolidated 
Clinical Document Architecture (C-CDA) standard and updates to the 
following certification criteria: Sec.  170.315(b)(1) (transitions of 
care); (e)(1) (view, download, and transmit to 3rd party); (g)(6) 
(Consolidated CDA creation performance); (f)(5) (transmission to public 
health agencies--electronic case reporting); and (g)(9) (application 
access--all data request). From our analysis of the C-CDA standard, we 
concluded that the requirements of the ``Provenance'' data class are 
already met by the existing C-CDA standard and will not require any new 
development. Therefore, we have estimated the cost to health IT 
developers to add support for ``Allergies and Intolerances'' and 
``Clinical Notes'' data classes and ``Previous Address,'' ``Phone 
Number,''

[[Page 25913]]

``Phone Number Type,'' and ``Email Address'' data elements in C-CDA, 
and the necessary updates to the affected certification criteria. These 
estimates are detailed in Table 7 and are based on the following 
assumptions:
     Health IT developers will use the same labor costs and 
data models. Table 7 shows the estimated labor costs per product for a 
health IT developer to develop support for the additional USCDI data 
element in the C-CDA standard and affected certification criteria. We 
recognize that health IT developer costs will vary; however, our 
estimates in this section assume all health IT developers will incur 
the costs noted in Table 7.
     A proxy is needed to project the number of 2015 Edition 
certified health IT products. As the 2015 Edition certification is 
ongoing, using the current count of developers and products would 
underestimate the overall costs and benefits, so we therefore use a 
proxy. We estimate that 545 products from 458 developers will be 
affected. Our proxy is based on the number of 2014 Edition certified 
health IT products that are capable of recording patient data.\208\ 
There were 710 products by 588 developers with at least one 2014 
Edition product capable of recording patient data. We then multiplied 
these numbers by our certified health IT market consolidation estimates 
of -22.1 percent and -23.2 percent to project the number of 2015 
developers and products, respectively.
---------------------------------------------------------------------------

    \208\ We defined ``products capable of recording patient data'' 
as any 2014 Edition health IT product that was certified for at 
least one of the following criteria: Demographics ((a)(5)), 
Medication List ((a)(7)), Medication Allergy List ((a)(8)), Problem 
List ((a)(6)), and Family Health History ((a)(12)).
---------------------------------------------------------------------------

     According to the May 2017 BLS occupational employment 
statistics, the mean hourly wage for a ``Software Developer'' is 
$53.74.\209\
---------------------------------------------------------------------------

    \209\ See ``software developer, systems software''--https://www.bls.gov/oes/2017/may/oes151133.htm.

    Table 7--Costs to Health IT Developers To Develop Support for the Additional USCDI Data Element in C-CDA
                                  Standard and Affected Certification Criteria
                                                 [2017 Dollars]
----------------------------------------------------------------------------------------------------------------
                                                             Lower bound     Upper bound
               Tasks                       Details              hours           hours             Remarks
----------------------------------------------------------------------------------------------------------------
Update C-CDA creation.............  New development to              1,200           2,400  (1) Lower bound
                                     support ``Allergies                                    assumes health IT
                                     and Intolerances,''                                    already has
                                     ``Clinical Notes,''                                    developed C-CDA R2.1
                                     ``Previous                                             into their system
                                     Address,'' ``Phone                                     and only needs to be
                                     Number,'' ``Phone                                      updated for new data
                                     Number Type,'' and                                     elements.
                                     ``Email Address''                                     (2) Upper bound
                                     for C-CDA and C-CDA                                    estimates effort for
                                     2.1 Companion Guide.                                   organizations that
                                                                                            are on older
                                                                                            versions of C-CDA
                                                                                            standard, for
                                                                                            example C-CDA R1.1.
Sec.   170.315(b)(1) (transitions   New development to                200             600  Necessary updates to
 of care).                           support ``Allergies                                    health IT to support
                                     and Intolerances,''                                    the new data class
                                     ``Clinical Notes,''                                    to meet the criteria
                                     ``Previous                                             requirements.
                                     Address,'' ``Phone
                                     Number,'' ``Phone
                                     Number Type,'' and
                                     ``Email Address''
                                     for C-CDA and C-CDA
                                     2.1 Companion Guide.
Sec.   170.315(e)(1) (view,         New development to                400           1,000  Necessary updates to
 download, and transmit to 3rd       support ``Allergies                                    health IT to support
 party).                             and Intolerances,''                                    the new data class
                                     ``Clinical Notes,''                                    to meet the criteria
                                     ``Previous                                             requirements.
                                     Address,'' ``Phone
                                     Number,'' ``Phone
                                     Number Type,'' and
                                     ``Email Address''
                                     for C-CDA and C-CDA
                                     2.1 Companion Guide.
Sec.   170.315(g)(6) (Consolidated  New development to                200             600  Sec.   170.315(b)(1)
 CDA creation performance).          support ``Allergies                                    and Sec.
                                     and Intolerances,''                                    170.315(g)(6) are
                                     ``Clinical Notes,''                                    related and may be
                                     ``Previous                                             developed together.
                                     Address,'' ``Phone
                                     Number,'' ``Phone
                                     Number Type,'' and
                                     ``Email Address''
                                     for C-CDA and C-CDA
                                     2.1 Companion Guide.
                                                          --------------------------------
    Total Hours...................  .....................           2,000           4,600  .....................
                                                          --------------------------------
    Hourly Rate...................  .....................            $107  ..............  .....................
                                                          --------------------------------
    Cost per Product..............  .....................        $214,000        $492,200  .....................
                                                          --------------------------------
    Total Cost (545 products).....  .....................  $116.6 million  $268.2 million  .....................
----------------------------------------------------------------------------------------------------------------

    We estimated that the cost to a health IT developer to develop 
support for the additional USCDI data elements would range $214,000 to 
$492,200. Therefore, assuming 545 products, we estimate that the total 
annual cost to all health IT developers would, on average, range from 
$116.6 million to $268.2 million. This would be a one-time cost to 
developers per product that is certified to the specified certification 
criteria and would not be perpetual.
    We believe this would benefit health care providers, patients, and 
the industry as a whole. Clinical notes and provenance were included in 
the draft USCDI v1 based on significant feedback from the industry, 
which highly

[[Page 25914]]

regarded their desirability as part of interoperable exchanges. The 
free text portion of the clinical notes was most often relayed by 
clinicians as the data they sought, but were often missing during 
electronic health information exchange. Similarly, the provenance of 
data was also referenced by stakeholders as a fundamental need to 
improve the trustworthiness and reliability of the data being 
exchanged.
    We expect improvements to interoperable exchange of information and 
data provenance to significantly benefit providers and patients. For 
example, in 2018, among individuals who had viewed their online medical 
record within the past year (representing 30 percent nationally), about 
half indicated that clinical notes were included in their online 
medical record.\210\ Additionally, seven percent of individuals who 
viewed their online medical record requested a correction of inaccurate 
information. Thus, enabling patients to have access to their clinical 
notes might assist in reducing medical coding errors.
---------------------------------------------------------------------------

    \210\ Patel V & Johnson C. (May 2019). Trends in Individuals' 
Access and Use of Online Medical Records and Technology for Health 
Needs: 2017-2018. ONC Data Brief, no.48 Office of the National 
Coordinator for Health Information Technology: Washington DC.
---------------------------------------------------------------------------

    Patient matching is a barrier to interoperability. In 2017, 36 
percent of non-Federal acute care hospitals reported difficulty 
matching or identifying the correct patient between systems.\211\ The 
data elements ``Previous Address,'' ``Phone Number,'' ``Phone Number 
Type,'' and ``Email Address'' were included in the USCDI v1 based on 
feedback from industry, for their usage in accurate patient matching.
---------------------------------------------------------------------------

    \211\ Pylypchuk Y., Johnson C., Henry J. & Ciricean D. (November 
2018). Variation in Interoperability among U.S. Non-Federal Acute 
Care Hospitals in 2017. ONC Data Brief, no.42. Office of the 
National Coordinator for Health Information Technology: Washington 
DC.
---------------------------------------------------------------------------

    However, we are not aware of an approach for quantifying these 
benefits and we welcomed comments on potential approaches to 
quantifying these benefits in the Proposed Rule.
    Comments. We did not receive comments regarding an approach to 
quantify benefits. However, we did receive comment regarding estimation 
of the time and effort on behalf of health IT developers to update to 
the USCDI. Commenters stated that we have underestimated the number of 
hours necessary for health IT developers, suggesting that it is triple 
our estimates.
    Response. We thank commenters for their input. We maintain the 
approach we proposed in the Proposed Rule in regard to our estimates 
for updating the USCDI. This final rule constrains ``provenance'' to 
only the scope of data for which the health IT developer is the owner/
steward. Hence, the scope is fairly limited and therefore, we believe 
our estimates to be accurate. We note the removal of ``data export'' 
(Sec.  170.315(b)(6)) from the cost estimate in Table 6, in alignment 
with our final policy decisions and no longer updating the criterion to 
USCDI. We did, however, increase the hour per developer based on 
additional data elements included in this final rule.
(ii) Electronic Health Information Export
    In this final rule, we adopted a modified version of the ``EHI 
export'' criterion in Sec.  170.315(b)(10). Notably, we have defined 
and further constrained the criterion's scope of data for export as 
EHI, as defined in Sec.  171.102, that can be stored at the time of 
certification by the product, of which the Health IT Module is a part. 
The final criterion provides a focused set of data from a scope 
perspective and clarifies what a product with a certified Health IT 
Module must be capable of exporting. The intent of this criterion aims 
to provide Health IT Module users the functionality to efficiently 
export or direct the export of EHI for a single patient or a patient 
population in a computable, electronic format.
(A) Costs To Develop and Maintain EHI Export Criterion
    This section describes the estimated costs of the ``EHI export'' 
criterion. The cost estimates are based on the following assumptions:
     Health IT developers will use the same labor costs and 
data models. Table 8 shows the estimated labor costs per product for a 
health IT developer to develop and maintain the EHI export 
functionality. We recognize that health IT developer costs will vary; 
however, our estimates in this section assume all health IT developers 
will incur the costs noted in Table 8.
     A proxy is needed to project the number of 2015 Edition 
certified health IT products containing the ``EHI export'' criterion. 
We estimated that 545 products from 458 developers will contain the 
``EHI export'' criterion. To develop these estimates, we first 
identified a proxy for the number of health IT developers that may 
create a 2015 Edition certified health IT product containing the ``EHI 
export'' criterion. Our proxy is based on the number of 2014 Edition 
certified health IT products that are capable of recording patient 
data.\212\ We based our estimates on these products because data must 
be captured to be exported under the adopted criterion. There were 710 
products by 588 developers with at least one 2014 Edition product 
capable of recording patient data. We then multiplied these numbers by 
our certified health IT market consolidation estimates of -22.1 percent 
and -23.2 percent to project the number of 2015 developers and 
products, respectively.
---------------------------------------------------------------------------

    \212\ We defined ``products capable of recording patient data'' 
as any 2014 Edition product that was certified for at least one of 
the following criteria: Demographics ((a)(5)), Medication List 
((a)(7)), Medication Allergy List ((a)(8)), Problem List ((a)(6)), 
and Family Health History ((a)(12)).
---------------------------------------------------------------------------

     Wages are determined using BLS estimates. According to the 
May 2017 BLS occupational employment statistics, the mean hourly wage 
for a ``Software Developer'' is $53.74.\213\ As noted previously, we 
have assumed that overhead costs (including benefits) are equal to 100 
percent of pre-tax wages, so the hourly wage including overhead costs 
is $107.
---------------------------------------------------------------------------

    \213\ https://www.bls.gov/oes/2017/may/oes151133.htm.

[[Page 25915]]



           Table 8--Estimated Labor Costs To Develop and Maintain the EHI Export Criterion per Product
----------------------------------------------------------------------------------------------------------------
                                               Lower bound     Upper bound
                  Activity                        hours           hours                    Remarks
----------------------------------------------------------------------------------------------------------------
Task 1: Developing the Data Dictionary                  160           1,600  This is the effort to document all
 software capability to export EHI in a                                       the data exported by the product
 developer format (per product).                                              for a single patient and for all
                                                                              patients.
                                                                             The lower bound assumes that the
                                                                              health IT developer already has a
                                                                              standard format in which they are
                                                                              exporting the data for either case
                                                                              (e.g., C-CDA for single patient,
                                                                              CSV file or database dump for all
                                                                              data) and the effort is merely to
                                                                              publish it to the users. On the
                                                                              other hand, the upper bound
                                                                              reflects the case where the health
                                                                              IT has to develop the export
                                                                              capability de novo into their
                                                                              product and document the data
                                                                              output. This still assumes that
                                                                              the developer will be able to use
                                                                              the format of their choice.
Task 2: Updating the Data Dictionary and                 80             500  This is the maintenance cost to
 publishing the updated format (per                                           update the data dictionary
 product).                                                                    published by the product to ensure
                                                                              that the data dictionary is
                                                                              compatible with newer releases of
                                                                              the product. The lower bound
                                                                              estimate assumes the effort when
                                                                              there are only minor changes to
                                                                              the formats of the data stored by
                                                                              the product. The upper bound
                                                                              estimate assumes the effort when
                                                                              the product makes substantial
                                                                              changes to the formats of the
                                                                              data.
Task 3: Updating the software that performs              80             500  This is the maintenance cost to
 EHI Export (per product).                                                    upgrade the software that would
                                                                              generate the EHI export files. The
                                                                              lower bound estimates the cost to
                                                                              maintain the software when there
                                                                              are only minor changes to the
                                                                              product, including updates to
                                                                              underlying software (e.g.,
                                                                              database versions, operating
                                                                              systems, etc.). The upper bound
                                                                              estimate accounts for substantial
                                                                              reworking of the export software
                                                                              program to export in new formats
                                                                              or based on substantial changes
                                                                              made to the underlying storage
                                                                              system.
                                            --------------------------------
    Total Labor Hours......................             320           2,600  ...................................
----------------------------------------------------------------------------------------------------------------


  Table 9--Example Calculation for the Lower Bound Estimated Cost To Health IT Developers To Perform Task 1 for
                                            the EHI Export Criterion
                                                 [2016 Dollars]
----------------------------------------------------------------------------------------------------------------
                                                               Estimated labor
                           Activity                              hours lower       Developer        Projected
                                                                    bound            salary          products
----------------------------------------------------------------------------------------------------------------
Task 1.......................................................       160 hours    $107 per hour     545 products
----------------------------------------------------------------------------------------------------------------
Example Calculation
----------------------------------------------------------------------------------------------------------------
    160 hours * $107 * 545 products = $9,330,400
----------------------------------------------------------------------------------------------------------------


  Table 10--Total Cost To Develop and Maintain the EHI Export Criterion
                             [2017 Dollars]
------------------------------------------------------------------------
                                                  Estimated cost
                Activity                 -------------------------------
                                            Lower bound     Upper bound
------------------------------------------------------------------------
Task 1 (545 products)...................      $9,330,400     $93,304,000
Task 2 (545 products)...................       4,665,200      29,157,500
Task 3 (545 products)...................       4,665,200      29,157,500
                                         -------------------------------
    Total (545 products)................      18,660,800     151,619,000
------------------------------------------------------------------------

(B) Costs To Implement and Support the EHI Export Criterion
    The cost estimates are based on the following assumptions:
     Health care providers will use the same costs and data 
models. Table 11 shows the estimated costs to implement and support the 
EHI Export criterion. The cost estimates used in this calculation were 
published by the Agency for Healthcare Research and Quality and were 
based on the average cost to implement an EHR for a clinical 
practice.\214\ This publication was based on the implementation of an 
entire EHR system. We assume that all stakeholders impacted by this 
rule will already have a base EHR system implemented, therefore we 
discounted these estimates by a factor of 10 to better reflect the cost 
to implement an EHI Export module only. We did not have cost estimates 
for hospitals. Therefore, to estimate the cost for a hospital to 
implement an EHR system, we multiplied the estimate to

[[Page 25916]]

implement an EHR for a clinical practice by a factor of 10. We believe 
this will better reflect the increased magnitude and complexity of 
implementing and supporting a new health IT module in a hospital 
compared to a clinical practice. We recognize that costs health care 
providers incur will vary; our estimates in this section assume health 
care providers incur the costs noted in Table 11.
---------------------------------------------------------------------------

    \214\ Fleming, N., Impact of Health Information Technology on 
Primary Care Workflow and Financial Measures AHRQ Publication No. 
11-0081-4-EF, October 2011 https://digital.ahrq.gov/sites/default/files/docs/page/Fleming_SS_508_20111021_d.pdf.
---------------------------------------------------------------------------

     Hospitals and clinical practices that have participated in 
the CMS EHR Incentive Program will be impacted. We estimate that 95,470 
clinical practices \215\ and 4,519 hospitals \216\ will be impacted by 
our rule.
---------------------------------------------------------------------------

    \215\ This number was estimated based on the de-duplicated 
number of practices that had at least one clinician participate in 
the CMS Medicare Electronic Health Record Incentive Program.
    \216\ This estimate is the total number of eligible hospitals 
that ever participated in the CMS Medicare Electronic Health Record 
Incentive Program.

                     Table 11--Estimated Cost to Hospitals and Clinical Practices To Implement and Support the EHI Export Criterion
                                                                     [2017 Dollars]
--------------------------------------------------------------------------------------------------------------------------------------------------------
                                                                                                Cost per entity
                   Task                            Entity type             Number of   --------------------------------              Remarks
                                                                           entities       Lower bound     Upper bound
--------------------------------------------------------------------------------------------------------------------------------------------------------
Task 1: Implementation and Support.......  Clinical Practices.........          95,470          $2,000          $4,000  This task would involve costs
                                                                                                                         associated with staff support
                                                                                                                         during implementation, workflow
                                                                                                                         mapping and redesign, content
                                                                                                                         development and customization,
                                                                                                                         project management, and other
                                                                                                                         technical deployment including
                                                                                                                         networking.
                                           Hospitals..................           4,519          20,000          40,000
Task 2: Staff Training...................  Clinical Practices.........          95,470             500           1,000  This task would involve staff
                                                                                                                         training for implementation
                                                                                                                         teams and staff end users.
                                           Hospitals..................           4,519           5,000          10,000
--------------------------------------------------------------------------------------------------------------------------------------------------------


                     Table 12--Total Cost To Implement and Support the EHI Export Criterion
                                                 [2017 Dollars]
----------------------------------------------------------------------------------------------------------------
                    Task                                                       Lower bound        Upper bound
----------------------------------------------------------------------------------------------------------------
Task 1: Implementation and Support.........  Clinical Practices...........       $190,940,000       $381,880,000
                                             Hospitals....................         90,380,000        180,760,000
Task 2: Staff Training.....................  Clinical Practices...........         47,735,000         95,470,000
                                             Hospitals....................         22,595,000         45,190,000
                                            --------------------------------------------------------------------
    Total Cost.............................  .............................        351,650,000        703,300,000
----------------------------------------------------------------------------------------------------------------

    Based on the stated assumptions and costs outlined in Tables 8 and 
10, the total estimated cost for health IT developers to develop 
products to the ``EHI export'' criterion will range from $18.7 million 
to $151.6 million. Assuming 458 health IT developers, there would be an 
average cost per health IT developer ranging from $40,744 to $331,045. 
We note that the development costs, which equal half of the total, 
would be a one-time cost and would not be perpetual. The total 
estimated cost for hospitals and clinical practices to implement and 
support the EHI Export will range from $351.7 million to $703.3 
million. The midpoint of ranges stated is used as the primary estimate 
of costs.
(C) Benefits
    Health care providers may choose to change their EHRs for a number 
of reasons. However, the steps and costs associated with switching 
one's EHR are complex. Market forces, such as health IT developers' 
business incentives, make it difficult and costly for EHR users to 
transfer system data from one developer to another. Data transfer costs 
vary depending on how contracts are structured.\217\ Specifically, 
contracts might include high data-transfer fees or do not include 
conditions for data transfer. Providers may also pay fees for 
consultants or technical staff to help with the data-transfer process 
given differences in how data may be mapped from one developer to 
another. Hence, health care providers will experience benefits 
associated with the standardization proposed in the EHI export 
functionality.
---------------------------------------------------------------------------

    \217\ Pratt, Mary, The True Cost of Switching EHRs, Medical 
Economics, May 30, 2018, Volume: 96 Issue: 10.
---------------------------------------------------------------------------

    Because of the EHI export functionality, providers will no longer 
incur the costs associated with mapping data from their health IT 
database into standard terms or exporting said data using a 
standardized format when switching EHRs. In our analysis, we calculated 
the benefits in terms of the reduced costs to providers as a result of 
our rule eliminating these two tasks. The benefit calculations below 
are based on the following assumptions:
     On average, five percent of providers and hospitals switch 
their health IT annually. Using CMS Medicare EHR Incentive Program data 
from years 2013-2016, we estimate the rate of providers (hospitals and 
eligible professionals) that changed their health IT developer. We 
believe that the EHI export functionality would help alleviate the 
burden of switching between health IT systems by increasing portability 
of EHI that can be stored at the time of certification by the product, 
of which the Health IT Module is a part. Thus, the benefit calculations 
are based on assumptions regarding the number of clinical practices (n 
= 4,774) and hospitals (n = 226) that are projected to switch products 
in a year.

[[Page 25917]]

     Health IT consultants \218\ will use the same labor costs 
and data models. Table 13 shows the estimated labor costs per product 
for a hospital or health care provider to hire a health IT consultant 
to perform data export of EHI, as defined in 45 CFR 171.102, without 
the EHI export functionality. We recognize that these costs will vary 
based on the size of the hospital or clinical practice.
---------------------------------------------------------------------------

    \218\ ``Health IT consultant'' refers to a technical expert that 
a hospital or provider will hire to migrate their data from a legacy 
system to a new EHR.
---------------------------------------------------------------------------

     Wages are determined using BLS estimates. According to the 
May 2017 BLS occupational employment statistics, the mean hourly wage 
for a ``Software Developer'' is $53.74.\219\ As noted previously, we 
have assumed that overhead costs (including benefits) are equal to 100 
percent of pre-tax wages, so the hourly wage including overhead costs 
is $107.
---------------------------------------------------------------------------

    \219\ https://www.bls.gov/oes/2017/may/oes151133.htm.

  Table 13--Cost per Provider To Perform Data Export Without EHI Export Functionality When Switching Health IT
                                                    Products
                                                 [2017 Dollars]
----------------------------------------------------------------------------------------------------------------
                                             Estimated cost  Estimated cost
                                              per health IT   per health IT
                  Activity                    switch (lower   switch (upper                Remarks
                                             bound) (hours)  bound) (hours)
----------------------------------------------------------------------------------------------------------------
Task 1: Understanding and mapping the data              320           3,200  The lower bound is an estimate for
 in health IT database into standard terms.                                   a small provider practice using
                                                                              the standard instance of a
                                                                              certified health IT product with
                                                                              no customization and use of
                                                                              nationally recognized content
                                                                              standards. The upper bound
                                                                              estimates a medium to large
                                                                              practice with substantial local
                                                                              customization of content.
Task 2: Exporting the data from the health              160           1,600  The lower bound assumes that the
 IT into a format that can be subsequently                                    certified health IT product is
 used to import.                                                              capable of exporting most of the
                                                                              data into standard output format
                                                                              such as C-CDA. The upper bound
                                                                              estimates the case where a large
                                                                              amount of data is not easily
                                                                              exported by the certified health
                                                                              IT product and therefore
                                                                              substantial one-off software needs
                                                                              to be written to export the data
                                                                              into a custom (de novo) format
                                                                              developed for the transition.
                                            --------------------------------
    Total Labor Hours......................             480           4,800
----------------------------------------------------------------------------------------------------------------

    Table 14 provides an example calculation for how we calculated our 
total costs presented in Table 15.

 Table 14--Example Calculation for the Lower Bound Estimated Cost to Providers To Hire a Health IT Consultant To
                                 Perform Task 1 Without the EHI Export Criterion
                                                 [2017 Dollars]
----------------------------------------------------------------------------------------------------------------
                                                                                               Estimated annual
                      Activity                          Estimated labor    Developer salary    number of health
                                                       hours lower bound                          IT switches
----------------------------------------------------------------------------------------------------------------
Task 1..............................................          320 hours       $107 per hour      5,000 switches
----------------------------------------------------------------------------------------------------------------
Example Calculation:
    320 hours * $107 * 5000 switches = $171,200,000.
----------------------------------------------------------------------------------------------------------------


Table 15--Total Cost to Providers To Perform Data Export Without the EHI
           Export Criterion When Switching Health IT Products
                             [2017 Dollars]
------------------------------------------------------------------------
                                               Estimated cost
             Activity              -------------------------------------
                                       Lower bound        Upper bound
------------------------------------------------------------------------
Task 1............................       $171,200,000     $1,712,000,000
Task 2............................         85,600,000        856,000,000
                                   -------------------------------------
    Total Cost Savings (5,000             256,800,000      2,568,000,000
     switches)....................
------------------------------------------------------------------------


[[Page 25918]]

    We multiplied the costs to switch health IT by the estimated number 
of hospitals and clinical practices affected. Thus the estimated annual 
benefit, in terms of cost savings to hospitals and clinical practices, 
would range from $256.8 million to $2.6 billion.
(iii) Application Programming Interfaces
    The API requirements in this final rule reflect the full depth and 
scope of what we believe is necessary to implement the API Condition of 
Certification requirement described in section 4002 of the Cures Act. 
We have adopted new standards, new implementation specifications, a new 
certification criterion, and detailed Conditions and Maintenance of 
Certification requirements in Sec. Sec.  170.213 and 170.215, 170.315, 
and 170.404, respectively. We also modified the Base EHR definition in 
Sec.  170.201.
(A) Costs To Develop and Maintain Certified API Technology
    This section describes the potential costs of the API certification 
criterion. The cost estimates below are based on the following 
assumptions:
     Health IT developers will use labor costs and data models 
based on whether they have adopted aspects of the API certification 
criterion. Tables 16 A and 16 B show the estimated labor costs per 
product for a health IT developer to develop and maintain an API. We 
recognize that health IT developer costs will vary based on whether 
they have already implemented aspects of the API certification 
criterion; including adopting the Fast Healthcare Interoperability 
Resources (FHIR[supreg]) API. To account for this variation, we have 
estimated two cost tables. Table 16 A reflects the range of costs 
incurred for new products or those developers that have not previously 
certified to the API certification criteria. Table 16 B shows the cost 
for developers that have already implemented the API criteria. We have 
assumed in our calculations that all health IT developers will incur 
costs noted in either Table 16 A or Table 16 B.
     A proxy is needed to project the number of 2015 Edition 
certified health IT products containing the API certification 
criterion. We estimated that 459 products from 394 developers will 
contain the API criterion. We used a proxy to determine the number of 
health IT developers that may develop an API for the certification to 
the 2015 Edition. There were 598 products and 506 developers with at 
least one 2014 Edition certified health IT product that could perform 
transitions of care. We then multiplied this number by our certified 
health IT market consolidation estimates of -22.1 percent and -23.2 
percent to project the number of 2015 developers and products, 
respectively. Some developers and products are already leveraging 
aspects of the API certification criterion. This could reduce their 
cost to implement the criterion. To determine the number of developers 
and products applicable to cost Table 16 A or 16 B, we calculated the 
proportion of products and developers that have already certified to 
API certification criterion. We then applied this estimate to the 
projected number of 2015 Edition certified health IT products. 
Specifically, we estimate that 50 percent of products (230) and 55 
percent of developers (217) will incur costs reflected in Table 16 A 
because they have no prior experience with certifying to the API 
criteria. We believe this estimate serves as a reasonable proxy for 
products' capability to send patient data and the cost of 
implementation. The API functionality required by the 2015 Edition 
achieves a similar end by allowing providers to retrieve patient data 
from secure data servers hosted by other developers, as well as 
providing patients access to their medical records through third-party 
applications connected to these same secure servers.
     Wages are determined using BLS estimates. According to the 
May 2017 BLS occupational employment statistics, the mean hourly wage 
for a ``Software Developer'' is $53.74.\220\
---------------------------------------------------------------------------

    \220\ https://www.bls.gov/oes/2017/may/oes151133.htm.

                   Table 16 A--Estimated Labor Hours To Develop and Maintain API--New Products
----------------------------------------------------------------------------------------------------------------
                                                               Estimated labor hours
            Activity                     Details         --------------------------------         Remarks
                                                            Lower bound     Upper bound
----------------------------------------------------------------------------------------------------------------
Task 1: Implementing security    (1) New development to             1000            1500  (1) Lower bound
 via SMART App Launch Framework   support OpenID Connect.                                  assumes health IT has
 IG (per product).               (2) Implementation of                                     already implemented
                                  the Smart Guide with                                     security via SMART
                                  support for refresh                                      App Launch Framework
                                  tokens and the core                                      IG and need to be
                                  capabilities specified                                   updated to account
                                  in the rule.                                             for additional
                                 (3) New development to                                    requirements in the
                                  respond to request for                                   rule including
                                  access token                                             Support for
                                  verification.                                            additional ``core''
                                                                                           capabilities required
                                                                                           by rule and Token
                                                                                           Introspection.
                                                                                          (2) Upper bound
                                                                                           assumes new
                                                                                           development for
                                                                                           implementation of
                                                                                           SMART App Launch
                                                                                           Framework IG, and
                                                                                           additional
                                                                                           requirements in the
                                                                                           rule including Token
                                                                                           Introspection.
Task 2: Develop support for      (1) New development to             2000            6000  (1) Lower bound
 Fast Healthcare                  support FHIR R4.                                         assumes health IT
 Interoperability Resources      (2) Implementation to                                     already has developed
 (FHIR[supreg]) API and           the FHIR US Core IG.                                     FHIR DSTU2 2015
 associated IGs (per product).                                                             Edition for data
                                                                                           classes that were
                                                                                           specified in prior
                                                                                           rule and only needs
                                                                                           to be updated to R4
                                                                                           and new data classes
                                                                                           specified in the rule
                                                                                          (2) Upper bound
                                                                                           assumes new
                                                                                           development of FHIR
                                                                                           API for all resources

[[Page 25919]]

 
Task 3: Develop API for          (1) New development to             2000            4500  (1) Lower bound
 Population Level Services (per   support FHIR Bulk Data                                   assumes health IT
 product).                        Access IG.                                               already has an
Note: One-time cost............                                                            existing API for
                                                                                           population level
                                                                                           services; and need to
                                                                                           migrate to the
                                                                                           standardized API
                                                                                           specified in the
                                                                                           rule.
                                                                                          (2) Upper bound
                                                                                           assumes new
                                                                                           development of FHIR
                                                                                           Bulk Data Access IG.
Task 4: Development of App       (1) New registration               1000            2500  (1) Lower bound
 registration Server and Portal   server development (or                                   assumes that the
 (per developer).                 updates to existing                                      developer already has
                                  server) to support                                       existing application
                                  registration                                             registration
                                  timeliness and                                           infrastructure in
                                  publication of FHIR                                      place, and only needs
                                  endpoints.                                               to update it to
                                 (2) Development of                                        support the API
                                  portal and managing                                      Maintenance of
                                  the application                                          Certification
                                  registration system.                                     requirements.
                                                                                          (2) Upper bound is new
                                                                                           development of an
                                                                                           application
                                                                                           registration service
                                                                                           and portal.
Task 5: Update Application       (1) Yearly updates and              400            1300  (1) Lower bound
 Registration Server and Portal   maintenance to keep                                      estimates hours to
 (per developer).                 the portal running. We                                   keep it running with
                                  do not anticipate any                                    junior staff.
                                  major changes to the                                    (2) Upper bound
                                  standard and will be                                     estimates small
                                  primarily driven by                                      updates.
                                  usage and developer
                                  interest.
Task 6: Develop support for      (1) Develop capability              250            1500  (1) Lower bound
 patients to revoke access to     to identify apps                                         assumes that the
 authorized app (per product)..   authorized by                                            developer already has
Note: One-time cost............   registered users.                                        a portal used by
                                 (2) Provide capability                                    patients for managing
                                  to remove access at                                      their preferences and
                                  patient direction.                                       new development will
                                                                                           be needed to provide
                                                                                           patients with ability
                                                                                           to view and revoke
                                                                                           access to their
                                                                                           authorized apps.
                                                                                          (2) Upper bound
                                                                                           assumes that
                                                                                           developer's current
                                                                                           capability of
                                                                                           managing registered
                                                                                           patients need to be
                                                                                           significantly
                                                                                           enhanced to support
                                                                                           enabling patients to
                                                                                           revoke access to the
                                                                                           authorized apps.
Other costs (50% per product,    (1) Server costs for             $7,500         $30,000  (1) Estimated as
 50% per developer) \(2017        application                                              monetized costs and
 Dollars)\.                       registration, sandbox,                                   not as hours; most of
Note: One-time cost............   bulk data storage, and                                   the costs would be
                                  costs associated with                                    one-time procurement
                                  making documentation                                     costs plus yearly
                                  publicly available.                                      maintenance.
                                 (2) Software costs
                                  (e.g., databases,
                                  application servers,
                                  portal technology).
----------------------------------------------------------------------------------------------------------------


           Table 16 B--Estimated Labor Hours To Develop and Maintain API--Currently Certified Products
----------------------------------------------------------------------------------------------------------------
                                                               Estimated labor hours
            Activity                     Details         --------------------------------         Remarks
                                                            Lower bound     Upper bound
----------------------------------------------------------------------------------------------------------------
Task 1: Implementing security    (1) Development to                  800            1000  (1) Lower bound
 via SMART App Launch Framework   support OpenID Connect.                                  assumes health IT has
 IG (per product).               (2) Implementation of                                     already implemented
                                  the Smart Guide with                                     security via SMART
                                  support for refresh                                      App Launch Framework
                                  tokens and the core                                      IG and need to be
                                  capabilities specified                                   updated to account
                                  in the rule.                                             for additional
                                 (3) Development to                                        requirements in the
                                  respond to request for                                   rule.
                                  access token                                            (2) Upper bound
                                  verification.                                            assumes additional
                                                                                           development for
                                                                                           implementation of
                                                                                           SMART App Launch
                                                                                           Framework IG, and
                                                                                           additional
                                                                                           requirements in the
                                                                                           rule.
Task 2: Develop support for      (1) Development to                 1600            2000  (1) Lower bound
 Fast Healthcare                  support FHIR R4.                                         assumes health IT
 Interoperability Resources      (2) Implementation to                                     already has developed
 (FHIR[supreg]) API and           the FHIR US Core IG.                                     FHIR R4 for data
 associated IGs (per product).                                                             classes that were
                                                                                           specified in prior
                                                                                           rule and only needs
                                                                                           to be updated to new
                                                                                           data classes
                                                                                           specified in the
                                                                                           rule.
                                                                                          (2) Upper bound
                                                                                           assumes health IT was
                                                                                           originally developed
                                                                                           for FHIR DSTU2 and
                                                                                           needs additional
                                                                                           development of FHIR
                                                                                           API to support
                                                                                           upgrading to FHIR R4
                                                                                           and new data classes.

