Health Data, Technology, and Interoperability: Certification Program Updates, Algorithm Transparency, and Information Sharing, 23746-23917 [2023-07229]
Download as PDF
23746
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
DEPARTMENT OF HEALTH AND
HUMAN SERVICES
Office of the Secretary
45 CFR Parts 170 and 171
RIN 0955–AA03
Health Data, Technology, and
Interoperability: Certification Program
Updates, Algorithm Transparency, and
Information Sharing
Office of the National
Coordinator for Health Information
Technology (ONC), Department of
Health and Human Services (HHS).
ACTION: Proposed rule.
AGENCY:
This proposed rule would
implement the Electronic Health Record
(EHR) Reporting Program provision of
the 21st Century Cures Act by
establishing new Conditions and
Maintenance of Certification
requirements for health information
technology (health IT) developers under
the ONC Health IT Certification Program
(Program). This proposed rule would
also make several updates to
certification criteria and
implementation specifications
recognized by the Program, including a
revised certification criterion for
decision support and revised
certification criteria for patient
demographics and observations and
electronic case reporting. This proposed
rule would establish a new baseline
version of the United States Core Data
for Interoperability (USCDI).
Additionally, this proposed rule would
provide enhancements to support
information sharing under the
information blocking regulations. The
implementation of these provisions
would advance interoperability,
improve transparency, and support the
access, exchange, and use of electronic
health information. The proposed rule
would also update the Program in
additional ways to advance
interoperability, enhance health IT
certification, and reduce burden and
costs.
DATES: To be assured consideration,
written or electronic comments must be
received at one of the addresses
provided below, no later than 5 p.m. on
June 20, 2023.
ADDRESSES: You may submit comments,
identified by RIN 0955–AA03, by any of
the following methods (please do not
submit duplicate comments). Because of
staff and resource limitations, we cannot
accept comments by facsimile (FAX)
transmission.
• Federal eRulemaking Portal: Follow
the instructions for submitting
ddrumheller on DSK120RN23PROD with PROPOSALS2
SUMMARY:
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
comments. Attachments should be in
Microsoft Word, Microsoft Excel, or
Adobe PDF; however, we prefer
Microsoft Word. https://
www.regulations.gov.
• Regular, Express, or Overnight Mail:
Department of Health and Human
Services, Office of the National
Coordinator for Health Information
Technology, Attention: Health Data,
Technology, and Interoperability:
Certification Program Updates,
Algorithm Transparency, and
Information Sharing Proposed Rule,
Mary E. Switzer Building, Mail Stop:
7033A, 330 C Street SW, Washington,
DC 20201. Please submit one original
and two copies.
• Hand Delivery or Courier: Office of
the National Coordinator for Health
Information Technology, Attention:
Health Data, Technology, and
Interoperability: Certification Program
Updates, Algorithm Transparency, and
Information Sharing Proposed Rule,
Mary E. Switzer Building, Mail Stop:
7033A, 330 C Street SW, Washington,
DC 20201. Please submit one original
and two copies. (Because access to the
interior of the Mary E. Switzer Building
is not readily available to persons
without federal government
identification, commenters are
encouraged to leave their comments in
the mail drop slots located in the main
lobby of the building.)
Enhancing the Public Comment
Experience: To facilitate public
comment on this proposed rule, a copy
will be made available in Microsoft
Word format on ONC’s website (https://
www.healthit.gov). We believe this
version will make it easier for
commenters to access and copy portions
of the proposed rule for use in their
individual comments. Additionally, a
separate document (‘‘public comment
template’’) will also be made available
on ONC’s website (https://
www.healthit.gov) for the public to use
in providing comments on the proposed
rule. This document is meant to provide
the public with a simple and organized
way to submit comments on proposals
and respond to specific questions posed
in the preamble of the proposed rule.
While use of this document is entirely
voluntary, we encourage commenters to
consider using the document in lieu of
unstructured comments, or to use it as
an addendum to narrative cover pages.
We believe that use of the document
may facilitate our review and
understanding of the comments
received. The public comment template
will be available shortly after the
proposed rule publishes in the Federal
Register. This short delay will permit
the appropriate citation in the public
PO 00000
Frm 00002
Fmt 4701
Sfmt 4702
comment template to pages of the
published version of the proposed rule.
Inspection of Public Comments: All
comments received before the close of
the comment period will be available for
public inspection, including any
personally identifiable or confidential
business information that is included in
a comment. Please do not include
anything in your comment submission
that you do not wish to share with the
general public. Such information
includes, but is not limited to, the
following: a person’s social security
number; date of birth; driver’s license
number; state identification number or
foreign country equivalent; passport
number; financial account number;
credit or debit card number; any
personal health information; or any
business information that could be
considered proprietary. We will post all
comments that are received before the
close of the comment period at https://
www.regulations.gov.
Docket: For access to the docket to
read background documents or
comments received, go to https://
www.regulations.gov or the Department
of Health and Human Services, Office of
the National Coordinator for Health
Information Technology, Mary E.
Switzer Building, Mail Stop: 7033A, 330
C Street SW, Washington, DC 20201
(call ahead to the contact listed below
to arrange for inspection).
FOR FURTHER INFORMATION CONTACT:
Michael Lipinski, Office of Policy,
Office of the National Coordinator for
Health Information Technology, 202–
690–7151.
SUPPLEMENTARY INFORMATION:
Table of Contents
I. Executive Summary
A. Purpose of Regulatory Action
B. Summary of Major Provisions
1. ONC Health IT Certification Program
Updates
a. ‘‘The ONC Certification Criteria for
Health IT’’ and Discontinuing Year
Themed ‘‘Editions’’
b. New and Revised Standards and
Certification Criteria
i. The United States Core Data for
Interoperability Standard Version 3 (USCDI
v3)
ii. C–CDA Companion Guide Updates
iii. ‘‘Minimum Standards’’ Code Sets
Updates
iv. Electronic Case Reporting
v. Decision Support Interventions and
Predictive Models
vi. Synchronized Clocks Standard
vii. Standardized API for Patient and
Population Services
viii. Patient Demographics and
Observations Certification Criterion in
§ 170.315(a)(5)
ix. Updates to Transitions of Care
Certification Criterion in § 170.315(b)(1)
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
x. Patient Requested Restrictions
Certification Criterion
xi. Requirement for Health IT Developers
To Update Their Previously Certified Health
IT
2. Assurances Condition and Maintenance
of Certification Requirements
3. Real World Testing—Inherited Certified
Status
4. Insights Condition and Maintenance of
Certification
5. Information Blocking Enhancements
C. Costs and Benefits
II. Background
A. Statutory Basis
1. Standards, Implementation
Specifications, and Certification Criteria
2. Health IT Certification Program(s)
B. Regulatory History
III. ONC Health IT Certification Program
Updates
A. ‘‘The ONC Certification Criteria for
Health IT’’ and Discontinuing Year
Themed ‘‘Editions’’
B. Standards and Implementation
Specifications
1. National Technology Transfer and
Advancement Act
2. Compliance With Adopted Standards
and Implementation Specifications
3. ‘‘Reasonably Available’’ to Interested
Parties
C. New and Revised Standards and
Certification Criteria
1. The United States Core Data for
Interoperability Standard (USCDI) v3
a. Background
b. Certification Criteria That Reference
USCDI
c. USCDI Standard—Data Classes and
Elements Added Since USCDI v1
2. C–CDA Companion Guide Updates
3. ‘‘Minimum Standards’’ Code Sets
Updates
4. Electronic Case Reporting
a. Background
b. Standards Landscape for Case Reporting
c. Proposed Updates to Case Reporting in
§ 170.315(f)(5)
d. Proposed Adoption of Standards for
Electronic Case Reporting
e. Proposal for Reporting
5. Decision Support Interventions and
Predictive Models
a. Background
b. Summary of Proposals
c. Proposed Requirements for Decision
Support Interventions (DSI) Certification
Criterion
d. Proposed Updates to Real World Testing
Condition for CDS Criterion
6. Synchronized Clocks Standard
a. Background
b. Justification
7. Standardized API for Patient and
Population Services
a. Native Applications and Refresh Tokens
b. FHIR United States Core Implementation
Guide Version 5.0.1
c. FHIR Endpoint for Service Base URLs
d. Access Token Revocation
e. SMART App Launch 2.0
8. Patient Demographics and Observations
Certification Criterion in § 170.315(a)(5)
9. Updates to Transitions of Care
Certification Criterion in § 170.315(b)(1)
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
10. Patient Requested Restrictions
Certification Criterion
a. Patient Right To Request a Restriction
New Criterion—Primary Proposal
b. Alignment With Adopted Standards—
Alternate Proposals and Request for
Information
c. Alignment With Applicable Law—
Request for Information
11. Requirement for Health IT Developers
To Update Their Previously Certified
Health IT
D. Assurances Condition and Maintenance
of Certification Requirements
1. Condition of Certification
2. Maintenance of Certification
Requirements
E. Real World Testing—Inherited Certified
Status
F. Insights Condition and Maintenance of
Certification
1. Background and Purpose
2. Insights Condition—Proposed Measures
3. Insights Condition and Maintenance of
Certification Requirements
4. Insights Condition and Maintenance of
Certification’s Process for Reporting
G. Requests for Information
1. Laboratory Data Interoperability Request
for Information
a. Background
b. Request for Information
2. Request for Information on Pharmacy
Interoperability Functionality Within the
ONC Health IT Certification Program
Including Real-Time Prescription Benefit
Capabilities
a. Background
b. Request for Information
c. Real-Time Prescription Benefit
Certification Criterion
d. Health IT Ecosystem for Pharmacy
Interoperability
3. FHIR Standard
a. FHIR Subscriptions Request for
Information
b. Clinical Decision Support Hooks
Request for Information
c. FHIR Standard for Scheduling Request
for Information
d. SMART Health Links Request for
Information
IV. Information Blocking Enhancements
A. Defined Terms
1. Offer Health Information Technology or
Offer Health IT
a. Exclusion of Certain Funding Subsidy
Arrangements From Offer Definition
b. Implementation and Use Activities That
Are Not an Offering
c. Consulting and Legal Services Exclusion
From Offer Definition
2. Health IT Developer of Certified Health
IT: Self-Developer Health Care Providers
3. Information Blocking Definition
B. Exceptions
1. Infeasibility
a. Infeasibility Exception—Uncontrollable
Events Condition
b. Third Party Seeking Modification Use
c. Manner Exception Exhausted
2. Manner Exception—TEFCA Reasonable
and Necessary Activities
a. Background
b. TEFCA Condition for the ‘‘Manner’’
Exception
PO 00000
Frm 00003
Fmt 4701
Sfmt 4702
23747
C. Information Blocking Requests for
Information
1. Additional Exclusions From Offer
Health IT—Request for Information
2. Possible Additional TEFCA Reasonable
and Necessary Activities—Request for
Information
3. Health IT Capabilities for Data
Segmentation and User/Patient Access—
Request for Information
V. Incorporation by Reference
VI. Response to Comments
VII. Collection of Information Requirements
A. Independent Entity
B. Health IT Developers
C. ONC–ACBs
VIII. Regulatory Impact Statement
A. Statement of Need
B. Alternatives Considered
C. Overall Impact
1. Executive Orders 12866 and 13563—
Regulatory Planning and Review
Analysis
a. Costs and Benefits
b. Accounting Statement and Table
D. Regulatory Flexibility Act
E. Executive Order 13132—Federalism
F. Unfunded Mandates Reform Act of 1995
Regulation Text
I. Executive Summary
A. Purpose of Regulatory Action
The Secretary of Health and Human
Services has delegated responsibilities
to ONC for the implementation of
certain provisions in Title IV of the 21st
Century Cures Act (Pub. L. 114–255,
Dec. 13, 2016) (Cures Act) including: the
Electronic Health Record (EHR)
Reporting Program condition and
maintenance of certification
requirements under the ONC Health IT
Certification Program (Program) and
identifying reasonable and necessary
activities that do not constitute
information blocking.1 ONC is
responsible for implementation of
certain provisions of the Health
Information Technology for Economic
and Clinical Health Act (Pub. L. 111–5,
Feb. 17, 2009) (HITECH Act) of 2009
including, among other things:
requirements that the National
Coordinator perform duties consistent
with the development of a nationwide
health information technology
infrastructure that allows for the
electronic use and exchange of
information and that promotes a more
effective marketplace, greater
competition, and increased consumer
choice, among other goals; and
requirements to keep or recognize a
1 Reasonable and necessary activities that do not
constitute information blocking, also known as
information blocking exceptions, are identified in
45 CFR part 171 subparts B and C. ONC’s official
website, HealthIT.gov, offers a variety of resources
on the topic of Information Blocking, including fact
sheets, recorded webinars, and frequently asked
questions. To learn more, please visit: https://
www.healthit.gov/topic/information-blocking/.