[[Page 25920]]

 
Task 3: Develop API for          (1) New development to             2000            4500  (1) Lower bound
 Population Level Services (per   support FHIR Bulk Data                                   assumes health IT
 product).                        Access IG.                                               already has an
Note: One-time cost............                                                            existing API for
                                                                                           population level
                                                                                           services; and need to
                                                                                           migrate to the
                                                                                           standardized API
                                                                                           specified in the
                                                                                           rule.
                                                                                          (2) Upper bound
                                                                                           assumes new
                                                                                           development of FHIR
                                                                                           Bulk Data Access IG.
Task 4: Development of App       (1) New registration                800            1000  (1) Lower bound
 registration Server and Portal   server development (or                                   assumes that the
 (per developer).                 updates to existing                                      developer already has
                                  server) to support                                       existing application
                                  registration                                             registration
                                  timeliness and                                           infrastructure in
                                  publication of FHIR                                      place, and only needs
                                  endpoints.                                               to update it to
                                 (2) Development of                                        support the API
                                  portal and managing                                      Maintenance of
                                  the application                                          Certification
                                  registration system.                                     requirements.
                                                                                          (2) Upper bound
                                                                                           assumes additional
                                                                                           development to
                                                                                           support requirements
                                                                                           in rule.
Task 5: Update Application       (1) Yearly updates and              320             400  (1) Lower bound
 Registration Server and Portal   maintenance to keep                                      estimates hours to
 (per developer).                 the portal running. We                                   keep it running with
                                  do not anticipate any                                    junior staff.
                                  major changes to the                                    (2) Upper bound
                                  standard and will be                                     estimates small
                                  primarily driven by                                      updates.
                                  usage and developer
                                  interest.
Task 6: Develop support for      (1) Develop capability              150             250  (1) Lower bound
 patients to revoke access to     to identify apps                                         assumes the developer
 authorized app (per product).    authorized by                                            provides this
Note: One-time cost............   registered users.                                        functionality based
                                 (2) Provide capability                                    on 2015 ONC Edition
                                  to remove access at                                      and needs to perform
                                  patient direction.                                       minimum verification.
                                                                                          (2) Upper bound
                                                                                           assumes that the
                                                                                           developer already has
                                                                                           a portal used by
                                                                                           patients for managing
                                                                                           their preferences and
                                                                                           new development will
                                                                                           be needed to provide
                                                                                           patients with ability
                                                                                           to view and revoke
                                                                                           access to their
                                                                                           authorized apps.
Other costs (50% per product,    (1) Server costs for              $6000          $7,500  (1) Estimated as
 50% per developer) \(2017        application                                              monetized costs and
 Dollars)\.                       registration, sandbox,                                   not as hours; most of
Note: One-time cost............   bulk data storage, and                                   the costs would be
                                  costs associated with                                    one-time procurement
                                  making documentation                                     costs plus yearly
                                  publicly available.                                      maintenance.
                                 (2) Software costs
                                  (e.g., databases,
                                  application servers,
                                  portal technology).
----------------------------------------------------------------------------------------------------------------

    Table 17 provides an example calculation for how we calculated our 
total costs presented in Tables 18 A and 18 B.

Table 17--Example Calculation for the Lower Bound Estimated Cost to New Products To Perform Task 1 in Table 13 A
                                                 To Develop API
                                                 [2017 Dollars]
----------------------------------------------------------------------------------------------------------------
                                        Estimated labor hours
               Activity               -------------------------     Developer salary        Projected products
                                             Lower bound
----------------------------------------------------------------------------------------------------------------
Task 1...............................  1,000 hours............  $107 per hour..........  230 products.
----------------------------------------------------------------------------------------------------------------
Example Calculation:
    1,000 hours * $107 * 230 products
     = $24,610,000.
----------------------------------------------------------------------------------------------------------------


    Table 18 A--Total Cost To Develop and Maintain API--New Products
                             [2017 Dollars]
------------------------------------------------------------------------
                                                  Estimated lost
                Activity                 -------------------------------
                                            Lower bound     Upper bound
------------------------------------------------------------------------
Task 1 (230 products)...................     $24,556,500     $36,834,750
Task 2 (230 products)...................      49,113,000     147,339,000
Task 3 (230 products)...................      49,113,000     110,504,250

[[Page 25921]]

 
Task 4 (217 developers).................      23,186,900      57,967,250
Task 5 (217 developers).................       9,274,760      30,142,970
Task 6 (230 products)...................       6,152,500      36,915,000
Other Costs (230 products)..............         860,625       3,442,500
Other Costs (217 developers)............         812,625       3,250,500
                                         -------------------------------
    Total (230 products and 217              163,069,910     426,396,220
     developers)........................
------------------------------------------------------------------------


 Table 18 B--Total Cost To Develop and Maintain API--Currently Certified
                                Products
                             [2017 Dollars]
------------------------------------------------------------------------
                                                  Estimated cost
                Activity                 -------------------------------
                                            Lower bound     Upper bound
------------------------------------------------------------------------
Task 1 (229 products)...................     $19,645,200     $24,556,500
Task 2 (229 products)...................      39,290,400      49,113,000
Task 3 (229 products)...................      49,113,000     110,504,250
Task 4 (177 developers).................      15,176,880      18,971,100
Task 5 (177 developers).................       6,070,752       7,588,440
Task 6 (229 products)...................       3,675,450       6,125,750
Other Costs (229 developers)............         688,500         860,625
Other Costs (177 products)..............         531,900         664,875
                                         -------------------------------
    Total (229 products and 177              134,192,082     218,384,540
     developers)........................
------------------------------------------------------------------------

    We note that we have adopted in Sec.  170.404(b)(3) a specific 
requirement that an API Technology Supplier must support the 
publication of Service Base URLs for all of its customers that are 
centrally managed by the Certified API Developer, and make such 
information publicly available (in a computable format) at no charge. 
Thus, we are placing the responsibility of publishing the URLs on 
health IT developers and those costs are captured in the registration 
portal cost estimation in this RIA.
    Based on the stated assumptions and costs outlined in Tables 16 A 
and 16 B, the total estimated costs for health IT developers to develop 
and maintain a product to the API criterion would range from $297.3 
million to $644.8 million with an average cost per developer ranging 
from $0.75 million to $1.64 million. We note that the ``other costs'' 
and costs associated with tasks 3 and 6, which account for $110.9 
million to $272.3 million of this total, are one-time costs and are not 
perpetual.
(B) Optional Cost To Acquire and Use Applications That Interact With 
Certified API Technology
    We believe the API certification criterion and associated Condition 
and Maintenance of Certification requirements finalized in this rule 
will create an environment that promotes innovation for software 
developers to connect new tools and services that create efficiencies 
for health care providers throughout their course of care delivery. 
Software applications that connect to APIs is an emerging market that 
we believe will be further enhanced by the standards, transparency, and 
pro-competitive requirements finalized in this rule. As of October 25, 
2018, researchers identified nearly 300 software applications being 
marketed on EHR vendors' app stores. The majority of these applications 
are designed for health care providers to help support use cases for 
population health analytics, clinical decision support, patient 
education, as well as to conduct administrative and financial 
tasks.\221\ Although not required under this rule, this section 
describes the potential costs of health care providers to acquire and 
use new software applications that interact with certified API 
technology. The cost estimates are based on the following assumptions:
---------------------------------------------------------------------------

    \221\ Dullabh P, Hovey L, Heaney-Huls K, Rajendron N, Wright A, 
Sittig D. Application Programming Interfaces in Health Care: 
Findings from a Current-State Sociotechnical Assessment. Applied 
Clinical Informatics. 2020; 11(01): 059-069.
---------------------------------------------------------------------------

     Health care providers will use the same costs and data 
models. Table 19 shows the estimated costs to acquire and use software 
applications that interact with certified API technology. We recognize 
that costs health care providers incur will vary based on several 
factors including, but not limited to, size of the health care entity, 
application usage, and complexity of deployment and maintenance. 
However, our estimates in this section assume health care providers 
incur the costs noted in Table 19.
     Hospitals and clinical practices that have participated in 
the CMS EHR Incentive Program will be impacted. We estimate that 95,470 
clinical practices \222\ and 4,519 hospitals \223\ will be impacted by 
our rule.
---------------------------------------------------------------------------

    \222\ This number was estimated based on the de-duplicated 
number of practices that had at least one clinician participate in 
the CMS Medicare Electronic Health Record Incentive Program.
    \223\ This estimate is the total number of eligible hospitals 
that ever participated in the CMS Medicare Electronic Health Record 
Incentive Program.

[[Page 25922]]



   Table 19--Estimated Cost to Hospitals and Clinical Practices To Acquire and Use Software Applications That
                                      Engage With Certified API Technology
                                                 [2017 Dollars]
----------------------------------------------------------------------------------------------------------------
                                                          Cost per entity                   Total cost
           Entity type               Number of   ---------------------------------------------------------------
                                     entities       Lower bound     Upper bound     Lower bound     Upper bound
----------------------------------------------------------------------------------------------------------------
Clinical Practices..............          95,470          $1,000          $5,000     $95,470,000    $477,350,000
Hospitals.......................           4,519          10,000         100,000      45,190,000     451,900,000
                                 -------------------------------------------------------------------------------
    Total.......................  ..............  ..............  ..............     140,660,000     929,250,000
----------------------------------------------------------------------------------------------------------------

    The total cost to health care providers to acquire and use software 
applications that engage with certified API technology would range from 
$140.6 million to $929.3 million. The midpoint of ranges stated is used 
as the primary estimate of costs.
(C) Benefits
    The Medicare Access and CHIP Reauthorization Act (MACRA), (Pub. L. 
114-10), tasks ONC with measuring interoperability in the health IT 
industry.\224\ The measurement concepts developed include a multi-part 
approach analyzing not only adoption of health IT functionalities 
supporting information exchange but the downstream impact of these 
technologies on data completeness, data integration, and supports for 
core functions of patient care. The benefits of our API proposal are 
similarly multifaceted.
---------------------------------------------------------------------------

    \224\ Health IT Buzz Blog, Measuring Interoperability: Listening 
and Learning, https://www.healthit.gov/buzz-blog/electronic-health-and-medical-records/interoperability-electronic-health-and-medical-records/measuring-interoperability-listening-learning/.
---------------------------------------------------------------------------

    Our API proposal will increase interoperability by ensuring that 
more data is available and shared between EHR users. The proposal will 
also make data more widely available to software developers outside of 
those specializing in EHR development. As a result, this data will lead 
to greater innovation in the app market resulting in new technologies 
for health care providers and patients alike. In the analysis, we 
quantify benefits in the following three areas: First, provider time 
saved as a result of new efficiencies in care delivery due to new 
technologies, such as provider facing apps. Second, the effects of 
interoperability on cost-savings associated with reductions in 
duplicate lab tests, readmissions, emergency room (ER) visits, and 
adverse drug events. We focused on these outcomes for two reasons: 
Evidence in literature indicates that health information exchange 
impacts the chosen measures; and cost of care associated with these 
measures is high and the impact of health information exchange is 
likely to result in significant benefits in the form of a cost 
reduction.\225\ Finally, we quantify an increase in the number of 
individuals with access to their health information through a mechanism 
of their choice such as apps.
---------------------------------------------------------------------------

    \225\ Analyzing the Public Benefit Attributable to Interoperable 
Health Information Exchange https://aspe.hhs.gov/pdf-report/analyzing-public-benefit-attributable-interoperable-health-information-exchange.
---------------------------------------------------------------------------

    The benefit calculations are based on the following assumptions:
     Benefits noted in academic literature are assumed 
accurate. Estimates of the benefits are based on estimates obtained 
from peer reviewed academic literature. ONC reviewed academic articles 
for validity; however, models were not replicated.
     Hospitals and eligible professionals that have 
participated in the CMS EHR Incentive Programs will be impacted: 
Estimates assume that 439,187 health care providers and/or 4,519 
hospitals would be affected by this regulatory action.
(D) Benefits: Provider Time Saved as a Result of New Efficiencies in 
Care Delivery Due to the Optional Purchase of New Technologies, Such as 
Provider Facing Apps
    Improvements in technology result in benefits for consumers and 
producers through increased production efficiencies (Stoneman 
2018).\226\ The introduction of EHRs into the health care industry is 
an example of this. Sinsky (2016) found physicians spend 27 percent of 
their total time on direct clinical face time with patients, and 49.2 
percent of their time on EHR and desk work.\227\ Outside of office 
hours, physicians spend another one to two hours of personal time each 
night doing additional computer and other clerical work. Despite the 
number of hours providers spend in their EHR, there is evidence that 
the introduction of EHRs is associated with time saved. Adler-Milstein 
(2013) found that EHR use compared to non-EHR use resulted in a 5.3 
percent increase in work relative value units per clinician work 
day.\228\
---------------------------------------------------------------------------

    \226\ Stoneman P, Bartoloni E., Baussola M. The Microeconomics 
of Product Innovation. Oxford, United Kingdom: Oxford University 
Press, 2018.
    \227\ Christine Sinsky et al., Allocation of Physician Time in 
Ambulatory Practice: A Time and Motion Study in 4 Specialties, Ann 
Intern Med. (Dec. 6, 2016), at 753-60.
    \228\ Julia Adler-Milstein and Robert S. Huckman, The Impact of 
Electronic Health Record Use on Physician Productivity, Am J Manag 
Care (Nov. 19, 2013).
---------------------------------------------------------------------------

    Improved efficiencies are not limited to the installation of an 
EHR. Providers also benefit from the use of emerging technologies. 
Amusan (2008) found that EHR and computerized provider order entry 
(CPOE) implementation was associated with 3.69 minutes of time saved 
five months post implementation.\229\ Similarly, Helmons (2015) found 
that the impact of suppressing clinically irrelevant alerts and adding 
clinical-decision support to EHRs saved providers about two percent of 
their time.
---------------------------------------------------------------------------

    \229\ Amusan, Tongen, Speedie, and Mellin, A time-motion study 
to evaluate the impact of EMR and CPOE implementation on physician 
efficiency, J. Healthcare Inf. Manag. (Fall 2008), at 31-7.
---------------------------------------------------------------------------

    To measure the benefits of the API provision on providers' time as 
a result of new technologies, we examined the literature on the impact 
of IT on productivity across various industries. As explained in Bartel 
(2007), improvements in IT could affect productivity through multiple 
mechanisms that are not necessarily associated with the underlying 
intention of that technology.\230\ When examining the effect of IT in 
manufacturing, researchers found that adoption of IT affected 
production plants' composition of products, reduced time of production 
processes, and increased hiring of skilled workers. We adopt the same 
logic here. Specifically, we assume that the impact of the data made 
available under our API provisions will not be

[[Page 25923]]

through a single mechanism, such as an EHR, but will have multiple 
spillover effects. For example, data made available through an API 
could be used by a software developer to create tools to improve 
patient scheduling and billing processes. Use of this tool could result 
in improvements in the providers' workflow. Thus, is important to 
quantify the impacts of data made available through APIs on the future 
health IT market.
---------------------------------------------------------------------------

    \230\ Bartel, Ann & Ichniowski, Casey & Shaw, Kathryn. (2007). 
How Does Information Technology Affect Productivity? Plant-Level 
Comparisons of Product Innovation, Process Improvement, and Worker 
Skills. The Quarterly Journal of Economics. 122. 1721-1758. 10.1162/
qjec.2007.122.4.1721.
---------------------------------------------------------------------------

    Table 20 provides a summary of the results of the literature review 
used to quantify this benefit.

           Table 20--Findings From Literature on the Impact of Information Technology on Productivity
----------------------------------------------------------------------------------------------------------------
                     Study                                         Description                    Findings:  (%)
----------------------------------------------------------------------------------------------------------------
Bartel et al (2007)...........................  Identify impact in improvements in information               4-8
                                                 technology on production time of valve
                                                 manufacturing. IT is defined as adoption of
                                                 separated information system that enable
                                                 various automations.
Lee et al (2013)..............................  Identified impact of IT capital on hospital                  3-6
                                                 productivity where IT capital is defined as
                                                 hospital expenditure on IT.
Shao and Lin (2002)...........................  Identifies impact of IT expense on productivity              2-7
                                                 of fortune 500 firms.
Adler-Milstein et al (2013)...................  Identifies the impact of the introduction of the               5
                                                 EHR on providers' time compared to non-EHR
                                                 users.
Helmons et al (2015)..........................  Identifies impact of suppressing clinically                    2
                                                 irrelevant alerts and adding clinical-decision
                                                 support to EHRs on time saved.
Wagholikar KB, et al (2015)...................  Identifies impact of clinical-decision support                 1
                                                 on time saved among primary care providers.
----------------------------------------------------------------------------------------------------------------
Sources:
\a\ Jinhyung Lee Jeffrey S. McCullough Robert J. Town. The impact of health information technology on hospital
  productivity. The RAND Journal of Economics 44(3):545.
\b\ Shao, W. Lin, Technical efficiency analysis of information technology investments: a two-stage empirical
  investigation, Information and Management 39, 2002, pp. 391-401.
\c\ Adler-Milstein, J. and Huckman, R, The Impact of Electronic Health Record Use on Physician Productivity, AM
  J Manage Care, Nov. 19, 2013.
\d\ Helmons PJ1, Suijkerbuijk BO2, Nannan Panday PV3, Kosterink JG4. Drug-drug interaction checking assisted by
  clinical decision support: a return on investment analysis. J Am Med Inform Assoc. 2015 Jul; 22(4):764-72.
  doi: 10.1093/jamia/ocu010. Epub 2015 Feb 10.
\e\ Wagholikar KB1, Hankey RA2, Decker LK2, Cha SS2, Greenes RA3, Liu H2, Chaudhry R2. Evaluation of the effect
  of decision support on the efficiency of primary care providers in the outpatient practice. J Prim Care
  Community Health. 2015 Jan;6(1):54-60. doi: 10.1177/2150131914546325. Epub 2014 Aug 25.

    As illustrated in the Table 20, the incremental effects of 
improvements in IT on productivity range from one percent to eight 
percent. Based on these findings, we assume the impact of the API 
provision on providers' time ranges between one percent and five 
percent. The lower bound estimate of one percent assumes that, at a 
minimum, providers will use one new app created as a result of the data 
made available under the API provision. We assume that this app will 
save providers time equivalent to the introduction of clinical decision 
support tools found in Wagholikar (2015). The upper bound estimate of 
five percent assume that, at a maximum, providers will use multiple 
apps created such that the combination will result in an increase in 
productivity. Furthermore, we assume that the API provision will affect 
only providers with certified EHRs and those that participated in the 
CMS EHR Incentive Program (439,187). Given that an average provider 
spends six hours with an EHR per day,\231\ earns $97.85 per hour, and 
works 260 days per year, physicians' time saved attributed to API 
technology range from $670 million to $3.4 billion per year.
---------------------------------------------------------------------------

    \231\ Christine Sinsky et al., Allocation of Physician Time in 
Ambulatory Practice: A Time and Motion Study in 4 Specialties, Ann 
Intern Med. (Dec. 6, 2016), at 753-60.
---------------------------------------------------------------------------

(E) Benefits: Reduced Costs Associated With the Impact of 
Interoperability on Health Outcomes
    To identify the impact of the API proposal on interoperability and 
therefore identified health outcomes, we used regression analysis. 
Specifically, we estimated linear probability models that identified 
the impact of 2014 Edition certified EHR on hospitals' interoperability 
(whether a hospital sends, receives, finds, and integrates summary of 
care records). Using data from the American Hospital Association (AHA) 
\232\ from years 2014 to 2015 in the model, we controlled for hospital 
size, profit status, participation in a health information 
organization, and state and year fixed effects. The marginal effect of 
using a 2014 Edition certified health IT equated to a five percent 
increase in interoperability. This is an upper bound estimate. For the 
purpose of this analysis, we assume that one to four percentage points 
would be a reasonable range for API's marginal impact on 
interoperability.
---------------------------------------------------------------------------

    \232\ American Hospital Association Health IT Supplement Survey, 
https://www.ahadata.com/aha-healthcare-database/.
---------------------------------------------------------------------------

    As noted previously, there might be shared benefits across certain 
provisions, and we have taken steps to ensure that the benefits 
attributed to each provision are unique to the specific provision. We 
assumed that the collective impact of real world testing and API 
proposals on interoperability would not exceed the impact of 2014 
Edition certified health IT (estimated at five percent). We distributed 
the five percent benefit across our real world testing and API 
proposals at (0.1-1 percent) to (1-4 percent) respectively. Moreover, 
the number of providers impacted is specific to each provision. Thus, 
to finalize our calculations of the reduced costs related to reductions 
in duplicate lab tests, readmissions, emergency room (ER) visits, and 
adverse drug events due to increased interoperability, we leveraged 
evidence from the literature that found an association between 
providers' rates of interoperability and applied the estimated marginal 
effect of each proposal on interoperability. Given data limitations, we 
believe this approach allows us to estimate the benefits of our final 
rule without double counting the impact each provision might have on 
interoperability.

[[Page 25924]]



                                                    Table 21--Benefit of API on Health Care Outcomes
                                                                     [2017 dollars]
--------------------------------------------------------------------------------------------------------------------------------------------------------
                                                  Overall interop      Impact of API                     Percentage of          Total benefit \a\
        Benefit type               Number        impact  (marginal  ------------------    Total cost      total cost   ---------------------------------
                                  affected            effect)          Min      Max                        impacted           Min              Max
--------------------------------------------------------------------------------------------------------------------------------------------------------
Duplicate testing...........  439,187          0.09 \b\............     0.01     0.04  $200 billion                100  $185 million     $742 million
                               providers.                                               \c\.                             per year.        per year.
Avoidable hospitalizations    4,519 hospitals  0.09 \b\............     0.01     0.04  $41 billion \d\             100  $38 million per  $152 million
 and readmissions.                                                                                                       year.            per year.
ER visits...................  131 million      0.03 \b\............     0.01     0.04  $1,233 per ER               100  $50 million per  $200 million
                               visits \e\.                                              visit.                           year.            per year.
Adverse drug events.........  20 of events     22 \f\..............     0.01     0.04  $30 billion \g\              20  $14 million per  $54 million per
                               affected.                                                                                 year.            year.
--------------------------------------------------------------------------------------------------------------------------------------------------------
\a\ Total benefit is a product of total cost, percent of total cost impacted, overall impact of interoperability, and impact of API, adjusted for
  inflation (1.03).
\b\ Stephen E. Ross, Tiffany A. Radcliff, William G. Leblanc, L. Miriam Dickinson, Anne M. Libby, and Donald E. Nease Jr., Effects of health information
  exchange adoption on ambulatory testing rates, J. Am. Med. Inform. Assoc. (2013), at 1137-1142; Bridget A. Stewart, Susan Fernandes, Elizabeth
  Rodriguez-Huertas, and Michael Landzberg, A preliminary look at duplicate testing associated with lack of electronic health record interoperability
  for transferred patients, J. of the Am. Med. Informatics Assoc. (2010), at 341-344; Sezgin Ayabakan, Indranil R. Bardhan, Zhiqiang (Eric) Zheng, and
  Kirk Kirksey Value of health information sharing in reducing healthcare waste: An analysis of duplicate testing across hospitals, MIS Quarterly (Jan.
  1, 2017); Eric J. Lammers, Julia Adler-Milstein, and Keith E. Kocher, Does health information exchange reduce redundant imaging? Evidence from
  emergency departments, Med Care (Mar. 2014), at 227-34.
\c\ National Academy of Medicine. (2016), https://money.cnn.com/2017/05/20/news/economy/medical-tests/.
\d\ Agency for Healthcare Research and Quality (AHRQ) Statistical Brief #199 (Dec. 2015), https://www.hcup-us.ahrq.gov/reports/statbriefs/sb199-Readmissions-Payer-Age.pdf; AHRQ Statistical Brief #72, Nationwide Frequency and Costs of Potentially Preventable Hospitalizations (Apr. 2009), https://www.hcup-us.ahrq.gov/reports/statbriefs/sb72.pdf.
\e\ National Center for Health Statistics (NCHS) Data Brief No. 252 (June 2016), https://www.cdc.gov/nchs/data/databriefs/db252.pdf; Nolan Caldwell,
  Tanja Srebotnjak, Tiffany Wang, and Renee Hsia, ``How Much Will I Get Charged for This?'' Patient Charges for Top Ten Diagnoses in the Emergency
  Department (2013), https://doi.org/10.1371/journal.pone.0055491.
\f\ M.F. Furukawa, W.D. Spector, M.R. Limcangco, and W.E. Encinosa, Meaningful use of health information technology and declines in in-hospital adverse
  drug events, J. of the Am. Med. Informatics Assoc. (2017).
\g\ Janet Sultana, Paola Cutroneo, and Gianluca Trifir[ograve], Clinical and economic burden of adverse drug reactions.

    Based on this analysis, the benefits of the API provision on 
reduced costs on health outcomes range from $287 million to $1.1 
billion.
(F) Benefits: Increase in Percent of Individuals With Access to Their 
Health Information
    This provision will also provide individuals with better access to 
their data. APIs make it easier for patients to transmit data to 
smartphone health applications. According to the Health Information 
National Trends Survey,\233\ nearly 20 percent of Americans were 
offered access and viewed their online medical record using smartphone 
health applications in 2019. The proportion of individuals accessing 
their online medical records using smartphone health applications is 
expected to grow as APIs become more widespread. This will result in 
cost savings to patients. Specifically, patients who use new 
applications to access copies of their medical record instead of 
contacting their provider will have cost savings.
---------------------------------------------------------------------------

    \233\ These estimates were derived from Health Information 
National Trends Survey 5, Cycle 1 (2017).
---------------------------------------------------------------------------

    Under the HIPAA Privacy Rule, individuals have the right to access 
their Protected Health Information (PHI) (45 CFR 164.524), and 45 CFR 
164.524(c)(4) sets forth implementation specifications for fees that 
covered entities may charge individuals for access to their PHI. Under 
45 CFR 164.524(c)(4), a covered entity may impose a reasonable, cost-
based fee (consistent with the conditions in Sec.  164.524(c)(4)(i) 
through (iv)). For purposes of this analysis, we assume covered 
entities can charge a flat fee not to exceed $6.50 (inclusive of all 
labor, supplies, and any applicable postage). The API Condition and 
Maintenance of Certification requirements finalized in Sec.  170.404 do 
not allow for a ``Certified API Developer'' (as defined in Sec.  
170.404(c)) to charge patients for connecting to an API to access, 
exchange, or use their EHI. A Certified API Developer is permitted to 
charge fees to an API Information Source related to the use of 
certified API technology. The fees must be limited to the recovery of 
incremental costs reasonably incurred by the Certified API Developer 
when it hosts certified API technology on behalf of the API Information 
Source (Sec.  170.404). Thus, patients would ultimately see cost 
savings by accessing their online medical record using a smartphone 
health application instead of contacting their provider for an 
electronic copy.
    To identify the potential cost savings this rule will have for 
patients, we used data from the Health Information National Trends 
Survey to estimate the proportion of individuals who reported having to 
bring a test result to a doctor's appointment at least once in the past 
year. In 2018, approximately 81 percent of Americans reported that they 
saw a doctor in the past year and about 19 percent of these individuals 
reporting having to bring a test result to an appointment. Therefore, 
using Census data from December 31, 2017, we conducted the following 
calculation (total U.S. population 325.9M) * (81 percent of individuals 
saw a doctor in the past year) * (19 percent of individuals who had to 
bring a test result to an appointment). This resulted in an estimate of 
50.2 million Americans who bring test results to a doctor's appointment 
each year. We recognize that not all of these individuals will have the 
capability to access an online medical record using a smartphone health 
application. Therefore, we discounted this estimate based on the 
proportion of individuals who currently access their online medical 
records using a smartphone health applications (14 percent), as our 
lower bound. Our upper bound is the proportion of individuals who 
reported being offered access to an online medical record by a health 
care provider or insurer (58 percent). These calculations are in Table 
22.

[[Page 25925]]



                                     Table 22--Benefit of API on Patients Having Access To their Health Information
                                                                     [2017 Dollars]
--------------------------------------------------------------------------------------------------------------------------------------------------------
                                                        Proportion of  individuals impacted                                    Total benefit
          Benefit type              Number affected  ---------------------------------------- Total cost savings ---------------------------------------
                                                              Min                 Max                                     Min                 Max
--------------------------------------------------------------------------------------------------------------------------------------------------------
Cost savings to patients for      50,156,010 \a\      14% \b\...........  58% \b\...........  $6.50 \c\ per       $45.8 million per   $189.8 million per
 requesting an electronic copy     patients.                                                   patient.            year.               year.
 of their medical record.
--------------------------------------------------------------------------------------------------------------------------------------------------------
\a\ This represents the number of individuals who had to bring a medical test result to an appointment with a health care provider in the past year.
  Calculation: US Population on December 31, 2017 (325.9M)*81 percent who saw a doctor in the past year*19 percent who had to bring a test result to an
  appointment. Sources: (1) https://www.census.gov/popclock/; (2) https://dashboard.healthit.gov/quickstats/pages/consumers-gaps-in-information-exchange.php.
\b\ Lower bound represents the proportion of individuals nationwide who were offered access to their online medical record by a health care provider or
  insurer. Upper bound represents the proportion of individuals nationwide who were offered access and subsequently viewed their online medical record
  using a smartphone health app. Source: Johnson C. & Patel V. The Current State of Patients' Access and Using their Electronic Health Information.
  Presented at the ONC Annual Meeting on January 27, 2020.
\c\ We assume that providers charge individuals a flat fee for all requests for electronic copies of PHI maintained electronically, provided the fee
  does not exceed $6.50, inclusive of all labor, supplies, and any applicable postage.

    Based on the above calculations, we estimated the annual benefit to 
health care providers for the use of these API capabilities would, on 
average, range from $6.7 million to $140 million. We estimated the 
annual benefit due to improved health outcomes would, on average, range 
from $287 million to $1.1 billion. We estimated the annual benefit to 
patients having access to their online medical record would, on 
average, range from $45.8 million and $189.8 million. Therefore, we 
estimated the total annual benefit of APIs, on average, to range from 
$0.34 billion to $1.43 billion.
    Comments. We did not receive comments specific to our approach to 
estimating the benefits of API support.
    Response. We have maintained our overall approach for the costs and 
benefits associated with the API provisions of this rule. As discussed 
in section IV.B.7 of this final rule preamble, we have added a new 
requirement in the finalized Sec.  170.315(g)(10) that gives patients 
the capability to revoke access to an authorized application. Cost 
estimates for this new requirement were added to cost tables 16 A and 
16 B as task six. The task of meeting this additional finalized 
requirement increased the overall cost estimate for the API provisions 
by $9.8 million to $43 million. Due to this increase in cost, we re-
evaluated our benefits estimates associated with increasing patients' 
access to their health information. In the Proposed Rule, we 
qualitatively discussed benefits of patients having increased access to 
their health information. However, upon further consideration, and 
additional data sources, we were able to estimate cost savings to 
patients for requesting electronic copies of their medical record. 
These estimates are reflected in Table 22. We provided additional 
rationale to substantiate our approach and we updated estimates to 2017 
dollars.
(iv) New Privacy and Security Certification Criteria
    As specified in section IV.C.3 of this final rule, we have adopted 
two new privacy and security transparency attestation certification 
criteria in Sec.  170.315(d)(12) and (13) that are part of the 2015 
Edition privacy and security certification framework. The criteria will 
serve to identify whether certified health IT supports encrypting 
authentication credentials and/or multi-factor authentication (MFA). 
They do not require new development or implementation to take place in 
order to be met. However, certification to these criteria will provide 
increased transparency and, perhaps, motivate the small percentage of 
health IT developers that do neither to encrypt authentication 
credentials and/or support multi-factor authentication, which will help 
prevent exposure to unauthorized persons/entities.
(A) Costs
    Comments. We did not receive any comment specific to any method we 
could use to quantify the costs of the new privacy and security 
certification criteria, encrypt authentication credentials (Sec.  
170.315(d)(12)) and multi-factor authentication (MFA) (Sec.  170.315 
(d)(13)), and requiring health IT developers to assess their Health IT 
Modules' capabilities and attest ``yes'' or ``no'' to the certification 
criteria.
    Response. We have maintained our estimates of the costs of this 
provision in the final rule.
(B) Benefits
    As stated previously, we have not required health IT developers to 
encrypt authentication credentials or support multi-factor 
authentication (MFA). Instead, we have required that they attest to 
whether or not they support the certification criteria. By requiring an 
attestation, we are promoting transparency, which might motivate some 
health IT developers that do not currently encrypt authentication 
credentials or support MFA to do so. If health IT developers are 
motivated by these criteria and ultimately do encrypt authentication 
credentials and/or support MFA, we acknowledge that there would be 
costs to do so; however, we assume that the benefits will substantially 
exceed the costs. Such encryption and adopting MFA would reduce the 
likelihood that authentication credentials would be compromised and 
would eliminate an unnecessary use of IT resources. Encrypting 
authentication credentials and adopting MFA could directly reduce 
providers' operating and support costs, which will reduce their 
administrative and financial burden. Encrypting authentication 
credentials will also help decrease costs and burdens by reducing the 
number of password resets due to possible phishing or other 
vulnerabilities.
    According to Verizon's 2017 Data Breach Investigations Report, 81 
percent of hacking-related breaches leveraged either stolen and/or weak 
passwords.\234\ The Verizon report encourages customers to vary their 
passwords and use two-factor authentication. Also, National Institute 
of Standards and Technology (NIST) Special Publication 800-63B: Digital 
Identity Guidelines, Authentication and Lifecycle

[[Page 25926]]

Management,\235\ recommends the use of, and provides the requirements 
for multi-factor authenticators.
---------------------------------------------------------------------------

    \234\ https://enterprise.verizon.com/resources/reports/2017_dbir.pdf.
    \235\ https://pages.nist.gov/800-63-3/sp800-63b.html.
---------------------------------------------------------------------------

    Based on these reports and other anecdotal evidence, we believe 
encrypting authentication credentials and supporting MFA are 
established best practices among industry developers, including health 
IT developers. As described above, in this final rule, we required 
health IT developers to attest to whether they encrypt authentication 
credentials. We do not have access to published literature that details 
how health IT developers are already encrypting authentication 
credentials and supporting MFA industry-wide, but we believe most 
health IT developers, or around 80 percent, are taking such actions. We 
assume that building this functionality is in the future project plans 
for the remaining 20 percent because, as noted previously, adopting 
these capabilities is an industry best practice. Health IT developers 
that have not yet adopted these capabilities are likely already making 
financial investments to get up to speed with industry standards. We 
believe the adoption of these criteria will motivate these health IT 
developers to speed their implementation process, but we have not 
attributed a monetary estimate to this potential benefit because our 
rule is not a direct cause of health IT developers adopting these 
capabilities. We anticipate that when we release this final rule, many 
more, or perhaps all, health IT developers will likely already be 
encrypting authentication credentials and supporting MFA. We welcomed 
comments on this expectation and any means or methods we could use to 
quantify these benefits.
    Comments. We did not receive any comment specific to any means or 
methods we could use to quantify the costs and benefits of having the 
new privacy and security transparency attestation certification 
criteria, encrypt authentication credentials (Sec.  170.315(d)(12)) and 
multi-factor authentication (MFA) (Sec.  170.315(d)(13)), and requiring 
health IT developers to assess their Health IT Modules' capabilities 
and attest ``yes'' or ``no'' to the certification criteria.
    Response. We maintain our estimates of the costs and benefits of 
this provision in the final rule. We also continue to believe that the 
adoption of these criteria will motivate these health IT developers to 
speed their implementation process.
(v) Security Tags--Summary of Care--Send and Security Tags--Summary of 
Care--Receive
    In this final rule, we updated the 2015 Edition Data Segmentation 
for Privacy (DS4P) certification criteria in Sec.  170.315(b)(7) and 
(8) to support a more granular approach to privacy tagging data for 
health information exchange. We also renamed the criteria to reduce 
confusion and better align with the criteria, ``Security tags--Summary 
of Care--send'' and ``Security tags--Summary of Care--receive.'' The 
criteria will remain based on the C-CDA and the HL7 DS4P standard. 
These criteria will include capabilities for applying the DS4P standard 
at the document, section, and entry level. In the Proposed Rule, we 
proposed to adopt a third 2015 Edition DS4P certification criterion, 
``consent management for APIs'' (Sec.  170.315(g)(11)), that requires 
health IT to be capable of responding to requests for data through an 
API in accordance with the Consent Implementation Guide, which we did 
not finalize.
(A) Costs
    We anticipate these updated criteria will result in up-front costs 
to health IT developers as health IT would be required to support all 
three levels--document, section, and entry--as specified in the current 
DS4P standard. However, we note that these criteria are not being 
required in any program at this time. As of the beginning of the fourth 
quarter of the 2019 calendar year, only about 30 products (products 
with multiple certified versions were counted once) were certified to 
the current 2015 Edition DS4P certification criteria. We estimated that 
10 to 15 products will implement the new DS4P criteria. Developers may 
need to perform fairly extensive health IT upgrades to support the more 
complex and granular data tagging requirements under these criteria. We 
anticipate developers will need approximately 1,500 to 2,500 hours to 
upgrade databases and/or other backend infrastructure to appropriately 
apply security tags to data and/or develop access control capabilities. 
Moreover, developers will likely incur costs to upgrade health IT to 
generate a security-labeled C-CDA conforming to the DS4P standard. We 
estimated developers will need 400 to 600 hours per criterion to make 
these upgrades on systems that had previously certified to the 
document-level DS4P criteria, or 720 to 1220 hours per criterion for 
systems that are implementing these criteria for the first time. We 
believe this work would be performed by a ``Software Developer.'' 
According to the May 2017 BLS occupational employment statistics, the 
mean hourly wage for software developer is $53.74. As noted previously, 
we have assumed that overhead costs (including benefits) are equal to 
100 percent of pre-tax wages, so the hourly wage including overhead 
costs is $107. Therefore, we estimated the total cost to developers 
could range from $2,910,400 to $6,933,600. We note that this would be a 
one-time cost. The midpoint of ranges stated is used as the primary 
estimate of costs.
    Additionally, we proposed that the health IT support the capability 
to respond to requests for patient consent information through an API 
compatible with FHIR Release 3. However, we did not finalize that 
proposal. Therefore, we did not include an estimate in this final rule.
    We have estimated costs using the following assumptions:
     For the two Security tags--Summary of Care criteria, we 
anticipate developers will need approximately 1,500 to 2,500 hours to 
upgrade databases and/or other backend infrastructure to appropriately 
apply security tags to data and/or develop access control capabilities. 
We expect that this would be a one-time cost.
     According to the May 2017 BLS occupational employment 
statistics, the mean hourly wage for a ``Software Developer'' is 
$53.74.
    Our cost estimates are explained in the Table 23.

[[Page 25927]]



                       Table 23--Costs Related to Security Tags--Summary of Care Criteria
                                                 [2017 Dollars]
----------------------------------------------------------------------------------------------------------------
              Tasks                       Lower bound                Upper bound                 Remarks
----------------------------------------------------------------------------------------------------------------
Task 1: Enhancements to health IT  1,500 hours..............  2,500 hours.............  This is a one-time cost
 to upgrade databases and/or                                                             for health IT systems
 other backend infrastructure to                                                         to support data
 appropriately apply security                                                            segmentation for
 tags to data and/or develop                                                             discrete data.
 access control capabilities.
    Total Labor Hours............  1,500 hours..............  2,500 hours.............
                                  -----------------------------------------------------
    Hourly Rate..................                     $107 per hour
---------------------------------------------------------------------------------------
    Cost per Product.............  $160,500.................  $267,500................
    Total Cost (23 products).....  $3,691,500...............  $6,152,500..............
----------------------------------------------------------------------------------------------------------------

    We believe the voluntary nature of these criteria would 
significantly mitigate health IT developer costs. We also expect 
developers to see a return on their investment in developing and 
preparing their health IT for these certification criteria given the 
benefits to interoperable exchange.
    We anticipate potential costs for ONC related to the updated DS4P 
criteria (Security tags--Summary of Care--send and Security tags--
Summary of Care--receive) associated with: (1) Developing and 
maintaining information regarding these updated criteria on the ONC 
website; (2) creating documents related to these updated criteria and 
making those documents 508 compliant; (3) updating, revising, and 
supporting Certification Companion Guides, test procedures, and test 
tools; and (4) responding to inquiries concerning these criteria. We 
estimate an ONC analyst at the GS-13, Step 1 level staff would devote, 
on average, 200 hours to the above tasks annually. The hourly wage with 
benefits for a GS-13, Step 1 employee located in Washington, DC is 
approximately $91. Therefore, we estimate the annual costs to be 
$18,200.
(B) Benefits
    We believe leveraging the DS4P standard's ability to allow for both 
document level and more granular tagging would offer functionality that 
is more valuable to providers and patients, especially given the 
complexities of the privacy landscape for multiple care and specialty 
settings. The updated DS4P criteria (Security tags--Summary of Care--
send and Security tags--Summary of Care--receive) would benefit 
providers, patients, and ONC because it would support more complete 
records, contribute to patient safety, and enhance care coordination. 
We believe this will also reduce burden for providers by enabling an 
automated option, rather relying on case-by-case manual redaction and 
subsequent workarounds to transmit redacted documents. Implementing 
security tags enables providers to more effectively share patient 
records with sensitive information, thereby protecting patient privacy 
while still delivering actionable clinical content. We emphasize that 
health care providers already have processes and workflows to address 
their existing compliance obligations, which could be made more 
efficient and cost effective through the use of health IT. We expect 
these benefits for providers, patients, and ONC to be significant; 
however, we are unable to quantify these benefits at this time because 
we do not have adequate information to support quantitative estimates. 
We welcomed comments regarding potential approaches for quantifying 
these benefits.
    Comments. Several commenters indicated there would be cost burden 
associated with our proposal of adopting two new DS4P certification 
criteria and a consent management for API criterion. Commenters stated 
that ONC needs to quantify and include the cost of this burden in our 
impact analysis section. Another commenter conducted their own analysis 
and indicated a cost of $5-6 billion with a multi-year implementation 
timeframe. Commenters stated there could be significant upfront costs 
and ongoing costs for maintenance of the systems necessary to comply 
with these criteria and one commenter further explained that segmenting 
data at the document, section, and entry level as opposed to the 
document level only, would significantly increase costs and could 
potentially impact system performance. One commenter was specifically 
concerned that the proposal would broadly impact HIEs both in terms of 
administration and implementation but did not state specifics.
    Response. We thank commenters for their input. We did not finalize 
the consent management for API criterion. For the DS4P-related criteria 
(Security tags--Summary of Care--send and Security tags--Summary of 
Care--receive), the developer costs were estimated for supporting DS4P 
IG enhancements to include tagging the data at the section and entry 
level when exchanged using the C-CDA. The lower bound estimates include 
developers who are already supporting the DS4P IG for tagging data at 
``document'' level and estimates additional effort to support tagging 
at ``section'' and ``entry'' level. The criteria do not require the 
capability to segment the data, only to tag the data.
    The certification criteria does not make any additional 
expectations around compliance beyond what the providers are currently 
expected to do, nor does it add any additional requirements for 
developers around how they handle the data received with the tags. 
Therefore, we disagree with the commenters about underestimating the 
cost. Rather, the commenters may be suggesting implementation costs 
which are beyond the costs associated with the certification criteria 
itself. These costs are unquantifiable and are noted in Table 31.
(3) Conditions and Maintenance of Certification Requirements
(i) Information Blocking
    For a discussion of the costs and benefits of the exceptions to 
information blocking, please see section (5) of this RIA.
(ii) Assurances
    In this final rule, we included a provision that requires health IT 
developers to make certain assurances as Conditions and Maintenance of 
Certification requirements: (1) Assurances regarding the ``EHI export'' 
certification criterion in Sec.  170.315(b)(10) and (2) assurances 
regarding retaining records and information in 170.402(b)(1)(i)-(ii).

[[Page 25928]]

(A) Electronic Health Information Export
    Alongside the criterion revisions in Sec.  170.315(b)(10), we have 
finalized in Sec.  170.402(a)(4), that a health IT developer of a 
certified health IT Modules that is part of a health IT product which 
electronically stores EHI must certify to the certification criterion 
in Sec.  170.315(b)(10). We have finalized in Sec.  170.402(b)(2) that 
within 36 months from the final rule's publication date, a health IT 
developer that must comply with the requirements of paragraph Sec.  
170.402(a)(4) of this section must provide all of its customers of 
certified health IT with the health IT certified to the certification 
criterion in Sec.  170.315(b)(10). We also finalized that on and after 
36 months from the publication of this final rule, health IT developers 
that must comply with the requirements of Sec.  170.402(a)(4) must 
provide all of their customers of certified health IT with health IT 
certified to Sec.  170.315(b)(10). In addition, a health IT developer 
must attest accurately in accordance with Sec.  170.402(a)(4) and 
(b)(2) if the Health IT Module presented for certification is part of a 
heath IT product which can electronically store EHI. If the product 
stores such information, the health IT developer must ensure all EHI is 
available for export in accordance with Sec.  170.315(b)(10).
    For a detailed discussion of the costs and benefits of the 
assurances regarding the criterion in Sec.  170.315(b)(10), please see 
section (2)(ii) (EHI export) of this RIA above.
(B) Records and Information Retention
    As a Maintenance of Certification requirement in Sec.  
170.402(b)(1), a health IT developer must, for a period of 10 years 
beginning from the date of certification, retain all records and 
information necessary that demonstrate initial and ongoing compliance 
with the requirements of the ONC Health IT Certification Program. In an 
effort to reduce administrative burden, we also finalized that in 
situations where applicable certification criteria are removed from the 
Code of Federal Regulations before the 10 years have expired, records 
must only be kept for three years from the date of removal for those 
certification criteria and related Program provisions unless that 
timeframe would exceed the overall 10-year retention period. This 
``three-year from the date of removal'' records retention period also 
aligns with the records retention requirements for ONC-ACBs and ONC-
ATLs under the Program.
    As stated in the Proposed Rule, currently, there are no existing 
regulatory requirements regarding record and information retention by 
health IT developers. We expect there are costs to developers to retain 
the records and information described above but they may be mitigated 
due to other factors. For example, we expect that health IT developers 
are already keeping most of their records and information in an 
electronic format. We also expect that some developers may already be 
retaining records and information for extended periods of time due to 
existing requirements of other programs, including for those programs 
their customers participate in. For instance, Medicaid managed care 
companies are required to keep records for 10 years from the effective 
date of a contract.
    We estimated that each health IT developer will, on average, spend 
two hours each week to comply with our proposed record retention 
requirement. We expect that a health IT developer's office clerk could 
complete the record retention responsibilities. According to the May 
2017 BLS occupational employment statistics, the mean hourly wage for 
an office clerk is $16.30.\236\ As noted previously, we have assumed 
that overhead costs (including benefits) are equal to 100 percent of 
pre-tax wages, so the hourly wage including overhead costs is $32.
---------------------------------------------------------------------------

    \236\ See https://www.bls.gov/oes/2017/may/oes439061.htm.
---------------------------------------------------------------------------

    Therefore, we estimated the annual cost per developer on average, 
would be $3,328 and the total annual cost for all health IT developers 
(458 health IT developers have products certified to the 2015 Edition 
that are capable of recording patient health data) on average, would be 
$1.5 million. We note that this is a perpetual cost.
(iii) Prohibition or Restriction of Communications
(A) Costs
    Health IT developers need to notify their customers about the 
unenforceability of communications and contract provisions that violate 
the Communications Condition of Certification requirements in Sec.  
170.403(a). Generally, health IT developers already have mechanisms in 
place, whether via online postings, email, mail, or phone, for alerting 
customers to changes in their policies and procedures. Such alerts 
should be standard practice. However, we have estimated the potential 
costs for health IT developers to draft the notice and mail the notice 
as appropriate. We estimated that a health IT developer's office clerk 
will commit (overall) approximately 40 hours to drafting and mailing 
notices when necessary. According to the May 2017 BLS occupational 
employment statistics, the mean hourly wage for an office clerk is 
$16.30.\237\ As noted previously, we have assumed that overhead costs 
(including benefits) are equal to 100 percent of pre-tax wages, so the 
hourly wage including overhead costs is $32. Therefore, we estimated 
the annual cost per developer to be $1,280 and the total cost for all 
health IT developers (792 health IT developers certified to the 2014 
Edition) to be $1 million. We note that a developer must notify all 
customers annually until any contracts contravening the Condition are 
amended.
---------------------------------------------------------------------------

    \237\ See https://www.bls.gov/oes/2017/may/oes439061.htm.
---------------------------------------------------------------------------

    We also note that mailing is one option for delivery, along with 
other means such as email. We do not have information concerning how 
health IT developers will deliver their notices. We have estimated a 
total cost for all developers to mail the initial notices (including 
postage) to be $80,000. As noted above, this notice may have to be 
provided annually, depending on when contracts contravening this 
provision are amended.
    In order to meet the Cures Act requirement that health IT 
developers do not prohibit or restrict communication regarding health 
IT, some health IT developers will eventually need to amend their 
contracts to reflect such a change. Many standard form health IT 
contracts limit the ability of users to voluntarily discuss problems or 
report usability and safety concerns that they experience when using 
their health IT. This type of discussion or reporting is typically 
prohibited through broad confidentiality, nondisclosure, and 
intellectual property provisions in the developer's standard form 
health IT contract. Some standard form health IT contracts may also 
include non-disparagement clauses that prohibit customers from making 
statements that could reflect negatively on the health IT developer. 
These practices are often referred to colloquially in the industry as 
``gag clauses.'' We expect amendments to these clauses to be 
accomplished in the normal course of business, such as when 
renegotiating contracts or updating them for HIPAA Rules or other 
compliance requirements outside of the ONC Health IT Certification 
Program. As such, we do not estimate any direct or indirect costs

[[Page 25929]]

for health IT developers to amend their contracts to comply with this 
Condition of Certification requirement.
(B) Benefits
    We expect health care providers to benefit from this provision. 
There is growing recognition that these practices of prohibiting or 
restricting communication do not promote health IT safety or good 
security hygiene and that health IT contracts should support and 
facilitate the transparent exchange of information relating to patient 
care. We were unable to estimate these benefits because we do not have 
adequate information to determine the prevalence of gag clauses and 
other restrictive practices, nor do we have a means to quantify the 
value to providers of being able to freely communicate and share 
information. We welcomed comments on approaches to quantify these 
benefits.
    Comments. We did not receive comments specific to our approach of 
quantifying the benefits of our provision to inform customers regarding 
the prohibition or restriction of communications. We did receive 
several comments stating that our notification and contract revision 
estimates underestimate the volume of agreements for large developers 
and the cost of compliance. We also received several comments that the 
burden for revising contracts could be significant and costly, 
particularly in the timeframe originally proposed, with one comment 
adding that the cost for revising contracts should be included in the 
impact analysis.
    Response. We maintain that we were unable to estimate the benefits 
of the provision due to inadequate information however, we believe that 
prohibiting or restricting communication does not promote health IT 
safety or good security hygiene and that health IT contracts should 
support and facilitate the transparent exchange of information relating 
to patient care. We maintain our notification estimates as we believe 
that large developers would have efficient means of sending 
notifications i.e. by email. We reiterate that we expect revision of 
contracts to be accomplished in the normal course of business and do 
not estimate any direct or indirect costs for health IT developers to 
amend their contracts to comply.
(iv) Application Programming Interfaces
    For a discussion of the costs and benefits of the new API criterion 
in Sec.  170.315(g)(10), please see section (2)(iii) of this RIA.
(A) Transparency Requirements for Application Programming Interfaces
    In this final rule, as part of the Conditions and Maintenance of 
Certification requirements in Sec.  170.404, we have required that API 
Technology Suppliers make specific business and technical documentation 
necessary to interact with the APIs in production freely and publicly 
accessible. We expect that the API Technology Suppliers will perform 
the following tasks related to transparency of business and technical 
documentation and would devote the following number of hours annually 
to such tasks: (1) Health Level 7's (HL7[supreg]) Fast Healthcare 
Interoperability Resources (FHIR[supreg]) API documentation (the 
developer would most likely point to the HL7 FHIR standard for API 
documentation) (estimated eight hours); (2) patient application 
registration documentation, which will include a development effort to 
create a website that manages the application registration activity 
(estimated 40 hours); (3) publication of the FHIR Endpoint--Base URLs 
for all centrally managed providers (estimated 40 hours); (4) 
publication of FHIR Endpoints for provider-managed APIs (estimated 160 
hours); and (5) API cost information documentation, which will 
typically be documented as a tiered rate based on usage or some form of 
monthly rate (estimated 40 hours).
    We believe each of the above tasks would be performed by a 
``Software Developer.'' According to the May 2017 BLS occupational 
employment statistics, the mean hourly wage for software developer is 
$53.74.\238\ As noted previously, we have assumed that overhead costs 
(including benefits) are equal to 100 percent of pre-tax wages, so the 
hourly wage including overhead costs is $107. Therefore, we estimated 
the cost per developer to be $30,816. As noted in section (2)(iii) of 
this RIA, we estimated that 459 products from 394 developers will 
contain the API criterion. Therefore, we estimated the total developer 
cost would be $12.1 million. We note that this is a one-time cost and 
would not be perpetual. We did not receive comments on this discussion 
and have therefore finalized our figures.
---------------------------------------------------------------------------

    \238\ See https://www.bls.gov/oes/2017/may/oes439061.htm.
---------------------------------------------------------------------------

(v) Real World Testing
    The objective of real world testing in Sec.  170.405 is to verify 
the extent to which deployed health IT products in operational 
production settings are demonstrating compliance to certification 
criteria and functioning with the intended use cases for continued 
maintenance of certification requirements. Real world testing should 
ensure certified health IT products have the ability to share 
electronic health information between systems. Real world testing 
should assess that the certified health IT is meeting the intended use 
case(s) of the certification criteria to which it is certified within 
the workflow, health IT architecture, and care/practice setting in 
which the health IT is implemented. We note that we expect real world 
testing would take about three months of the year to perform.
(A) Costs
    This section describes the potential costs of the real world 
testing requirements in this final rule. The costs estimates are based 
on the following assumptions:
     Health IT developers will use the same labor costs. Table 
24 shows the estimated labor costs for a health IT developer to perform 
real world testing. We recognize that health IT developer costs will 
vary; however, our estimates in this section assume all developers will 
incur the costs noted in Table 24.
     Proxy needed to project the number of 2015 Edition 
products impacted by real world testing. We estimated that 523 products 
from 429 developers will be impacted by real world testing. We used a 
proxy to determine developers that would be subject to real world 
testing. There were 681 products and 551 developers with at least one 
of its 2014 Edition certified products that could perform transitions 
of care and/or send any type of public health data. We then multiplied 
these numbers by our estimates for certified health IT market 
consolidation by -22.1 percent and -23.2 percent to project the number 
of 2015 developers and products, respectively. We believe this estimate 
serves as a reasonable proxy for products impacted by real world 
testing, as these products primarily focus on interoperability.
    The tables below describe the various costs to health IT developers 
to perform real world testing by task.

[[Page 25930]]



                 Table 24--Estimated Cost to Health IT Developers To Perform Real World Testing
                                                 [2017 Dollars]
----------------------------------------------------------------------------------------------------------------
                    Tasks and labor category                           Hours           Rate            Total
----------------------------------------------------------------------------------------------------------------
Task 1: Design Real world Testing Approach and Submit Plan (per   ..............  ..............         $34,560
 developer).....................................................
    15-1133 Software Developers, Systems Software...............              80             107           8,560
    15-1143 Computer Network Architects.........................             120             104          12,480
    15-1121 Computer Systems Analysts...........................              80              89           7,120
    15-1199 Computer Occupations, All Other.....................              40              88           3,520
    27-3042 Technical Writers...................................              40              72           2,880
Task 2: Prepare Staff and Environments (per developer)..........  ..............  ..............          14,920
    15-1121 Computer Systems Analysts...........................              40              89           3,560
    15-1142 Network and Computer Systems Administrators.........              40              83           3,320
    15-1152 Computer Network Support Specialists................              40              65           2,600
    15-1199 Computer Occupations, All Other.....................              40              88           3,520
    15-1122 Information Security Analysts.......................              20              96           1,920
Task 3: Perform Testing (per product)...........................  ..............  ..............          32,240
    15-1121 Computer Systems Analysts...........................              80              89           7,120
    15-1133 Software Developers, Systems Software...............              40             107           4,280
    15-1199 Computer Occupations, All Other.....................             160              88          14,080
    15-1142 Network and Computer Systems Administrators.........              40              83           3,320
    15-1141 Database Administrators.............................              40              86           3,440
Task 4: Collect Results and Prepare-Submit Report (per            ..............  ..............          20,560
 developer).....................................................
    15-1199 Computer Occupations, All Other.....................             120              88          10,560
    15-1121 Computer Systems Analysts...........................              80              89           7,120
    27-3042 Technical Writers...................................              40              72           2,880
                                                                 -----------------------------------------------
    Total Labor Hours...........................................           1,140
        Other Direct Costs--printing, publishing (per product)..  ..............  ..............          150.00
----------------------------------------------------------------------------------------------------------------


             Table 25--Real World Testing Total Annual Cost
                             [2017 Dollars]
------------------------------------------------------------------------
               Task                      Calculation        Total cost
------------------------------------------------------------------------
Task 1............................  $34,560 * 429            $14,826,240
                                     developers.
Task 2............................  $14,920 * 429              6,400,680
                                     developers.
Task 3............................  $32,240 * 523             16,861,520
                                     products.
Task 4............................  $20,560 * 429              8,820,240
                                     developers.
Other Direct Costs................  $150 * 523 products.          78,450
                                   -------------------------------------
    Total Cost....................  ....................      46,987,130
------------------------------------------------------------------------

    Based on the stated assumptions and costs outlined in the above 
tables, we estimated the total annual cost for real world testing 
would, on average, be $47 million with an average cost per developer of 
$109,557.
(B) Benefits
    There are several benefits that can be attributed to real world 
testing. Real world testing may impact the effective integration of 
varied health IT systems, including integration of certified health IT 
with non-certified and ancillary technologies such as picture archiving 
and communications systems (PACS) or specialty-specific interfaces. 
This could result in greater interoperability among health IT systems. 
For providers that are currently dissatisfied with how their health IT 
is performing, real world testing might also influence the effective 
implementation of workflows in a clinical setting. In this analysis, we 
calculated the benefits in the following categories: For providers that 
have complained about their EHR system, time saved documenting in their 
EHR due to improved usability; for providers that are dissatisfied with 
their EHR, increased provider satisfaction resulting in fewer providers 
incurring the costs of switching products; and benefits related to 
reductions in duplicate lab tests, readmissions, ER visits, and adverse 
drug events due to increased interoperability. We focused on these 
outcomes for two reasons: (i) Evidence in literature indicates that 
health information exchange impacts the chosen measures; and (ii) cost 
of care associated with these measures is high and the impact of health 
information exchange is likely to result in significant benefits in the 
form of reduced costs.
    The benefit calculations were based on the following assumptions:
     Benefits noted in academic literature are assumed accurate 
and results were not externally validated.
     Hospitals and eligible professionals that participate in 
the CMS Promoting Interoperability Programs will be impacted. Estimates 
were based on the assumption that 439,187 health care providers and/or 
4,519 hospitals will be affected by this regulatory action.
     Estimates of the impact of real world testing on rates of 
interoperability (0.1 to 1 percent) are based on ONC analysis. To 
identify the impact of real world testing on interoperability, we used 
regression analysis. Specifically, we estimated linear probability 
models that identified impact of 2014 Edition certified EHR on 
hospitals' interoperability (whether a hospital sends, receives, finds, 
and integrates summary of care records). Using data from the AHA from 
years 2014 and 2015 in the model, we controlled for hospital size, 
profit status, participation in a health information organization, and 
state and year fixed effects. The marginal effect of using a 2014 
Edition was a five percentage point increase in interoperability. This 
is an upper bound estimate. For the purpose of this

[[Page 25931]]

analysis, we assume 0.1 percent to 1 percent would be a reasonable 
range for real world testing to impact interoperability.
     Impact of real world testing is also based on the 
estimated number of providers that switch health IT developers (rate = 
five percent) and are dissatisfied with their current EHR (44 percent). 
To calculate the number of providers that are likely to switch their 
EHR due to dissatisfaction with their system, we estimate the rate of 
switching using CMS Medicare EHR Incentive Program data from years 2013 
to 2016. This results in 4,774 clinical practices and 226 hospitals 
that are projected to switch products in a year. We then leverage 
results from Stanford Medicine's research conducted by The Harris Poll 
which reports that nearly 44 percent of providers are not satisfied 
with their EHR.\239\ Based on this research, we assume that 
approximately 2,195 providers are less likely to switch their EHR with 
real world testing.
---------------------------------------------------------------------------

    \239\ How Doctors Feel About Electronic Health Records National 
Physician Poll by The Harris Poll https://med.stanford.edu/content/dam/sm/ehr/documents/EHR-Poll-Presentation.pdf.
---------------------------------------------------------------------------

     Estimates of the rate of eligible professionals (10 
percent) and hospitals (five percent) that will be impacted by real 
world testing are based on ONC complaint data. We recognize that the 
benefits of real world testing are limited to those providers that have 
systems that might be underperforming. Therefore, we estimated that the 
providers impacted by this rule are limited to the proportion of 
providers that have issued complaints about their system to ONC.
    As noted previously in this analysis, we acknowledge that there 
might be shared benefits across certain provisions and have taken steps 
to ensure that the benefits attributed to each provision are unique to 
the provision referenced. Specifically, we used regression analysis to 
calculate the impact of our real world testing and API provisions on 
interoperability. We assumed that the real world testing and API 
provisions would collectively have the same impact on interoperability 
as use of 2014 Edition certified health IT. Therefore, we estimated 
linear probability models that identified the impact of 2014 Edition 
certified health IT on hospitals' interoperability.\240\ We controlled 
for additional factors such as participation in a health information 
exchange organization, hospital characteristics, and urban/rural 
status. We found the marginal effect of using 2014 Edition certified 
health IT was a five percentage point increase in interoperability.
---------------------------------------------------------------------------

    \240\ American Hospital Association Health IT Supplement Survey, 
https://www.ahadata.com/aha-healthcare-database.
---------------------------------------------------------------------------

    We assumed that this marginal effect is true for our provisions and 
distributed the five percent benefit across our real world testing and 
API provisions at (0.1 to 1 percent) to (1 to 4 percent) respectively. 
Moreover, the number of providers impacted is provision specific. Given 
data limitations, we believe this approach allows us to estimate the 
benefits of our provisions without double counting the impact each 
provision might have on interoperability.
    Table 26 shows the benefits of real world testing for providers. We 
quantified the monetary benefits of real world testing based on a 
reduction in the amount of time a provider spends on their EHR by 
improving its usability or the cost-savings associated with switching 
from an underperforming EHR system. Note, these benefits are limited to 
providers who have expressed dissatisfaction with their EHR and only 
represent a fraction of all health care providers. Table 27 quantifies 
the benefits associated with improved interoperability for these 
providers. This is primarily because provider behavior is more directly 
affected by improvements in interoperability.

                                                                      Table 26--Benefit of Real World Testing for Providers
                                                                                         [2017 Dollars]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
                                                                                  Hours saved  (percent) A B                       Number of                    Total benefit C
             Benefit type                  Number  affected       Hourly wage  --------------------------------  Hours per day   working days  -------------------------------------------------
                                                                                      Min             Max          with EHR        in a year              Min                      Max
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Reduction in provider time spent in    43,919 providers or 10%          $97.85               1               5             6 E             260  $65 million per year...  $335 million per year.
 health IT by improving usability and   D (based on complaint
 interoperability.                      data).
Number of providers switching health   2,195; Cost of           ..............  ..............  ..............  ..............  ..............  $34M per year..........  $158M per year.
 IT F.                                  Switching.
                                       Min = $15,000..........
                                       Max = $70,000..........
                                                                                                                                               -------------------------------------------------
    Total Benefit....................  .......................  ..............  ..............  ..............  ..............  ..............  $99M per year..........  $493M per year.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
\A\ Julia Adler-Milstein and Robert S. Huckman, The Impact of Electronic Health Record Use on Physician Productivity, Am J Manag Care (Nov. 19, 2013).
\B\ Amusan, Tongen, Speedie, and Mellin, A time-motion study to evaluate the impact of EMR and CPOE implementation on physician efficiency, J. Healthcare Inf. Manag. (Fall 2008), at 31-7.
\C\ Total benefits for the provider and administrative time spent in health IT by improving usability and interoperability. Total benefits from switching EHR developer is a product of the
  number providers switching and cost of EHR.
\D\ The estimate is based on the number of providers that currently possess products with complaints. This is identified by flagging health IT developers and products about whom/which
  complaints are logged on ONC's database. These health IT developers are then matched to physicians using the Meaningful Use database.
\E\ Christine Sinsky et al., Allocation of Physician Time in Ambulatory Practice: A Time and Motion Study in 4 Specialties, Ann Intern Med. (Dec. 6, 2016), at 753-60. Physician Practice,
  Calculating the Right Number of Staff for Your Medical Practice, available at https://www.physicianspractice.com/blog/calculating-right-number-staff-your-medical-practice.
\F\ This estimate was obtained from Meaningful Use data from years 2013-2016. ``Switching'' is defined as an annual change in all health IT developers by providers/hospitals.


[[Page 25932]]


                                                                 Table 27--Benefit of Real World Testing for Patients and Payers
                                                                                         [2017 Dollars]
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
                                                                 Overall      Impact of real world testing                                                         Total benefit A
                                                             interop impact --------------------------------                         Percentage of ---------------------------------------------
            Benefit type              Population  affected      (marginal                                          Total cost         total cost
                                                                 effect)           Min             Max                                 impacted              Min                    Max
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Duplicate testing..................  35,607 providers......          B 0.09           0.001            0.01  $200 billion C.......              10  $1.9 million per year  $18.5 million per
                                                                                                                                                                            year.
Avoidable hospitalizations and       5% of hospitals (n =            B 0.09           0.001            0.01  $41 billion D........               5  $0.2 million per year  $1.9 million per
 readmissions.                        226).                                                                                                                                 year.
ER visits..........................  5% of visits affected           B 0.03           0.001            0.01  $1,233, Per ER visit                5  $0.2 million per year  $2.54 million per
                                      (n = 131 million).                                                      E.                                                            year.
Adverse drug events................  5% of events affected.          F 0.22           0.001            0.01  $30 billion G........               5  $0.3 million per year  $3.4 million per
                                                                                                                                                                            year.
                                                                                                                                                   ---------------------------------------------
    Total Benefit..................  ......................  ..............  ..............  ..............  .....................  ..............  $2.6 million.........  $26.3 million.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
\A\ Total benefit is a product of total cost, percent of total cost impacted, overall impact of interoperability, and impact of real world testing.
\B\ Stephen E. Ross, Tiffany A. Radcliff, William G. Leblanc, L. Miriam Dickinson, Anne M. Libby, and Donald E. Nease Jr., Effects of health information exchange adoption on ambulatory testing
  rates, J. Am. Med. Inform. Assoc. (2013), at 1137-1142; Bridget A. Stewart, Susan Fernandes, Elizabeth Rodriguez-Huertas, and Michael Landzberg, A preliminary look at duplicate testing
  associated with lack of electronic health record interoperability for transferred patients, J. of the Am. Med. Informatics Assoc. (2010), at 341-344; Sezgin Ayabakan, Indranil R. Bardhan,
  Zhiqiang (Eric) Zheng, and Kirk Kirksey Value of health information sharing in reducing healthcare waste: An analysis of duplicate testing across hospitals, MIS Quarterly (Jan. 1, 2017);
  Eric J. Lammers, Julia Adler-Milstein, and Keith E. Kocher, Does health information exchange reduce redundant imaging? Evidence from emergency departments, Med Care (Mar. 2014), at 227-34.
\C\ National Academy of Medicine. (2016), https://money.cnn.com/2017/05/20/news/economy/medical-tests/.
\D\ Agency for Healthcare Research and Quality (AHRQ) Statistical Brief #199 (Dec. 2015), https://www.hcup-us.ahrq.gov/reports/statbriefs/sb199-Readmissions-Payer-Age.pdf; AHRQ Statistical
  Brief #72, Nationwide Frequency and Costs of Potentially Preventable Hospitalizations (Apr. 2009), https://www.hcup-us.ahrq.gov/reports/statbriefs/sb72.pdf.
\E\ National Center for Health Statistics (NCHS) Data Brief No. 252 (June 2016), https://www.cdc.gov/nchs/data/databriefs/db252.pdf; Nolan Caldwell, Tanja Srebotnjak, Tiffany Wang, and Renee
  Hsia, ``How Much Will I Get Charged for This?'' Patient Charges for Top Ten Diagnoses in the Emergency Department (2013), https://doi.org/10.1371/journal.pone.0055491.
\F\ M.F. Furukawa, W.D. Spector, M.R. Limcangco, and W.E. Encinosa, Meaningful use of health information technology and declines in in-hospital adverse drug events, J. of the Am. Med.
  Informatics Assoc. (2017).
\G\ Janet Sultana, Paola Cutroneo, and Gianluca Trifir[ograve], Clinical and economic burden of adverse drug reactions (Dec. 2013).