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
23748
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
program or programs for the voluntary
certification of health information
technology. This proposed rule would
fulfill statutory requirements; provide
transparency; advance equity,
innovation, and interoperability; and
support the access, exchange, and use of
electronic health information (EHI).
Transparency regarding healthcare
information and activities—as well as
the interoperability and electronic
exchange of health information—are all
in the best interest of the patient and are
central to the efforts of the Department
of Health and Human Services to
enhance and protect the health and
well-being of all Americans.
In addition to fulfilling the HITECH
Act’s and Cures Act’s requirements
described above and advancing
interoperability, the proposed rule
would contribute to fulfilling Executive
Orders (E.O.) 13994, 13985, 14036,
14058, and 14091. The President issued
E.O. 13994 on January 21, 2021, to
ensure a data-driven response to
COVID–19 and future high-consequence
public health threats. The Cures Act and
the information blocking provisions in
the 21st Century Cures Act:
Interoperability, Information Blocking,
and the ONC Health IT Certification
Program (85 FR 25642) (ONC Cures Act
Final Rule) have enabled critical steps
to making data available across the
healthcare system. The proposed update
in this proposed rule to adopt the
United States Core Data for
Interoperability Standard Version 3
(USCDI v3) would promote the
establishment and use of interoperable
data sets of EHI for interoperable health
data exchange. As discussed in section
III.C.1, USCDI v3 would facilitate the
gathering, sharing, and publication of
data for use in public health and
emergency response (e.g., the COVID–19
pandemic) by capturing and promoting
the sharing of key data elements related
to public health. The proposed updates
to Application Programming Interfaces
(APIs) Conditions and Maintenance of
Certification requirements, as discussed
in section III.C.7, would continue ONC’s
efforts to develop and standardize APIs
and would help individuals and other
authorized health care providers,
including those engaged in public
health, to securely access EHI through
the broader adoption of standardized
APIs.2 3 Additionally, the proposed rule
2 ONC. (2022, October 18). API Resource Guide.
ONC Health IT Certification Program API Resource
Guide. Retrieved March 16, 2023, from https://onchealthit.github.io/api-resource-guide/.
3 Section 4002 of the 21st Century Cures Act
(Cures Act) establishes a condition of certification
that requires health IT developers to publish
application programming interfaces (APIs) that
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
would adopt consensus-based, industrydeveloped health IT standards for
certified Health IT Modules to support
electronic case reporting. As discussed
in section III.C.4, this would, among
other benefits, facilitate faster and more
efficient disease tracking and case
management. It also would provide
more timely and complete data than
manual or non-standardized reporting.
In addition to proposing new standards
to support public health initiatives, we
also request comment and seek input
from the public in section III.G
regarding health IT standards that could
be adopted within the Program to
strengthen and advance laboratory
interoperability.
We are committed to advancing
health equity, and this proposed rule is
consistent with E.O. 13985 of January
20, 2021, Advancing Racial Equity and
Support for Underserved Communities
Through the Federal Government 4 and
E.O. 14091 of February 16, 2023,
Further Advancing Racial Equity and
Support for Underserved Communities
Through the Federal Government.5
Section 1 of E.O. 13985 states that ‘‘the
Federal Government should pursue a
comprehensive approach to advancing
equity for all, including people of color
and others who have been historically
underserved, marginalized, and
adversely affected by persistent poverty
and inequality.’’ Section 1 of E.O. 13985
also states that because ‘‘advancing
equity requires a systematic approach to
embedding fairness in decision-making
processes, executive departments and
agencies must recognize and work to
redress inequities in any policies and
programs that serve as barriers to equal
allow ‘‘health information from such technology to
be accessed, exchanged, and used without special
effort through the use of APIs or successor
technology or standards, as provided for under
applicable law.’’ The Cures Act’s API Condition of
Certification requirement also states that a
developer must, through an API, ‘‘provide access to
all data elements of a patient’s electronic health
record to the extent permissible under applicable
privacy laws.’’ The API Conditions and
Maintenance of Certification requirements and
certification criteria are identified in 45 CFR part
170.
4 United States, Executive Office of the President
[Joseph Biden]. Executive Order 13985: Advancing
Racial Equity and Support for Underserved
Communities Through the Federal Government. Jan
20, 2021. 86 FR 7009–7013, https://www.federal
register.gov/documents/2021/01/25/2021-01753/
advancing-racial-equity-and-support-forunderserved-communities-through-the-federalgovernment.
5 United States, Executive Office of the President
[Joseph Biden]. Executive Order 14091: Further
Advancing Racial Equity and Support for
Underserved Communities Through the Federal
Government. Feb 16, 2023. 88 FR 10825–10833,
https://www.federalregister.gov/documents/2023/
02/22/2023-03779/further-advancing-racial-equityand-support-for-underserved-communities-throughthe-federal.
PO 00000
Frm 00004
Fmt 4701
Sfmt 4702
opportunity.’’ As noted above, we
propose to adopt USCDI v3. If finalized,
the adoption of USCDI v3 would update
the USCDI standard to include data
elements such as sexual orientation and
social determinants of health, as
discussed in sections III.C.1 and III.C.8
of this proposed rule. Expanding the
data elements included in USCDI would
increase the amount and type of data
available to be used and exchanged
through certified health IT. These
proposed updates could help capture
more accurate and complete patient
characteristics that are reflective of
patient diversity and could potentially
help data users address disparities in
health outcomes for all patients,
including those who may be
marginalized and underrepresented.
The use of USCDI v3 would also
support data users’ abilities to identify,
assess, and analyze gaps in care, which
could in turn be used to inform and
address the quality of healthcare
through interventions and strategies.
This could lead to better patient care,
experiences, and health outcomes.
As discussed in section III.C.1.c, the
proposal to adopt USCDI v3 also
supports the concept of ‘‘health equity
by design,’’ where health equity
considerations are identified and
incorporated from the beginning and
throughout the technology design,
build, and implementation process, and
health equity strategies, tactics, and
patterns are guiding principles for
developers, enforced by technical
architecture, and built into the
technology at every layer. If the
proposal to adopt USCDI v3 is finalized,
certified health IT products and
capabilities should be designed with a
foundational approach to promote
equity. As a result, by their very design,
certified health IT and the workflows
around them should support equity and
efforts to reduce disparities.
E.O. 14091 of Feb. 16, 2023, builds
upon previous equity-related E.O.s,
including E.O. 13985. Section 1 of E.O.
14091 requires the Federal Government
to ‘‘promote equity in science and root
out bias in the design and use of new
technologies, such as artificial
intelligence.’’ Section 8 of E.O. 14091
requires agencies to ‘‘prevent and
address discrimination and advance
equity for all’’ and to ‘‘consider
opportunities to prevent and remedy
discrimination, including by protecting
the public from algorithmic
discrimination.’’
This proposed rule would revise the
existing clinical decision support (CDS)
certification criterion by proposing a
‘‘Decision Support Interventions’’ (DSIs)
certification criterion to keep pace with
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
advances in software that developers of
certified health IT enable or interface
with to aid decision-making in
healthcare. As discussed in section
III.C.5, this criterion would also advance
health equity by design by making it
known to users of certified Health IT
Modules certified to the criterion
whether demographic, social
determinants of health assessment data
are used in DSIs. Finally, these
proposals would: (1) establish a
definition for algorithm-based,
‘‘predictive’’ DSIs; (2) require certified
Health IT Modules certified to the
criterion that enable or interface with
predictive DSIs to enable users to
review information about additional
source attributes relevant to health
equity, among other purposes, (3)
require developers of certified Health IT
Modules certified to the criterion to
employ or engage in intervention risk
management practices for all predictive
DSIs that the developers’ certified
Health IT Modules enable or interface;
and (4) make summary information
regarding these practices available
publicly.
Together, these proposed
requirements should improve
transparency, promote trustworthiness,
and incentivize the development and
wider use of fair, appropriate, valid,
effective, and safe predictive DSIs to aid
decision-making. The resulting
information transparency would enable
users, including health care providers,
to scrutinize these technologies and
would increase public trust and
confidence in these technologies. The
resulting information transparency
could expand the use of these
technologies in safer, more appropriate,
and more equitable ways. This
transparency would also inform wider
discussions across industry and
academia regarding how to evaluate and
communicate performance related to
predictive decision support
interventions.
President Biden’s E.O. 14036,
Promoting Competition in the American
Economy, issued on July 9, 2021,
established a whole-of-government
effort to promote competition in the
American economy and reaffirmed the
policy stated in E.O. 13725 of April 15,
2016 (Steps to Increase Competition and
Better Inform Consumers and Workers
to Support Continued Growth of the
American Economy).6 This proposed
rule would foster competition by
6 United States, Executive Office of the President
[Joseph Biden]. Executive Order 14036: Promoting
Competition in the American Economy. Jul 9, 2021.
86 FR 36987–36999, https://www.federal
register.gov/documents/2021/07/14/2021-15069/
promoting-competition-in-the-american-economy.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
advancing foundational standards for
certified API technology, which
enable—through applications (apps) and
without special effort—improved legally
permissible sharing of EHI among
clinicians, patients, researchers, and
others. As described in section III.C.7,
competition would be advanced through
these improved API standards that can
help individuals connect to their
information and can help authorized
health care providers involved in the
patient’s care to securely access
information. For example, these
standards are designed to foster an
ecosystem of new applications that can
connect through the API technology to
provide patients with improved
electronic access to EHI and more
choices in their health care providers.
This is similar to how APIs have
impacted other sectors of the economy,
such as travel, banking, and commerce.
Further, as described in section IV,
this proposed rule would provide
enhancements to support information
sharing under the information blocking
regulations and promote innovation and
competition, as well as address market
consolidation. As we have noted,
addressing information blocking is
critical for promoting innovation and
competition in health IT and for the
delivery of healthcare services to
individuals. In both the ONC Cures Act
Proposed (84 FR 7508) and Final (85 FR
25790 through 25791) Rules, we
discussed how the information blocking
provisions provide a comprehensive
response to the issues identified by
empirical and economic research that
suggested that information blocking may
weaken competition, encourage
consolidation, and create barriers to
entry for developers of new and
innovative applications and
technologies that enable more effective
uses of EHI to improve population
health and the patient experience.7 We
explained that the information blocking
provision of the Public Health Service
Act (PHSA) itself expressly addresses
7 See, e.g., Martin Gaynor, Farzad Mostashari, and
Paul B. Ginsberg, Making Health Care Markets
Work: Competition Policy for Health Care, 16–17
(Apr. 2017), available at https://heinz.cmu.edu/
news/news-detail/index.aspx?nid=3930; Diego A.
Martinez et al., A Strategic Gaming Model For
Health Information Exchange Markets, Health Care
Mgmt. Science (Sept. 2016). (‘‘[S]ome healthcare
provider entities may be interfering with HIE across
disparate and unaffiliated providers to gain market
advantage.’’) Niam Yaraghi, A Sustainable Business
Model for Health Information Exchange Platforms:
The Solution to Interoperability in Healthcare IT
(2015), available at https://www.brookings.edu/
research/papers/2015/01/30-sustainable-businessmodel-health-information-exchange-yaraghi;;
Thomas C. Tsai Ashish K. Jha, Hospital
Consolidation, Competition, and Quality: Is Bigger
Necessarily Better? 312 J. AM. MED. ASSOC. 29, 29
(2014).
PO 00000
Frm 00005
Fmt 4701
Sfmt 4702
23749
practices that impede innovation and
advancements in EHI access, exchange,
and use, including care delivery enabled
by health IT (section 3022(a)(2)(C)(ii) of
the PHSA). Actors subject to the
information blocking provisions may,
among other practices, attempt to
exploit their control over
interoperability elements to create
barriers to entry for competing
technologies and services that offer
greater value for health IT customers
and users, provide new or improved
capabilities, and enable more robust
access, exchange, and use of electronic
health information (EHI) (85 FR 25820).8
Information blocking may also harm
competition not just in health IT
markets, but also in markets for
healthcare services (85 FR 25820). In the
ONC Cures Act Final Rule, we described
practices that dominant market
providers may leverage and use to
control access and use of their
technology, resulting in technical
dependence and possibly leading to
barriers to entry by would-be
competitors, as well as making some
market providers vulnerable to
acquisition or inducement into
arrangements that enhance the market
power of incumbent providers to the
detriment of consumers and purchasers
of healthcare services (85 FR 25820).
The implementation of the new
information blocking provisions
proposed in section IV of this proposed
rule would promote innovation,
encourage market competition, and
address consolidation in the interest of
the patient to advance interoperability,
improve transparency, and support the
access, exchange, and use of electronic
health information.
Lastly, in support of E.O. 14058,
Transforming Federal Customer
Experience and Service Delivery to
Rebuild Trust in Government, issued on
December 16, 2021, we are committed to
advancing the equitable and effective
delivery of services with a focus on the
experience of individuals, health IT
developers, and health care providers.9
As required by section 4002 of the Cures
Act and included in the ONC Cures Act
Final Rule (85 FR 25717), we
8 See also Martin Gaynor, Farzad Mostashari, and
Paul B. Ginsberg, Making Health Care Markets
Work: Competition Policy for Health Care, 16–17
(Apr. 2017), available at https://heinz.cmu.edu/
news/news-detail/index.aspx?nid=3930.
9 United States, Executive Office of the President
[Joseph Biden]. Executive Order 14058:
Transforming Federal Customer Experience and
Service Delivery To Rebuild Trust in Government.
Dec 13, 2021. 86 FR 71357–71366, https://
www.federalregister.gov/documents/2021/12/16/
2021-27380/transforming-federal-customerexperience-and-service-delivery-to-rebuild-trust-ingovernment.
E:\FR\FM\18APP2.SGM
18APP2
23750
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
established certain Conditions and
Maintenance of Certification
requirements, which express initial and
ongoing requirements for health IT
developers and their certified Health IT
Module(s) under the Program. This
proposed rule would implement the
EHR Reporting Program Condition and
Maintenance of Certification
requirement outlined in the Cures Act
by establishing a new Insights Condition
and Maintenance of Certification
(‘‘Insights Condition’’) within Program.
As discussed in section III.F, the
implementation of the Insights
Condition would provide transparent
reporting to address information gaps in
the health IT marketplace and provide
insights on the use of specific certified
health IT functionalities. The
implementation of this new Condition
and Maintenance of Certification
requirement would allow ONC to gain
understanding of the use of health IT
and would provide ONC with
information about consumers’
experience with certified health IT.
We also strive to improve federal
agency coordination. ONC works with
the Centers for Medicare & Medicaid
Services (CMS) to ensure that our own
certification timelines complement
timelines for CMS programs that
reference ONC regulations, such as the
Medicare Promoting Interoperability
Program and the Promoting
Interoperability performance category of
the Merit-based Incentive Payment
System (MIPS). In the interest of clarity
and cohesion among HHS components,
we have proposed to align some of our
compliance dates to the calendar year
for consistency with calendar-year
based performance periods in CMS
programs when participants may be
required to use updated certified health
IT. We believe this approach reduces
confusion for participants in these
programs and better serves the public
interest.
B. Summary of Major Provisions
ddrumheller on DSK120RN23PROD with PROPOSALS2
1. ONC Health IT Certification Program
Updates
a. ‘‘The ONC Certification Criteria for
Health IT’’ and Discontinuing Year
Themed ‘‘Editions’’
Section 3001(c)(5) of the PHSA
provides the National Coordinator with
the authority to establish a certification
program or programs for the voluntary
certification of health IT. ONC first
introduced the concept of an ‘‘edition’’
of ONC health IT certification criteria in
2012. In 2012, we stated that we would
refer to the certification criteria adopted
in §§ 170.302, 170.304, and 170.306
collectively as the ‘‘2011 Edition EHR
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
certification criteria’’ and that the
certification criteria adopted in
§ 170.314 would be referred to as the
‘‘2014 Edition EHR certification
criteria’’ (77 FR 13836). In 2015, we
issued a final rule, ‘‘2015 Edition Health
Information Technology (Health IT)
Certification Criteria, 2015 Edition Base
Electronic Health Record (EHR)
Definition, and ONC Health IT
Certification Program Modifications,’’
(2015 Edition Final Rule) and adopted
the ‘‘2015 Edition Health IT
Certification Criteria’’ (80 FR 62602).
We codified the 2015 Edition
certification criteria in § 170.315 to set
them apart from other editions of
certification criteria (80 FR 62608). In
2020, we published the ONC Cures Act
Final Rule (85 FR 25642) and adopted
updates to the 2015 Edition. These
updates included new certification
criteria, standards, and requirements, as
well as incremental revisions to existing
2015 Edition certification criteria to
better enable interoperability and the
access, exchange, and use of electronic
health information (85 FR 25664–65).
Because we did not adopt a wholesale
new edition of certification criteria in a
different CFR section, we retained the
overall 2015 Edition title for the changes
included in the ONC Cures Act Final
Rule and made specific timebound
compliance changes within certification
criteria.
Subsequent to publication of the ONC
Cures Act Final Rule through public
meetings and correspondence, we heard
that the continued use and reference to
the 2015 Edition inaccurately implied
an age and outdatedness to the
certification criteria we had adopted.
More importantly, we heard significant
positive feedback that the incremental
approach to updates is generally
beneficial as a long-term approach.
Specifically, we heard that a consistent,
transparent, incremental update cycle
that includes the following features
would be preferred by some: (1) regular
updates to recognize standards
advancement and an allowance for
voluntary standards advancement
between updates, (2) incremental
updates rather than wholesale certified
Health IT Module certification criteria
overhauls, (3) a predictable timeline for
updates based on standards
development cycles with reasonable
development timelines, and (4) a
reasonable development timeline for
any new criterion based on the specific
development needs.
For these reasons, we no longer
believe that it is helpful or necessary to
maintain an ‘‘edition’’ naming
convention or to adopt entirely new
editions of certification criteria to
PO 00000
Frm 00006
Fmt 4701
Sfmt 4702
encapsulate updates over time. Instead,
we believe there should be a single set
of certification criteria, which will be
updated in an incremental fashion in
closer alignment to standards
development cycles and regular health
IT development timelines. Therefore, in
section III.A, we propose to rename all
criteria within the Program simply as
‘‘ONC Certification Criteria for Health
IT.’’ We believe maintaining a single set
of ‘‘ONC Certification Criteria for Health
IT’’ would create more stability for the
Program and for federal partners who
reference the Program, as well as make
it easier for developers of certified
health IT to maintain their product
certificates over time. This proposal to
remove ‘‘editions’’ from the Program
would also help users of certified health
IT identify which certification criteria
are necessary for their participation in
other HHS programs, such as Medicare
Promoting Interoperability Program and
the Promoting Interoperability
performance category of the MIPS. For
example, users would only need to
know that their Health IT Module is
certified by ONC in accordance with the
ONC Certification Criteria for Health IT
for successful participation in MIPS, as
compared to the current state where
they must also know if the Health IT
Module complies with the 2014 Edition
Certification Criteria, the 2015 Edition
Certification Criteria, or the 2015
Edition Cures Update Certification
Criteria.
In addition, we believe that this
approach will have the benefit of
reducing administrative burden for
health IT developers with Health IT
Modules certified through the Program.
Previously, duplicative references to
certification criteria across different year
themed editions created administrative
burden on developers as they had the
effect of requiring health IT developers
to seek an updated certificate attributed
to the ‘‘new’’ duplicated certification
criterion even in circumstances when
the certification criterion remained
substantively unchanged. Under this
proposal, unchanged certification
criteria would no longer be duplicated
as separate criteria under multiple
editions.
b. New and Revised Standards and
Certification Criteria
i. The United States Core Data for
Interoperability Standard Version 3
(USCDI v3)
In the ONC Cures Act Final Rule,
ONC adopted the United States Core
Data for Interoperability (USCDI) as a
standard to replace the Common
Clinical Data Set (CCDS) in several ONC
E:\FR\FM\18APP2.SGM
18APP2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
certification criteria (85 FR 25670). We
adopted USCDI Version 1 (USCDI v1) as
a standard in § 170.213 and
incorporated it by reference in
§ 170.299. The new USCDI v1 standard
established a set of data classes and
constituent data elements required to
support interoperability nationwide.
USCDI v1 is a required part of certain
certification criteria updates that were
made to the existing 2015 Edition
Health IT Certification Criteria in the
ONC’s Cures Act Final Rule. These
changes constitute the ‘‘2015 Edition
Cures Update.’’
ONC also indicated in the ONC Cures
Act Final Rule that we intended to
establish and follow a predictable,
transparent, and collaborative process to
expand future versions of the USCDI,
including providing the public with the
opportunity to comment on the USCDI’s
expansion (85 FR 25670). ONC
established a process, including creating
the ONC New Data Element and Class
(ONDEC) submission system,10 which
provides the public with the
opportunity to submit new data
elements to be considered for inclusion
in future versions of USCDI. Following
this established process, ONC published
USCDI Version 2 (USCDI v2) in July
2021 11 and finalized and released
USCDI Version 3 (USCDI v3) in July
2022.12 Both USCDI v2 and USCDI v3
contain new data elements and data
classes beyond what was included in
USCDI v1. USCDI v3 contains all data
elements and classes added in USCDI
v2.