    Based on the stated assumptions and benefits outlined in Table 26, 
we estimate the total annual benefit for real world testing to 
providers would range, on average, from $99 million to $493 million. 
Based on the stated assumptions and benefits outlined in Table 27, we 
estimate the total annual benefit for patients and payers would range, 
on average, from $2.6 million to $26.3 million. Therefore, we estimate 
the total benefit of real world testing would range, on average, from 
$101.6 million to $519.3 million.
    We recognize that health IT developers may deploy their systems in 
a number of ways, including cloud-based deployments, and requested 
comment on whether our cost estimates of real world testing should 
factor in such methods of system deployment. For example, we requested 
feedback about whether health IT developers would incur reduced real 
world testing costs through cloud-based deployments as opposed to other 
deployment methods. We specifically solicited comment on the general 
ratio of cloud-based to non-cloud-based deployments within the health 
care ecosystem and specific cost variations in performing real world 
testing based on the type of deployment. We also requested comment on 
our assumptions about the burden to providers in time spent assisting 
health IT developers since we encourage health IT developers to come up 
with ways to perform real world testing that mitigate provider 
disruption.
    Comments. We did not receive comment specific to whether health IT 
developers would incur reduced real world testing costs through cloud-
based deployments as opposed to other deployment methods. We also did 
not receive comments regarding the ratio of cloud-based to non-cloud 
based deployments and cost variations regarding different types of 
deployments. We also did not receive comments regarding the burden to 
providers in time spent assisting health IT developers.
    Response. We maintain our assumptions and estimates as proposed 
regarding real world testing.
(C) Real World Testing Maintenance Requirements
    In this final rule, we revised the Principle of Proper Conduct in 
Sec.  170.523(m) to require ONC-ACBs to collect, no less than 
quarterly, all updates successfully made to standards in certified 
health IT pursuant to the developers having opted to avail themselves 
of the Standards Version Advancement Process flexibility under the real 
world testing Condition of Certification requirement. Under Sec.  
170.523(p), ONC-ACBs will be responsible for: (1) Reviewing and 
confirming that applicable health IT developers submit real world 
testing plans in accordance with Sec.  170.405(b)(1); (2) reviewing and 
confirming that applicable health IT developers submit real world 
testing results in accordance with Sec.  170.405(b)(2); and (3) 
submitting real world testing plans by December 15 and results by March 
15 of each calendar year to ONC for public availability. In addition, 
under Sec.  170.523(t), ONC-ACBs will be required to: (1) Maintain a 
record of the date of issuance and the content of developers' notices; 
and (2) timely post content of each notice on the CHPL.
    Using the information from the ``Real World Testing Costs'' section 
of this RIA, we estimated that 429 developers will be impacted by real 
world testing. We estimate that, on average, it will take an ONC-ACB 
employee at the GS-13, Step 1 level approximately 30 minutes to collect 
all updates made to standards in Health IT Modules in accordance with 
Sec.  170.523(m). The hourly wage with benefits for a GS-13, Step 1 
employee located in Washington, DC is approximately $91. Since the 
collection must occur no less than quarterly, we assume it occurs, on 
average, four times per year. Therefore, we estimate the annual cost to 
ONC-ACBs to comply with the collection requirements under Sec.  
170.523(m) to be $78,078.
    We estimated that, on average, it will take an ONC-ACB employee at 
the GS-

[[Page 25933]]

13, Step 1 level approximately one hour to review and confirm that 
applicable health IT developers submit real world testing plans in 
accordance with Sec.  170.405(b)(1). We estimate that, on average, it 
will take an ONC-ACB employee at the GS-13, Step 1 level approximately 
30 minutes to review and confirm that applicable health IT developers 
submit real world testing results in accordance with Sec.  
170.405(b)(2). We estimate that, on average, it will take an ONC-ACB 
employee at the GS-13, Step 1 level approximately 30 minutes to submit 
real world testing plans and results to ONC for public availability. 
The hourly wage with benefits for a GS-13, Step 1 employee located in 
Washington, DC is approximately $91. Therefore, we estimate the annual 
cost to ONC-ACBs to comply with the submission and reporting 
requirements under Sec. Sec.  170.523(m) and 170.550(l) to be $156,156.
    Throughout the RIA we have used 830 products as our 2015 Edition 
projection. We came up with this projection by multiplying a -23.2 
percent market consolidation rate from the total number of products 
certified to 2014 Edition. This assumption was based on the market 
consolidation rate observed between the 2011 and 2014 Editions. We have 
estimated the number of 2015 Edition products that will certify each 
criterion included in the real world testing Condition of Certification 
requirement. We assume that there will be a cost associated with a 
notice for each certified criterion (even if an individual product were 
to update the same standard across multiple criteria that use that 
standard). This estimation was calculated by multiplying the current 
percent of 2015 Edition products that certify a criterion by the 
estimated number of total 2015 Edition products (830). For example, we 
calculated that 43 percent of 2015 Edition products certified 
170.315(b)(1); we then multiplied this percentage by 830--the predicted 
number of 2015 Edition products. Thus, based on this calculation, for 
2015 Edition, we predict that 359 products will certify the 
170.315(b)(1) criterion. This method was used across all criteria 
included in the real world testing Condition of Certification 
requirement.
    We assume that the amount of time for an ONC-ACB staff person to: 
(1) Maintain a record of the date of issuance and the content of 
developers' notices; and (2) to timely post content of each notice on 
the CHPL can be anywhere from 30 minutes to one hour.
    The hourly wage with benefits for a GS-13, Step 1 employee located 
in Washington, DC is approximately $91. This was the hourly rate we 
used for this RIA, so it is consistent with prior calculations. This 
wage is used to determine the ONC-ACB time cost to complete this 
requirement under Sec.  170.523(t). For this estimate, we take half the 
hourly rate and multiply it by the number of products predicted to 
certify each of the applicable criteria. For each criterion, we 
estimate a lower bound and upper bound prediction. The lower bound 
assumes that 25 percent of certified products update any of the 
applicable standards. The upper bound prediction assumes that all 
certified products update any of the applicable standards. These 
estimates are calculated for each criterion and then the cumulative sum 
of all the individual criterion calculations is made. We estimate, at 
30 minutes per notice, it will cost $60,606 if 25 percent of certified 
products update any of the applicable standards across all criteria, 
and if all products update any of the applicable standards, we estimate 
it will cost $242,424. Our maximum estimate for time to comply is one 
hour per notice.
    Using the same methodology explained above, we estimate, at 60 
minutes per notice, it will cost $121,212 if 25 percent of certified 
products update any of the applicable standards across all criteria, 
and if all products update any of the applicable standards, we estimate 
it will cost $484,848. Our lower bound estimate for the cost of this 
requirement is $60,606. Our upper bound estimate for the cost of this 
requirement is $484,848.
    Comments. We received a comment recommending that ONC add 
accountability to the real world testing process by having ONC-ACBs 
review a randomly selected percentage of submitted results for 
potential non-conformity with certification requirements.
    Response. We thank commenters for their input. It is within ONC-
ACBs' rights and interests to randomly select certified Health IT 
Modules that have been real world tested as part of their surveillance 
activities. ONC will be working closely with ONC-ACBs to provide 
direction on how ONC-ACBs can leverage existing Program and ISO/IEC 
17065 requirements to provide oversight without increasing burden by 
setting a minimum expectation in regulation. Setting a regulatory quota 
could potentially create burden as workloads amongst the different ONC-
ACBs vary. Additionally, it limits ONC-ACBs to what is adopted in the 
final rule and prevents future adjustments that may be needed to 
improve efficiency without additional rulemaking. We have finalized our 
estimates.
(vi) Attestations
    The Cures Act requires that a health IT developer, as a Condition 
and Maintenance of Certification requirement under the Program, provide 
to the Secretary an attestation to all the Conditions and Maintenance 
of Certification requirements specified in the Cures Act, except for 
the ``EHR Reporting Program'' Condition of Certification requirement. 
It also requires that a health IT developer attest that its health IT 
allows for health information to be exchanged, accessed, and used in 
the manner described by the API Condition of Certification requirement. 
We have finalized our proposal to implement the Cures Act 
``attestations'' requirement in Sec.  170.406 by requiring health IT 
developers to attest to the aforementioned Conditions. For the purposes 
of estimating the potential burden of these attestations on health IT 
developers, ONC-ACBs, and ONC, we estimate that all health IT 
developers under the Program will submit an attestation biannually. As 
noted previously in this RIA, there are 792 health IT developers 
certified to the 2014 Edition.
    We estimated it would take a health IT developer employee 
approximately one hour on average to prepare and submit each 
attestation to the ONC-ACB. According to the May 2017 BLS occupational 
employment statistics, the mean hourly wage for a software developer is 
$53.74.\241\ Therefore, we estimated the annual cost including overhead 
costs to be $84,744. We have finalized that attestations will be 
submitted to ONC-ACBs on behalf of ONC and the Secretary. We assume 
there will be four ONC-ACBs as this is the current number of ONC-ACBs, 
and we also assume an equal distribution in responsibilities among ONC-
ACBs. ONC-ACBs would have two responsibilities related to attestations. 
One responsibility we finalized in Sec.  170.523(q) is that an ONC-ACB 
must review attestations for completion and submit the health IT 
developers' attestations to ONC. We estimate it will take an ONC-ACB 
employee at the GS-13, Step 1 level approximately 30 minutes on average 
to review and submit each attestation to ONC. The other responsibility 
we are finalizing in Sec.  170.550(l) is that an ONC-ACB would need to 
ensure that the health IT developer of the Health IT Module has

[[Page 25934]]

met its responsibilities related to the Conditions and Maintenance of 
Certification requirements as solely evidenced by its attestation. We 
estimate it will take an ONC-ACB employee at the GS-13, Step 1 level 
approximately one hour on average to complete this task. The hourly 
wage with benefits for a GS-13, Step 1 employee located in Washington, 
DC is approximately $91. Therefore, we estimate the annual cost to ONC-
ACBs to be $108,108.
---------------------------------------------------------------------------

    \241\ See https://www.bls.gov/oes/2017/may/oes439061.
---------------------------------------------------------------------------

    We have finalized that we would make the attestations publicly 
available on the CHPL once they are submitted by the ONC-ACBs. ONC 
posts information regularly to the CHPL and we estimate the added costs 
to post the attestation will be de minimis.
    Comments. We did not receive comment specific to the methods 
related to the estimates for posting attestations.
    Response. We maintain our assumptions and estimates as proposed 
regarding attestations.
(4) Oversight for the Conditions and Maintenance of Certification 
Requirements
    Our processes for overseeing the Conditions and Maintenance of 
Certification requirements will, for the most part, mirror our 
processes for direct review of non-conformities in certified health IT 
as described in current Sec.  170.580. We may directly review a health 
IT developer's actions to determine whether they conform to the 
Conditions and Maintenance of Certification requirements finalized in 
this final rule. The estimated costs and benefits for such oversight 
and review are detailed below.
(i) Costs
    We estimated the potential monetary costs of allowing ONC to 
directly review a health IT developer's actions to determine whether 
the actions conform to the requirements of the Program as follows: (1) 
Costs for health IT developers to correct non-conforming actions 
identified by ONC; (2) costs for health IT developers and ONC costs 
related to ONC review and inquiry into non-conforming actions by the 
health IT developer; and (3) costs for ONC-ACBs related to the new 
reporting requirement in the Principles of Proper Conduct in Sec.  
170.523(s).
(A) Costs for Health IT Developers to Correct Non-Conforming Actions 
Identified by ONC
    We do not believe health IT developers face additional direct costs 
for the ONC direct review of health IT developer actions (see cost 
estimates for the Conditions and Maintenance of Certification 
requirements). However, we acknowledge that this final rule may 
eventually require health IT developers to correct certain actions or 
non-conformities with their health IT that do not conform to the 
Conditions and Maintenance of Certification requirements.
    If we identify a non-conforming action by a health IT developer, 
the costs incurred by the health IT developer to bring its actions into 
conformance will be determined on a case-by-case basis. Factors that 
will be considered include, but are not limited to: (1) The extent of 
customers and/or business affected; (2) how pervasive the action(s) is 
across the health IT developer's business; (3) the period of time that 
the health IT developer was taking the action(s) in question; and (4) 
the corrective action required to resolve the issue. We are unable to 
reliably estimate these costs as we do not have cost estimates for a 
comparable situation. We requested comment on existing relevant data 
and methods we could use to estimate these costs.
    Comments. We did not receive any comments specific to the relevant 
data and methods used to estimate the costs to correct non-conforming 
actions identified by ONC.
    Response. We maintain our approach used to estimate the costs to 
correcting identified non-conformities.
(B) Costs for Health IT Developers and ONC Costs Related to ONC Review 
and Inquiry Into Health IT Developer Actions
    In order to calculate the potential costs to health IT developers 
and ONC related to ONC review and inquiry into health IT developer 
actions, we have created the following categories for potential costs: 
(1) ONC review and inquiry prior to the issuance of a notice of non-
conformity; (2) ONC review and inquiry following the issuance of a 
notice of non-conformity and the health IT developer does not contest 
ONC's findings (i.e., no appeal); and (3) ONC review and inquiry 
following the issuance of a notice of non-conformity and the health IT 
developer contests ONC's findings (i.e., appeal).
(C) ONC Review and Inquiry Prior to the Issuance of a Notice of 
Nonconformity
    We anticipate that ONC will receive, on average, between 100 and 
200 complaints per year concerning the Conditions and Maintenance of 
Certification requirements that will warrant review and inquiry by ONC. 
We estimate that such initial review and inquiry by ONC will require, 
on average, two to three analysts at the GS-13 level working one to two 
hours each per complaint. The hourly wage with benefits for a GS-13, 
Step 1 employee located in Washington, DC is approximately $91. 
Therefore, we estimate each review and inquiry will cost ONC, on 
average, between $182 and $546. We estimate the total annual cost to 
ONC will, on average, range from $18,200 and $109,200. This range takes 
into account both the low end of reviews that are resolved quickly and 
the high end in which staff will need to discuss issues with ONC 
leadership or in some cases, HHS senior leadership including the Office 
of General Counsel. We have not estimated health IT developer costs 
associated with ONC review prior to the issuance of a notice of non-
conformity because, in most cases, health IT developers are not 
required to take action prior to the notice of non-conformity.
(D) ONC Review and Inquiry Following the Issuance of a Notice of Non-
Conformity and the Health IT Developer Does Not Contest ONC's Findings
    This category captures cases that require review and inquiry 
following ONC's issuance of a notice of non-conformity, but that do not 
proceed to the appeals process. Examples of such situations would 
include, but not be limited to: (1) A health IT developer violates a 
Condition of Certification requirement and does not contest ONC's 
finding that it is in violation of the Condition of Certification 
requirement; or (2) a health IT developer fails to meet a deadline, 
such as for its corrective action plan (CAP). We estimate that ONC 
will, on average, conduct between 12 and 18 of these reviews annually.
    We estimate that a health IT developer may commit, on average and 
depending on complexity, between 10 and 40 hours of staff time per case 
to provide ONC with all requested records and documentation that ONC 
would use to review and conduct an inquiry into health IT developer 
actions, and, when necessary, make a certification ban and/or 
termination determination. We assumed that the work will be performed 
by a ``Computer Systems Analyst.'' According to the May 2017 BLS 
occupational employment statistics, the mean hourly wage for computer 
systems analyst is $44.59.\242\ As noted previously, we have assumed 
that overhead costs (including benefits) are equal to 100 percent of 
pre-tax wages, so the hourly wage including overhead costs would be 
$89. Therefore,

[[Page 25935]]

we estimate the average annual cost for health IT developers would 
range from $10,680 to $64,080. We note that some health IT developers' 
costs are expected to be less and some health IT developers' costs are 
expected to be more than this estimated cost range. Further, we note 
that these costs would be perpetual.
---------------------------------------------------------------------------

    \242\ https://www.bls.gov/oes/2017/May/oes151121.htm.
---------------------------------------------------------------------------

    We estimate that ONC may commit, on average and depending on 
complexity, between eight and 80 hours of staff time to complete a 
review and inquiry into health IT developer actions. We assume that the 
expertise of a GS-15, Step 1 Federal employee(s) will be necessary. The 
hourly wage with benefits for a GS-15, Step 1 employee located in 
Washington, DC is approximately $126. Therefore, based on the estimate 
of between 12 and 18 cases each year, we estimate ONC's annual costs 
would range, on average, from $12,096 to $181,440. We note that some 
reviews and inquiries may cost less and some may cost more than this 
estimated cost range. Further, we note that these costs would be 
perpetual.
    We welcomed comments on our estimated costs and any comparable 
processes and costs that we could use to improve our estimates.
    Comments. We did not receive any comments specific to the relevant 
data and methods used to estimate the costs to: (1) ONC review and 
inquiry prior to the issuance of a notice of non-conformity; (2) ONC 
review and inquiry following the issuance of a notice of non-conformity 
and the health IT developer does not contest ONC's findings (i.e., no 
appeal); and (3) ONC review and inquiry following the issuance of a 
notice of non-conformity and the health IT developer contests ONC's 
findings (i.e., appeal).
    Response. We maintain our approach used to estimate the costs to 
health IT developers and to ONC, related to ONC review and inquiry into 
health IT developer actions.
(E) ONC Review and Inquiry Following the Issuance of a Notice of Non-
Conformity and the Health IT Developer Contests ONC's Findings
    As discussed in section VII.C of this preamble, we permit a health 
IT developer to appeal an ONC determination to issue a certification 
ban and/or terminate a certification under Sec.  170.580(a)(2)(iii). 
This category of cost calculations captures cases that require review 
and inquiry following ONC's issuance of a notice of non-conformity and 
where the health IT developer contests ONC's finding and files an 
appeal. We estimate that ONC will, on average, conduct between three 
and five of these reviews annually.
    We estimated that a ``Computer Systems Analyst'' for the health IT 
developer may commit, on average and depending on complexity, between 
20 and 80 hours to provide the required information to appeal a 
certification ban and/or termination under Sec.  170.580(a)(2)(iii) and 
respond to any requests from the hearing officer. According to the May 
2017 BLS occupational employment statistics, the mean hourly wage for a 
computer systems analyst is $44.59.\243\ Assuming that overhead costs 
(including benefits) are equal to 100 percent of pre-tax wages, the 
hourly wage including overhead costs is $89. Therefore, we estimate the 
annual cost, including overhead costs, for a health IT developer to 
appeal a certification ban and/or termination under Sec.  
170.580(a)(2)(iii) would, on average, range from $5,340 to $35,600. We 
note that some health IT developers' costs are expected to be less and 
some health IT developers' costs are expected to be more than this 
estimated cost range. Further, we note that these costs would be 
perpetual.
---------------------------------------------------------------------------

    \243\ See https://www.bls.gov/oes/2017/May/oes151121.htm.
---------------------------------------------------------------------------

    We estimated that ONC would commit, on average and depending on 
complexity, between 40 and 160 hours of staff time to conduct each 
appeal. This will include the time to represent ONC in the appeal and 
support the costs for the hearing officer. We assume that the expertise 
of a GS-15, Step 1 Federal employee(s) would be necessary. The hourly 
wage with benefits for a GS-15, Step 1 employee located in Washington, 
DC is approximately $126. Therefore, based on the estimate of between 
three and five cases each year, we estimate the cost for ONC to conduct 
an appeal would range, on average, from $15,120 to $100,800. We note 
that some appeals may cost less and some may cost more than this 
estimated cost range. Further, we note that these costs would be 
perpetual.
    Based on the above estimates, we estimated the total annual costs 
for health IT developers related to ONC review and inquiry into health 
IT developer actions would range, on average, from $16,020 to $99,680. 
We estimated the total annual costs for ONC related to ONC review and 
inquiry into health IT developer actions would range, on average, from 
$44,603 to $383,345.
    Comments. We did not receive any comments specific to the relevant 
data and methods used to estimate the costs of (1) ONC review and 
inquiry prior to the issuance of a notice of non-conformity; (2) ONC 
review and inquiry following the issuance of a notice of non-conformity 
and the health IT developer does not contest ONC's findings (i.e., no 
appeal); and (3) ONC review and inquiry following the issuance of a 
notice of non-conformity and the health IT developer contests ONC's 
findings (i.e., appeal).
    Response. We maintain our approach used to estimate the costs to 
health IT developers and to ONC, related to ONC review and inquiry into 
health IT developer actions.
(F) Costs for ONC-ACBs
    We also note that ONC-ACBs could realize costs associated with the 
new reporting requirement in the Principles of Proper Conduct in Sec.  
170.523(s) that they report, at a minimum, no later than a week after 
becoming aware of, any information that could inform whether ONC should 
exercise direct review under Sec.  170.580(a). We estimate that, on 
average, it will take an ONC-ACB employee at the GS-13, Step 1 level 
approximately 30 minutes to prepare the report. The hourly wage with 
benefits for a GS-13, Step 1 employee located in Washington, DC is 
approximately $91. Since the collection must occur no less than weekly, 
we will assume it occurs, on average, 52 times per year. Therefore, 
given that there are currently three ONC-ACBs, we estimate the annual 
cost to ONC-ACBs to comply with the reporting requirement under Sec.  
170.523(s) would, on average, be $7,098. We did not receive comments 
regarding our calculations. We have finalized these estimates.
(ii) Benefits
    This final rule's provisions for ONC direct review of the 
Conditions and Maintenance of Certification requirements would promote 
health IT developers' accountability for their actions and ensure that 
health IT developers' actions conform with the requirements of the 
Cures Act and Conditions and Maintenance of Certification requirements 
in Sec. Sec.  170.400-406. Specifically, ONC's direct review of health 
IT developer actions will facilitate ONC's ability to require 
comprehensive corrective action by health IT developers to address non-
conforming actions determined by ONC. If ONC ultimately implements a 
certification ban and/or terminates a certification(s), such action 
will serve to protect the integrity of the Program and users of health 
IT. While we do not have available means to quantify the benefits of 
ONC direct review of health IT developer actions, we note that ONC

[[Page 25936]]

direct review supports and enables the National Coordinator to fulfill 
his responsibilities under the HITECH Act and Cures Act, instills 
public confidence in the Program, and protects public health and 
safety. We did not receive comments regarding our calculations. We have 
finalized these estimates. (5) Information Blocking
(i) Costs
    We expect ONC to incur an annual cost for issuing educational 
resources related to the information blocking ``reasonable and 
necessary'' exceptions. We estimate that ONC issues educational 
resources each quarter, therefore, four per year. We assume that the 
educational resources would be provided by ONC staff with the expertise 
of a GS-15, Step 1 Federal employee(s). The hourly wage with benefits 
for a GS-15, Step 1 employee located in Washington, DC is approximately 
$126. We estimate it would take ONC staff between 200 and 400 hours to 
develop the guidance. Therefore, we estimate the annual cost to ONC 
would range, on average, from $100,800 to $201,600.
    Comments. We did not receive any comments regarding the specific 
costs associated with information blocking.
    Response. We have adopted our estimates as proposed. We note that 
we did receive comments regarding ``burden'' on various stakeholder 
groups related to our information blocking proposals, and those 
comments are addressed throughout the information blocking section 
(section VIII) of this final rule.
(ii) Benefits
    Information blocking not only interferes with effective health 
information exchange, but also negatively impacts many important 
aspects of health and health care. For a detailed discussion of the 
negative impacts of information blocking, we refer readers to section 
XIV.C.2.a(2) of the Proposed Rule (84 FR 7584).
    The exceptions to the information blocking definition adopted in 
this final rule create clear guidelines for industry regarding pro-
competitive and other beneficial activities and will enable 
stakeholders to determine more easily and with greater certainty 
whether their activities are excepted from the information blocking 
definition. Overall, the finalized exceptions are accommodating to 
legitimate industry practices for health IT developers, hospitals, and 
health care providers and, we believe, will ease the burden and 
compliance costs for these parties.
    To estimate the benefits of information blocking, we first examined 
existing data sources to identify a proxy that will indicate the extent 
to which information blocking is occurring. According to analysis of 
data from the American Hospital Association IT Supplement survey, 53 
percent of non-Federal acute care hospitals reported that they had 
challenges with exchanging data across different vendor platforms.\244\ 
Moreover, 31 percent reported that they must pay additional costs to 
exchange information with organizations outside of the system. Nearly 
one in four hospitals reported that they had to develop customized 
interfaces to electronically exchange information.
---------------------------------------------------------------------------

    \244\ Pylypchuk Y., Johnson C., Henry J. & Ciricean D. (November 
2018). Variation in Interoperability among U.S. Non-Federal Acute 
Care Hospitals in 2017. ONC Data Brief, no.42. Office of the 
National Coordinator for Health Information Technology: Washington 
DC.
---------------------------------------------------------------------------

    To quantify the magnitude of information blocking and the benefits 
of restricting information blocking, we estimated the following, which 
gives us the imposed cost of information blocking for each health 
outcome: [Percent of providers that engage in cross-vendor exchange] * 
[marginal effect (ME) of information blocking on interoperability] * 
[ME effect of interoperability on the health outcome] * [total cost of 
health outcome].
    We extracted the ``ME effect of interoperability on the health 
outcome'' and ``cost of health outcomes'' from academic literature (see 
citations in Table 24). We then determined a proxy for the number of 
providers that engage in cross-vendor exchange. We did this by 
leveraging hospital referral data from 2015 to determine the proportion 
of hospitals that referred patients to a provider outside of their 
system where the receiving provider used a different EHR vendor. We 
determined that 82 percent of hospitals engaged in cross-vendor 
exchange. This estimate was used as the proxy for ``providers that 
engaged in cross-vendor exchange.''
    We estimated the ``ME of information blocking on interoperability'' 
through the following research design:

Y = b1InforBlock + X'B + e

    Where y = 1 if a hospital routinely engages in four domains of 
interoperability--sending, receiving, finding, and integrating data, 0 
otherwise. The variable InforBlock is a binary indicator for whether a 
hospital reported experiencing challenges with exchanging data across 
different vendor platforms. We assume the impact of reporting this 
barrier is a proxy for the extent to which vendors hinder a hospital's 
interoperability. In the model, we control for the following: 
Hospital's primary vendor, participation in health exchange 
organization, participation in five different networks, system 
ownership, level of system centralization, bed size, profit status, 
public status, region, location in urban area. The marginal effect of b 
is 0.04. We assume that this effect may capture other reasons not 
related to information blocking, so we use half of this estimate for 
our benefit calculations--0.02.

                                         Table 28--Benefits of Prohibiting and/or Deterring Information Blocking
                                                                     [2017 Dollars]
--------------------------------------------------------------------------------------------------------------------------------------------------------
                                                                                                                             Marginal
                                                                                              Overall       Percent of       effect of
                                                                                          interop impact     providers      information       Benefit
             Benefit type                 Total cost impacted           Total cost           (marginal    susceptible to     blocking        benefit A
                                                                                              effect)       information     (percentage
                                                                                                             blocking         points)
--------------------------------------------------------------------------------------------------------------------------------------------------------
Duplicate testing....................  100%....................  200 billion B..........          C 0.09              82            0.02    $295,200,000
Avoidable hospitalizations and         100%....................  $41 billion D..........            0.09              82            0.02      60,516,000
 readmissions.
ER visits............................  131 million visits E....  Cost per ER visit                  0.03              82            0.02      79,469,316
                                                                  $1,233.
Adverse drug events..................  20%.....................  $30 billion F..........            0.22              82            0.02      21,648,000

[[Page 25937]]

 
    Total benefit per year...........  ........................  .......................  ..............  ..............  ..............   $456,833,316
--------------------------------------------------------------------------------------------------------------------------------------------------------
\A\ Total benefit would be a product of % of total cost impacted, total cost, overall interop impact, percent of providers susceptible to information
  blocking, and marginal effect of information blocking; however, no reasonable estimate of the marginal effect of information blocking is currently
  available.
\B\ National Academy of Medicine (2016), https://money.cnn.com/2017/05/20/news/economy/medical-tests/.
\C\ Stephen E. Ross, Tiffany A. Radcliff, William G. Leblanc, L. Miriam Dickinson, Anne M. Libby, and Donald E. Nease Jr., Effects of health information
  exchange adoption on ambulatory testing rates, J. Am. Med. Inform. Assoc. (2013), at 1137-1142; Bridget A. Stewart, Susan Fernandes, Elizabeth
  Rodriguez-Huertas, and Michael Landzberg, A preliminary look at duplicate testing associated with lack of electronic health record interoperability
  for transferred patients, J. of the Am. Med. Informatics Assoc. (2010), at 341-344; Sezgin Ayabakan, Indranil R. Bardhan, Zhiqiang (Eric) Zheng, and
  Kirk Kirksey Value of health information sharing in reducing healthcare waste: An analysis of duplicate testing across hospitals, MIS Quarterly (Jan.
  1, 2017); Eric J. Lammers, Julia Adler-Milstein, and Keith E. Kocher, Does health information exchange reduce redundant imaging? Evidence from
  emergency departments, Med Care (Mar. 2014), at 227-34.
\D\ Agency for Healthcare Research and Quality (AHRQ) Statistical Brief #199 (Dec. 2015), https://www.hcup-us.ahrq.gov/reports/statbriefs/sb199-Readmissions-Payer-Age.pdf; AHRQ Statistical Brief #72, Nationwide Frequency and Costs of Potentially Preventable Hospitalizations (Apr. 2009), https://www.hcup-us.ahrq.gov/reports/statbriefs/sb72.pdf.
\E\ National Center for Health Statistics (NCHS) Data Brief No. 252 (June 2016), https://www.cdc.gov/nchs/data/databriefs/db252.pdf; Nolan Caldwell,
  Tanja Srebotnjak, Tiffany Wang, and Renee Hsia, ``How Much Will I Get Charged for This?'' Patient Charges for Top Ten Diagnoses in the Emergency
  Department (2013), https://doi.org/10.1371/journal.pone.0055491.
\F\ Janet Sultana, Paola Cutroneo, and Gianluca Trifir[ograve], Clinical and economic burden of adverse drug reactions.

    As a result of this calculation, we estimate that the benefit of 
the information blocking provision is $456 million.
    Comments. We did not receive any comments regarding our approach to 
estimating benefits or the specific benefit estimates associated with 
information blocking.
    Response. ONC has revised its methodological approach to 
quantifying the benefits of our information blocking provision. This 
new methodology is described in the RIA.
(6) Total Annual Cost Estimate
    The total annual cost estimate is expressed in 2016 dollars to meet 
regulatory reform analysis requirements under Executive Order 13771. We 
estimated that the total cost for this final rule for the first year 
after it is finalized (including one-time costs), based on the cost 
estimates outlined above and throughout this RIA, would range, on 
average, from $953 million to $2.6 billion with an average annual cost 
of $1.8 billion. We estimated that the total perpetual cost for this 
final rule (starting in year two), based on the cost estimates outlined 
above, would range, on average, from $366 million to $1.3 billion with 
an average annual cost of $840 million. We also included estimates 
based on the stakeholder groups affected. We estimated the total costs 
to health IT developers to be between $483 million and $1.1 billion 
(including one-time and perpetual costs) with $633,000 in cost savings 
from deregulatory actions. Assuming that 458 health IT developers will 
be impacted, the cost per developer will range from $1.1 million to 
$2.4 million. Based on previous participation in the CMS EHR Incentive 
Program, we estimated that 439,187 health care providers in 95,470 
clinical practices and 4,519 hospitals that participated in the CMS EHR 
Incentive Program will be impacted by this final rule. We estimated the 
total cost to health care providers to be between $478 million to $1.6 
billion. We did not calculate per entity costs for health care 
providers. We acknowledged that costs may be passed from health IT 
developers to their customers (i.e. health care providers) during the 
licensing of their health IT modules. We estimated the total costs to 
ONC-ACBs to be between $391,000 and $792,000. We estimated the 
government costs (through labor hours of ONC staff) to be between 
$159,000 and $586,000 with $4,497 in cost savings from deregulatory 
actions. In addition to the above-mentioned cost savings that are 
attributable to specific stakeholder groups, we estimated an additional 
cost savings of $6.6 million to $13.3 million to all stakeholders 
affected by this provision. We are unable to attribute these amounts to 
specific stakeholder groups. We did not receive comment regarding these 
calculations. We have finalized our estimates.
(7) Total Annual Benefit Estimate
    The total annual benefit estimate is expressed in 2016 dollars to 
meet regulatory reform analysis requirements under Executive Order 
13771. We estimated the total annual benefit for this final rule, based 
on the benefit estimates outlined above, would range from $1.2 billion 
to $5.0 billion with primary estimated annual benefit of $3.1 billion. 
Our estimates include benefits attributed to the entire health care 
system, including hospitals, clinicians, payers and patients.(8) Total 
Annualized Net Benefit
    The total annualized net benefit is expressed in 2016 dollars to 
meet regulatory reform analysis requirements under Executive Order 
13771. We estimate the total annualized net benefit for this final 
rule, based on the estimates outlined above, would range from $191 
million to $2.3 billion with a primary net benefit estimate of $1.3 
billion.
b. Accounting Statement and Table
    When a rule is considered an economically significant rule under 
Executive Order 12866, we are required to develop an accounting 
statement indicating the classification of the expenditures associated 
with the provisions of the proposed rule. Monetary annual benefits are 
presented as discounted flows using three percent and seven percent 
factors in Table 29. We are not able to explicitly define the universe 
of all costs, but have provided an average of likely costs of this 
final rule as well as a high and low range of likely costs. 
Unquantifiable costs and benefits are noted in Table 31. This final 
rule requires no Federal transfers, but it might bring about a 
reduction in fraudulent payments to providers by the

[[Page 25938]]

Federal Government and other payers.\245\
---------------------------------------------------------------------------

    \245\ Parente, Stephen T., Karen Mandelbaum, Susan P. Hanson, 
Bonnie S. Cassidy and Donald W. Simborg. ``Crime and Punishment: Can 
the NHIN Reduce the Cost of Healthcare Fraud?'' Journal of 
Healthcare Information Management 22(3): 42-51. June 2008.