Because USCDI is the standard for
data required to be accessible through
certified health IT for numerous
certification criteria, expanding the data
elements and data classes included in
USCDI increases the amount of data
available to be used and exchanged for
patient care. To advance
interoperability, in section III.C.1, ONC
proposes to add the newly released
USCDI v3 in § 170.213(b). We propose
that USCDI v1 would remain in
regulation and now be codified in
§ 170.213(a) and we propose to add
USCDI v3 to § 170.213 (to be codified as
§ 170.213(b)). We also propose to
incorporate by reference USCDI v3 in
10 ONC. (2020, July 27). USCDI ONDEC. Retrieved
March 16, 2023, from https://www.healthit.gov/isa/
ONDEC).
11 ONC. (2021, July 2). United States Core Data
for Interoperability (USCDI). Interoperability
Standards Advisory (ISA). Retrieved March 16,
2023, from https://www.healthit.gov/isa/unitedstates-core-data-interoperability-uscdi#uscdi-v2.
12 United States Core Data for Interoperability
(USCDI),’’ Interoperability Standards Advisory
(ISA) (ONC, July 5, 2022), https://www.healthit.gov/
isa/united-states-core-data-interoperabilityuscdi#uscdi-v3.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
§ 170.299 as of the effective date of the
final rule. In addition, we propose that
the USCDI v1 (July 2020 Errata) in the
USCDI standard in § 170.213(a) will
expire on January 1, 2025. Under this
proposal, both versions would be
referenced as applicable in the USCDI
standard in § 170.213 for the time
period up to and including December
31, 2024.
ii. C–CDA Companion Guide Updates
In section III.C.2, we propose to adopt
the HL7® CDA® R2 Implementation
Guide: C–CDA Templates for Clinical
Notes STU Companion Guide, Release
3—US Realm (C–CDA Companion
Guide R3) in § 170.205(a)(6). The C–
CDA Companion Guide R3 provides
supplemental guidance and additional
technical clarification for specifying
data in the C–CDA Release 2.1,
including data specified in USCDI v2.
However, it is our understanding that
HL7 is working on updating the C–CDA
Companion Guide for USCDI v3. If the
updated C–CDA Companion Guide
Release 4 (R4) is published before the
date of publication of the final rule, it
is our intention to consider adopting the
updated Companion Guide that
provides guidance and clarifications for
specifying data in USCDI v3.
iii. ‘‘Minimum Standards’’ Code Sets
Updates
In the 2015 Edition Final Rule, we
established a policy of adopting newer
versions of ‘‘minimum standards’’ code
sets that update frequently (80 FR
62612). Adopting newer versions of
these code sets enables improved
interoperability and implementation of
health IT with minimal additional
burden (77 FR 54170). If adopted, newer
versions of these minimum standards
code sets would serve as the baseline for
certification, and developers of certified
health IT would be able to use newer
versions of these adopted standards on
a voluntary basis. Because these code
sets are updated frequently, we will
consider whether it may be more
appropriate to adopt a version of a
minimum standards code set issued
after publication of this proposed rule
but before publication of a final rule. In
section III.C.3, we propose to adopt
newer versions of the following
minimum standards code sets:
• § 170.207(a)—Problems
• § 170.207(c)—Laboratory tests
• § 170.207(d)—Medications
• § 170.207(e)—Immunizations
• § 170.207(f)—Race and ethnicity
• § 170.207(m)—Numerical references
• § 170.207(n)—Sex
• § 170.207(o)—Sexual orientation and
gender information
PO 00000
Frm 00007
Fmt 4701
Sfmt 4702
23751
• § 170.207(p)—Social, psychological,
and behavioral data
• § 170.207(r)—Provider type
• § 170.207(s)—Patient insurance
In addition to updating the minimum
standards code sets listed above, we
propose to update some of the
certification criteria that reference those
minimum standards. These criteria
include § 170.315(a)(5)(i)(A)(1) and (2),
(a)(5)(i)(C) through (E), (a)(12),
(b)(1)(iii)(B)(2), (b)(1)(iii)(G)(3),
(b)(6)(ii)(B)(2), (c)(4)(iii)(C), (c)(4)(iii)(E),
(c)(4)(iii)(G) through (I), (f)(1)(i)(B) and
(C), (f)(3)(ii), and (f)(4)(ii).
We also propose to change the
heading of § 170.207(o) from ‘‘sexual
orientation and gender identity’’ to
‘‘sexual orientation and gender
information’’ to acknowledge that
§ 170.207(o) may include standard code
sets to support other gender related data
items.
iv. Electronic Case Reporting
In section III.C.4 of this proposed rule,
we propose to revise the ‘‘transmission
to public health agencies—electronic
case reporting’’ criterion in
§ 170.315(f)(5) to adopt consensusbased, industry-developed electronic
standards and implementation guides
(IGs) to replace all functional,
descriptive requirements in the present
criterion in § 170.315(f)(5). These
standards are proposed to support the
following requirements for Health IT
Modules certified to § 170.315(f)(5): (i)
create a case report for electronic
transmission; (ii) consume and process
a case report response; and (iii)
consume and process electronic case
reporting trigger codes and parameters.
We note that these electronic standards
are standards-based representations of
the functional requirements described
in the existing criterion in
§ 170.315(f)(5) as described in section
III.C.4 of this preamble.
v. Decision Support Interventions and
Predictive Models
In section III.C.5 of this proposed rule,
we propose the certification criterion,
‘‘decision support interventions (DSI)’’
in § 170.315(b)(11). The DSI criterion is
a revised certification criterion as it
serves as both an iterative and
replacement criterion for the ‘‘clinical
decision support (CDS)’’ criterion in
§ 170.315(a)(9). This criterion would
reflect an array of contemporary
functionalities, data elements, and
software applications, including the use
of predictive models or algorithms, that
certified Health IT Module(s) enable or
interface with to aid decision-making in
healthcare.
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
23752
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
We propose to adopt a new definition
for ‘‘predictive decision support
intervention,’’ in § 170.102, and we
propose that developers of certified
health IT with Health IT Module(s)
certified to the criterion we propose in
§ 170.315(b)(11) that enable or interface
with predictive DSIs would be subject to
requirements to provide transparency of
predictive DSIs. Specifically, we
propose that Health IT Modules that
enable or interface with predictive DSIs
enable a user to review predictive DSI
‘‘source attribute’’ information through
the Health IT Module. We also propose
that developers of certified health IT
with Health IT Modules that enable or
interface with predictive DSIs employ or
engage in ‘‘intervention risk
management’’ practices. We also
propose that summary information
regarding these intervention risk
management practices be made
available via a publicly accessible
hyperlink. Together, our proposals for
predictive DSI-specific source attributes
and intervention risk management
practices information are intended to
provide appropriate information to help
guide medical decisions at the time and
place of care, consistent with 42 U.S.C.
300jj–11(b)(4).
We propose that Health IT Modules
certified to § 170.315(b)(11) enable users
to provide feedback regarding DSI
information displayed through the
Health IT Module, and that such Health
IT Modules make available such
feedback data for export in a
computable format.
We propose that developers of
certified health IT with Health IT
Modules certified to § 170.315(b)(11)
comply with these new requirements by
December 31, 2024. For the intervening
time between finalization of this
proposed rule and December 31, 2024,
we propose to add § 170.315(a)(9) to the
list of applicable certification criteria for
the real-world testing Condition and
Maintenance of Certification
requirement in § 170.405(a), thus
requiring developers of certified health
IT with Health IT Module(s) certified to
§ 170.315(a)(9) or § 170.315(b)(11) to
participate in real world testing plan
and results submission.
Finally, we propose to update the
Base EHR definition in § 170.102 to
include an option of either the existing
‘‘clinical decision support (CDS)’’
version of the criterion in
§ 170.315(a)(9) or the revised ‘‘decision
support interventions’’ criterion in
§ 170.315(b)(11) for the period up to and
including December 31, 2024, and to
include only ‘‘decision support
interventions’’ in § 170.315(b)(11) on
and after January 1, 2025. We discuss in
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
section III.C.5.d of this preamble
proposals that would constitute changes
to the CDS criterion, as the new DSI
criterion. We describe how much of the
structure and requirements are
duplicated across these criteria and
reflect the capabilities included in the
CDS criterion with which Program
participants have years of familiarity
and can find, for comparison purposes,
in § 170.315(a)(9).
vi. Synchronized Clocks Standard
We propose in section III.C.6 to
remove the current named specification
for clock synchronization, which is
Network Time Protocol (NTP v4 of RFC
5905), in § 170.210(g), based on public
feedback and reflective of contemporary
norms within the industry.
Additionally, we propose to keep the
requirement for any network time
protocol (NTP) standard to be present,
though any NTP standard could be
used.
vii. Standardized API for Patient and
Population Services
We propose in section III.C.7 to revise
the ‘‘standardized API for patient and
population services’’ certification
criterion in § 170.315(g)(10) in several
ways. We propose to require a certified
Health IT Module’s authorization server
to issue a refresh token according to the
implementation specification adopted
in § 170.215(c). The token should be
valid for a period of no less than three
months and will apply to all
applications using the ‘‘confidential
app’’ profile for both first time and
subsequent connections.
We also propose to adopt the FHIR US
Core Implementation Guide STU
version 5.0.1 in § 170.215(b)(1)(ii).
Based on the annual US Core release
cycle, we believe US Core IG v6.0.0 will
be published before ONC issues a final
rule.13 Therefore, it is our intent to
consider adopting the updated US Core
IG v6.0.0 that supports the data
elements and data classes in USCDI v3
since we propose to adopt USCDI v3 in
this rule. Health IT systems that adopt
this version of the US Core IG can
provide the latest consensus-based
capabilities for providing access to
USCDI data classes and elements using
a FHIR API.
Additionally, we propose to amend
the API Condition and Maintenance of
Certification requirements by adding the
requirement that Certified API
Developers with patient-facing apps
must publish their service base URLs for
all customers, regardless of whether the
certified Health IT Modules are
13 https://hl7.org/fhir/us/core/history.html.
PO 00000
Frm 00008
Fmt 4701
Sfmt 4702
centrally managed by the Certified API
Developer or locally deployed by an API
Information Source, according to a
specified format.
We also propose to revise the
requirement in § 170.315(g)(10)(vi) to
specify that Health IT Modules
presented for certification that allow
short-lived access tokens to expire, in
lieu of immediate access token
revocation, must have such access
tokens expire within one hour of the
request. This revised requirement would
align with industry standard practice for
short-lived access tokens, would
provide clarity and consistent
expectations that developers revoke
access or expire access privileges within
one hour of a request, and would offer
patients an assurance that an
application’s access to their data would
be revoked or expired within one hour
of a request.
We propose to adopt the Substitutable
Medical Applications, Reusable
Technologies (SMART) Application
Launch Framework Implementation
Guide Release 2.0.0 (SMART v2 Guide)
in § 170.215(c)(2), which would replace
SMART v1 Guide as the standard in
§ 170.215(a)(3) (proposed in this rule as
§ 170.215(c)(1)). The SMART v2 Guide
iterates on the features of the SMART v1
Guide by including new features and
technical revisions based on industry
consensus, including features that
reflect security best practices. We
propose that the availability of the
SMART v1 Guide to be adopted as a
standard in the Program would expire
on January 1, 2025. After this time, the
SMART v2 Guide would be the only
version of the IG available for use in the
Program.
viii. Patient Demographics and
Observations Certification Criterion in
§ 170.315(a)(5)
In section III.C.1 of this proposed rule,
we introduce proposals to change
certain data elements in USCDI, namely
Sex (Assigned at Birth), Sexual
Orientation, and Gender Identity, that
are also data elements in § 170.315(a)(5).
We propose these changes to reflect
public feedback that the standards and
terms used to represent these data
elements needed to be updated.
Therefore, to ensure consistency, in
section III.C.8 of this preamble, we
propose to change the name of the
certification criterion in § 170.315(a)(5)
from ‘‘demographics’’ to ‘‘patient
demographics and observations.’’
Additionally, in order to ensure
consistent capture of these data
elements across health IT, we propose
in section III.C.8 to carry these changes
E:\FR\FM\18APP2.SGM
18APP2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
into their respective data elements in
§ 170.315(a)(5).
We propose to replace the specific
codes sets referenced in
§ 170.315(a)(5)(i)(D) and (E), Sexual
Orientation and Gender Identity,
respectively, with the Systematized
Nomenclature of Medicine Clinical
Terms (SNOMED CT®) code set, as
referenced in the standard proposed in
§ 170.207(o)(3). We propose that the
adoption of the code sets referenced in
§ 170.207(n)(1) would expire on January
1, 2026, and we also propose that health
IT developers can continue to use the
specific codes in the current
terminology standard until December
31, 2025, in order to provide adequate
time for health IT systems to transition
to the updated terminology standards.
As also discussed in section III.C.1 of
this proposed rule, we have taken note
of efforts to develop clinically relevant
ways of identifying a patient’s sex based
on observations, to be used by a
patient’s clinician when considering or
evaluating diagnostic or therapeutic
services in areas such as radiology,
laboratory, and genetic testing. The
concept ‘‘Sex For Clinical Use’’ (SFCU)
is seen as a valuable tool in addressing
these concerns and therefore important
for clinical capture. We also propose to
add SFCU as a new data element in
§ 170.315(a)(5)(i)(F). Additionally, we
propose to add new data elements
‘‘Name to Use’’ in § 170.315(a)(5)(i)(G)
and ‘‘Pronouns’’ in § 170.315(a)(5)(i)(H),
to facilitate data capture that supports
providers’ ability to provide culturally
competent care for their patients.
ix. Updates to Transitions of Care
Certification Criterion in § 170.315(b)(1)
ddrumheller on DSK120RN23PROD with PROPOSALS2
We propose in section III.C.9 to
update the ‘‘transitions of care’’
certification criterion (§ 170.315(b)(1)) to
align it with changes proposed in
§ 170.213, including the proposed
adoption of USCDI v3 in § 170.213(b)).
This change would ensure that Health
IT Modules certified to § 170.315(b)(1)
are capable of accessing, exchanging,
and using USCDI data elements
referenced in § 170.213.
x. Patient Requested Restrictions
Certification Criterion
We believe that individuals should be
provided a reasonable opportunity and
technical capability to make informed
decisions about the collection, use, and
disclosure of their electronic health
information. The Health Insurance
Portability and Accountability Act
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
(HIPAA) 14 Privacy Rule 15 provides
individuals with several legal,
enforceable rights intended to empower
them to be more active participants in
managing their health information. We
make several proposals in support of the
HIPAA Privacy Rule’s individuals’
‘‘right to request a restriction’’ on
certain uses and disclosures of their PHI
(see also 45 CFR 154.522(a)). We
propose to adopt a new certification
criterion, revise a certification criterion,
and propose modifications for Health IT
Modules certified to specific criteria
under the Privacy and Security
certification Framework.
We propose a new certification
criterion in § 170.315(d)(14), an addition
to ONC’s Privacy and Security
Certification Framework under the
Program in § 170.550(h), and a revision
to an existing criterion in § 170.315(e)(1)
to support additional tools for
implementing patient requested
information privacy restrictions.
xi. Requirement for Health IT
Developers To Update Their Previously
Certified Health IT
We propose to make explicit in the
introductory text in § 170.315 that
health IT developers voluntarily
participating in the Program must
update their certified Health IT Modules
and provide that updated certified
health IT to customers in accordance
with the timelines defined for a specific
criterion or standard included in
§ 170.315. More specifically, we propose
in section III.C.11 that health IT
developers with health IT certified to
any of the certification criteria in
§ 170.315 would need to update their
previously certified Health IT Modules
to be compliant with any revised
certification criterion adopted in
§ 170.315, including any new standards
adopted in 45 CFR part 170 subpart B
and capabilities included in the revised
certification criterion. We further
propose that health IT developers would
also need to provide the updated heath
IT to customers of the previously
certified health IT according to the
timelines established for that criterion
and any applicable standards.
2. Assurances Condition and
Maintenance of Certification
Requirements
We propose in section III.D to
establish additional Assurances
Condition and Maintenance of
Certification requirements. We propose
14 Public
Law 104–191,110 Stat. 1936 (August 21,
1996), codified at 42 U.S.C. 1320d–1320d8.
15 45 CFR part 160 and subparts A and E of part
164.
PO 00000
Frm 00009
Fmt 4701
Sfmt 4702
23753
as a Condition of Certification that a
health IT developer must provide an
assurance that it will not interfere with
a customer’s timely access to
interoperable health IT certified under
the Program. To support this assurance,
we propose two accompanying
Maintenance of Certification
requirements. We propose that a health
IT developer must update a Health IT
Module, once certified to a certification
criterion adopted in § 170.315, to all
applicable revised certification criteria,
including the most recently adopted
capabilities and standards included in
the revised certification criterion. We
also propose that a health IT developer
must provide all Health IT Modules
certified to a revised certification
criterion to its customers of such
certified health IT. Additionally, we
propose separate ‘‘timely access’’ or
‘‘timeliness’’ requirements for each of
the two proposed Maintenance of
Certification requirements above
dictating by when a Health IT Module
must be updated to revised certification
criteria and by when a Health IT
Module certified to a revised
certification criterion must be provided
to the health IT developer’s customers.
3. Real World Testing—Inherited
Certified Status
Section 4002(a) of the Cures Act
added a new Condition and
Maintenance of Certification
requirement that health IT developers
must successfully test the real-world use
of health IT for interoperability in the
type(s) of setting(s) in which such
technology would be marketed. Many
health IT developers update their
certified Health IT Module(s) on a
regular basis leveraging the flexibility
provided through ONC’s Inherited
Certified Status (ICS).16 Because of the
way that ONC issues certification
identifiers, this updating can cause an
existing certified Health IT Module to be
recognized as new within the Program.
Regular updating, especially on a
frequent basis (such as quarterly or
semi-annually) creates an anomaly that
could result in existing certified Health
IT Modules being inadvertently
excluded from the real world testing
reporting requirements.
In order to ensure that all developers
continue to test the real world use of
their technology as required, we
propose in section III.E to eliminate this
anomaly by requiring health IT
developers to include in their real world
16 ONC, Applicability Of Inherited Certified
Status And Gap Certification (2016). https://
www.healthit.gov/sites/default/files/policy/public_
applicability_of_gap_certification_and_inherited_
certified_status.pdf.
E:\FR\FM\18APP2.SGM
18APP2
23754
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
testing results report the newer version
of those certified Health IT Module(s)
that are updated using Inherited
Certified Status after August 31 of the
year in which the plan is submitted.
This will ensure that health IT
developers fully test all applicable
certified Health IT Module(s) as part of
their real world testing requirements.
4. Insights Condition and Maintenance
of Certification
The Cures Act specified requirements
in section 4002(c) to establish an
Electronic Health Record (EHR)
Reporting Program to provide
transparent reporting on certified health
IT in the categories of interoperability,
usability and user-centered design,
security, conformance to certification
testing, and other categories, as
appropriate to measure the performance
of EHR technology. The Cures Act also
specified that a health IT developer be
required, as a Condition and
Maintenance of Certification
requirement under the ONC Health IT
Certification Program, to submit
responses to reporting criteria in
accordance with the Electronic Health
Record Reporting Program established
with respect to all certified technology
offered by such developer. For clarity
purposes, we intend to refer to the
Condition and Maintenance of
Certification associated with the ‘‘EHR
Reporting Program’’ as the ‘‘Insights’’
Condition and Maintenance of
Certification (also referred to as the
‘‘Insights Condition’’) throughout this
proposed rule. We believe this
descriptive name captures the essence
of this requirement and will help avoid
confusion that might occur through use
of the term ‘‘EHR Reporting Program.’’
We propose in section III.F to adopt
nine reporting measures for developers
of certified health IT that focus initially
on the interoperability category,
emphasizing four areas of
interoperability: individuals’ access to
electronic health information, public
health information exchange, clinical
care information exchange, and
standards adoption and conformance.
Through this first set of proposed
measures, ONC intends to provide
insights on the interoperability category
specified in the Cures Act. We intend to
explore the other Cures Act categories
(security, usability and user-centered
design, conformance to certification
testing, and other categories to measure
the performance of EHR technology) in
future years.
We also propose in section III.F to
implement the Insights Condition and
Maintenance of Certification
requirements in § 170.407 in two
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
phases, where some of the measures
will be required to be reported earlier
than others. For each proposed measure,
we have included information on the
rationale for proposing the measure, the
proposed numerators and denominators,
and other key topics. Overall, the intent
of the Insights Condition is to provide
transparent reporting, address
information gaps in the health IT
marketplace, and provide insights on
the use of health IT.
5. Information Blocking Enhancements
We propose in section IV.A to define
what it means to ‘‘offer health
information technology’’ or ‘‘offer health
IT’’ for purposes of the information
blocking regulations in 45 CFR part 171.
This definition of what it means to offer
health IT would, as proposed, narrow
the applicability of the health IT
developer of certified health IT
definition. While the definition of offer
health IT proposed at 45 CFR 171.102
would generally continue to include
holding out for sale, selling, or
otherwise supplying certified health IT
to others on commercial or other terms,
it would carve out by explicit exclusion
the provision of funding for obtaining or
maintaining certified health IT. The
proposed definition would also
explicitly codify that we do not
interpret health care providers or other
health IT users to offer health IT when
they engage in certain activities
customary and common amongst both
health care providers that purchase
certified health IT from a commercial
developer or reseller and health care
providers that self-develop certified
health IT. Activities we propose to
codify as explicitly excluded from the
definition of what it means to offer
health IT include implementing APIs or
portals for clinician or patient access as
well as the issuance of login credentials
allowing licensed healthcare
professionals who are in independent
practice to use a hospital or other
healthcare facility’s EHR to furnish and
document care to patients in the
hospital or other healthcare facility. We
also include a proposal to potentially
exclude from what it means to offer
health IT the inclusion of health IT in
a package of items, supplies, facilities,
and services that a management
consultant handles for a clinician
practice or other health care provider in
a comprehensive (‘‘turn key’’) package
of services for administrative or
operational management of the clinician
practice or other health care provider
(see section IV.A.1.c, below). Finally,
we seek comment on the proposed
definition of offer health IT and whether
PO 00000
Frm 00010
Fmt 4701
Sfmt 4702
we should consider additional
exclusions.
We also propose in section IV.A to
modify the health IT developer of
certified health IT definition so that it
is clear that health care providers who
self-develop certified health IT would
continue to be excluded from this
definition if they supply their selfdeveloped certified health IT to others
under arrangements excluded from the
definition of what it means to offer
health IT. This would treat selfdeveloper health care providers who
supply use of their self-developed
certified health IT to others under
arrangements, or in the course of
activities, excluded from the proposed
offer health IT definition in the same
way that we treat health care providers
who supply commercial developers’
certified health IT under arrangements,
or in the course of activities, excluded
from the offer health IT definition.
We propose in section IV.A to revise
the text of § 171.103, the information
blocking definition, to remove
paragraph (b) (see § 171.103(b)).