                                                            Table 29--EO 12866 Summary Table
                                                              [In $ millions, 2016 Dollars]
--------------------------------------------------------------------------------------------------------------------------------------------------------
                                                                            Lower bound     Upper bound                     Lower bound     Upper bound
                                                           Primary (3%)        (3%)            (3%)        Primary (7%)        (7%)            (7%)
--------------------------------------------------------------------------------------------------------------------------------------------------------
Present Value of Quantified Costs.......................           6,454           2,966           9,943           4,574           2,120           7,028
Present Value of Quantified Benefits....................          23,411           8,831          37,991          16,552           6,244          26,859
Present Value of Net Benefits...........................          16,957           5,865          28,049          16,552           4,124          19,832
Annualized Quantified Costs.............................             852             391           1,312             854             396           1,312
Annualized Quantified Benefits..........................           3,089           1,165           5,013           2,184             824           3,544
Annualized Net Quantified Benefits......................           2,237             774           3,701           1,330             428           2,232
--------------------------------------------------------------------------------------------------------------------------------------------------------


                             Table 30--E.O. 12866 Summary Table Non-Discounted Flows
                                                 [2016 Dollars]
----------------------------------------------------------------------------------------------------------------
                                      Year 1          Year 2          Year 3          Year 4          Year 5
----------------------------------------------------------------------------------------------------------------
Costs...........................     942,795,801     839,887,346     839,887,346     839,887,346     839,887,346
Benefits........................   3,088,980,583   3,088,980,583   3,088,980,583   3,088,980,583   3,088,980,583
----------------------------------------------------------------------------------------------------------------
                                      Year 6          Year 7          Year 8          Year 9          Year 10
----------------------------------------------------------------------------------------------------------------
Costs...........................     839,887,346     839,887,346     839,887,346     839,887,346     839,887,346
Benefits........................   3,088,980,583   3,088,980,583   3,088,980,583   3,088,980,583   3,088,980,583
----------------------------------------------------------------------------------------------------------------


                                       Table 31--Non-Quantifiable Benefits
                                                 [2016 Dollars]
----------------------------------------------------------------------------------------------------------------
                                                   Present value of 10 years by   Annualized value over 10 years
                                                    discount rate (in millions)   by discount rate (in millions)
                    Benefits                     ---------------------------------------------------------------
                                                     3 Percent       7 Percent       3 Percent       7 Percent
----------------------------------------------------------------------------------------------------------------
Quantified Benefits.............................          23,411          16,552           3,089           2,184
----------------------------------------------------------------------------------------------------------------
Non-quantified Benefits:
    Impact on users of health IT that were ineligible or did not participate in the CMS EHR Incentive Programs;
     developer cost savings from no longer supporting the 2014 Edition; provider and patient benefit from
     implementation of USCDI and Security tags (DS4P) provisions due to improvements in interoperability;
     benefits associated with communication provision because we do not have adequate information to determine
     the prevalence of gag clauses and other such restrictive practices nor do we have a means to quantify the
     value to providers of being able to freely communicate and share information; benefit of ONC oversight on
     real world testing and non-conformance; external regulatory and policy activities..........................
----------------------------------------------------------------------------------------------------------------
                      Costs                          3 Percent       7 Percent       3 Percent       7 Percent
----------------------------------------------------------------------------------------------------------------
Quantified Costs................................           6,454           4,574             852             396
----------------------------------------------------------------------------------------------------------------
Non-quantified Costs:
    Impact of provisions on health IT production costs such as the supply and demand for personnel over time;
     costs developers to correct non-conformities; ONC cost to review non-conformities, real-world testing
     maintenance by ACBs; additional provider implementation activities related to USCDI and DS4P; external
     regulatory and policy activities...........................................................................
----------------------------------------------------------------------------------------------------------------

3. Regulatory Flexibility Act
    The Regulatory Flexibility Act (RFA) requires agencies to analyze 
options for regulatory relief of small businesses if a rule has a 
significant impact on a substantial number of small entities. The Small 
Business Administration (SBA) establishes the size of small businesses 
for Federal Government programs based on average annual receipts or the 
average employment of a firm.\246\ The entities that are likely to be 
directly affected by the requirements in this final rule are health IT 
developers. We note that the reasonable and necessary activities that 
do not constitute information blocking provide flexibilities and relief 
for health IT developers of certified health IT, health information 
networks, health information exchanges, and health care providers in 
relation to the information blocking provision of the Cures Act. These 
reasonable and necessary activities also take into account the 
potential burden on small entities to

[[Page 25939]]

meet these ``exceptions'' to information blocking, such as with 
considering the size and resources of small entities when meeting 
security requirements to qualify for the ``promoting the security of 
electronic health information'' exception.
---------------------------------------------------------------------------

    \246\ The SBA references that annual receipts means ``total 
income'' (or in the case of a sole proprietorship, ``gross income'') 
plus ``cost of goods sold'' as these terms are defined and reported 
on Internal Revenue Service tax return forms.
---------------------------------------------------------------------------

    While health IT developers that pursue certification of their 
health IT under the Program represent a small segment of the overall 
information technology industry, we believe that many health IT 
developers impacted by the requirements in this final rule most likely 
fall under the North American Industry Classification System (NAICS) 
code 541511 ``Custom Computer Programming Services.'' \247\ The SBA 
size standard associated with this NAICS code is set at $27.5 million 
annual receipts or less. There is enough data generally available to 
establish that between 75 percent and 90 percent of entities that are 
categorized under the NAICS code 541511 are under the SBA size 
standard. We also note that with the exception of aggregate business 
information available through the U.S. Census Bureau and the SBA 
related to NAICS code 541511, it appears that many health IT developers 
that pursue certification of their health IT under the Program are 
privately held or owned and do not regularly, if at all, make their 
specific annual receipts publicly available. As a result, it is 
difficult to locate empirical data related to many of these health IT 
developers to correlate to the SBA size standard. However, although not 
perfectly correlated to the size standard for NAICS code 541511, we do 
have information indicating that over 60 percent of health IT 
developers that have had Complete EHRs and/or Health IT Modules 
certified to the 2011 Edition had less than 51 employees (80 FR 62741).
---------------------------------------------------------------------------

    \247\ https://www.sba.gov/sites/default/files/files/Size_Standards_Table_2017.pdf.
---------------------------------------------------------------------------

    We estimated that the requirements in this final rule will have 
effects on health IT developers, some of which may be small entities, 
that have certified health IT or are likely to pursue certification of 
their health IT under the Program. We believe, however, that we have 
finalized the minimum amount of requirements necessary to accomplish 
our primary policy goal of enhancing interoperability. Further, as 
discussed in section XIII.B of this RIA above, there are no appropriate 
regulatory or non-regulatory alternatives that could be developed to 
lessen the compliance burden associated with this final rule because 
many of the provisions are derived directly from legislative mandates 
in the Cures Act. Additionally, we have attempted to offset some of the 
burden imposed on health IT developers in this final rule with cost 
saving provisions through deregulatory actions (see section III). 
Additionally, the Secretary certifies that this final rule will not 
have a significant impact on a substantial number of small entities.
4. Executive Order 13132--Federalism
    Executive Order 13132 establishes certain requirements that an 
agency must meet when it promulgates a final rule that imposes 
substantial direct requirement costs on State and local governments, 
preempts State law, or otherwise has federalism implications. Nothing 
in this final rule imposes substantial direct compliance costs on State 
and local governments, preempts State law, or otherwise has federalism 
implications. We are not aware of any State laws or regulations that 
are contradicted or impeded by any of the provisions in this final 
rule.
5. Unfunded Mandates Reform Act of 1995
    Section 202 of the Unfunded Mandates Reform Act of 1995 requires 
that agencies assess anticipated costs and benefits before issuing any 
rule that imposes unfunded mandates on State, local, and tribal 
governments or the private sector requiring spending in any one year of 
$100 million in 1995 dollars, updated annually for inflation. The 
current inflation-adjusted statutory threshold is approximately $150 
million. While the estimated potential cost effects of this final rule 
reach the statutory threshold, we do not believe this final rule 
imposes unfunded mandates on State, local, and tribal governments or 
the private sector.
    OMB reviewed this final rule.

List of Subjects

45 CFR Part 170

    Computer technology, Electronic health record, Electronic 
information system, Electronic transactions, Health, Health care, 
Health information technology, Health insurance, Health records, 
Hospitals, Incorporation by reference, Laboratories, Medicaid, 
Medicare, Privacy, Reporting and recordkeeping requirements, Public 
health, Security.

45 CFR Part 171

    Computer technology, Electronic health record, Electronic 
information system, Electronic transactions, Health, Health care, 
Health care provider, Health information exchange, Health information 
technology, Health information network, Health insurance, Health 
records, Hospitals, Privacy, Reporting and recordkeeping requirements, 
Public health, Security.

    For the reasons set forth in the preamble, 45 CFR subtitle A, 
subchapter D, is amended as follows:

PART 170--HEALTH INFORMATION TECHNOLOGY STANDARDS, IMPLEMENTATION 
SPECIFICATIONS, AND CERTIFICATION CRITERIA AND CERTIFICATION 
PROGRAMS FOR HEALTH INFORMATION TECHNOLOGY

0
1. The authority citation for part 170 continues to read as follows:

    Authority: 42 U.S.C. 300jj-11; 42 U.S.C 300jj-14; 5 U.S.C. 553


0
2. Revise Sec.  170.101 to read as follows:


Sec.  170.101  Applicability.

    The standards, implementation specifications, and certification 
criteria adopted in this part apply to Health IT Modules and the 
testing and certification of such Health IT Modules.

0
3. Amend Sec.  170.102 by:
0
a. Removing the definitions of ``2014 Edition Base EHR'' and ``2014 
Edition EHR certification criteria'';
0
b. Revising paragraph (3) in the definition of ``2015 Edition Base 
EHR'';
0
c. Revising the definition of ``Common Clinical Data Set'';
0
d. Removing the definition of ``Complete EHR, 2014 Edition''; and
0
e. Adding in alphabetical order definitions for ``Electronic Health 
Information'', ``Fee'', ``Health information technology'', 
``Interoperability'', and ``Interoperability element''.
    The revisions and additions read as follows:


Sec.  170.102  Definitions.

* * * * *
    2015 Edition Base EHR * * *
    (3) Has been certified to the certification criteria adopted by the 
Secretary in--
    (i) Section 170.315(a)(1), (2), or (3); (a)(5), (a)(9), (a)(14), 
(b)(1), (c)(1), (g)(7) and (9), and (h)(1) or (2);
    (ii) Section 170.315(g)(8) or (10) until May 2, 2022; and
    (iii) Section 170.315(g)(10) on and after May 2, 2022.
* * * * *
    Common Clinical Data Set means the following data expressed, where 
indicated, according to the specified standard(s):
    (1) Patient name.
    (2) Sex: The standard specified in Sec.  170.207(n)(1).
    (3) Date of birth.

[[Page 25940]]

    (4) Race:
    (i) The standard specified in Sec.  170.207(f)(2); and
    (ii) The standard specified in Sec.  170.207(f)(1) for each race 
identified in accordance Sec.  170.207(f)(2).
    (5) Ethnicity:
    (i) The standard specified in Sec.  170.207(f)(2); and
    (ii) The standard specified in Sec.  170.207(f)(1) for each 
ethnicity identified in accordance Sec.  170.207(f)(2).
    (6) Preferred language: The standard specified in Sec.  
170.207(g)(2).
    (7) Smoking status.
    (8) Problems: At a minimum, the standard specified in Sec.  
170.207(a)(4).
    (9) Medications: At a minimum, the standard specified in Sec.  
170.207(d)(3).
    (10) Medication allergies: At a minimum, the standard specified in 
Sec.  170.207(d)(3).
    (11) Laboratory test(s): At a minimum, the standard specified in 
Sec.  170.207(c)(3).
    (12) Laboratory value(s)/result(s).
    (13) Vital signs:
    (i) The patient's diastolic blood pressure, systolic blood 
pressure, body height, body weight, heart rate, respiratory rate, body 
temperature, pulse oximetry, and inhaled oxygen concentration must be 
exchanged in numerical values only; and
    (ii) In accordance with the standard specified in Sec.  
170.207(c)(3) and with the associated applicable unit of measure for 
the vital sign measurement in the standard specified in Sec.  
170.207(m)(1).
    (iii) Optional: The patient's BMI percentile per age and sex for 
youth 2-20 years of age, weight for age per length and sex for children 
less than 3 years of age, and head occipital-frontal circumference for 
children less than 3 years of age must be recorded in numerical values 
only in accordance with the standard specified in Sec.  170.207(c)(3) 
and with the associated applicable unit of measure for the vital sign 
measurement in the standard specified in Sec.  170.207(m)(1). For BMI 
percentile per age and sex for youth 2-20 years of age and weight for 
age per length and sex for children less than 3 years of age, the 
reference range/scale or growth curve should be included as 
appropriate.
    (14) Procedures:
    (i) At a minimum, the version of the standard specified in Sec.  
170.207(a)(4) or Sec.  170.207(b)(2); or
    (ii) For technology primarily developed to record dental 
procedures, the standard specified in Sec.  170.207(b)(3).
    (iii) Optional: The standard specified in Sec.  170.207(b)(4).
    (15) Care team member(s).
    (16) Immunizations: In accordance with, at a minimum, the standards 
specified in Sec.  170.207(e)(3) and (4).
    (17) Unique device identifier(s) for a patient's implantable 
device(s): In accordance with the ``Product Instance'' in the 
``Procedure Activity Procedure Section'' of the standard specified in 
Sec.  170.205(a)(4).
    (18) Assessment and plan of treatment:
    (i) In accordance with the ``Assessment and Plan Section (V2)'' of 
the standard specified in Sec.  170.205(a)(4); or
    (ii) In accordance with the ``Assessment Section (V2)'' and ``Plan 
of Treatment Section (V2)'' of the standard specified in Sec.  
170.205(a)(4).
    (19) Goals: In accordance with the ``Goals Section'' of the 
standard specified in Sec.  170.205(a)(4).
    (20) Health concerns: In accordance with the ``Health Concerns 
Section'' of the standard specified in Sec.  170.205(a)(4).
* * * * *
    Electronic health information (EHI) is defined as it is in Sec.  
171.102.
    Fee is defined as it is in Sec.  171.102 of this subchapter.
* * * * *
    Health information technology means hardware, software, integrated 
technologies or related licenses, IP, upgrades, or packaged solutions 
sold as services that are designed for or support the use by health 
care entities or patients for the electronic creation, maintenance, 
access, or exchange of health information.
* * * * *
    Interoperability is, with respect to health information technology, 
such health information technology that--
    (1) Enables the secure exchange of electronic health information 
with, and use of electronic health information from, other health 
information technology without special effort on the part of the user;
    (2) Allows for complete access, exchange, and use of all 
electronically accessible health information for authorized use under 
applicable State or Federal law; and
    (3) Does not constitute information blocking as defined in Sec.  
171.103 of this subchapter.
    Interoperability element is defined as it is in Sec.  171.102 of 
this subchapter.
* * * * *


Sec.  170.200  [Amended]

0
4. Amend Sec.  170.200 by removing the phrase ``Complete EHRs and''.


Sec.  170.202   [Amended]

0
5. Amend Sec.  170.202 by removing and reserving paragraph (a)(1).


Sec.  170.204   [Amended]

0
6. Amend Sec.  170.204 by removing and reserving paragraphs (b)(1) and 
(2) and removing paragraph (c).

0
7. Amend Sec.  170.205 by:
0
a. Removing and reserving paragraphs (a)(1) and (2);
0
b. Adding paragraphs (a)(5) and (b)(1);
0
c. Removing and reserving paragraphs (d)(3), (e)(3), and (h)(1);
0
d. Adding paragraph (h)(3);
0
e. Removing and reserving paragraphs (i)(1) and (j); and
0
f. Adding paragraph (k)(3).

    The additions read as follows:


Sec.  170.205  Content exchange standards and implementation 
specifications for exchanging electronic health information.

    (a) * * *
    (5) Standard. HL7 CDA[supreg] R2 Implementation Guide: C-CDA 
Templates for Clinical Notes R2.1 Companion Guide, Release 2 
(incorporated by reference in Sec.  170.299).
* * * * *
    (b) * * *
    (1) Standard. National Council for Prescription Drug Programs 
(NCPDP): SCRIPT Standard Implementation Guide; Version 2017071 
(incorporated by reference in Sec.  170.299).
* * * * *
    (h) * * *
    (3) Standard. CMS Implementation Guide for Quality Reporting 
Document Architecture: Category I; Hospital Quality Reporting; 
Implementation Guide for 2019 (incorporated by reference in Sec.  
170.299).
* * * * *
    (k) * * *
    (3) Standard. CMS Implementation Guide for Quality Reporting 
Document Architecture: Category III; Eligible Clinicians and Eligible 
Professionals Programs; Implementation Guide for 2019 (incorporated by 
reference in Sec.  170.299).
* * * * *


Sec.  170.207  [Amended]

0
8. Amend Sec.  170.207 by removing and reserving paragraphs (d)(2), 
(e)(2), (g)(1), (h), and (j).


Sec.  170.210   [Amended]

0
9. Amend Sec.  170.210:
0
a. By removing and reserving paragraphs (a)(1) and (c)(1);
0
b. In paragraph (e)(1)(i), by removing the words ``7.2 through 7.4, 
7.6, and 7.7'' and adding in their place ``7.1.1 through 7.1.3 and 
7.1.6 through 7.1.9''; and
0
c. In paragraph (h), by removing the words ``ASTM E2147-01 (Reapproved 
2013)'' and adding in their place ``ASTM E2147-18''.


[[Page 25941]]



0
10. Add Sec.  170.213 to read as follows:


Sec.  170.213  United States Core Data for Interoperability

    Standard. United States Core Data for Interoperability (USCDI), 
Version 1 (v1) (incorporated by reference in Sec.  170.299).

0
11. Add Sec.  170.215 to read as follows:


Sec.  170.215   Application Programming Interface Standards.

    The Secretary adopts the following application programming 
interface (API) standards and associated implementation specifications:
    (a)(1) Standard. HL7[supreg] Fast Healthcare Interoperability 
Resources (FHIR [supreg]) Release 4.0.1 (incorporated by reference in 
Sec.  170.299).
    (2) Implementation specification. HL7 FHIR US Core Implementation 
Guide STU 3.1.0. (incorporated by reference in Sec.  170.299).
    (3) Implementation specification. HL7 SMART Application Launch 
Framework Implementation Guide Release 1.0.0, including mandatory 
support for the ``SMART Core Capabilities'' (incorporated by reference 
in Sec.  170.299).
    (4) Implementation specification. FHIR Bulk Data Access (Flat FHIR) 
(v1.0.0: STU 1), including mandatory support for the ``group-export'' 
``OperationDefinition'' (incorporated by reference in Sec.  170.299).
    (b) Standard. OpenID Connect Core 1.0, incorporating errata set 1 
(incorporated by reference in Sec.  170.299).

0
12. Amend Sec.  170.299 by:
0
a. Revising paragraph (c)(1);
0
b. Removing and reserving paragraphs (c)(2) and (3) and (d)(2), (7), 
and (8);
0
c. Adding paragraphs (e)(4) and (5);
0
d. Removing and reserving paragraphs (f)(3), (6), (7), (10), and (11);
0
e. Adding paragraphs (f)(30) through (34);
0
f. Removing and reserving paragraphs (h)(1) and (j)(1);
0
g. Adding paragraph (k)(3);
0
h. Removing and reserving paragraph (l)(3);
0
i. Adding paragraph (m)(5);
0
j. Redesignating paragraphs (n) through (r) as paragraphs (o) through 
(s), respectively;
0
k. Adding new paragraph (n); and
0
l. Removing and reserving newly redesignated paragraphs (r)(4) and (5).
    The revision and additions read as follows:


Sec.  170.299  Incorporation by reference.

* * * * *
    (c) * * *
    (1) ASTM E2147-18 Standard Specification for Audit and Disclosure 
Logs for Use in Health Information Systems, approved May 1, 2018, IBR 
approved for Sec.  170.210(h).
* * * * *
    (e) * * *
    (4) CMS Implementation Guide for Quality Reporting Document 
Architecture Category I Hospital Quality Reporting Implementation Guide 
for 2019; published May 4, 2018, IBR approved for Sec.  170.205(h).
    (5) CMS Implementation Guide for Quality Reporting Document 
Architecture Category III Eligible Clinicians and Eligible 
Professionals Programs Implementation Guide for 2019; published October 
8, 2018, IBR approved for Sec.  170.205(k).
    (f) * * *
    (30) HL7[supreg] CDA[supreg] R2 Implementation Guide: C-CDA 
Templates for Clinical Notes R2.1 Companion Guide, Release 2-US Realm, 
October 2019, IBR approved for Sec.  170.205(a).
    (31) HL7 FHIR[supreg] Bulk Data Access (Flat FHIR[supreg]) (v1.0.0: 
STU 1), August 22, 2019, IBR approved for Sec.  170.215(a).
    (32) HL7 FHIR SMART Application Launch Framework Implementation 
Guide Release 1.0.0, November 13, 2018, IBR approved for Sec.  
170.215(a).
    (33) HL7 Fast Healthcare Interoperability Resources Specification 
(FHIR[supreg]) Release 4, Version 4.0.1: R4, October 30, 2019, 
including Technical Correction #1, November 1, 2019, IBR approved for 
Sec.  170.215(a).
    (34) HL7 FHIR[supreg] US Core Implementation Guide STU3 Release 
3.1.0, November 06, 2019, IBR approved for Sec.  170.215(a).
* * * * *
    (k) * * *
    (3) SCRIPT Standard, Implementation Guide, Version 2017071 
(Approval Date for ANSI: July 28, 2017), IBR approved for Sec.  
170.205(b).
* * * * *
    (m) * * *
    (5) United States Core Data for Interoperability (USCDI), Version 
1, February 2020, IBR approved for Sec.  170.213; available at https://
www.healthit.gov/USCDI.
* * * * *
    (n) OpenID Foundation, 2400 Camino Ramon, Suite 375, San Ramon, CA 
94583, Telephone +1 925-275-6639, https://openid.net/.
    (1) OpenID Connect Core 1.0 Incorporating errata set 1, November 8, 
2014, IBR approved for Sec.  170.215(b).
    (2) [Reserved]
* * * * *


Sec.  170.300   [Amended]

0
13. Amend Sec.  170.300 in paragraphs (a) and (c) by removing the 
phrase ``Complete EHRs and''.


Sec.  170.314   [Removed and Reserved]

0
14. Remove and reserve Sec.  170.314.

0
15. Amend Sec.  170.315:
0
a. By removing and reserving paragraphs (a)(6) through (8);
0
b. In paragraph (a)(9)(ii)(B)(1)(iii) by removing ``medication 
allergy'' and adding in its place ``allergy and intolerance'';
0
c. In paragraph (a)(9)(ii)(B)(2) by removing ``medication allergies'' 
and adding in its place ``allergies and intolerance'';
0
d. By removing and reserving paragraph (a)(11);
0
e. In paragraphs (b)(1)(ii)(A) introductory text, (b)(1)(ii)(A)(2) and 
(3), (b)(1)(ii)(B), and (b)(1)(ii)(C) introductory text, by removing 
the reference ``Sec.  170.205(a)(3) and Sec.  170.205(a)(4)'' and 
adding in its place the reference ``Sec.  170.205(a)(3), (4), and 
(5)'';
0
f. In paragraph (b)(1)(iii) introductory text, by removing the 
reference ``Sec.  170.205(a)(4)'' and adding in its place the reference 
``Sec.  170.205(a)(3), (4), and (5)'';
0
g. By revising paragraphs (b)(1)(iii)(A) and (b)(2) and (3);
0
h. By removing and reserving paragraphs (b)(4) and (5);
0
i. By revising paragraphs (b)(7) through (9);
0
j. By adding paragraph (b)(10);
0
k. By revising paragraph (c)(3);
0
l. By adding paragraphs (d)(12) and (13);
0
m. By revising paragraphs (e)(1)(i)(A)(1) through (5);
0
n. By adding paragraphs (e)(1)(i)(A)(6) and (7)
0
o. In paragraph (e)(1)(i)(B)(1)(ii) and (e)(1)(i)(B)(2) introductory 
text, by removing the reference ``Sec.  170.205(a)(4)'' and adding in 
its place the reference ``Sec.  170.205(a)(4) and (5)'';
0
p. By removing and reserving paragraph (e)(1)(ii)(B);
0
q. By revising paragraphs (f)(5)(iii)(B)(1) through (4),
0
r. By adding paragraph (f)(5)(iii)(B)(5);
0
s. By revising paragraphs (g)(1) and (2), (g)(3)(i), and (g)(6)
0
t. By removing paragraphs (g)(7)(ii)(A)(3) and (g)(8)(ii)(A)(3);
0
u. By revising paragraph (g)(9)(i)(A);
0
v. By removing paragraph (g)(9)(ii)(A)(3); and
0
w. By adding paragraph (g)(10).
    The revisions and additions read as follows:


Sec.  170.315 2015   Edition health IT certification criteria.

* * * * *
    (b) * * *
    (1) * * *

[[Page 25942]]

    (iii) * * *
    (A)(1) The data classes expressed in the standard in Sec.  170.213 
and in accordance with Sec.  170.205(a)(4), (5), and paragraphs 
(b)(1)(iii)(A)(3)(i) through (iii) of this section, or
    (2) The Common Clinical Data Set in accordance with Sec.  
170.205(a)(4) and paragraph (b)(1)(iii)(A)(3)(i) through (iv) of this 
section for the period until May 2, 2022, and
    (3) The following data classes:
    (i) Assessment and plan of treatment. In accordance with the 
``Assessment and Plan Section (V2)'' of the standard specified in Sec.  
170.205(a)(4); or in accordance with the ``Assessment Section (V2)'' 
and ``Plan of Treatment Section (V2)'' of the standard specified in 
Sec.  170.205(a)(4).
    (ii) Goals. In accordance with the ``Goals Section'' of the 
standard specified in Sec.  170.205(a)(4).
    (iii) Health concerns. In accordance with the ``Health Concerns 
Section'' of the standard specified in Sec.  170.205(a)(4).
    (iv) Unique device identifier(s) for a patient's implantable 
device(s). In accordance with the ``Product Instance'' in the 
``Procedure Activity Procedure Section'' of the standard specified in 
Sec.  170.205(a)(4).
    (2) Clinical information reconciliation and incorporation--(i) 
General requirements. Paragraphs (b)(2)(ii) and (iii) of this section 
must be completed based on the receipt of a transition of care/referral 
summary formatted in accordance with the standards adopted in Sec.  
170.205(a)(3) through (5) using the Continuity of Care Document, 
Referral Note, and (inpatient setting only) Discharge Summary document 
templates on and after May 2, 2022.
    (ii) Correct patient. Upon receipt of a transition of care/referral 
summary formatted according to the standards adopted Sec.  
170.205(a)(3) through (5), technology must be able to demonstrate that 
the transition of care/referral summary received can be properly 
matched to the correct patient.
    (iii) Reconciliation. Enable a user to reconcile the data that 
represent a patient's active medication list, allergies and intolerance 
list, and problem list as follows. For each list type:
    (A) Simultaneously display (i.e., in a single view) the data from 
at least two sources in a manner that allows a user to view the data 
and their attributes, which must include, at a minimum, the source and 
last modification date.
    (B) Enable a user to create a single reconciled list of each of the 
following: Medications; Allergies and Intolerances; and problems.
    (C) Enable a user to review and validate the accuracy of a final 
set of data.
    (D) Upon a user's confirmation, automatically update the list, and 
incorporate the following data expressed according to the specified 
standard(s) on and after May 2, 2022:
    (1) Medications. At a minimum, the version of the standard 
specified in Sec.  170.213;
    (2) Allergies and intolerance. At a minimum, the version of the 
standard specified in Sec.  170.213; and
    (3) Problems. At a minimum, the version of the standard specified 
in Sec.  170.213.
    (iv) System verification. Based on the data reconciled and 
incorporated, the technology must be able to create a file formatted 
according to the standard specified in Sec.  170.205(a)(4) using the 
Continuity of Care Document template and the standard specified in 
Sec.  170.205(a)(5) on and after May 2, 2022.
    (3) Electronic prescribing. (i) For technology certified prior to 
May 2, 2022, subject to the real world testing provisions at Sec.  
170.405(b)(5),
    (A) Enable a user to perform the following prescription-related 
electronic transactions in accordance with, at a minimum, the version 
of the standard specified in Sec.  170.207(d)(3) as follows:
    (1) Create new prescriptions (NEWRX).
    (2) Change prescriptions (RXCHG, CHGRES).
    (3) Cancel prescriptions (CANRX, CANRES).
    (4) Refill prescriptions (REFREQ, REFRES).
    (5) Receive fill status notifications (RXFILL).
    (6) Request and receive medication history information (RXHREQ, 
RXHRES).
    (B) For each transaction listed in paragraph (b)(3)(i)(A) of this 
section, the technology must be able to receive and transmit the reason 
for the prescription using the diagnosis elements in the DRU Segment.
    (C) Optional: For each transaction listed in paragraph (b)(3)(i)(A) 
of this section, the technology must be able to receive and transmit 
the reason for prescription using the indication elements in the SIG 
Segment.
    (D) Limit a user's ability to prescribe all oral liquid medications 
in only metric standard units of mL (i.e., not cc).
    (E) Always insert leading zeroes before the decimal point for 
amounts less than one and must not allow trailing zeroes after a 
decimal point when a user prescribes medications.
    (ii) For technology certified subsequent to June 30, 2020:
    (A) Enable a user to perform the following prescription-related 
electronic transactions in accordance with the standard specified in 
Sec.  170.205(b)(1) and, at a minimum, the version of the standard 
specified in Sec.  170.207(d)(3) as follows:
    (1) Create new prescriptions (NewRx).
    (2) Request and respond to change prescriptions (RxChangeRequest, 
RxChangeResponse).
    (3) Request and respond to cancel prescriptions (CancelRx, 
CancelRxResponse).
    (4) Request and respond to renew prescriptions (RxRenewalRequest, 
RxRenewalResponse).
    (5) Receive fill status notifications (RxFill).
    (6) Request and receive medication history (RxHistoryRequest, 
RxHistoryResponse).
    (7) Relay acceptance of a transaction back to the sender (Status).
    (8) Respond that there was a problem with the transaction (Error).
    (9) Respond that a transaction requesting a return receipt has been 
received (Verify).
    (B) Optionally, enable a user to perform the following 
prescription-related electronic transactions in accordance with the 
standard specified in Sec.  170.205(b)(1) and, at a minimum, the 
version of the standard specified in Sec.  170.207(d)(3) as follows:
    (1) Create and respond to new prescriptions (NewRxRequest, 
NewRxResponseDenied).
    (2) Receive fill status notifications (RxFillIndicator).
    (3) Ask the Mailbox if there are any transactions (GetMessage).
    (4) Request to send an additional supply of medication (Resupply).
    (5) Communicate drug administration events (DrugAdministration).
    (6) Request and respond to transfer one or more prescriptions 
between pharmacies (RxTransferRequest, RxTransferResponse, 
RxTransferConfirm).
    (7) Recertify the continued administration of a medication order 
(Recertification).
    (8) Complete Risk Evaluation and Mitigation Strategy (REMS) 
transactions (REMSInitiationRequest, REMSInitiationResponse, 
REMSRequest, and REMSResponse).
    (9) Electronic prior authorization transactions 
(PAInitiationRequest, PAInitiationResponse, PARequest, PAResponse, 
PAAppealRequest, PAAppealResponse, PACancelRequest, and 
PACancelResponse).
    (C) For the following prescription-related transactions, the 
technology must be able to receive and transmit the

[[Page 25943]]

reason for prescription using the diagnosis elements:  
 or :
    (1) Required transactions:
    (i) Create new prescriptions (NewRx).
    (ii) Request and respond to change prescriptions (RxChangeRequest, 
RxChangeResponse).
    (iii) Cancel prescriptions (CancelRx).
    (iv) Request and respond to renew prescriptions (RxRenewalRequest, 
RxRenewalResponse).
    (v) Receive fill status notifications (RxFill).
    (vi) Receive medication history (RxHistoryResponse).
    (2) Optional transactions:
    (i) Request to send an additional supply of medication (Resupply)
    (ii) Request and respond to transfer one or more prescriptions 
between pharmacies (RxTransferRequest, RxTransferResponse)
    (iii) Complete Risk Evaluation and Mitigation Strategy (REMS) 
transactions (REMSInitiationRequest, REMSInitiationResponse, 
REMSRequest, and REMSResponse).
    (iv) Electronic prior authorization (ePA) transactions 
(PAInitiationRequest, PAInitiationResponse, PARequest, PAResponse, 
PAAppealRequest, PAAppealResponse and PACancelRequest, 
PACancelResponse).
    (D) Optional: For each transaction listed in paragraph 
(b)(3)(ii)(C) of this section, the technology must be able to receive 
and transmit reason for prescription using the  
element in the SIG segment.
    (E) Limit a user's ability to prescribe all oral liquid medications 
in only metric standard units of mL (i.e., not cc).
    (F) Always insert leading zeroes before the decimal point for 
amounts less than one and must not allow trailing zeroes after a 
decimal point when a user prescribes medications.
* * * * *
    (7) Security tags--summary of care--send. Enable a user to create a 
summary record formatted in accordance with the standard adopted in 
Sec.  170.205(a)(4) that is tagged as restricted and subject to 
restrictions on re-disclosure according to the standard adopted in 
Sec.  170.205(o)(1) at the:
    (i) Document, section, and entry (data element) level; or
    (ii) Document level for the period until May 2, 2022.
    (8) Security tags--summary of care--receive. (i) Enable a user to 
receive a summary record that is formatted in accordance with the 
standard adopted in Sec.  170.205(a)(4) that is tagged as restricted 
and subject to restrictions on re-disclosure according to the standard 
adopted in Sec.  170.205(o)(1) at the:
    (A) Document, section, and entry (data element) level; or
    (B) Document level for the period until May 2, 2022; and
    (ii) Preserve privacy markings to ensure fidelity to the tagging 
based on consent and with respect to sharing and re-disclosure 
restrictions.
    (9) Care plan. Enable a user to record, change, access, create, and 
receive care plan information in accordance with:
    (i) The Care Plan document template, including the Health Status 
Evaluations and Outcomes Section and Interventions Section (V2), in the 
standard specified in Sec.  170.205(a)(4); and
    (ii) The standard in Sec.  170.205(a)(5)) on and after May 2, 2022.
    (10) Electronic Health Information export--(i) Single patient 
electronic health information export. (A) Enable a user to timely 
create an export file(s) with all of a single patient's electronic 
health information that can be stored at the time of certification by 
the product, of which the Health IT Module is a part.
    (B) A user must be able to execute this capability at any time the 
user chooses and without subsequent developer assistance to operate.
    (C) Limit the ability of users who can create export file(s) in at 
least one of these two ways:
    (1) To a specific set of identified users
    (2) As a system administrative function.
    (D) The export file(s) created must be electronic and in a 
computable format.
    (E) The publicly accessible hyperlink of the export's format must 
be included with the exported file(s).
    (ii) Patient population electronic health information export. 
Create an export of all the electronic health information that can be 
stored at the time of certification by the product, of which the Health 
IT Module is a part.
    (A) The export created must be electronic and in a computable 
format.
    (B) The publicly accessible hyperlink of the export's format must 
be included with the exported file(s).
    (iii) Documentation. The export format(s) used to support 
paragraphs (b)(10)(i) and (ii) of this section must be kept up-to-date.
    (c) * * *
    (3) Clinical quality measures--report. Enable a user to 
electronically create a data file for transmission of clinical quality 
measurement data in accordance with the applicable implementation 
specifications specified by the CMS implementation guides for Quality 
Reporting Document Architecture (QRDA), category I, for inpatient 
measures in Sec.  170.205(h)(3) and CMS implementation guide for QRDA, 
category III for ambulatory measures in Sec.  170.205 (k)(3).
* * * * *
    (d) * * *
    (12) Encrypt authentication credentials. Health IT developers must 
make one of the following attestations and may provide the specified 
accompanying information, where applicable:
    (i) Yes--the Health IT Module encrypts stored authentication 
credentials in accordance with standards adopted in Sec.  
170.210(a)(2).
    (ii) No--the Health IT Module does not encrypt stored 
authentication credentials. When attesting ``no,'' the health IT 
developer may explain why the Health IT Module does not support 
encrypting stored authentication credentials.
    (13) Multi-factor authentication. Health IT developers must make 
one of the following attestations and, as applicable, provide the 
specified accompanying information:
    (i) Yes--the Health IT Module supports the authentication, through 
multiple elements, of the user's identity with the use of industry-
recognized standards. When attesting ``yes,'' the health IT developer 
must describe the use cases supported.
    (ii) No--the Health IT Module does not support authentication, 
through multiple elements, of the user's identity with the use of 
industry-recognized standards. When attesting ``no,'' the health IT 
developer may explain why the Health IT Module does not support 
authentication, through multiple elements, of the user's identify with 
the use of industry-recognized standards.
    (e) * * *
    (1) * * *
    (i) * * *
    (A) * * *
    (1) The data classes expressed in the standards in Sec.  170.213 
(which should be in their English (i.e., non-coded) representation if 
they associate with a vocabulary/code set), and in accordance with 
Sec.  170.205(a)(4) and (a)(5), and paragraphs (e)(1)(i)(A)(3)(i) 
through (iii) of this section, or
    (2) The Common Clinical Data Set in accordance with Sec.  
170.205(a)(4) and paragraphs (e)(1)(i)(A)(3)(i) through (iv) of this 
section for the period until May 2, 2022.
    (3) The following data classes:
    (i) Assessment and plan of treatment. In accordance with the 
``Assessment and Plan Section (V2)'' of the standard specified in Sec.  
170.205(a)(4); or in accordance with the ``Assessment