Paragraph (b) established the period of
time during which electronic health
information (EHI) for purposes of the
information blocking definition
(§ 171.103) was limited to a subset of
electronic health information (EHI) that
was identified by the data elements
represented in the USCDI standard
adopted in 171.213. The end date of that
period of time, October 5, 2022, has
passed. On and after October 6, 2022,
the scope of EHI for purposes of the
information blocking definition
(§ 171.103) is EHI as defined in
§ 171.102 and thus paragraph (b) of
§ 171.103 is no longer needed.
We note that we do not propose to
change the scope of EHI for purposes of
the information blocking definition,
only to update the CFR text to remove
the paragraph specific to the period of
time now passed. Similarly, because we
included the same time period in
reference to the scope of electronic
health information in two paragraphs of
the Content and Manner exception
(§ 171.301(a)(1) and (2)), we propose to
revise § 171.301 to remove from the
regulatory text the existing
§ 171.301(a)(1) and (2) as no longer
necessary.
We propose in section IV.B to revise
the Infeasibility Exception codified in
45 CFR 171.204(a) by adding two new
conditions and by revising one existing
condition to further clarify when an
actor’s practice of not fulfilling a request
for access, exchange, or use of EHI
meets the condition. First, we propose
to revise the ‘‘uncontrollable events’’
condition in § 171.204(a)(1) to further
E:\FR\FM\18APP2.SGM
18APP2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
clarify when an actor’s practice meets
the uncontrollable events condition.
Second, we propose to add two new
conditions to be codified as
subparagraphs (a)(3) and (a)(4), and to
therefore renumber the ‘‘infeasible
under the circumstances’’ condition
currently codified in § 171.204(a)(3) as
(a)(5).
The first new infeasibility condition
would apply to an actor’s practice of
denying a third party’s request to enable
use of EHI in order to modify EHI,
including but not limited to creation
and deletion functionality, provided the
request is not from a health care
provider requesting such use from an
actor that is its business associate. The
second new infeasibility condition
would apply where an actor has
exhausted the manner exception in
§ 171.301, including offering all
alternative manners in accordance with
§ 171.301(b), and the actor does not
currently provide a substantial number
of individuals or entities similarly
situated to the requestor with the same
requested access, exchange, or use of the
requested EHI.
We also seek comment on ways health
IT can support EHI segmentation for
access, exchange, and use of EHI; and
particularly how the Program, through
the certification of health IT to certain
functionalities and/or standards, can
support EHI segmentation for access,
exchange, and use, including to assist
health care providers with sharing EHI
consistent with patient preferences and
all laws applicable to the creation, use,
and sharing of EHI.
Additionally, in section IV.B, we
propose to add a Trusted Exchange
Framework and Common Agreement
(TEFCA) condition to the proposed
revised and renamed Manner Exception,
proposed to be codified in 45 CFR
171.301. This proposal aligns with a
foundational policy construct
underpinning the Manner Exception in
that it facilitates an actor reaching
agreeable terms with a requestor to
fulfill an EHI request and acknowledges
that certain agreements have been
reached between these parties for the
access, exchange, and use of EHI.
C. Costs and Benefits
E.O. 12866 on Regulatory Planning
and Review and E.O.13563 on
Improving Regulation and Regulatory
Review direct agencies to assess all
costs and benefits of available regulatory
alternatives and, if regulation is
necessary, to select regulatory
approaches that maximize net benefits
(including potential economic,
environmental, public health and safety
effects, distributive impacts, and
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
equity). Section 3(f) of Executive Order
12866 defines a ‘‘significant regulatory
action’’ as an action that is likely to
result in a rule that may: (1) have an
annual effect on the economy of $100
million or more in any 1 year, or
adversely and materially affecting a
sector of the economy, productivity,
competition, jobs, the environment,
public health or safety, or State, local or
Tribal governments or communities; (2)
create a serious inconsistency or
otherwise interfere with an action taken
or planned by another agency; (3)
materially alter the budgetary impacts of
entitlement grants, user fees, or loan
programs or the rights and obligations of
recipients thereof; or (4) raise novel
legal or policy issues arising out of legal
mandates, the President’s priorities, or
the principles set forth in the Executive
Order. A regulatory impact analysis
(RIA) must be prepared for major rules
with significant effects as per section
3(f)(1)) ($100 million or more in any one
year). OMB has determined that this
proposed rule is a significant rule as the
potential costs associated with this
proposed rule could be greater than
$100 million per year. Accordingly, we
have prepared an RIA that to the best of
our ability presents the costs and
benefits of this proposed rule. We have
estimated the potential monetary costs
and benefits of this proposed rule for
the health IT community, including
costs and benefits as they relate to
health IT developers, health care
providers, patients, and the Federal
Government (i.e., ONC), and have
broken those costs and benefits out by
section. In accordance with E.O. 12866,
we have included the RIA summary
table as Table 35.
We note that we have rounded all
estimates to the nearest dollar and that
all estimates are expressed in 2021
dollars as it is the most recent data
available to address all cost and benefit
estimates consistently. The wages used
to derive the cost estimates are from the
May 2021 National Occupational
Employment and Wage Estimates
reported by the U.S. Bureau of Labor
Statistics.17 We also note that estimates
presented in the following ‘‘Employee
Assumptions and Hourly Wage,’’
‘‘Quantifying the Estimated Number of
Health IT Developers and Products,’’
and ‘‘Number of End Users that Might
Be Impacted by ONC’s Proposed
Regulations’’ sections are used
throughout this RIA.
17 May 2021 National Occupational Employment
and Wage Estimates, United States. U.S. Bureau of
Labor Statistics. https://www.bls.gov/oes/current/
oes_nat.htm.
PO 00000
Frm 00011
Fmt 4701
Sfmt 4702
23755
We estimate that the total annual cost
for this proposed rule for the first year
after it is finalized (including one-time
costs), based on the cost estimates
outlined above and throughout this RIA,
would result in $742 million. The total
undiscounted perpetual cost over a 10year period for this proposed rule
(starting in year three), based on the cost
estimates outlined above, would result
in $712 million. We estimate the total
costs to health IT developers to be $742
million and estimate the government
(ONC) costs to be between $62,000 to
$124,000.
We estimate the total annual benefit
for this proposed rule, based on the
benefit estimates outlined above, would
be on average $1.0 billion. We estimate
the total undiscounted perpetual annual
net benefit for this proposed rule
(starting in year three), based on the
estimates outlined above, would be
$326 million.
II. Background
A. Statutory Basis
The Health Information Technology
for Economic and Clinical Health Act
(HITECH Act), Title XIII of Division A
and Title IV of Division B of the
American Recovery and Reinvestment
Act of 2009 (Pub. L. 111–5), was enacted
on February 17, 2009. The HITECH Act
amended the Public Health Service Act
(PHSA) and created ‘‘Title XXX—Health
Information Technology and Quality’’
(Title XXX) to improve healthcare
quality, safety, and efficiency through
the promotion of health IT and
electronic health information (EHI)
exchange.
The 21st Century Cures Act, Public
Law 114–255 (Cures Act), was enacted
on December 13, 2016, to accelerate the
discovery, development, and delivery of
21st century cures, and for other
purposes. The Cures Act, through Title
IV—Delivery, amended the HITECH Act
by modifying or adding certain
provisions to the PHSA relating to
health IT.
Section 119 of Title I, Division CC of
the Consolidated Appropriations Act,
2021, Public Law 116–260 (CAA),
enacted on December 27, 2020, requires
PDP sponsors of prescription drug plans
to implement one or more real-time
benefit tools (RTBTs) that meet the
requirements described in the statute,
after the Secretary has adopted a
standard for RTBTs and at a time
determined appropriate by the
Secretary. For purposes of the
requirement to implement a real-time
benefit tool in section 1860D–4(o)(1) of
the Social Security Act, described
above, the CAA provides that one of the
E:\FR\FM\18APP2.SGM
18APP2
23756
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
requirements for an RTBT is that it is
capable of integrating with electronic
prescribing and EHR systems of
prescribing healthcare professionals for
the transmission of formulary and
benefit information in real time to such
professionals. The statute requires
incorporation of RTBTs within both the
Medicare Part D prescription drug
program and the ONC Health IT
Certification Program (Program).
Specifically, the law amends the
definition of a ‘‘qualified electronic
health record’’ (qualified EHR) in
section 3000(13) of the PHSA to require
that a qualified EHR must include (or be
capable of including) an RTBT.
1. Standards, Implementation
Specifications, and Certification Criteria
The HITECH Act established two
Federal advisory committees, the Health
IT Policy Committee (HITPC) and the
Health IT Standards Committee
(HITSC). Each was responsible for
advising the National Coordinator for
Health Information Technology
(National Coordinator) on different
aspects of standards, implementation
specifications, and certification criteria.
Section 4003(e) of the Cures Act
amended sections 3002 and 3003 of the
PHSA by replacing, in an amended
section 3002, the HITPC and HITSC
with one committee named the Health
Information Technology Advisory
Committee (Health IT Advisory
Committee or HITAC). Section 3002(a)
of the PHSA, as added by the Cures Act,
establishes that the HITAC recommends
to the National Coordinator policies and
standards, implementation
specifications, and certification criteria,
relating to the implementation of a
health information technology
infrastructure, nationally and locally,
that advances the electronic access,
exchange, and use of health
information. Further described in
section 3002(b)(1) of the PHSA, this
includes recommending to the National
Coordinator a policy framework to
advance interoperable health
information technology infrastructure,
updating recommendations to the policy
framework, and making new
recommendations, as appropriate.
Section 3002(b)(2)(A) of the PHSA
specifies that in general, the HITAC
shall recommend to the National
Coordinator for purposes of adoption
under section 3004, standards,
implementation specifications, and
certification criteria and an order of
priority for the development,
harmonization, and recognition of such
standards, specifications, and
certification criteria. Like the process
previously required of the former HITPC
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
and HITSC, section 3002(b)(5) of the
PHSA requires the HITAC to develop a
schedule, updated annually, for the
assessment of policy recommendations,
which the Secretary publishes in the
Federal Register.
Section 3004 of the PHSA establishes
a process for the adoption of health IT
standards, implementation
specifications, and certification criteria
and authorizes the Secretary to adopt
such standards, implementation
specifications, and certification criteria.
As specified in section 3004(a)(1), the
Secretary is required, in consultation
with representatives of other relevant
federal agencies, to jointly review
standards, implementation
specifications, and certification criteria
endorsed by the National Coordinator
under section 3001(c) and subsequently
determine whether to propose the
adoption of such standards,
implementation specifications, or
certification criteria. Section 3004(a)(3)
requires the Secretary to publish all
such determinations in the Federal
Register.
Section 3004(b)(3) of the PHSA, titled,
Subsequent Standards Activity,
provides that the Secretary shall adopt
additional standards, implementation
specifications, and certification criteria
as necessary and consistent with the
schedule published by the HITAC. We
consider this provision in the broader
context of the HITECH Act and Cures
Act to grant the Secretary the authority
and discretion to adopt standards,
implementation specifications, and
certification criteria that have been
recommended by the HITAC and
endorsed by the National Coordinator,
as well as other appropriate and
necessary health IT standards,
implementation specifications, and
certification criteria.
2. Health IT Certification Program(s)
Section 3001(c)(5) of the PHSA
provides the National Coordinator with
the authority to establish a certification
program or programs for the voluntary
certification of health IT. Section
3001(c)(5)(A) specifies that the National
Coordinator, in consultation with the
Director of the National Institute of
Standards and Technology (NIST), shall
keep or recognize a program or
programs for the voluntary certification
of health IT that is in compliance with
applicable certification criteria adopted
under section 3004 of the PHSA. The
certification program(s) must also
include, as appropriate, testing of the
technology in accordance with section
13201(b) of the HITECH Act. Section
13201(b) of the HITECH Act requires
that, with respect to the development of
PO 00000
Frm 00012
Fmt 4701
Sfmt 4702
standards and implementation
specifications, the Director of NIST shall
support the establishment of a
conformance testing infrastructure,
including the development of technical
test beds. Section 13201(b) also
indicates that the development of this
conformance testing infrastructure may
include a program to accredit
independent, non-federal laboratories to
perform testing.
Section 4003(b) of the Cures Act
added section 3001(c)(9)(B)(i) to the
PHSA, which requires the National
Coordinator ‘‘to convene appropriate
public and private stakeholders’’ with
the goal of developing or supporting a
Trusted Exchange Framework and a
Common Agreement (collectively,
TEFCA) for the purpose of ensuring full
network-to-network exchange of health
information. Section 3001(c)(9)(B)
outlines provisions related to the
establishment of a Trusted Exchange
Framework for trust policies and
practices and a Common Agreement for
exchange between health information
networks (HINs)—including provisions
for the National Coordinator, in
collaboration with the NIST, to provide
technical assistance on implementation
and pilot testing of TEFCA. Section
3001(c)(9)(C) requires the National
Coordinator to publish TEFCA on its
website and in the Federal Register.
Section 4002(a) of the Cures Act
amended section 3001(c)(5) of the PHSA
by adding section 3001(c)(5)(D), which
requires the Secretary, through notice
and comment rulemaking, to require
conditions of certification and
maintenance of certification for the
Program. Specifically, the health IT
developers or entities with technology
certified under the Program must, in
order to maintain such certification
status, adhere to certain conditions and
maintenance of certification
requirements concerning information
blocking; assurances regarding
appropriate exchange, access, and use of
electronic health information;
communications regarding health IT;
application programing interfaces
(APIs); real world testing; attestations
regarding certain conditions and
maintenance of certification
requirements; and submission of
reporting criteria under the EHR
Reporting Program in accordance with
section 3009A(b) of the PHSA.
B. Regulatory History
The Secretary issued an interim final
rule with request for comments on
January 13, 2010, ‘‘Health Information
Technology: Initial Set of Standards,
Implementation Specifications, and
Certification Criteria for Electronic
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
Health Record Technology’’ (75 FR
2014), which adopted an initial set of
standards, implementation
specifications, and certification criteria.
On March 10, 2010, the Secretary issued
a proposed rule, ‘‘Proposed
Establishment of Certification Programs
for Health Information Technology’’ (75
FR 11328), that proposed both
temporary and permanent certification
programs for the purposes of testing and
certifying health IT. A final rule
establishing the temporary certification
program was published on June 24,
2010, ‘‘Establishment of the Temporary
Certification Program for Health
Information Technology’’ (75 FR 36158),
and a final rule establishing the
permanent certification program was
published on January 7, 2011,
‘‘Establishment of the Permanent
Certification Program for Health
Information Technology’’ (76 FR 1262).
We have engaged in multiple
rulemakings to update standards,
implementation specifications,
certification criteria, and the
certification program, a history of which
can be found in the October 16, 2015,
final rule ‘‘2015 Edition Health
Information (Health IT) Certification
Criteria, 2015 Edition Base Electronic
Health Record (EHR) Definition, and
ONC Health IT Certification Program
Modifications’’ (80 FR 62602) (2015
Edition Final Rule). The history can be
found at 80 FR 62606. A correction
notice was published for the 2015
Edition Final Rule on December 11,
2015 (80 FR 76868), to correct preamble
and regulatory text errors and clarify
requirements of the Common Clinical
Data Set (CCDS), the 2015 Edition
privacy and security certification
framework, and the mandatory
disclosures for health IT developers.
The 2015 Edition Final Rule
established a new edition of
certification criteria (‘‘2015 Edition
health IT certification criteria’’ or ‘‘2015
Edition’’) and a new 2015 Edition Base
EHR definition. The 2015 Edition
established the minimum capabilities
and specified the related minimum
standards and implementation
specifications that certified electronic
health record technology (CEHRT)
would need to include to support the
achievement of ‘‘meaningful use’’ by
eligible clinicians, eligible hospitals,
and critical access hospitals under the
Medicare and Medicaid EHR Incentive
Programs (EHR Incentive Programs)
(now referred to as the Promoting
Interoperability (PI) Programs) when the
2015 Edition is required for use under
these and other programs referencing
the CEHRT definition. The final rule
also adopted a proposal to change the
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
Program’s name to the ‘‘ONC Health IT
Certification Program’’ from the ONC
HIT Certification Program, modified the
Program to make it more accessible to
other types of health IT beyond EHR
technology and for health IT that
supports care and practice settings
beyond the ambulatory and inpatient
settings, and adopted new and revised
Principles of Proper Conduct (PoPC) for
ONC-Authorized Certification Bodies
(ONC–ACBs).
After issuing a proposed rule on
March 2, 2016, ‘‘ONC Health IT
Certification Program: Enhanced
Oversight and Accountability’’ (81 FR
11056), we published a final rule by the
same title (81 FR 72404) (EOA Final
Rule) on October 19, 2016. The EOA
Final Rule finalized modifications and
new requirements under the Program,
including provisions related to our role
in the Program. The final rule created a
regulatory framework for our direct
review of health IT certified under the
Program, including, when necessary,
requiring the correction of nonconformities found in health IT certified
under the Program and suspending and
terminating certifications issued to
Complete EHRs and Health IT Modules.
The final rule also set forth processes for
us to authorize and oversee accredited
testing laboratories under the Program.
In addition, it included provisions for
expanded public availability of certified
health IT surveillance results.
On March 4, 2019, the Secretary
published a proposed rule titled, ‘‘21st
Century Cures Act: Interoperability,
Information Blocking, and the ONC
Health IT Certification Program’’ (84 FR
7424) (ONC Cures Act Proposed Rule).
The proposed rule proposed to
implement certain provisions of the
Cures Act that would advance
interoperability and support the access,
exchange, and use of electronic health
information. We also requested
comment in the ONC Cures Act
Proposed Rule (84 FR 7467) as to
whether certain health IT developers
should be required to participate in
TEFCA as a means of providing
assurances to their customers and ONC
that they are not taking actions that
constitute information blocking or any
other action that may inhibit the
appropriate exchange, access, and use of
EHI, with the goal of developing or
supporting TEFCA for the purpose of
ensuring full network-to-network
exchange of health information.
On May 1, 2020, a final rule was
published titled, ‘‘21st Century Cures
Act: Interoperability, Information
Blocking, and the ONC Health IT
Certification Program’’ (85 FR 25642)
(ONC Cures Act Final Rule). This final
PO 00000
Frm 00013
Fmt 4701
Sfmt 4702
23757
rule implemented certain provisions of
the Cures Act, including Conditions and
Maintenance of Certification
requirements for health information
technology (health IT) developers, the
voluntary certification of health IT for
use by pediatric health providers, and
reasonable and necessary activities that
do not constitute information blocking.
The final rule also implemented certain
parts of the Cures Act to support
patients’ access to their EHI, and the
implementation of information blocking
policies that support patient electronic
access. Additionally, the final rule
modified the 2015 Edition health IT
certification criteria and Program in
other ways to advance interoperability,
enhance health IT certification, and
reduce burden and costs, as well as
improving patient and health care
provider access to EHI and promoting
competition. On November 4, 2020, the
Secretary published an interim final
rule with comment period titled,
‘‘Information Blocking and the ONC
Health IT Certification Program:
Extension of Compliance Dates and
Timeframes in Response to the COVID–
19 Public Health Emergency’’ (85 FR
70064) (Cures Act Interim Final Rule).
The interim final rule extended certain
compliance dates and timeframes
adopted in the ONC Cures Act Final
Rule to offer the healthcare system
additional flexibilities in furnishing
services to combat the COVID–19
pandemic, including extending the
applicability date for information
blocking provisions to April 5, 2021.
On January 19, 2022, we published a
notice titled, ‘‘Notice of Publication of
the Trusted Exchange Framework and
Common Agreement’’ (87 FR 2800)
(‘‘TEFCA’’). The notice fulfilled an
obligation under section 3001(c)(9)(C) of
the PHSA, which requires the National
Coordinator for Health Information
Technology to publish on the Office of
the National Coordinator for Health
Information Technology’s public
internet website, and in the Federal
Register, the trusted exchange
framework and common agreement
developed under the PHSA.
III. ONC Health IT Certification
Program Updates
A. ‘‘The ONC Certification Criteria for
Health IT ’’ and Discontinuing Year
Themed ‘‘Editions’’
ONC first introduced the concept of
an ‘‘edition’’ of ONC health IT
certification criteria in 2012. In March
2012, in the 2014 Edition Proposed
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
23758
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
Rule,18 to make a clear distinction
between the certification criteria
finalized in the 2010 ONC ‘‘Health
Information Technology: Initial Set of
Standards, Implementation
Specifications, and Certification Criteria
for Electronic Health Record
Technology’’ interim final rule (75 FR
20132047) and adopted in §§ 170.302,
170.304, and 170.306 (to support ‘‘Stage
1 meaningful use criteria’’) and the
certification criteria proposed for
adoption in § 170.314 (to support ‘‘Stage
2 meaningful use criteria’’) (77 FR
13832), we discussed that we would use
an ‘‘edition’’ naming approach for the
sets of certification criteria subsequently
adopted by the Secretary (77 FR 13836).
We stated that we would refer to the
certification criteria adopted in
§§ 170.302, 170.304, and 170.306
collectively as the ‘‘2011 Edition EHR
certification criteria’’ and that the
certification criteria adopted in
§ 170.314 would be referred to as the
‘‘2014 Edition EHR certification
criteria’’ (77 FR 13836). We finalized
this approach and adopted a ‘‘2014
Edition’’ in a September 2012 final rule
(77 FR 54163) (the 2014 Edition Final
Rule). Overall, we created the concept of
certification criteria ‘‘editions’’ with the
expectation that it would make it easier
for developers of certified health IT and
health care providers to quickly
determine the certification criteria to
which their health IT would need to be
certified to remain in compliance with
CMS program requirements regarding
the use of certified EHR technology
(CEHRT) (77 FR 54167).
We coined the ‘‘2011 Edition’’ and
‘‘2014 Edition’’ because the edition’s
name was designed to coincide with the
first year in which compliance with that
edition of certification criteria was
required for use under the Medicare and
Medicaid EHR Incentive Programs (79
FR 54431). We thought this approach
would simplify communications related
to the certification criteria editions and
enable clear compliance statements like
‘‘an EP needs to be using 2014 Edition
CEHRT when they demonstrate
meaningful use . . . in CY 2014’’ (79 FR
54431). This approach resulted for many
people in a direct, and limited in scope,
link between certification criteria
editions and ‘‘meaningful use’’ even
though these certification criteria were
already being referenced by other HHS
programs (e.g., the CMS and HHS Office
of the Inspector General (OIG) final
18 Health
Information Technology: Standards,
Implementation Specifications, and Certification
Criteria for Electronic Health Record Technology,
2014 Edition; Revisions to the Permanent
Certification Program for Health Information
Technology (77 FR 13832).