[[Page 25944]]

Section (V2)'' and ``Plan of Treatment Section (V2)'' of the standard 
specified in Sec.  170.205(a)(4).
    (ii) Goals. In accordance with the ``Goals Section'' of the 
standard specified in Sec.  170.205(a)(4).
    (iii) Health concerns. In accordance with the ``Health Concerns 
Section'' of the standard specified in Sec.  170.205(a)(4).
    (iv) Unique device identifier(s) for a patient's implantable 
device(s). In accordance with the ``Product Instance'' in the 
``Procedure Activity Procedure Section'' of the standards specified in 
Sec.  170.205(a)(4).
    (4) Ambulatory setting only. Provider's name and office contact 
information.
    (5) Inpatient setting only. Admission and discharge dates and 
locations; discharge instructions; and reason(s) for hospitalization.
    (6) Laboratory test report(s). Laboratory test report(s), 
including:
    (i) The information for a test report as specified all the data 
specified in 42 CFR 493.1291(c)(1) through (7);
    (ii) The information related to reference intervals or normal 
values as specified in 42 CFR 493.1291(d); and
    (iii) The information for corrected reports as specified in 42 CFR 
493.1291(k)(2).
    (7) Diagnostic image report(s).
* * * * *
    (f) * * *
    (5) * * *
    (iii) * * *
    (B) * * *
    (1) The data classes expressed in the standards in Sec.  170.213, 
and in accordance with Sec.  170.205(a)(4) and (5), or
    (2) The Common Clinical Data Set in accordance with Sec.  
170.205(a)(4) for the period until May 2, 2022.
    (3) Encounter diagnoses. Formatted according to at least one of the 
following standards:
    (i) The standard specified in Sec.  170.207(i).
    (ii) At a minimum, the version of the standard specified in Sec.  
170.207(a)(4).
    (4) The provider's name, office contact information, and reason for 
visit.
    (5) An identifier representing the row and version of the trigger 
table that triggered the case report.
* * * * *
    (g) Design and performance--(1) Automated numerator recording. For 
each Promoting Interoperability Programs percentage-based measure, 
technology must be able to create a report or file that enables a user 
to review the patients or actions that would make the patient or action 
eligible to be included in the measure's numerator. The information in 
the report or file created must be of sufficient detail such that it 
enables a user to match those patients or actions to meet the measure's 
denominator limitations when necessary to generate an accurate 
percentage.
    (2) Automated measure calculation. For each Promoting 
Interoperability Programs percentage-based measure that is supported by 
a capability included in a technology, record the numerator and 
denominator and create a report including the numerator, denominator, 
and resulting percentage associated with each applicable measure.
    (3) * * *
    (i) User-centered design processes must be applied to each 
capability technology includes that is specified in the following 
certification criteria: Paragraphs (a)(1) through (5), (9), and (14), 
and (b)(2) and (3).
* * * * *
    (6) Consolidated CDA creation performance. The following technical 
and performance outcomes must be demonstrated related to Consolidated 
CDA creation. The capabilities required under paragraphs (g)(6)(i) 
through (v) of this section can be demonstrated in tandem and do not 
need to be individually addressed in isolation or sequentially.
    (i) This certification criterion's scope includes:
    (A) The data classes expressed in the standard in Sec.  170.213, 
and in accordance with Sec.  170.205(a)(4) and (5) and paragraphs 
(g)(6)(i)(C)(1) through (3) of this section; or
    (B) The Common Clinical Data Set in accordance with Sec.  
170.205(a)(4) and paragraphs (g)(6)(i)(C)(1) through (4) of this 
section for the period until May 2, 2022.
    (C) The following data classes:
    (1) Assessment and plan of treatment. In accordance with the 
``Assessment and Plan Section (V2)'' of the standard specified in Sec.  
170.205(a)(4); or in accordance with the ``Assessment Section (V2)'' 
and ``Plan of Treatment Section (V2)'' of the standard specified in 
Sec.  170.205(a)(4).
    (2) Goals. In accordance with the ``Goals Section'' of the standard 
specified in Sec.  170.205(a)(4).
    (3) Health concerns. In accordance with the ``Health Concerns 
Section'' of the standard specified in Sec.  170.205(a)(4).
    (4) Unique device identifier(s) for a patient's implantable 
device(s). In accordance with the ``Product Instance'' in the 
``Procedure Activity Procedure Section'' of the standard specified in 
Sec.  170.205(a)(4).
    (ii) Reference C-CDA match. (A) For health IT certified to 
(g)(6)(i)(A) of this section, create a data file formatted in 
accordance with the standard adopted in Sec.  170.205(a)(4) and (5) 
that matches a gold-standard, reference data file.
    (B) For health IT certified to (g)(6)(i)(B) of this section, create 
a data file formatted in accordance with the standard adopted in Sec.  
170.205(a)(4) that matches a gold-standard, reference data file.
    (iii) Document-template conformance. (A) For health IT certified to 
(g)(6)(i)(A) of this section, create a data file formatted in 
accordance with the standard adopted in Sec.  170.205(a)(4) and (5) 
that demonstrates a valid implementation of each document template 
applicable to the certification criterion or criteria within the scope 
of the certificate sought.
    (B) For health IT certified to (g)(6)(i)(B) of this section, create 
a data file formatted in accordance with the standard adopted in Sec.  
170.205(a)(4) that demonstrates a valid implementation of each document 
template applicable to the certification criterion or criteria within 
the scope of the certificate sought.
    (iv) Vocabulary conformance. (A) For health IT certified to 
(g)(6)(i)(A) of this section, create a data file formatted in 
accordance with the standard adopted in Sec.  170.205(a)(4) and (5) 
that demonstrates the required vocabulary standards (and value sets) 
are properly implemented.
    (B) For health IT certified to (g)(6)(i)(B) of this section, create 
a data file formatted in accordance with the standard adopted in Sec.  
170.205(a)(4) that demonstrates the required vocabulary standards (and 
value sets) are properly implemented.
    (v) Completeness verification. Create a data file for each of the 
applicable document templates referenced in paragraph (g)(6)(iii) of 
this section without the omission of any of the data included in either 
paragraph (g)(6)(i)(A) or (B) of this section, as applicable.
* * * * *
    (9) * * *
    (i) * * *
    (A)(1) Respond to requests for patient data (based on an ID or 
other token) for all of the data classes expressed in the standards in 
Sec.  170.213 at one time and return such data (according to the 
specified standards, where applicable) in a summary record formatted in 
accordance with Sec.  170.205(a)(4) and (5) following the CCD document 
template, and as specified in paragraphs (g)(9)(i)(A)(3)(i) through 
(iii) of this section, or

[[Page 25945]]

    (2) The Common Clinical Data Set in accordance with paragraphs 
(g)(9)(i)(A)(3)(i) through (iv) of this section for the period until 
May 2, 2022, and
    (3) The following data classes:
    (i) Assessment and plan of treatment. In accordance with the 
``Assessment and Plan Section (V2)'' of the standards specified in 
Sec.  170.205(a)(4); or in accordance with the ``Assessment Section 
(V2)'' and ``Plan of Treatment Section (V2)'' of the standards 
specified in Sec.  170.205(a)(4).
    (ii) Goals. In accordance with the ``Goals Section'' of the 
standards specified in Sec.  170.205(a)(4).
    (iii) Health concerns. In accordance with the ``Health Concerns 
Section'' of the standards specified in Sec.  170.205(a)(4).
    (iv) Unique device identifier(s) for a patient's implantable 
device(s). In accordance with the ``Product Instance'' in the 
``Procedure Activity Procedure Section'' of the standards specified in 
Sec.  170.205(a)(4).
* * * * *
    (10) Standardized API for patient and population services. The 
following technical outcomes and conditions must be met through the 
demonstration of application programming interface technology.
    (i) Data response. (A) Respond to requests for a single patient's 
data according to the standard adopted in Sec.  170.215(a)(1) and 
implementation specification adopted in Sec.  170.215(a)(2), including 
the mandatory capabilities described in ``US Core Server 
CapabilityStatement,'' for each of the data included in the standard 
adopted in Sec.  170.213. All data elements indicated as ``mandatory'' 
and ``must support'' by the standards and implementation specifications 
must be supported.
    (B) Respond to requests for multiple patients' data as a group 
according to the standard adopted in Sec.  170.215(a)(1), and 
implementation specifications adopted in Sec.  170.215(a)(2) and (4), 
for each of the data included in the standard adopted in Sec.  170.213. 
All data elements indicated as ``mandatory'' and ``must support'' by 
the standards and implementation specifications must be supported.
    (ii) Supported search operations. (A) Respond to search requests 
for a single patient's data consistent with the search criteria 
included in the implementation specification adopted in Sec.  
170.215(a)(2), specifically the mandatory capabilities described in 
``US Core Server CapabilityStatement.''
    (B) Respond to search requests for multiple patients' data 
consistent with the search criteria included in the implementation 
specification adopted in Sec.  170.215(a)(4).
    (iii) Application registration. Enable an application to register 
with the Health IT Module's ``authorization server.''
    (iv) Secure connection. (A) Establish a secure and trusted 
connection with an application that requests data for patient and user 
scopes in accordance with the implementation specifications adopted in 
Sec.  170.215(a)(2) and (3).
    (B) Establish a secure and trusted connection with an application 
that requests data for system scopes in accordance with the 
implementation specification adopted in Sec.  170.215(a)(4).
    (v) Authentication and authorization--(A) Authentication and 
authorization for patient and user scopes--(1) First time connections--
(i) Authentication and authorization must occur during the process of 
granting access to patient data in accordance with the implementation 
specification adopted in Sec.  170.215(a)(3) and standard adopted in 
Sec.  170.215(b).
    (ii) An application capable of storing a client secret must be 
issued a refresh token valid for a period of no less than three months.
    (2) Subsequent connections. (i) Access must be granted to patient 
data in accordance with the implementation specification adopted in 
Sec.  170.215(a)(3) without requiring re-authorization and re-
authentication when a valid refresh token is supplied by the 
application.
    (ii) An application capable of storing a client secret must be 
issued a new refresh token valid for a new period of no less than three 
months.
    (B) Authentication and authorization for system scopes. 
Authentication and authorization must occur during the process of 
granting an application access to patient data in accordance with the 
``SMART Backend Services: Authorization Guide'' section of the 
implementation specification adopted in Sec.  170.215(a)(4) and the 
application must be issued a valid access token.
    (vi) Patient authorization revocation. A Health IT Module's 
authorization server must be able to revoke an authorized application's 
access at a patient's direction.
    (vii) Token introspection. A Health IT Module's authorization 
server must be able to receive and validate tokens it has issued.
    (viii) Documentation. (A) The API(s) must include complete 
accompanying documentation that contains, at a minimum:
    (1) API syntax, function names, required and optional parameters 
supported and their data types, return variables and their types/
structures, exceptions and exception handling methods and their 
returns.
    (2) The software components and configurations that would be 
necessary for an application to implement in order to be able to 
successfully interact with the API and process its response(s).
    (3) All applicable technical requirements and attributes necessary 
for an application to be registered with a Health IT Module's 
authorization server.
    (B) The documentation used to meet paragraph (g)(10)(viii)(A) of 
this section must be available via a publicly accessible hyperlink 
without any preconditions or additional steps.
* * * * *

0
16. Add subpart D to part 170 to read as follows:
Subpart D--Conditions and Maintenance of Certification Requirements for 
Health IT Developers
Sec.
170.400 Basis and scope.
170.401 Information blocking.
170.402 Assurances.
170.403 Communications.
170.404 Application programming interfaces.
170.405 Real world testing.
170.406 Attestations.

Subpart D--Conditions and Maintenance of Certification Requirements 
for Health IT Developers


Sec.  170.400   Basis and scope.

    This subpart implements section 3001(c)(5)(D) of the Public Health 
Service Act by setting forth certain Conditions and Maintenance of 
Certification requirements for health IT developers participating in 
the ONC Health IT Certification Program.


Sec.  170.401  Information blocking.

    (a) Condition of Certification requirement. A health IT developer 
must not take any action that constitutes information blocking as 
defined in 42 U.S.C. 300jj-52 and Sec.  171.103 on or after November 2, 
2020.
    (b) [Reserved]


Sec.  170.402  Assurances.

    (a) Condition of Certification requirement. (1) A health IT 
developer must provide assurances satisfactory to the Secretary that 
the health IT developer will not take any action that constitutes 
information blocking as defined in 42 U.S.C. 300jj-52 and Sec.  171.103 
on and after November 2, 2020, unless for legitimate purposes as 
specified by the Secretary; or any other action that may inhibit the 
appropriate exchange, access, and use of electronic health information.

[[Page 25946]]

    (2) A health IT developer must ensure that its health IT certified 
under the ONC Health IT Certification Program conforms to the full 
scope of the certification criteria.
    (3) A health IT developer must not take any action that could 
interfere with a user's ability to access or use certified capabilities 
for any purpose within the full scope of the technology's 
certification.
    (4) A health IT developer of a certified Health IT Module that is 
part of a heath IT product which electronically stores EHI must certify 
to the certification criterion in Sec.  170.315(b)(10).
    (b) Maintenance of Certification requirements. (1) A health IT 
developer must retain all records and information necessary to 
demonstrate initial and ongoing compliance with the requirements of the 
ONC Health IT Certification Program for:
    (i) A period of 10 years beginning from the date a developer's 
Health IT Module(s) is first certified under the Program; or
    (ii) If for a shorter period of time, a period of 3 years from the 
effective date that removes all of the certification criteria to which 
the developer's health IT is certified from the Code of Federal 
Regulations.
    (2)(i) Within 36 months of May 1, 2020, a health IT developer that 
must comply with the requirements of paragraph (a)(4) of this section 
must provide all of its customers of certified health IT with the 
health IT certified to the certification criterion in Sec.  
170.315(b)(10).
    (ii) On and after 36 months from May 1, 2020, a health IT developer 
that must comply with the requirements of paragraph (a)(4) of this 
section must provide all of its customers of certified health IT with 
the health IT certified to the certification criterion in Sec.  
170.315(b)(10).


Sec.  170.403  Communications.

    (a) Condition of Certification requirements. (1) A health IT 
developer may not prohibit or restrict any communication regarding--
    (i) The usability of its health IT;
    (ii) The interoperability of its health IT;
    (iii) The security of its health IT;
    (iv) Relevant information regarding users' experiences when using 
its health IT;
    (v) The business practices of developers of health IT related to 
exchanging electronic health information; and
    (vi) The manner in which a user of the health IT has used such 
technology.
    (2) A health IT developer must not engage in any practice that 
prohibits or restricts a communication regarding the subject matters 
enumerated in paragraph (a)(1) of this section, unless the practice is 
specifically permitted by this paragraph and complies with all 
applicable requirements of this paragraph.
    (i) Unqualified protection for certain communications. A health IT 
developer must not prohibit or restrict any person or entity from 
communicating any information whatsoever (including proprietary 
information, confidential information, and intellectual property) when 
the communication is about one or more of the subject matters 
enumerated in paragraph (a)(1) of this section and is made for any of 
the following purposes:
    (A) Making a disclosure required by law;
    (B) Communicating information about adverse events, hazards, and 
other unsafe conditions to government agencies, health care 
accreditation organizations, and patient safety organizations;
    (C) Communicating information about cybersecurity threats and 
incidents to government agencies;
    (D) Communicating information about information blocking and other 
unlawful practices to government agencies; or
    (E) Communicating information about a health IT developer's failure 
to comply with a Condition of Certification requirement, or with any 
other requirement of this part, to ONC or an ONC-ACB.
    (ii) Permitted prohibitions and restrictions. For communications 
about one or more of the subject matters enumerated in paragraph (a)(1) 
of this section that is not entitled to unqualified protection under 
paragraph (a)(2)(i) of this section, a health IT developer may prohibit 
or restrict communications only as expressly permitted by paragraphs 
(a)(2)(ii)(A) through (E) of this section.
    (A) Developer employees and contractors. (1) A health IT developer 
may prohibit or restrict the communications of the developer's 
employees or contractors.
    (2) A self-developer must not prohibit or restrict communications 
of users of their health IT who are also employees or contractors.
    (B) Non-user-facing aspects of health IT. A health IT developer may 
prohibit or restrict communications that disclose information about 
non-user-facing aspects of the developer's health IT.
    (C) Intellectual property. A health IT developer may prohibit or 
restrict communications that involve the use or disclosure of 
intellectual property existing in the developer's health IT (including 
third-party intellectual property), provided that any prohibition or 
restriction imposed by a developer must be no broader than necessary to 
protect the developer's legitimate intellectual property interests and 
consistent with all other requirements of paragraph (a)(2)(ii) of this 
section. A restriction or prohibition is deemed broader than necessary 
and inconsistent with the requirements of paragraph (a)(2)(ii) of this 
section if it would restrict or preclude a public display of a portion 
of a work subject to copyright protection (without regard to whether 
the copyright is registered) that would reasonably constitute a ``fair 
use'' of that work.
    (D) Screenshots and video. A health IT developer may require 
persons who communicate screenshots or video to--
    (1) Not alter the screenshots or video, except to annotate the 
screenshots or video or resize the screenshots or video;
    (2) Limit the sharing of screenshots to the relevant number of 
screenshots needed to communicate about the health IT regarding one or 
more of the six subject areas in paragraph (a)(1) of this section; and
    (3) Limit the sharing of video to:
    (i) The relevant amount of video needed to communicate about the 
health IT regarding one or more of the six subject areas in paragraph 
(a)(1) of this section; and
    (ii) Only videos that address temporal matters that cannot be 
communicated through screenshots or other forms of communication.
    (E) Pre-market testing and development. A health IT developer may 
prohibit or restrict communications that disclose information or 
knowledge solely acquired in the course of participating in pre-market 
product development and testing activities carried out for the benefit 
of the developer or for the joint benefit of the developer and 
communicator. A developer must not, once the subject health IT is 
released or marketed for purposes other than product development and 
testing, and subject to the permitted prohibitions and restrictions 
described in paragraph (a)(2)(ii) of this section, prohibit or restrict 
communications about matters enumerated in paragraph (a)(1) of this 
section.
    (b) Maintenance of Certification requirements--(1) Notice. Health 
IT developers must issue a written notice to all customers and those 
with which it has contracts or agreements containing provisions that 
contravene paragraph (a) of this section annually, beginning in 
calendar year 2020, until

[[Page 25947]]

paragraph (b)(2)(ii) of this section is fulfilled, stating that any 
communication or contract provision that contravenes paragraph (a) of 
this section will not be enforced by the health IT developer.
    (2) Contracts and agreements. (i) A health IT developer must not 
establish, renew, or enforce any contract or agreement that contravenes 
paragraph (a) of this section.
    (ii) If a health IT developer has a contract or agreement in 
existence as of November 2, 2020, that contravenes paragraph (a) of 
this section, then the developer must amend the contract or agreement 
to remove or void the contractual provision that contravenes paragraph 
(a) of this section whenever the contract is next modified for other 
reasons or renewed.
    (c) Communication, defined. ``Communication'' as used in this 
section means any communication, irrespective of the form or medium. 
The term includes visual communications, such as screenshots and video.


Sec.  170.404  Application programming interfaces.

    The following Condition and Maintenance of Certification 
requirements apply to developers of Health IT Modules certified to any 
of the certification criteria adopted in Sec.  170.315(g)(7) through 
(10).
    (a) Condition of certification requirements--(1) General. A 
Certified API Developer must publish APIs and allow electronic health 
information from such technology to be accessed, exchanged, and used 
without special effort through the use of APIs or successor technology 
or standards, as provided for under applicable law, including providing 
access to all data elements of a patient's electronic health record to 
the extent permissible under applicable privacy laws.
    (2) Transparency conditions--(i) Complete business and technical 
documentation. A Certified API Developer must publish complete business 
and technical documentation, including the documentation described in 
paragraph (a)(2)(ii) of this section, via a publicly accessible 
hyperlink that allows any person to directly access the information 
without any preconditions or additional steps.
    (ii) Terms and conditions--(A) Material information. A Certified 
API Developer must publish all terms and conditions for its certified 
API technology, including any fees, restrictions, limitations, 
obligations, registration process requirements, or other similar 
requirements that would be:
    (1) Needed to develop software applications to interact with the 
certified API technology;
    (2) Needed to distribute, deploy, and enable the use of software 
applications in production environments that use the certified API 
technology;
    (3) Needed to use software applications, including to access, 
exchange, and use electronic health information by means of the 
certified API technology;
    (4) Needed to use any electronic health information obtained by 
means of the certified API technology;
    (5) Used to verify the authenticity of API Users; and
    (6) Used to register software applications.
    (B) API fees. Any and all fees charged by a Certified API Developer 
for the use of its certified API technology must be described in 
detailed, plain language. The description of the fees must include all 
material information, including but not limited to:
    (1) The persons or classes of persons to whom the fee applies;
    (2) The circumstances in which the fee applies; and
    (3) The amount of the fee, which for variable fees must include the 
specific variable(s) and methodology(ies) that will be used to 
calculate the fee.
    (3) Fees conditions--(i) General conditions--(A) All fees. All fees 
related to certified API technology not otherwise permitted by this 
section are prohibited from being imposed by a Certified API Developer. 
The permitted fees in paragraphs (a)(3)(ii) and (iv) of this section 
may include fees that result in a reasonable profit margin in 
accordance with Sec.  171.302.
    (B) Permitted fees requirements. For all permitted fees, a 
Certified API Developer must:
    (1) Ensure that such fees are based on objective and verifiable 
criteria that are uniformly applied to all similarly situated API 
Information Sources and API Users;
    (2) Ensure that such fees imposed on API Information Sources are 
reasonably related to the Certified API Developer's costs to supply 
certified API technology to, and if applicable, support certified API 
technology for, API Information Sources;
    (3) Ensure that such fees to supply and, if applicable, support 
certified API technology are reasonably allocated among all similarly 
situated API Information Sources; and
    (4) Ensure that such fees are not based on whether API Information 
Sources or API Users are competitors, potential competitors, or will be 
using the certified API technology in a way that facilitates 
competition with the Certified API Developer.
    (C) Prohibited fees. A Certified API Developer is prohibited from 
charging fees for the following:
    (1) Costs associated with intangible assets other than actual 
development or acquisition costs of such assets;
    (2) Opportunity costs unrelated to the access, exchange, or use of 
electronic health information; and
    (3) The permitted fees in this section cannot include any costs 
that led to the creation of intellectual property if the actor charged 
a royalty for that intellectual property pursuant to Sec.  171.303 and 
that royalty included the development costs for the creation of the 
intellectual property.
    (D) Record-keeping requirements. A Certified API Developer must 
keep for inspection detailed records of any fees charged with respect 
to the certified API technology, the methodology(ies) used to calculate 
such fees, and the specific costs to which such fees are attributed.
    (ii) Permitted fee--development, deployment, and upgrades. A 
Certified API Developer is permitted to charge fees to an API 
Information Source to recover the costs reasonably incurred by the 
Certified API Developer to develop, deploy, and upgrade certified API 
technology.
    (iii) Permitted fee--recovering API usage costs. A Certified API 
Developer is permitted to charge fees to an API Information Source 
related to the use of certified API technology. The fees must be 
limited to the recovery of incremental costs reasonably incurred by the 
Certified API Developer when it hosts certified API technology on 
behalf of the API Information Source.
    (iv) Permitted fee--value-added services. A Certified API Developer 
is permitted to charge fees to an API User for value-added services 
related to certified API technology, so long as such services are not 
necessary to efficiently and effectively develop and deploy production-
ready software that interacts with certified API technology.
    (4) Openness and pro-competitive conditions; general condition. A 
Certified API Developer must grant an API Information Source the 
independent ability to permit an API User to interact with the 
certified API technology deployed by the API Information Source.
    (i) Non-discrimination. (A) A Certified API Developer must provide 
certified API technology to an API Information Source on terms that are 
no less favorable than it provides to itself and its own customers, 
suppliers, partners, and other persons with whom it has a business 
relationship.

[[Page 25948]]

    (B) The terms on which a Certified API Developer provides certified 
API technology must be based on objective and verifiable criteria that 
are uniformly applied to all substantially similar or similarly 
situated classes of persons and requests.
    (C) A Certified API Developer must not offer different terms or 
services based on:
    (1) Whether a competitive relationship exists or would be created;
    (2) The revenue or other value that another party may receive from 
using the API technology.
    (ii) Rights to access and use certified API technology--(A) Rights 
that must be granted. A Certified API Developer must have and, upon 
request, must grant to API Information Sources and API Users all rights 
that may be reasonably necessary to:
    (1) Access and use the Certified API Developer's certified API 
technology in a production environment;
    (2) Develop products and services that are designed to interact 
with the Certified API Developer's certified API technology; and
    (3) Market, offer, and distribute products and services associated 
with the Certified API Developer's certified API technology.
    (B) Prohibited conduct. A Certified API Developer is prohibited 
from conditioning the receipt of the rights described in paragraph 
(a)(4)(ii)(A) of this section on:
    (1) Receiving a fee, including but not limited to a license fee, 
royalty, or revenue-sharing arrangement;
    (2) Agreeing to not compete with the Certified API Developer in any 
product, service, or market;
    (3) Agreeing to deal exclusively with the Certified API Developer 
in any product, service, or market;
    (4) Obtaining additional licenses, products, or services that are 
not related to or can be unbundled from the certified API technology;
    (5) Licensing, granting, assigning, or transferring any 
intellectual property to the Certified API Developer;
    (6) Meeting any Certified API Developer-specific testing or 
certification requirements; and.
    (7) Providing the Certified API Developer or its technology with 
reciprocal access to application data.
    (iii) Service and support obligations. A Certified API Developer 
must provide all support and other services reasonably necessary to 
enable the effective development, deployment, and use of certified API 
technology by API Information Sources and API Users in production 
environments.
    (A) Changes and updates to certified API technology. A Certified 
API Developer must make reasonable efforts to maintain the 
compatibility of its certified API technology and to otherwise avoid 
disrupting the use of certified API technology in production 
environments.
    (B) Changes to terms and conditions. Except as exigent 
circumstances require, prior to making changes to its certified API 
technology or to the terms and conditions thereof, a Certified API 
Developer must provide notice and a reasonable opportunity for API 
Information Sources and API Users to update their applications to 
preserve compatibility with certified API technology and to comply with 
applicable terms and conditions.
    (b) Maintenance of certification requirements--(1) Authenticity 
verification and registration for production use. The following apply 
to a Certified API Developer with a Health IT Module certified to the 
certification criterion adopted in Sec.  170.315(g)(10):
    (i) Authenticity verification. A Certified API Developer is 
permitted to institute a process to verify the authenticity of API 
Users so long as such process is objective and the same for all API 
Users and completed within ten business days of receipt of an API 
User's request to register their software application for use with the 
Certified API Developer's Health IT Module certified to Sec.  
170.315(g)(10).
    (ii) Registration for production use. A Certified API Developer 
must register and enable all applications for production use within 
five business days of completing its verification of an API User's 
authenticity, pursuant to paragraph (b)(1)(i) of this section.
    (2) Service base URL publication. A Certified API Developer must 
publish the service base URLs for all Health IT Modules certified to 
Sec.  170.315(g)(10) that can be used by patients to access their 
electronic health information. The Certified API Developer must 
publicly publish the service base URLs:
    (i) For all of its customers regardless of whether the Health IT 
Modules certified to Sec.  170.315(g)(10) are centrally managed by the 
Certified API Developer or locally deployed by an API Information 
Source; and
    (ii) In a machine-readable format at no charge.
    (3) Rollout of (g)(10)-certified APIs. A Certified API Developer 
with certified API technology previously certified to the certification 
criterion in Sec.  170.315(g)(8) must provide all API Information 
Sources with such certified API technology deployed with certified API 
technology certified to the certification criterion in Sec.  
170.315(g)(10) by no later than May 2, 2022.
    (4) Compliance for existing certified API technology. By no later 
than November 2, 2020, a Certified API Developer with Health IT 
Module(s) certified to the certification criteria in Sec.  
170.315(g)(7), (8), or (9) must comply with paragraph (a) of this 
section, including revisions to their existing business and technical 
API documentation and make such documentation available via a publicly 
accessible hyperlink that allows any person to directly access the 
information without any preconditions or additional steps.
    (c) Definitions. The following definitions apply to this section:
    API Information Source means an organization that deploys certified 
API technology created by a ``Certified API Developer;''
    API User means a person or entity that creates or uses software 
applications that interact with the ``certified API technology'' 
developed by a ``Certified API Developer'' and deployed by an ``API 
Information Source;''
    Certified API Developer means a health IT developer that creates 
the ``certified API technology'' that is certified to any of the 
certification criteria adopted in Sec.  170.315(g)(7) through (10); and
    Certified API technology means the capabilities of Health IT 
Modules that are certified to any of the API-focused certification 
criteria adopted in Sec.  170.315(g)(7) through (10).


Sec.  170.405   Real world testing.

    (a) Condition of Certification requirement. A health IT developer 
with Health IT Module(s) certified to any one or more 2015 Edition 
certification criteria in Sec.  170.315(b), (c)(1) through (3), (e)(1), 
(f), (g)(7) through (10), and (h) must successfully test the real world 
use of those Health IT Module(s) for interoperability (as defined in 42 
U.S.C.300jj(9) and Sec.  170.102) in the type of setting in which such 
Health IT Module(s) would be/is marketed.
    (b) Maintenance of Certification requirements--(1) Real world 
testing plan submission. A health IT developer with Health IT Module(s) 
certified to any one or more of the criteria referenced in paragraph 
(a) of this section must submit to its ONC-ACB an annual real world 
testing plan addressing each of those certified Health IT Modules by a 
date determined by the ONC-ACB that enables the ONC-ACB to publish a 
publicly available hyperlink to the plan on CHPL no later than December 
15 of each calendar year.
    (i) The plan must be approved by a health IT developer authorized 
representative capable of binding the

[[Page 25949]]

health IT developer for execution of the plan and include the 
representative's contact information.
    (ii) The plan must include all health IT certified to any one or 
more of the criteria referenced in paragraph (a) of this section as of 
August 31 of the year in which the plan is submitted, and address the 
real world testing to be conducted in the calendar year immediately 
following plan submission.
    (iii) The plan must address the following for each of the 
certification criteria identified in paragraph (a) of this section that 
are included in each Health IT Module's scope of certification:
    (A) The testing method(s)/methodology(ies) that will be used to 
demonstrate real world interoperability and conformance to the full 
scope of the certification criterion's requirements, including 
scenario- and use case-focused testing;
    (B) The care setting(s) that will be tested for real world 
interoperability and an explanation for the health IT developer's 
choice of care setting(s) to test;
    (C) For any standards and implementation specifications referenced 
by the criterion that the developer has chosen to certify to National 
Coordinator-approved newer versions pursuant to paragraph (b)(8) or (9) 
of this section, a description of how the developer will test and 
demonstrate conformance to all requirements of the criterion using all 
versions of the adopted standards to which each Health IT Module was 
certified as of August 31 of the year in which the real world testing 
plan is due.
    (D) A schedule of key real world testing milestones;
    (E) A description of the expected outcomes of real world testing;
    (F) At least one measurement/metric associated with the real world 
testing; and
    (G) A justification for the health IT developer's real world 
testing approach.
    (2) Real world testing results reporting. (i) If in the course of 
conducting real world testing the developer discovers one or more non-
conformities with the full scope of any certification criterion under 
the Program, the developer must report that non-conformity to the ONC-
ACB within 30 days.
    (ii) For real world testing activities conducted during the 
immediately preceding calendar year, a health IT developer must submit 
to its ONC-ACB an annual real world testing results report addressing 
each of its certified Health IT Modules that include certification 
criteria referenced in paragraph (a) of this section by a date 
determined by the ONC-ACB that enables the ONC-ACB to publish a 
publicly available hyperlink to the results report on CHPL no later 
than March 15 of each calendar year. The real world testing results 
must report the following for each of the certification criteria 
identified in paragraph (a) of this section that are included in the 
Health IT Module's scope of certification:
    (A) The method(s) that was used to demonstrate real world 
interoperability;
    (B) The care setting(s) that was tested for real world 
interoperability;
    (C) The voluntary updates to standards and implementation 
specifications that the National Coordinator has approved through the 
Standards Version Advancement Process;
    (D) A list of the key milestones met during real world testing;
    (E) The outcomes of real world testing including a description of 
any challenges encountered during real world testing; and
    (F) At least one measurement/metric associated with the real world 
testing.
    (3) USCDI Updates for C-CDA. A health IT developer with health IT 
certified to Sec.  170.315(b)(1), (b)(2), (e)(1), (g)(6), (f)(5), and/
or (g)(9) on May 1, 2020, must:
    (i) Update their certified health IT to be compliant with the 
revised versions of these criteria adopted in this final rule; and
    (ii) Provide its customers of the previously certified health IT 
with certified health IT that meets paragraph (b)(3)(i) of this section 
by May 2, 2022.
    (4) C-CDA Companion Guide Updates. A health IT developer with 
health IT certified to Sec.  170.315(b)(1), (b)(2), (b)(9), (e)(1), 
(g)(6), and/or (g)(9) prior to May 1, 2020, must:
    (i) Update their certified health IT to be compliant with the 
revised versions of the Program criteria in the 2015 Edition; and
    (ii) Provide its customers of the previously certified health IT 
with certified health IT that meets paragraph (b)(4)(i) of this section 
by May 2, 2022.
    (5) Electronic prescribing. A health IT developer with health IT 
certified to Sec.  170.315(b)(3) prior to November 2, 2020, must:
    (i) Update their certified health IT to be compliant with the 
revised versions of this criteria adopted in Sec.  170.315(b)(3)(ii); 
and
    (ii) Provide its customers of the previously certified health IT 
with certified health IT that meets paragraph (b)(5)(i) of this section 
by May 2, 2022
    (6) Security tags. A health IT developer with health IT certified 
to Sec.  170.315(b)(7) and/or Sec.  170.315(b)(8) prior to May 1, 2020, 
must:
    (i) Update their certified health IT to be compliant with the 
revised versions of the criteria adopted in Sec.  170.315(b)(7) and/or 
the revised versions of the criteria adopted in Sec.  170.315(b)(8); 
and
    (ii) Provide its customers of the previously certified health IT 
with certified health IT that meets paragraph (b)(6)(i) of this section 
by May 2, 2022.
    (7) ASTM updates. A health IT developer with health IT certified to 
Sec.  170.315(d)(2), (3), and/or (d)(10) prior to May 1, 2020, must:
    (i) Update their certified health IT to be compliant with Sec.  
170.210(e)(1) and the standard specified in Sec.  170.210(h); and
    (ii) Provide its customers of the previously certified health IT 
with certified health IT that meets paragraph (b)(7)(i) of this section 
by May 2, 2022.
    (8) Standards Version Advancement Process--voluntary updates of 
certified health IT to newer versions of standards and implementation 
specifications. A health IT developer subject to this paragraph (b) is 
permitted to update Health IT Module(s) certified to any one or more of 
the certification criteria referenced in paragraph (a) of this section 
to a newer version of any adopted standard or implementation 
specification included in the criterion, provided that newer version is 
approved by the National Coordinator for use in certifications issued 
under the ONC Health IT Certification Program. A developer that pursues 
such updates to its certified Health IT Module(s) must:
    (i) Provide advance notice to all affected customers and its ONC-
ACB--
    (A) Expressing its intent to update the certified Health IT 
Module(s) to the National Coordinator-approved advanced version of the 
standard implementation specification;
    (B) The developer's expectations for how the update(s) will affect 
real world interoperability for the Health IT Module(s);
    (C) Whether the developer intends to continue to support the 
certificate(s) for the existing certified Health IT Module(s) 
version(s) for some period of time and how long or if the existing 
certified Health IT Module(s) version(s) will be deprecated; and
    (ii) Successfully demonstrate conformance with approved more recent 
versions of the standard(s) or implementation specification(s) included 
in each certification criterion under which the developer chooses to 
update its certified Health IT Module(s).
    (iii) Maintain the updated certified Health IT Module(s) in full 
conformance

[[Page 25950]]

with all applicable Program requirements.
    (9) Standards Version Advancement Process--voluntary certification 
to newer versions of standards and implementation specifications. A 
Health IT developer is permitted to seek certification for its Health 
IT Module(s) to any one or more of the certification criteria 
referenced in paragraph (a) of this section using a newer version of 
any adopted standard(s) or implementation specification(s) included in 
the criterion without first obtaining certification to the version of 
that adopted standard or implementation specification that is 
incorporated by reference in Sec.  170.299, provided that the newer 
version is approved by the National Coordinator for use in 
certifications issued under the ONC Health IT Certification Program. 
Developers may, for each standard and implementation specification 
included in each criterion, choose on an itemized basis whether to seek 
certification to the version incorporated by reference in Sec.  
170.299, or to one or more newer version(s) approved by the National 
Coordinator for use in Health IT Module certifications issued pursuant 
to section 3001(c)(5) of the Public Health Service Act, or to both.


Sec.  170.406  Attestations.

    (a) Condition of Certification requirement. A health IT developer, 
or its authorized representative that is capable of binding the health 
IT developer, must provide the Secretary an attestation of compliance 
with the following Conditions and Maintenance of Certification 
requirements:
    (1) Section 170.401;
    (2) Section 170.402, but only for Sec.  170.402(a)(4) and (b)(2) if 
the health IT developer certified a Health IT Module(s) that is part of 
a health IT product which can store electronic health information;
    (3) Section 170.403;
    (4) Section 170.404 if the health IT developer has a Health IT 
Module(s) certified to any of the certification criteria adopted in 
Sec.  170.315(g)(7) through (10); and such health IT developer must 
also ensure that health IT allows for health information to be 
exchanged, accessed, and used, in the manner described in Sec.  
170.404; and
    (5) Section 170.405 if a health IT developer has a Health IT 
Module(s) certified to any one or more 2015 Edition certification 
criteria in Sec.  170.315(b), (c)(1) through (3), (e)(1), (f), (g)(7) 
through (10), and (h).
    (b) Maintenance of Certification requirement. (1) A health IT 
developer, or its authorized representative that is capable of binding 
the health IT developer, must provide the attestation specified in 
paragraph (a) of this section semiannually for any Health IT Modules 
that have or have had an active certification at any time under the ONC 
Health IT Certification Program during the prior six months.
    (2) [Reserved].

Subpart E--ONC Health IT Certification Program


Sec.  170.501   [Amended]

0
17. Amend Sec.  170.501:
0
a. In paragraph (a), by removing the phrase ``Complete EHRs,'';
0
b. In paragraph (b), by removing the phrase ``Complete EHRs and''; and
0
c. By removing and reserving paragraph (c).


Sec.  170.502  [Amended]

0
18. Amend Sec.  170.502:
0
a. In the definition of ``Deployment site'', by removing the phrase 
``Complete EHR,'';
0
b. In the definition of ``Development site'', by removing the phrase 
``Complete EHR,'';
0
c. In the introductory text to the definition of ``Gap certification'', 
by removing the phrase ``Complete EHR or'';
0
d. By removing the definition of ``ONC-Approved Accreditor or ONC-AA'';
0
e. In the definition of ``ONC-Authorized Certification Body or ONC-
ACB'', by removing the phrase ``Complete EHRs,''; and
0
f. In the definition of ``ONC-Authorized Testing Lab or ONC-ATL,'' by 
removing the phrase ``Complete EHRs and''.


Sec. Sec.  170.503 and 170.504   [Removed and Reserved]

0
19. Remove and reserve Sec. Sec.  170.503 and 170.504.

0
20. Revise Sec.  170.505 to read as follows:


Sec.  170.505   Correspondence.

    (a) Correspondence and communication with ONC or the National 
Coordinator shall be conducted by email, unless otherwise necessary or 
specified.
    (1) Consideration for providing notice beyond email, such as by 
regular, express, or certified mail, will be based on, but not limited 
to, whether: The party requests use of correspondence beyond email; the 
party has responded via email to our communications; we have sufficient 
information from the party to ensure appropriate delivery of any other 
method of notice; and the matter involves an alleged violation within 
ONC's purview under Sec.  170.580 that indicates a serious violation 
under the ONC Health IT Certification Program with potential 
consequences of suspension, certification termination, or a 
certification ban.
    (2) The official date of receipt of any email between ONC or the 
National Coordinator and an applicant for ONC-ACB status, an applicant 
for ONC-ATL status, an ONC-ACB, an ONC-ATL, health IT developer, or a 
party to any proceeding under this subpart is the date on which the 
email was sent.
    (b) In circumstances where it is necessary for an applicant for 
ONC-ACB status, an applicant for ONC-ATL status, an ONC-ACB, an ONC-
ATL, health IT developer, or a party to any proceeding under this 
subpart to correspond or communicate with ONC or the National 
Coordinator by regular, express, or certified mail, the official date 
of receipt for all parties will be the date of the delivery 
confirmation to the address on record.


Sec.  170.510  [Amended]

0
21. Amend Sec.  170.510 by removing paragraph (a) and redesignating 
paragraphs (b) and (c) as paragraphs (a) and (b).

0
22. Amend Sec.  170.520 by revising paragraph (a)(3) to read as 
follows:


Sec.  170.520  Application.

    (a) * * *
    (3) Documentation that confirms that the applicant has been 
accredited to ISO/IEC 17065 (for availability, see Sec.  170.599), with 
an appropriate scope, by any accreditation body that is a signatory to 
the Multilateral Recognition Arrangement (MLA) with the International 
Accreditation Forum (IAF).
* * * * *

0
23. Amend Sec.  170.523:
0
a. By revising paragraph (a);
0
b. By adding subject headings to paragraphs (b), (c), (d) introductory 
text, and (e);
0
c. In paragraph (f) introductory text, by adding a subject heading and 
removing the phrase, ``Complete EHRs,'' and;
0
d. By removing and reserving paragraph (f)(2);
0
e. Revising paragraphs (g) and (h);
0
f. Adding subject headings to paragraphs (i) introductory text and (j) 
introductory text;
0
g. In paragraph (k) introductory text, by adding a subject heading and 
removing the phrase ``Complete EHRs and'';
0
h. In paragraph (k)(1), by removing the phrase ``Complete EHR or'';

[[Page 25951]]

0
i. By revising paragraphs (k)(1)(ii) and (iii);
0
j. By removing and reserving paragraphs (k)(1)(iv)(B) and (C) and 
(k)(2) and (3);
0
k. By revising paragraph (k)(4);
0
l. By adding a subject heading to paragraph (l);
0
m. By revising paragraph (m);
0
n. In paragraph (o), by adding a subject heading and removing the 
phrase ``Complete EHR or''; and
0
o. By adding paragraphs (p) through (t).
    The revisions and additions read as follows:


Sec.  170.523   Principles of proper conduct for ONC-ACBs.

* * * * *
    (a) Accreditation. Maintain its accreditation in good standing to 
ISO/IEC 17065 (incorporated by reference in Sec.  170.599).
    (b) Mandatory training. * * *
* * * * *
    (c) Training program. * * *
* * * * *
    (d) Reporting. * * *
* * * * *
    (e) Onsite observation. * * *
    (f) Certified product listing. * * *
* * * * *
    (g) Records retention. (1) Retain all records related to the 
certification of Complete EHRs and Health IT Modules to an edition of 
certification criteria beginning with the codification of an edition of 
certification criteria in the Code of Federal Regulations through a 
minimum of 3 years from the effective date that removes the applicable 
edition from the Code of Federal Regulations; and
    (2) Make the records available to HHS upon request during the 
retention period described in paragraph (g)(1) of this section;
    (h) Certification decision. Only certify Health IT Modules that 
have been:
    (1) Tested, using test tools and test procedures approved by the 
National Coordinator, by an:
    (i) ONC-ATL;
    (ii) ONC-ATL, National Voluntary Laboratory Accreditation Program-
accredited testing laboratory under the ONC Health IT Certification 
Program, and/or an ONC-ATCB for the purposes of performing gap 
certification; or
    (2) Evaluated by it for compliance with a conformance method 
approved by the National Coordinator.
    (i) Surveillance. * * *
* * * * *
    (j) Refunds. * * *
* * * * *
    (k) Disclosures. * * *
    (1) * * *
    (ii) For a Health IT Module certified to the 2015 Edition health IT 
certification criteria, the information specified by paragraphs 
(f)(1)(i), (vi) through (viii), (xv), and (xvi) of this section as 
applicable for the specific Health IT Module.
    (iii) In plain language, a detailed description of all known 
material information concerning additional types of costs or fees that 
a user may be required to pay to implement or use the Health IT 
Module's capabilities, whether to meet provisions of HHS programs 
requiring the use of certified health IT or to achieve any other use 
within the scope of the health IT's certification. The additional types 
of costs or fees required to be disclosed include but are not limited 
to costs or fees (whether fixed, recurring, transaction-based, or 
otherwise) imposed by a health IT developer (or any third party from 
whom the developer purchases, licenses, or obtains any technology, 
products, or services in connection with its certified health IT) to 
purchase, license, implement, maintain, upgrade, use, or otherwise 
enable and support the use of capabilities to which health IT is 
certified; or in connection with any data generated in the course of 
using any capability to which health IT is certified.
* * * * *
    (4) A certification issued to a Health IT Module based solely on 
the applicable certification criteria adopted by the ONC Health IT 
Certification Program must be separate and distinct from any other 
certification(s) based on other criteria or requirements.
    (l) Certification and Design Mark. * * *
    (m) Adaptations and updates. On a quarterly basis each calendar 
year, obtain a record of:
    (1) All adaptations of certified Health IT Modules;
    (2) All updates made to certified Health IT Modules affecting the 
capabilities in certification criteria to which the ``safety-enhanced 
design'' criteria apply;
    (3) All uses cases for Sec.  170.315(d)(13);
    (4) All updates made to certified Health IT Modules in compliance 
with Sec.  170.405(b)(3); and
    (5) All updates to certified Health IT Modules and all 
certifications of Health IT Modules issued including voluntary use of 
newer standards versions per Sec.  170.405(b)(8) or (9). Record of 
these updates may be obtained by aggregation of ONC-ACB documentation 
of certification activity.
* * * * *
    (o) Scope reduction. * * *
    (p) Real world testing. (1) Review and confirm that applicable 
health IT developers submit real world testing plans in accordance with 
Sec.  170.405(b)(1).
    (2) Review and confirm that applicable health IT developers submit 
real world testing results in accordance with Sec.  170.405(b)(2).
    (3) Submit real world testing plans by December 15 of each calendar 
year and results by March 15 of each calendar year to ONC for public 
availability.
    (q) Attestations. Review and submit health IT developer Conditions 
and Maintenance of Certification requirements attestations made in 
accordance with Sec.  170.406 to ONC for public availability.
    (r) Test results from ONC-ATLs. Accept test results from any ONC-
ATL that is:
    (1) In good standing under the ONC Health IT Certification Program, 
and
    (2) Compliant with its ISO/IEC 17025 accreditation requirements as 
required by 170.524(a).
    (s) Information for direct review. Report to ONC, no later than a 
week after becoming aware of, any information that could inform whether 
ONC should exercise direct review under Sec.  170.580(a).
    (t) Health IT Module voluntary standards and implementation 
specifications updates notices. Ensure health IT developers opting to 
take advantage of the flexibility for voluntary updates of standards 
and implementation specifications in certified Health IT Modules per 
Sec.  170.405(b)(8) provide timely advance written notice to the ONC-
ACB and all affected customers.
    (1) Maintain a record of the date of issuance and the content of 
developers' Sec.  170.405(b)(8) notices; and
    (2) Timely post content or make publicly accessible via the CHPL 
each Sec.  170.405(b)(8) notice received, publicly on the CHPL 
attributed to the certified Health IT Module(s) to which it applies.

0
24. Amend Sec.  170.524:
0
a. By adding subject headings to paragraphs (a) through (c), (d) 
introductory text, and (e);
0
b. By revising paragraph (f);
0
c. By adding a subject heading to paragraph (g) and paragraph (h) 
introductory text; and
0
d. In paragraph (h)(3), by removing the phrase ``Complete EHRs and/
or''.
    The additions and revisions read as follows:


Sec.  170.524   Principles of proper conduct for ONC-ATLs.

* * * * *

[[Page 25952]]

    (a) Accreditation. * * *
    (b) Mandatory training. * * *
    (c) Training program. * * *
    (d) Reporting. * * *
* * * * *
    (e) Onsite observation. * * *
    (f) Records retention. (1) Retain all records related to the 
testing of Complete EHRs and/or Health IT Modules to an edition of 
certification criteria beginning with the codification of an edition of 
certification criteria in the Code of Federal Regulations through a 
minimum of three years from the effective date that removes the 
applicable edition from the Code of Federal Regulations; and
    (2) Make the records available to HHS upon request during the 
retention period described in paragraph (f)(1) of this section;
    (g) Approved testing methods. * * *
    (h) Refunds. * * *
* * * * *


Sec.  170.545  [Removed and Reserved]

0
25. Remove and reserve Sec.  170.545.
0
26. Amend Sec.  170.550 by:
0
a. Adding subject headings to paragraphs (a),(b), and (d), and adding 
paragraph (e);
0
b. Removing and reserving paragraph (f);
0
c. Adding a subject heading to paragraph (g) introductory text and 
adding paragraph (g)(5);
0
d. Revising paragraph (h); and
0
e. Adding paragraphs (l) and (m).
    The additions and revisions read as follows:


Sec.  170.550  Health IT Module certification.

    (a) Certification scope. * * *
    (b) Health IT product scope options. * * *
* * * * *
    (d) Upgrades and enhancements. * * *
    (e) Standards updates. ONC-ACBs must provide an option for 
certification of Health IT Modules consistent with Sec.  171.405(b)(7) 
or (8) to any one or more of the criteria referenced in Sec.  
170.405(a) based on newer versions of standards included in the 
criteria which have been approved by the National Coordinator for use 
in certification.
* * * * *
    (g) Health IT module dependent criteria. * * *
    (5) Section 170.315(b)(10) when a health IT developer presents a 
Health IT Module for certification that can store electronic health 
information at the time of certification by the product, of which the 
Health IT Module is a part.
    (h) Privacy and security certification framework--(1) General rule. 
When certifying a Health IT Module to the 2015 Edition health IT 
certification criteria, an ONC-ACB can only issue a certification to a 
Health IT Module if the privacy and security certification criteria in 
paragraphs (h)(3)(i) through (ix) of this section have also been met 
(and are included within the scope of the certification).
    (2) Testing. In order to be issued a certification, a Health IT 
Module would only need to be tested once to each applicable privacy and 
security criterion in paragraphs (h)(3)(i) through (ix) of this section 
so long as the health IT developer attests that such privacy and 
security capabilities apply to the full scope of capabilities included 
in the requested certification, except for the following:
    (i) A Health IT Module presented for certification to Sec.  
170.315(e)(1) must be separately tested to Sec.  170.315(d)(9); and
    (ii) A Health IT Module presented for certification to Sec.  
170.315(e)(2) must be separately tested to Sec.  170.315(d)(9).
    (3) Applicability. (i) Section 170.315(a)(1) through (3), (5), 
(12), (14), and (15) are also certified to the certification criteria 
specified in Sec.  170.315(d)(1) through (7), (d)(12), and (13).
    (ii) Section 170.315(a)(4), (9), (10), and (13) are also certified 
to the certification criteria specified in Sec.  170.315(d)(1) through 
(3), and (d)(5) through (7), (d)(12), and (13).
    (iii) Section 170.315(b)(1) through (3) and (6) through (9) are 
also certified to the certification criteria specified in Sec.  
170.315(d)(1) through (3) and (d)(5) through (8), (12), and (13);
    (iv) Section 170.315(c) is also certified to the certification 
criteria specified in Sec.  170.315(d)(1), (d)(2)(i)(A), (B), 
(d)(2)(ii) through (v), (d)(3), (5), (12), and (13);
    (v) Section 170.315(e)(1) is also certified to the certification 
criteria specified in Sec.  170.315(d)(1) through (3), (5), (7), (9), 
(12), and (13);
    (vi) Section 170.315(e)(2) and (3) is also certified to the 
certification criteria specified in Sec.  170.315(d)(1), (d)(2)(i)(A) 
and (B), (d)(2)(ii) through (v), (d)(3), (5), (9), (12), and (13);
    (vii) Section 170.315(f) is also certified to the certification 
criteria specified in Sec.  170.315(d)(1) through (3), (7), (12), and 
(13);
    (viii) Section 170.315(g)(7) through (10) is also certified to the 
certification criteria specified in Sec.  170.315(d)(1), (9), (12), and 
(13); and (d)(2)(i)(A) and (B), (d)(2)(ii) through (v), or (d)(10);
    (ix) Section 170.315(h) is also certified to the certification 
criteria specified in Sec.  170.315(d)(1), (d)(2)(i)(A) and (B), 
(d)(2)(ii) through (v), (d)(3), (12), and (13); and
* * * * *
    (l) Conditions of certification attestations. Ensure that the 
health IT developer of the Health IT Module has met its 
responsibilities under subpart D of this part.
    (m) Time-limited certification and certification status for certain 
2015 Edition certification criteria. An ONC-ACB may only issue a 
certification to a Health IT Module and permit continued certified 
status for:
    (1) Section 170.315(a)(10) and (13) and Sec.  170.315(e)(2) until 
January 1, 2022.
    (2) Section 170.315(b)(6) until May 1, 2023.
    (3) Section 170.315(g)(8) until May 2, 2022.

0
27. Amend Sec.  170.555:
0
a. In paragraph (a) by removing the words ``Complete EHRs and/or''; and
0
b. By revising paragraph (b)(1).
    The revision reads as follows:


Sec.  170.555  Certification to newer versions of certain standards.

* * * * *
    (b) * * *
    (1) ONC-ACBs are not required to certify Health IT Module(s) 
according to newer versions of standards adopted and named in subpart B 
of this part, unless:
    (i) The National Coordinator approves a newer version for use in 
certification and a health IT developer voluntarily elects to seek 
certification of its health IT in accordance with Sec.  170.405(b)(9) 
or update its certified health IT to the newer version in accordance 
with Sec.  170.405(b)(8); or
    (ii) The new version is incorporated by reference in Sec.  170.299.
* * * * *

0
28. Amend Sec.  170.556:
0
a. By removing the phrases ``certified Complete EHR or'' and ``Complete 
EHR or'', wherever they occur;
0
b. By revising paragraph (a) introductory text and paragraph (c) 
introductory text;
0
c. By removing and reserving paragraph (c)(2);
0
d. In paragraph (c)(3), by removing the phrase ``certified Complete 
EHRs''; and
0
e. By removing paragraphs (c)(5) and (6).
    The revisions read as follows:


Sec.  170.556  In-the-field surveillance and maintenance of 
certification for Health IT.

    (a) In-the-field surveillance. Consistent with its accreditation 
under 170.523(a) to ISO/IEC 17065 and the requirements of this subpart, 
an ONC-

[[Page 25953]]

ACB must initiate surveillance ``in the field'' as necessary to assess 
whether a certified Health IT Module continues to conform to the 
requirements in subparts A, B, C and E of this part once the certified 
Health IT Module has been implemented and is in use in a production 
environment.
* * * * *
    (c) Randomized surveillance. During each calendar year surveillance 
period, an ONC-ACB may conduct in-the-field surveillance for certain 
randomly selected Health IT Modules to which it has issued a 
certification.
* * * * *


Sec. Sec.  170.560, 170.565, and 170.570  [Amended]

0
29. In the table below, for each section and paragraph indicated in the 
first two columns, remove the phrase indicated in the third column:

------------------------------------------------------------------------
       Section           Paragraphs                  Remove
------------------------------------------------------------------------
Sec.   170.560......  (a)(2).........  ``Complete EHRs and/or''
Sec.   170.565......  (d)(1)(ii) and   ``Complete EHRs or''
                       (iii).
Sec.   170.565......  (h)(2)(iii)....  ``Complete EHRs and''
Sec.   170.570......  (a), (b)(2),     ``Complete EHRs and/or''
                       (c)
                       introductory
                       text, and
                       (c)(1) and (2).
------------------------------------------------------------------------

Sec.  170.575  [Removed and Reserved]

0
30. Remove and reserve Sec.  170.575.

0
31. Amend Sec.  170.580:
0
a. By revising paragraph (a)(1) and the subject headings to paragraphs 
(a)(2)(i) and(ii);
0
b. By adding paragraph (a)(2)(iii);
0
c. By revising paragraphs (a)(3)(i), (iv), and (v);
0
d. By adding paragraph (a)(4);
0
e. By revising paragraphs (b)(1)(i) and (b)(1)(iii)(D), (b)(2)(i), and 
(b)(3)(i) and (ii);
0
f. By adding paragraphs (b)(3)(iii) and (iv);
0
g. By revising paragraph (c)(1);
0
h. In paragraphs (d)(1), (d)(2)(i)(C), and (d)(4), by removing the 
phrase ``Complete EHR or'';
0
i. In paragraph (d)(5), by removing the phrase ``Complete EHRs or'';
0
j. By revising paragraphs (e)(1) introductory text and (f)(1);
0
k. In paragraph (f)(2)(i)(C), by removing the phrase ``Complete EHR 
or''; and
0
l. Revising paragraphs (g)(1) introductory text, (g)(1)(i), (g)(2), 
(g)(3)(i), (g)(4), (g)(5)(i), and (g)(6)(v).
    The revisions and additions read as follows:


Sec.  170.580   ONC review of certified health IT or a health IT 
developer's actions.

    (a) * * *
    (1) Purpose. ONC may directly review certified health IT or a 
health IT developer's actions or practices to determine whether either 
conform to the requirements of the ONC Health IT Certification Program.
    (2) * * *
    (i) Certified health IT causing or contributing to unsafe 
conditions. * * *
    (ii) Impediments to ONC-ACB oversight of certified health IT. * * *
    (iii) Noncompliance with a Condition and Maintenance of 
Certification requirement. ONC may initiate direct review under this 
section if it has a reasonable belief that a health IT developer has 
not complied with a Condition or Maintenance of Certification 
requirement under subpart D of this part.
    (3) * * *
    (i) ONC's review of certified health IT or a health IT developer's 
actions or practices is independent of, and may be in addition to, any 
surveillance of certified health IT conducted by an ONC-ACB.
* * * * *
    (iv) An ONC-ACB and ONC-ATL shall provide ONC with any available 
information that ONC deems relevant to its review of certified health 
IT or a health IT developer's actions or practices.
    (v) ONC may end all or any part of its review of certified health 
IT or a health IT developer's actions or practices under this section 
at any time and refer the applicable part of the review to the relevant 
ONC-ACB(s) if ONC determines that doing so would serve the effective 
administration or oversight of the ONC Health IT Certification Program.
    (4) Coordination with the Office of Inspector General. (i) ONC may 
coordinate its review of a claim of information blocking with the 
Office of Inspector General or defer to the Office of Inspector General 
to lead a review of a claim of information blocking.
    (ii) ONC may rely on Office of Inspector General findings to form 
the basis of a direct review action.
    (b) * * *
    (1) * * *
    (i) Circumstances that may trigger notice of potential non-
conformity. At any time during its review of certified health IT or a 
health IT developer's actions or practices under paragraph (a) of this 
section, ONC may send a notice of potential non-conformity if it has a 
reasonable belief that certified health IT or a health IT developer's 
actions or practices may not conform to the requirements of the ONC 
Health IT Certification Program.
* * * * *
    (iii) * * *
    (D) Issue a notice of proposed termination if the health IT is 
under review in accordance with paragraph (a)(2)(i) or (ii) of this 
section.
    (2) * * *
    (i) Circumstances that may trigger notice of non-conformity. At any 
time during its review of certified health IT or a health IT 
developer's actions or practices under paragraph (a) of this section, 
ONC may send a notice of non-conformity to the health IT developer if 
it determines that certified health IT or a health IT developer's 
actions or practices does not conform to the requirements of the ONC 
Health IT Certification Program.
* * * * *
    (3) * * *
    (i) All records related to the development, testing, certification, 
implementation, maintenance and use of its certified health IT;
    (ii) Any complaint records related to the certified health IT;
    (iii) All records related to the Condition(s) and Maintenance of 
Certification requirements, including marketing and distribution 
records, communications, and contracts; and
    (iv) Any other relevant information.
    (c) * * *
    (1) Applicability. If ONC determines that certified health IT or a 
health IT developer's action or practice does not conform to 
requirements of the ONC Health IT Certification Program, ONC shall 
notify the health IT developer of its determination and require the 
health IT developer to submit a proposed corrective action plan.
* * * * *
    (e) * * *
    (1) Applicability. Excluding situations of noncompliance with a 
Condition or Maintenance of Certification

[[Page 25954]]

requirement under subpart D of this part, ONC may propose to terminate 
a certification issued to a Health IT Module if:
* * * * *
    (f) * * *
    (1) Applicability. The National Coordinator may terminate a 
certification if:
    (i) A determination is made that termination is appropriate after 
considering the information provided by the health IT developer in 
response to the proposed termination notice;
    (ii) The health IT developer does not respond in writing to a 
proposed termination notice within the timeframe specified in paragraph 
(e)(3) of this section; or
    (iii) A determination is made that the health IT developer is 
noncompliant with a Condition or Maintenance of Certification 
requirement under subpart D of this part or for the following 
circumstances when ONC exercises direct review under paragraph 
(a)(2)(iii) of this section:
    (A) The health IT developer fails to timely respond to any 
communication from ONC, including, but not limited to:
    (1) Fact-finding;
    (2) A notice of potential non-conformity within the timeframe 
established in accordance with paragraph (b)(1)(ii)(A)(3) of this 
section; or
    (3) A notice of non-conformity within the timeframe established in 
accordance with paragraph (b)(2)(ii)(A)(3) of this section.
    (B) The information or access provided by the health IT developer 
in response to any ONC communication, including, but not limited to: 
Fact-finding, a notice of potential non-conformity, or a notice of non-
conformity is insufficient or incomplete;
    (C) The health IT developer fails to cooperate with ONC and/or a 
third party acting on behalf of ONC;
    (D) The health IT developer fails to timely submit in writing a 
proposed corrective action plan;
    (E) The health IT developer fails to timely submit a corrective 
action plan that adequately addresses the elements required by ONC as 
described in paragraph (c) of this section;
    (F) The health IT developer does not fulfill its obligations under 
the corrective action plan developed in accordance with paragraph (c) 
of this section; or
    (G) ONC concludes that the non-conformity(ies) cannot be cured.
* * * * *
    (g) * * *
    (1) Basis for appeal. A health IT developer may appeal an ONC 
determination to suspend or terminate a certification issued to a 
Health IT Module and/or an ONC determination to issue a certification 
ban under Sec.  170.581(a)(2) if the health IT developer asserts:
    (i) ONC incorrectly applied ONC Health IT Certification Program 
requirements for a:
    (A) Suspension;
    (B) Termination; or
    (C) Certification ban under Sec.  170.581(a)(2).
* * * * *
    (2) Method and place for filing an appeal. A statement of intent to 
appeal followed by a request for appeal must be submitted to ONC in 
writing by an authorized representative of the health IT developer 
subject to the determination being appealed. The statement of intent to 
appeal and request for appeal must be filed in accordance with the 
requirements specified in the notice of:
    (i) Termination;
    (ii) Suspension; or
    (iii) Certification ban under Sec.  170.581(a)(2).
    (3) * * *
    (i) A statement of intent to appeal must be filed within 10 days of 
a health IT developer's receipt of the notice of:
    (A) Suspension;
    (B) Termination; or
    (C) Certification ban under Sec.  170.581(a)(2).
* * * * *
    (4) Effect of appeal. (i) A request for appeal stays the 
termination of a certification issued to a Health IT Module, but the 
Health IT Module is prohibited from being marketed, licensed, or sold 
as ``certified'' during the stay.
    (ii) A request for appeal does not stay the suspension of a Health 
IT Module.
    (iii) A request for appeal stays a certification ban issued under 
Sec.  170.581(a)(2).
    (5) * * *
    (i) The hearing officer may not review an appeal in which he or she 
participated in the initial suspension, termination, or certification 
ban determination or has a conflict of interest in the pending matter.
* * * * *
    (6) * * *
    (v) ONC will have an opportunity to provide the hearing officer 
with a written statement and supporting documentation on its behalf 
that clarifies, as necessary, its determination to suspend or terminate 
the certification or issue a certification ban.
* * * * *

0
32. Revise Sec.  170.581 to read as follows:


Sec.  170.581   Certification ban.

    (a) Circumstances that may trigger a certification ban. The 
certification of any of a health IT developer's health IT is prohibited 
when:
    (1) The certification of one or more of the health IT developer's 
Health IT Modules is:
    (i) Terminated by ONC under the ONC Health IT Certification 
Program;
    (ii) Withdrawn from the ONC Health IT Certification Program by an 
ONC-ACB because the health IT developer requested it to be withdrawn 
(for reasons other than to comply with Program requirements) when the 
health IT developer's health IT was the subject of a potential non-
conformity or non-conformity as determined by ONC;
    (iii) Withdrawn by an ONC-ACB because of a non-conformity with any 
of the certification criteria adopted by the Secretary under subpart C 
of this part;
    (iv) Withdrawn by an ONC-ACB because the health IT developer 
requested it to be withdrawn (for reasons other than to comply with 
Program requirements) when the health IT developer's health IT was the 
subject of surveillance for a certification criterion or criteria 
adopted by the Secretary under subpart C of this part, including notice 
of pending surveillance; or
    (2) ONC determines a certification ban is appropriate per its 
review under Sec.  170.580(a)(2)(iii).
    (b) Notice of certification ban. When ONC decides to issue a 
certification ban to a health IT developer, ONC will notify the health 
IT developer of the certification ban through a notice of certification 
ban. The notice of certification ban will include, but may not be 
limited to:
    (1) An explanation of the certification ban;
    (2) Information supporting the certification ban;
    (3) Instructions for appealing the certification ban if banned in 
accordance with paragraph (a)(2) of this section; and
    (4) Instructions for requesting reinstatement into the ONC Health 
IT Certification Program, which would lift the certification ban.
    (c) Effective date of certification ban. (1) A certification ban 
will be effective immediately if banned under paragraph (a)(1) of this 
section.
    (2) For certification bans issued under paragraph (a)(2) of this 
section, the ban will be effective immediately after the following 
applicable occurrence:
    (i) The expiration of the 10-day period for filing a statement of 
intent to appeal in Sec.  170.580(g)(3)(i) if the health IT

[[Page 25955]]

developer does not file a statement of intent to appeal.
    (ii) The expiration of the 30-day period for filing an appeal in 
Sec.  170.580(g)(3)(ii) if the health IT developer files a statement of 
intent to appeal, but does not file a timely appeal.
    (iii) A final determination to issue a certification ban per Sec.  
170.580(g)(7) if a health IT developer files an appeal timely.
    (d) Reinstatement. The certification of a health IT developer's 
health IT subject to the prohibition in paragraph (a) of this section 
may commence once the following conditions are met.
    (1) A health IT developer must request ONC's permission in writing 
to participate in the ONC Health IT Certification Program.
    (2) The request must demonstrate that the customers affected by the 
certificate termination, certificate withdrawal, or noncompliance with 
a Condition or Maintenance of Certification requirement have been 
provided appropriate remediation.
    (3) For noncompliance with a Condition or Maintenance of 
Certification requirement, the noncompliance must be resolved.
    (4) ONC is satisfied with the health IT developer's demonstration 
under paragraph (d)(2) of this section that all affected customers have 
been provided with appropriate remediation and grants reinstatement 
into the ONC Health IT Certification Program.

0
33. Amend Sec.  170.599 by:
0
a. Redesignating paragraph (b)(4) as paragraph (b)(5);
0
b. Adding new paragraph (b)(4); and
0
c. Revising newly redesignated paragraph (b)(5).
    The addition and revision read as follows:


Sec.  170.599   Incorporation by Reference

* * * * *
    (b) * * *
    (4) ISO/IEC 17025:2017(E)--General requirements for the competence 
of testing and calibration laboratories (Third Edition), 2017-11, 
``ISO/IEC 17025,'' IBR approved for Sec. Sec.  170.520(b), and 
170.524(a).
    (5) ISO/IEC 17065:2012(E)--Conformity assessment--Requirements for 
bodies certifying products, processes and services (First Edition), 
2012, ``ISO/IEC 17065,'' IBR approved for Sec. Sec.  170.503 and 
170.523(a).

0
34. Add part 171 to read as follows:

PART 171--INFORMATION BLOCKING

Subpart A--General Provisions
Sec.
171.100 Statutory basis and purpose.
171.101 Applicability.
171.102 Definitions.
171.103 Information blocking.
Subpart B--Exceptions That Involve Not Fulfilling Requests to Access, 
Exchange, or use Electronic Health Information
171.200 Availability and effect of exceptions.
171.201 Preventing harm exception--when will an actor's practice 
that is likely to interfere with the access, exchange, or use of 
electronic health information in order to prevent harm not be 
considered information blocking?
171.202 Privacy exception--when will an actor's practice of not 
fulfilling a request to access, exchange, or use electronic health 
information in order to protect an individual's privacy not be 
considered information blocking?
171.203 Security exception--when will an actor's practice that is 
likely to interfere with the access, exchange, or use of electronic 
health information in order to protect the security of electronic 
health information not be considered information blocking?
171.204 Infeasibility exception--when will an actor's practice of 
not fulfilling a request to access, exchange, or use electronic 
health information due to the infeasibility of the request not be 
considered information blocking?
171.205 Health IT performance exception--when will an actor's 
practice that is implemented to maintain or improve health IT 
performance and that is likely to interfere with the access, 
exchange, or use of electronic health information not be considered 
information blocking?
Subpart C--Exceptions That Involve Procedures for Fulfilling Requests 
to Access, Exchange, or use Electronic Health Information
171.300 Availability and effect of exceptions.
171.301 Content and manner exception--when will an actor's practice 
of limiting the content of its response to or the manner in which it 
fulfills a request to access, exchange, or use electronic health 
information not be considered information blocking?
171.302 Fees exception--when will an actor's practice of charging 
fees for accessing, exchanging, or using electronic health 
information not be considered information blocking?
171.303 Licensing exception--when will an actor's practice to 
license interoperability elements in order for electronic health 
information to be accessed, exchanged, or used not be considered 
information blocking?

    Authority: 42 U.S.C. 300jj-52; 5 U.S.C. 552.

Subpart A--General Provisions


Sec.  171.100   Statutory basis and purpose.

    (a) Basis. This part implements section 3022 of the Public Health 
Service Act, 42 U.S.C. 300jj-52.
    (b) Purpose. The purpose of this part is to establish exceptions 
for reasonable and necessary activities that do not constitute 
information blocking as defined by section 3022(a)(1) of the Public 
Health Service Act, 42 U.S.C. 300jj-52.


Sec.  171.101  Applicability.

    (a) This part applies to health care providers, health IT 
developers of certified health IT, health information exchanges, and 
health information networks, as those terms are defined in Sec.  
171.102.
    (b) Health care providers, health IT developers of certified health 
IT, health information exchanges, and health information networks must 
comply with this part on and after November 2, 2020.


Sec.  171.102  Definitions.

    For purposes of this part:
    Access means the ability or means necessary to make electronic 
health information available for exchange or use.
    Actor means a health care provider, health IT developer of 
certified health IT, health information network or health information 
exchange.
    API Information Source is defined as it is in Sec.  170.404(c).
    API User is defined as it is in Sec.  170.404(c).
    Certified API Developer is defined as it is in Sec.  170.404(c).
    Certified API technology is defined as it is in Sec.  170.404(c).
    Electronic health information (EHI) means electronic protected 
health information as defined in 45 CFR 160.103 to the extent that it 
would be included in a designated record set as defined in 45 CFR 
164.501, regardless of whether the group of records are used or 
maintained by or for a covered entity as defined in 45 CFR 160.103, but 
EHI shall not include:
    (1) Psychotherapy notes as defined in 45 CFR 164.501; or
    (2) Information compiled in reasonable anticipation of, or for use 
in, a civil, criminal, or administrative action or proceeding.
    Exchange means the ability for electronic health information to be 
transmitted between and among different technologies, systems, 
platforms, or networks.
    Fee means any present or future obligation to pay money or provide 
any other thing of value.
    Health care provider has the same meaning as ``health care 
provider'' in 42 U.S.C. 300jj.
    Health information network or health information exchange means an 
individual or entity that determines,

[[Page 25956]]

controls, or has the discretion to administer any requirement, policy, 
or agreement that permits, enables, or requires the use of any 
technology or services for access, exchange, or use of electronic 
health information:
    (1) Among more than two unaffiliated individuals or entities (other 
than the individual or entity to which this definition might apply) 
that are enabled to exchange with each other; and
    (2) That is for a treatment, payment, or health care operations 
purpose, as such terms are defined in 45 CFR 164.501 regardless of 
whether such individuals or entities are subject to the requirements of 
45 CFR parts 160 and 164.
    Health IT developer of certified health IT means an individual or 
entity, other than a health care provider that self-develops health IT 
for its own use, that develops or offers health information technology 
(as that term is defined in 42 U.S.C. 300jj(5)) and which has, at the 
time it engages in a practice that is the subject of an information 
blocking claim, one or more Health IT Modules certified under a program 
for the voluntary certification of health information technology that 
is kept or recognized by the National Coordinator pursuant to 42 U.S.C. 
300jj-11(c)(5) (ONC Health IT Certification Program).
    Information blocking is defined as it is in Sec.  171.103.
    Interfere with or interference means to prevent, materially 
discourage, or otherwise inhibit.
    Interoperability element means hardware, software, integrated 
technologies or related licenses, technical information, privileges, 
rights, intellectual property, upgrades, or services that:
    (1) May be necessary to access, exchange, or use electronic health 
information; and
    (2) Is/Are controlled by the actor, which includes the ability to 
confer all rights and authorizations necessary to use the element to 
enable the access, exchange, or use of electronic health information.
    Permissible purpose means a purpose for which a person is 
authorized, permitted, or required to access, exchange, or use 
electronic health information under applicable law.
    Person is defined as it is in 45 CFR 160.103.
    Practice means an act or omission by an actor.
    Use means the ability for electronic health information, once 
accessed or exchanged, to be understood and acted upon.


Sec.  171.103  Information blocking.

    (a) Information blocking means a practice that--
    (1) Except as required by law or covered by an exception set forth 
in subpart B or subpart C of this part, is likely to interfere with 
access, exchange, or use of electronic health information; and
    (2) If conducted by a health information technology developer, 
health information network or health information exchange, such 
developer, network or exchange knows, or should know, that such 
practice is likely to interfere with, prevent, or materially discourage 
access, exchange, or use of electronic health information; or
    (3) If conducted by a health care provider, such provider knows 
that such practice is unreasonable and is likely to interfere with, 
prevent, or materially discourage access, exchange, or use of 
electronic health information.
    (b) Until May 2, 2022, electronic health information for purposes 
of paragraph (a) of this section is limited to the electronic health 
information identified by the data elements represented in the USCDI 
standard adopted in Sec.  170.213.

Subpart B--Exceptions That Involve Not Fulfilling Requests To 
Access, Exchange, or Use Electronic Health Information


Sec.  171.200   Availability and effect of exceptions.

    A practice shall not be treated as information blocking if the 
actor satisfies an exception to the information blocking provision as 
set forth in this subpart B by meeting all applicable requirements and 
conditions of the exception at all relevant times.


Sec.  171.201   Preventing harm exception--when will an actor's 
practice that is likely to interfere with the access, exchange, or use 
of electronic health information in order to prevent harm not be 
considered information blocking?

    An actor's practice that is likely to interfere with the access, 
exchange, or use of electronic health information in order to prevent 
harm will not be considered information blocking when the practice 
meets the conditions in paragraphs (a) and (b) of this section, 
satisfies at least one condition from each of paragraphs (c), (d), and 
(f) of this section, and also meets the condition in paragraph (e) of 
this section when applicable.
    (a) Reasonable belief. The actor engaging in the practice must hold 
a reasonable belief that the practice will substantially reduce a risk 
of harm to a patient or another natural person that would otherwise 
arise from the access, exchange, or use of electronic health 
information affected by the practice. For purposes of this section, 
``patient'' means a natural person who is the subject of the electronic 
health information affected by the practice.
    (b) Practice breadth. The practice must be no broader than 
necessary to substantially reduce the risk of harm that the practice is 
implemented to reduce.
    (c) Type of risk. The risk of harm must:
    (1) Be determined on an individualized basis in the exercise of 
professional judgment by a licensed health care professional who has a 
current or prior clinician-patient relationship with the patient whose 
electronic health information is affected by the determination; or
    (2) Arise from data that is known or reasonably suspected to be 
misidentified or mismatched, corrupt due to technical failure, or 
erroneous for another reason.
    (d) Type of harm. The type of harm must be one that could serve as 
grounds for a covered entity (as defined in Sec.  160.103 of this 
title) to deny access (as the term ``access'' is used in part 164 of 
this title) to an individual's protected health information under:
    (1) Section 164.524(a)(3)(iii) of this title where the practice is 
likely to, or in fact does, interfere with access, exchange, or use (as 
these terms are defined in Sec.  171.102) of the patient's electronic 
health information by their legal representative (including but not 
limited to personal representatives recognized pursuant to 45 CFR 
164.502) and the practice is implemented pursuant to an individualized 
determination of risk of harm consistent with paragraph (c)(1) of this 
section;
    (2) Section 164.524(a)(3)(ii) of this title where the practice is 
likely to, or in fact does, interfere with the patient's or their legal 
representative's access to, use or exchange (as these terms are defined 
in Sec.  171.102) of information that references another natural person 
and the practice is implemented pursuant to an individualized 
determination of risk of harm consistent with paragraph (c)(1) of this 
section;
    (3) Section 164.524(a)(3)(i) of this title where the practice is 
likely to, or in fact does, interfere with the patient's access, 
exchange, or use (as these terms are defined in Sec.  171.102) of their 
own electronic health information, regardless of whether the risk of 
harm that the practice is implemented to substantially reduce is 
consistent with paragraph (c)(1) or (2) of this section; or

[[Page 25957]]

    (4) Section 164.524(a)(3)(i) of this title where the practice is 
likely to, or in fact does, interfere with a legally permissible 
access, exchange, or use (as these terms are defined in Sec.  171.102) 
of electronic health information not described in paragraph (d)(1), 
(2), or (3) of this section, and regardless of whether the risk of harm 
the practice is implemented to substantially reduce is consistent with 
paragraph (c)(1) or (2) of this section.
    (e) Patient right to request review of individualized determination 
of risk of harm. Where the risk of harm is consistent with paragraph 
(c)(1) of this section, the actor must implement the practice in a 
manner consistent with any rights the individual patient whose 
electronic health information is affected may have under Sec.  
164.524(a)(4) of this title, or any Federal, State, or tribal law, to 
have the determination reviewed and potentially reversed.
    (f) Practice implemented based on an organizational policy or a 
determination specific to the facts and circumstances. The practice 
must be consistent with an organizational policy that meets paragraph 
(f)(1) of this section or, in the absence of an organizational policy 
applicable to the practice or to its use in particular circumstances, 
the practice must be based on a determination that meets paragraph 
(f)(2) of this section.
    (1) An organizational policy must:
    (i) Be in writing;
    (ii) Be based on relevant clinical, technical, and other 
appropriate expertise;
    (iii) Be implemented in a consistent and non-discriminatory manner; 
and
    (iv) Conform each practice to the conditions in paragraphs (a) and 
(b) of this section, as well as the conditions in paragraphs (c) 
through (e) of this section that are applicable to the practice and its 
use.
    (2) A determination must:
    (i) Be based on facts and circumstances known or reasonably 
believed by the actor at the time the determination was made and while 
the practice remains in use; and
    (ii) Be based on expertise relevant to implementing the practice 
consistent with the conditions in paragraphs (a) and (b) of this 
section, as well as the conditions in paragraphs (c) through (e) of 
this section that are applicable to the practice and its use in 
particular circumstances.


Sec.  171.202  Privacy exception--when will an actor's practice of not 
fulfilling a request to access, exchange, or use electronic health 
information in order to protect an individual's privacy not be 
considered information blocking?

    An actor's practice of not fulfilling a request to access, 
exchange, or use electronic health information in order to protect an 
individual's privacy will not be considered information blocking when 
the practice meets all of the requirements of at least one of the sub-
exceptions in paragraphs (b) through (e) of this section.
    (a) Definitions in this section. (1) The term HIPAA Privacy Rule as 
used in this section means 45 CFR parts 160 and 164.
    (2) The term individual as used in this section means one or more 
of the following--
    (i) An individual as defined by 45 CFR 160.103.
    (ii) Any other natural person who is the subject of the electronic 
health information being accessed, exchanged, or used.
    (iii) A person who legally acts on behalf of a person described in 
paragraph (a)(1) or (2) of this section in making decisions related to 
health care as a personal representative, in accordance with 45 CFR 
164.502(g).
    (iv) A person who is a legal representative of and can make health 
care decisions on behalf of any person described in paragraph (a)(1) or 
(2) of this section.
    (v) An executor, administrator, or other person having authority to 
act on behalf of a deceased person described in paragraph (a)(1) or (2) 
of this section or the individual's estate under State or other law.
    (b) Sub-exception--precondition not satisfied. To qualify for the 
exception on the basis that State or Federal law requires one or more 
preconditions for providing access, exchange, or use of electronic 
health information that have not been satisfied, the following 
requirements must be met--
    (1) The actor's practice is tailored to the applicable precondition 
not satisfied, is implemented in a consistent and non-discriminatory 
manner, and either:
    (i) Conforms to the actor's organizational policies and procedures 
that:
    (A) Are in writing;
    (B) Specify the criteria to be used by the actor to determine when 
the precondition would be satisfied and, as applicable, the steps that 
the actor will take to satisfy the precondition; and
    (C) Are implemented by the actor, including by providing training 
on the policies and procedures; or
    (ii) Are documented by the actor, on a case-by-case basis, 
identifying the criteria used by the actor to determine when the 
precondition would be satisfied, any criteria that were not met, and 
the reason why the criteria were not met.
    (2) If the precondition relies on the provision of a consent or 
authorization from an individual and the actor has received a version 
of such a consent or authorization that does not satisfy all elements 
of the precondition required under applicable law, the actor must:
    (i) Use reasonable efforts within its control to provide the 
individual with a consent or authorization form that satisfies all 
required elements of the precondition or provide other reasonable 
assistance to the individual to satisfy all required elements of the 
precondition; and
    (ii) Not improperly encourage or induce the individual to withhold 
the consent or authorization.
    (3) For purposes of determining whether the actor's privacy 
policies and procedures and actions satisfy the requirements of 
paragraphs (b)(1)(i) and (b)(2) above when the actor's operations are 
subject to multiple laws which have inconsistent preconditions, they 
shall be deemed to satisfy the requirements of the paragraphs if the 
actor has adopted uniform privacy policies and procedures to address 
the more restrictive preconditions.
    (c) Sub-exception--health IT developer of certified health IT not 
covered by HIPAA. If the actor is a health IT developer of certified 
health IT that is not required to comply with the HIPAA Privacy Rule, 
when engaging in a practice that promotes the privacy interests of an 
individual, the actor's organizational privacy policies must have been 
disclosed to the individuals and entities that use the actor's product 
or service before they agreed to use them, and must implement the 
practice according to a process described in the organizational privacy 
policies. The actor's organizational privacy policies must:
    (1) Comply with State and Federal laws, as applicable;
    (2) Be tailored to the specific privacy risk or interest being 
addressed; and
    (3) Be implemented in a consistent and non-discriminatory manner.
    (d) Sub-exception--denial of an individual's request for their 
electronic health information consistent with 45 CFR 164.524(a)(1) and 
(2). If an individual requests electronic health information under the 
right of access provision under 45 CFR 164.524(a)(1) from an actor that 
must comply with 45 CFR 164.524(a)(1), the actor's practice

[[Page 25958]]

must be consistent with 45 CFR 164.524(a)(2).
    (e) Sub-exception--respecting an individual's request not to share 
information. Unless otherwise required by law, an actor may elect not 
to provide access, exchange, or use of an individual's electronic 
health information if the following requirements are met--
    (1) The individual requests that the actor not provide such access, 
exchange, or use of electronic health information without any improper 
encouragement or inducement of the request by the actor;
    (2) The actor documents the request within a reasonable time 
period;
    (3) The actor's practice is implemented in a consistent and non-
discriminatory manner; and
    (4) An actor may terminate an individual's request for a 
restriction to not provide such access, exchange, or use of the 
individual's electronic health information only if:
    (i) The individual agrees to the termination in writing or requests 
the termination in writing;
    (ii) The individual orally agrees to the termination and the oral 
agreement is documented by the actor; or
    (iii) The actor informs the individual that it is terminating its 
agreement to not provide such access, exchange, or use of the 
individual's electronic health information except that such termination 
is:
    (A) Not effective to the extent prohibited by applicable Federal or 
State law; and
    (B) Only applicable to electronic health information created or 
received after the actor has so informed the individual of the 
termination.


Sec.  171.203   Security exception--when will an actor's practice that 
is likely to interfere with the access, exchange, or use of electronic 
health information in order to protect the security of electronic 
health information not be considered information blocking?

    An actor's practice that is likely to interfere with the access, 
exchange, or use of electronic health information in order to protect 
the security of electronic health information will not be considered 
information blocking when the practice meets the conditions in 
paragraphs (a), (b), and (c) of this section, and in addition meets 
either the condition in paragraph (d) of this section or the condition 
in paragraph (e) of this section.
    (a) The practice must be directly related to safeguarding the 
confidentiality, integrity, and availability of electronic health 
information.
    (b) The practice must be tailored to the specific security risk 
being addressed.
    (c) The practice must be implemented in a consistent and non-
discriminatory manner.
    (d) If the practice implements an organizational security policy, 
the policy must--
    (1) Be in writing;
    (2) Have been prepared on the basis of, and be directly responsive 
to, security risks identified and assessed by or on behalf of the 
actor;
    (3) Align with one or more applicable consensus-based standards or 
best practice guidance; and
    (4) Provide objective timeframes and other parameters for 
identifying, responding to, and addressing security incidents.
    (e) If the practice does not implement an organizational security 
policy, the actor must have made a determination in each case, based on 
the particularized facts and circumstances, that:
    (1) The practice is necessary to mitigate the security risk to 
electronic health information; and
    (2) There are no reasonable and appropriate alternatives to the 
practice that address the security risk that are less likely to 
interfere with, prevent, or materially discourage access, exchange or 
use of electronic health information.


Sec.  171.204  Infeasibility exception--when will an actor's practice 
of not fulfilling a request to access, exchange, or use electronic 
health information due to the infeasibility of the request not be 
considered information blocking?

    An actor's practice of not fulfilling a request to access, 
exchange, or use electronic health information due to the infeasibility 
of the request will not be considered information blocking when the 
practice meets one of the conditions in paragraph (a) of this section 
and meets the requirements in paragraph (b) of this section.
    (a) Conditions--(1) Uncontrollable events. The actor cannot fulfill 
the request for access, exchange, or use of electronic health 
information due to a natural or human-made disaster, public health 
emergency, public safety incident, war, terrorist attack, civil 
insurrection, strike or other labor unrest, telecommunication or 
internet service interruption, or act of military, civil or regulatory 
authority.
    (2) Segmentation. The actor cannot fulfill the request for access, 
exchange, or use of electronic health information because the actor 
cannot unambiguously segment the requested electronic health 
information from electronic health information that:
    (i) Cannot be made available due to an individual's preference or 
because the electronic health information cannot be made available by 
law; or
    (ii) May be withheld in accordance with Sec.  171.201.
    (3) Infeasible under the circumstances. (i) The actor demonstrates, 
prior to responding to the request pursuant to paragraph (b) of this 
section, through a contemporaneous written record or other 
documentation its consistent and non-discriminatory consideration of 
the following factors that led to its determination that complying with 
the request would be infeasible under the circumstances:
    (A) The type of electronic health information and the purposes for 
which it may be needed;
    (B) The cost to the actor of complying with the request in the 
manner requested;
    (C) The financial and technical resources available to the actor;
    (D) Whether the actor's practice is non-discriminatory and the 
actor provides the same access, exchange, or use of electronic health 
information to its companies or to its customers, suppliers, partners, 
and other persons with whom it has a business relationship;
    (E) Whether the actor owns or has control over a predominant 
technology, platform, health information exchange, or health 
information network through which electronic health information is 
accessed or exchanged; and
    (F) Why the actor was unable to provide access, exchange, or use of 
electronic health information consistent with the exception in Sec.  
171.301.
    (ii) In determining whether the circumstances were infeasible under 
paragraph (a)(3)(i) of this section, it shall not be considered whether 
the manner requested would have:
    (A) Facilitated competition with the actor.
    (B) Prevented the actor from charging a fee or resulted in a 
reduced fee.
    (b) Responding to requests. If an actor does not fulfill a request 
for access, exchange, or use of electronic health information for any 
of the reasons provided in paragraph (a) of this section, the actor 
must, within ten business days of receipt of the request, provide to 
the requestor in writing the reason(s) why the request is infeasible.

[[Page 25959]]

Sec.  171.205  Health IT performance exception--when will an actor's 
practice that is implemented to maintain or improve health IT 
performance and that is likely to interfere with the access, exchange, 
or use of electronic health information not be considered information 
blocking?

    An actor's practice that is implemented to maintain or improve 
health IT performance and that is likely to interfere with the access, 
exchange, or use of electronic health information will not be 
considered information blocking when the practice meets a condition in 
paragraph (a), (b), (c), or (d) of this section, as applicable to the 
particular practice and the reason for its implementation.
    (a) Maintenance and improvements to health IT. When an actor 
implements a practice that makes health IT under that actor's control 
temporarily unavailable, or temporarily degrades the performance of 
health IT, in order to perform maintenance or improvements to the 
health IT, the actor's practice must be--
    (1) Implemented for a period of time no longer than necessary to 
complete the maintenance or improvements for which the health IT was 
made unavailable or the health IT's performance degraded;
    (2) Implemented in a consistent and non-discriminatory manner; and
    (3) If the unavailability or degradation is initiated by a health 
IT developer of certified health IT, health information exchange, or 
health information network:
    (i) Planned. Consistent with existing service level agreements 
between the individual or entity to whom the health IT developer of 
certified health IT, health information exchange, or health information 
network supplied the health IT; or
    (ii) Unplanned. Consistent with existing service level agreements 
between the individual or entity; or agreed to by the individual or 
entity to whom the health IT developer of certified health IT, health 
information exchange, or health information network supplied the health 
IT.
    (b) Assured level of performance. An actor may take action against 
a third-party application that is negatively impacting the health IT's 
performance, provided that the practice is--
    (1) For a period of time no longer than necessary to resolve any 
negative impacts;
    (2) Implemented in a consistent and non-discriminatory manner; and
    (3) Consistent with existing service level agreements, where 
applicable.
    (c) Practices that prevent harm. If the unavailability of health IT 
for maintenance or improvements is initiated by an actor in response to 
a risk of harm to a patient or another person, the actor does not need 
to satisfy the requirements of this section, but must comply with all 
requirements of Sec.  171.201 at all relevant times to qualify for an 
exception.
    (d) Security-related practices. If the unavailability of health IT 
for maintenance or improvements is initiated by an actor in response to 
a security risk to electronic health information, the actor does not 
need to satisfy the requirements of this section, but must comply with 
all requirements of Sec.  171.203 at all relevant times to qualify for 
an exception.

Subpart C--Exceptions That Involve Procedures for Fulfilling 
Requests To Access, Exchange, or Use Electronic Health Information


Sec.  171.300   Availability and effect of exceptions.

    A practice shall not be treated as information blocking if the 
actor satisfies an exception to the information blocking provision as 
set forth in this subpart C by meeting all applicable requirements and 
conditions of the exception at all relevant times.


Sec.  171.301  Content and manner exception--when will an actor's 
practice of limiting the content of its response to or the manner in 
which it fulfills a request to access, exchange, or use electronic 
health information not be considered information blocking?

    An actor's practice of limiting the content of its response to or 
the manner in which it fulfills a request to access, exchange, or use 
electronic health information will not be considered information 
blocking when the practice meets all of the following conditions.
    (a) Content condition--electronic health information. An actor must 
respond to a request to access, exchange, or use electronic health 
information with--
    (1) USCDI. For up to May 2, 2022, at a minimum, the electronic 
health information identified by the data elements represented in the 
USCDI standard adopted in Sec.  170.213.
    (2) All electronic health information. On and after May 2, 2022, 
electronic health information as defined in Sec.  171.102.
    (b) Manner condition--(1) Manner requested. (i) An actor must 
fulfill a request described in paragraph (a) of this section in any 
manner requested, unless the actor is technically unable to fulfill the 
request or cannot reach agreeable terms with the requestor to fulfill 
the request.
    (ii) If an actor fulfills a request described in paragraph (a) of 
this section in any manner requested:
    (A) Any fees charged by the actor in relation to fulfilling the 
response are not required to satisfy the exception in Sec.  171.302; 
and
    (B) Any license of interoperability elements granted by the actor 
in relation to fulfilling the request is not required to satisfy the 
exception in Sec.  171.303.
    (2) Alternative manner. If an actor does not fulfill a request 
described in paragraph (a) of this section in any manner requested 
because it is technically unable to fulfill the request or cannot reach 
agreeable terms with the requestor to fulfill the request, the actor 
must fulfill the request in an alternative manner, as follows:
    (i) The actor must fulfill the request without unnecessary delay in 
the following order of priority, starting with paragraph (b)(2)(i)(A) 
of this section and only proceeding to the next consecutive paragraph 
if the actor is technically unable to fulfill the request in the manner 
identified in a paragraph.
    (A) Using technology certified to standard(s) adopted in part 170 
that is specified by the requestor.
    (B) Using content and transport standards specified by the 
requestor and published by:
    (1) The Federal Government; or
    (2) A standards developing organization accredited by the American 
National Standards Institute.
    (C) Using an alternative machine-readable format, including the 
means to interpret the electronic health information, agreed upon with 
the requestor.
    (ii) Any fees charged by the actor in relation to fulfilling the 
request are required to satisfy the exception in Sec.  171.302.
    (iii) Any license of interoperability elements granted by the actor 
in relation to fulfilling the request is required to satisfy the 
exception in Sec.  171.303.


Sec.  171.302   Fees exception--when will an actor's practice of 
charging fees for accessing, exchanging, or using electronic health 
information not be considered information blocking?

    An actor's practice of charging fees, including fees that result in 
a reasonable profit margin, for accessing, exchanging, or using 
electronic health information will not be considered information 
blocking when the practice meets the conditions in paragraph (a) of 
this section, does not include any of the excluded fees in paragraph 
(b) of this section, and, as applicable, meets the condition in 
paragraph (c) of this section.

[[Page 25960]]

    (a) Basis for fees condition. (1) The fees an actor charges must 
be--
    (i) Based on objective and verifiable criteria that are uniformly 
applied for all similarly situated classes of persons or entities and 
requests;
    (ii) Reasonably related to the actor's costs of providing the type 
of access, exchange, or use of electronic health information to, or at 
the request of, the person or entity to whom the fee is charged;
    (iii) Reasonably allocated among all similarly situated persons or 
entities to whom the technology or service is supplied, or for whom the 
technology is supported; and
    (iv) Based on costs not otherwise recovered for the same instance 
of service to a provider and third party.
    (2) The fees an actor charges must not be based on--
    (i) Whether the requestor or other person is a competitor, 
potential competitor, or will be using the electronic health 
information in a way that facilitates competition with the actor;
    (ii) Sales, profit, revenue, or other value that the requestor or 
other persons derive or may derive from the access, exchange, or use of 
the electronic health information;
    (iii) Costs the actor incurred due to the health IT being designed 
or implemented in a non-standard way, unless the requestor agreed to 
the fee associated with the non-standard design or implementation to 
access, exchange, or use the electronic health information;
    (iv) Costs associated with intangible assets other than the actual 
development or acquisition costs of such assets;
    (v) Opportunity costs unrelated to the access, exchange, or use of 
electronic health information; or
    (vi) Any costs that led to the creation of intellectual property, 
if the actor charged a royalty for that intellectual property pursuant 
to Sec.  171.303 and that royalty included the development costs for 
the creation of the intellectual property.
    (b) Excluded fees condition. This exception does not apply to--
    (1) A fee prohibited by 45 CFR 164.524(c)(4);
    (2) A fee based in any part on the electronic access of an 
individual's EHI by the individual, their personal representative, or 
another person or entity designated by the individual;
    (3) A fee to perform an export of electronic health information via 
the capability of health IT certified to Sec.  170.315(b)(10) of this 
subchapter for the purposes of switching health IT or to provide 
patients their electronic health information; and
    (4) A fee to export or convert data from an EHR technology that was 
not agreed to in writing at the time the technology was acquired.
    (c) Compliance with the Conditions of Certification condition. 
Notwithstanding any other provision of this exception, if the actor is 
a health IT developer subject to the Conditions of Certification in 
Sec.  170.402(a)(4), Sec.  170.404, or both of this subchapter, the 
actor must comply with all requirements of such conditions for all 
practices and at all relevant times.
    (d) Definition of Electronic access. The following definition 
applies to this section:
    Electronic access means an internet-based method that makes 
electronic health information available at the time the electronic 
health information is requested and where no manual effort is required 
to fulfill the request.


Sec.  171.303  Licensing exception--when will an actor's practice to 
license interoperability elements in order for electronic health 
information to be accessed, exchanged, or used not be considered 
information blocking?

    An actor's practice to license interoperability elements for 
electronic health information to be accessed, exchanged, or used will 
not be considered information blocking when the practice meets all of 
the following conditions.
    (a) Negotiating a license conditions. Upon receiving a request to 
license an interoperability element for the access, exchange, or use of 
electronic health information, the actor must--
    (1) Begin license negotiations with the requestor within 10 
business days from receipt of the request; and
    (2) Negotiate a license with the requestor, subject to the 
licensing conditions in paragraph (b) of this section, within 30 
business days from receipt of the request.
    (b) Licensing conditions. The license provided for the 
interoperability element(s) needed to access, exchange, or use 
electronic health information must meet the following conditions:
    (1) Scope of rights. The license must provide all rights necessary 
to:
    (i) Enable the access, exchange, or use of electronic health 
information; and
    (ii) Achieve the intended access, exchange, or use of electronic 
health information via the interoperability element(s).
    (2) Reasonable royalty. If the actor charges a royalty for the use 
of the interoperability elements described in paragraph (a) of this 
section, the royalty must be reasonable and comply with the following 
requirements:
    (i) The royalty must be non-discriminatory, consistent with 
paragraph (c)(3) of this section.
    (ii) The royalty must be based solely on the independent value of 
the actor's technology to the licensee's products, not on any strategic 
value stemming from the actor's control over essential means of 
accessing, exchanging, or using electronic health information.
    (iii) If the actor has licensed the interoperability element 
through a standards developing organization in accordance with such 
organization's policies regarding the licensing of standards-essential 
technologies on terms consistent with those in this exception, the 
actor may charge a royalty that is consistent with such policies.
    (iv) An actor may not charge a royalty for intellectual property if 
the actor recovered any development costs pursuant to Sec.  171.302 
that led to the creation of the intellectual property.
    (3) Non-discriminatory terms. The terms (including royalty terms) 
on which the actor licenses and otherwise provides the interoperability 
elements must be non-discriminatory and comply with the following 
requirements:
    (i) The terms must be based on objective and verifiable criteria 
that are uniformly applied for all similarly situated classes of 
persons and requests.
    (ii) The terms must not be based in any part on--
    (A) Whether the requestor or other person is a competitor, 
potential competitor, or will be using electronic health information 
obtained via the interoperability elements in a way that facilitates 
competition with the actor; or
    (B) The revenue or other value the requestor may derive from 
access, exchange, or use of electronic health information obtained via 
the interoperability elements.
    (4) Collateral terms. The actor must not require the licensee or 
its agents or contractors to do, or to agree to do, any of the 
following--
    (i) Not compete with the actor in any product, service, or market.
    (ii) Deal exclusively with the actor in any product, service, or 
market.
    (iii) Obtain additional licenses, products, or services that are 
not related to or can be unbundled from the requested interoperability 
elements.
    (iv) License, grant, assign, or transfer to the actor any 
intellectual property of the licensee.
    (v) Pay a fee of any kind whatsoever, except as described in 
paragraph (b)(2) of this section, unless the practice meets

[[Page 25961]]

the requirements of the exception in Sec.  171.302.
    (5) Non-disclosure agreement. The actor may require a reasonable 
non-disclosure agreement that is no broader than necessary to prevent 
unauthorized disclosure of the actor's trade secrets, provided--
    (i) The agreement states with particularity all information the 
actor claims as trade secrets; and
    (ii) Such information meets the definition of a trade secret under 
applicable law.
    (c) Additional conditions relating to the provision of 
interoperability elements. The actor must not engage in any practice 
that has any of the following purposes or effects.
    (1) Impeding the efficient use of the interoperability elements to 
access, exchange, or use electronic health information for any 
permissible purpose.
    (2) Impeding the efficient development, distribution, deployment, 
or use of an interoperable product or service for which there is actual 
or potential demand.
    (3) Degrading the performance or interoperability of the licensee's 
products or services, unless necessary to improve the actor's 
technology and after affording the licensee a reasonable opportunity to 
update its technology to maintain interoperability.

Alex M. Azar II,
Secretary, Department of Health and Human Services.
[FR Doc. 2020-07419 Filed 4-21-20; 4:15 pm]
BILLING CODE 4150-45-P
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.