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
rules to modify the Physician SelfReferral Law exception and Antikickback Statute safe harbor for certain
EHR donations (78 FR 78751) and (78
FR 79202), respectively).19
In September 2014, we issued a final
rule to update the 2014 Edition with
‘‘2014 Edition Release 2’’ certification
criteria and to remove the 2011 Edition
from the Code of Federal Regulations
(CFR) starting in 2015 (79 FR 54430). At
that time, EHR technology certified to
the 2011 Edition had become outmoded,
no longer met the CEHRT definition,
and no longer supported an acceptable
level of interoperability (79 FR 54447).
Further, as referenced by OIG and CMS
in the rulemakings completed by those
agencies around donations of EHR items
and services, we had planned to retire
old or no longer applicable certification
criteria editions ((78 FR 79205) and (78
FR 78754), respectively). During this
same time period, we jointly issued
with CMS a final rule (79 FR 52910) that
allowed for continued use of 2011
Edition CEHRT in combination with
2014 Edition CEHRT within 2014,
which allowed for certain providers to
meet meaningful use requirements with
EHRs certified to the 2011 or the 2014
Edition criteria, or a combination of
both editions, for an EHR Reporting
Period in 2014.20 The rule also extended
Stage 2 through 2016, meaning that
providers who first attested to
meaningful use in 2011 or 2012 would
remain in Stage 2 for an additional year
(79 FR 52926). These actions further
demonstrated that linking a certification
criteria edition’s year to any other
program’s compliance date had
drawbacks and could ultimately confuse
the original intent of the edition’s year
selection. This experience also
highlighted unintended negative
impacts stemming from this approach of
packaging all ONC certification criteria
into discrete editions, even where those
editions might have overlapping
criteria. Specifically, the editions
approach had two major negative
impacts relating to how updates were
implemented: (1) it required all
19 The CMS final rule is titled ‘‘Medicare
Program; Physicians’ Referrals to Health Care
Entities with Which They Have Financial
Relationships: Exception for Certain Electronic
Health Records Arrangements’’ (78 FR 78751). The
OIG final rule is titled ‘‘Medicare and State Health
Care Programs: Fraud and Abuse; Electronic Health
Records Safe Harbor Under the Anti-Kickback
Statute’’ (78 FR 79201).
20 The CMS final rule is titled ‘‘Medicare and
Medicaid Programs; Modifications to the Medicare
and Medicaid Electronic Health Record (EHR)
Incentive Program for 2014 and Other Changes to
the EHR Incentive Program; and Health Information
Technology: Revisions to the Certified EHR
Technology Definition and EHR Certification
Changes Related to Standards’’ (79 FR 52909).
PO 00000
Frm 00014
Fmt 4701
Sfmt 4702
developers and providers to update
their systems by a specific date, and (2)
it required all developers and providers
to update their systems to all edition
criteria even where criteria may overlap
or only have minor revisions between
editions.
Accordingly, we set out to establish a
simpler approach that could be used for
future certification criteria editions.
First, we intentionally adopted an
overlapping transition period from any
one edition to a subsequent edition (e.g.,
the 2014 Edition to the subsequent
edition). Second, we modified our
approach to name the edition for the
year in which the final rule was
published, and subsequent rulemakings
that include additional criteria or
alternatives to previously adopted
certification criteria would be added to
the most current edition of certification
criteria (79 FR 54431). To further clarify,
we stated that a rulemaking that does
not adopt an edition of certification
criteria would be referred to as ‘‘[current
edition year] Release #X’’ (79 FR 54431).
We intended this approach to provide
the public with predictable naming
expectations for future editions and to
support ONC’s broader interests to have
the Program be generally accessible to
other programs designed to use certified
health IT, either within or outside
government. Developers of certified
health IT and health care providers that
sought to leverage the Program would
then be able to choose which edition of
certification criteria (or subset of criteria
within an edition) was most relevant
and appropriate for their program needs
for the time their program requirements
would be applicable (79 FR 54431).
Following this approach, in 2015,
ONC issued a final rule, ‘‘2015 Edition
Health Information Technology (Health
IT) Certification Criteria, 2015 Edition
Base Electronic Health Record (EHR)
Definition, and ONC Health IT
Certification Program Modifications,’’
(2015 Edition Final Rule) and adopted
the ‘‘2015 Edition Health IT
Certification Criteria’’ (80 FR 62602).
We codified the 2015 Edition
certification criteria in § 170.315 to set
them apart from other editions of
certification criteria (80 FR 62608).
Importantly, the program compliance
requirements for certain health care
providers to use 2015 Edition certified
health IT was ultimately set by CMS to
start in 2019 (83 FR 41144).21
21 The CMS final rule is titled ‘‘Medicare
Program; Hospital Inpatient Prospective Payment
Systems for Acute Care Hospitals and the LongTerm Care Hospital Prospective Payment System
and Policy Changes and Fiscal Year 2019 Rates;
Quality Reporting Requirements for Specific
Providers; Medicare and Medicaid Electronic
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
Four years later, as part of
implementation of the 21st Century
Cures Act, we issued the 21st Century
Cures Act: Interoperability, Information
Blocking, and the ONC Health IT
Certification Program Proposed Rule (84
FR 7424) to update to the 2015 Edition,
mindful that 2015 Edition certified
health IT was just being implemented.
In 2020, we published the ONC Cures
Act Final Rule (85 FR 25642) and
adopted updates to the 2015 Edition.
These updates included new
certification criteria, standards, and
requirements, as well as incremental
revisions to existing 2015 Edition
certification criteria to better enable
interoperability and the access,
exchange, and use of EHI (85 FR 25664–
65). Because we did not adopt a new
edition of certification criteria in a
different CFR section, we retained the
overall 2015 Edition title for the changes
included in the ONC Cures Act Final
Rule and made specific timebound
compliance changes within certification
criteria.
In the final rule, we stated that we
considered a variety of factors when we
determined to update the 2015 Edition
rather than adopt a new ‘‘edition.’’ First,
we reviewed the scope of each proposed
update and the cumulative scope of the
proposals overall for health IT
developers and sought to identify
whether it would be more appropriate to
require health IT developers
participating in the Program to
implement updates to Health IT
Modules certified to the 2015 Edition or
to test and certify health IT products to
an entirely new edition of certification
criteria. Second, we considered the
impact that either approach would have
on health care providers, including how
such updated Health IT Modules or
products certified to a new edition
would be implemented by providers
participating in CMS programs. We also
noted that historically, with a new
edition of certification criteria, health IT
developers have packaged Health IT
Modules certified to new, revised, and
unchanged criteria into a wholly new
certified product. We observed that
historical data indicated that these
complete updates to the edition were
particularly challenging for both health
IT developers seeking certification and
for health care providers as they
establish deadlines for a significant
number of health IT developers to
Health Record (EHR) Incentive Programs
(Promoting Interoperability Programs)
Requirements for Eligible Hospitals, Critical Access
Hospitals, and Eligible Professionals; Medicare Cost
Reporting Requirements; and Physician
Certification and Recertification of Claims’’ (83 FR
41144).
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
support and implement new products
for a significant number of health care
providers simultaneously. As a result,
the burden of updating the technology
is compounded for both health IT
developers and health care providers
(85 FR 25665).
Our intent with this approach was to
maintain a single set of certification
criteria that have been updated to
include the most recent versions of
adopted standards, and to establish an
incremental approach to health IT
updates over time. In the ONC Cures
Act Final Rule, we stated our belief that
this approach should also include
development timelines based on the
updates required for each criterion and
a transition period allowing for multiple
standards to be used for a reasonable
period of time. We noted our belief that,
as a whole, this approach can help to
reduce the burden on health IT
developers and health care providers
and could allow health IT developers to
implement updates in the manner most
appropriate for their product and their
customers (85 FR 25665). Commenters
noted this approach would provide
stability and that an incremental
approach best serves the health care
provider and health IT developer
community (85 FR 25664).
However, in response to public
comment related to how we
communicate and avoid public
confusion (85 FR 25666), we
distinguished the ‘‘original’’ 2015
Edition certification criteria from the
new and revised 2015 Edition
certification criteria by referring to the
updates we adopted as the 2015 Edition
‘‘Cures Update’’ certification criteria.
Subsequent to publication of the final
rule, through public meetings and
correspondence, we have been informed
that the continued use and reference to
the 2015 Edition inaccurately implied
an age and outdatedness to the
certification criteria we had adopted.
More importantly, we have received
significant positive feedback expressing
that the incremental approach to
updates is generally beneficial as a longterm approach. Specifically, feedback
conveyed that a consistent, transparent,
incremental update cycle that includes
the following features would be
preferred by some: (1) regular updates to
recognize standards advancement and
an allowance for voluntary standards
advancement between updates, (2)
incremental updates rather than
‘‘wholesale’’ product overhauls, (3) a
predictable timeline for updates based
on standards development cycles with
reasonable development timelines, and
(4) a reasonable development timeline
PO 00000
Frm 00015
Fmt 4701
Sfmt 4702
23759
for any new criterion based on the
specific development needs.
For these reasons, we no longer
believe that it is helpful or necessary to
maintain an ‘‘edition’’ naming
convention and to adopt entirely new
editions of certification criteria to
encapsulate updates over time. Instead,
we believe that there should be a single
set of certification criteria, which would
be updated in an incremental fashion in
closer alignment to standards
development cycles and regular health
IT development timelines. We therefore
propose to rename all certification
criteria within the Program simply as
‘‘ONC Certification Criteria for Health
IT.’’ We believe maintaining a single set
of ‘‘ONC Certification Criteria for Health
IT’’ would create more stability for users
of health IT and Program partners, such
as CMS, as well as make it easier for
developers of certified health IT to
maintain their product certificates over
time. In addition, we believe that this
approach will have the benefit of
reducing administrative burden for
health IT developers participating in the
Program. Previously, duplicative
references to separate certification
criteria under multiple year-themed
editions created administrative burden
on developers, as they had the effect of
requiring health IT developers to seek
an updated certificate attributed to the
‘‘new’’ duplicated certification criterion
even in circumstances when the
certification criterion remained
substantively unchanged. Under this
proposal, unchanged certification
criteria would no longer be duplicated
as separate criteria under multiple
editions. Accordingly, we propose to
rename § 170.315 as the ‘‘ONC
Certification Criteria for Health IT’’ and
replace all references throughout 45
CFR part 170 to the ‘‘2015 Edition’’ with
this new description (this would impact
the wording, though not the substance
or effect, of §§ 170.102, 170.405,
170.406, 170.523, 170.524, and 170.550,
as shown in proposed revised regulation
text, below). We welcome public
comment on this proposal.
In the 2014 Edition Final Rule we
defined the terms ‘‘new,’’ ‘‘revised,’’ and
‘‘unchanged’’ to both describe the
differences between the 2014 Edition
certification criteria and the 2011
Edition certification criteria, as well as
establish what certification criteria in
the 2014 Edition were eligible for gap
certification 22 (see 77 FR 54171, 54202,
22 Gap certification means the certification of a
previously certified Health IT Module(s) to:
(1) All applicable new and/or revised certification
criteria adopted by the Secretary at subpart C of this
E:\FR\FM\18APP2.SGM
Continued
18APP2
23760
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
and 54248). Beginning with the 2015
Edition, ‘‘Complete EHR’’ certifications
were no longer issued (see also 79 FR
54443 through 54445) and, as part of our
effort to make the Program more open
and accessible to other healthcare and
practice settings, we also defined these
terms for the purpose of a gap
certification analysis as follows:
• ‘‘New’’ certification criteria are
those that as a whole only include
capabilities never referenced in
previously adopted certification criteria
editions and to which a Health IT
Module presented for certification to the
2015 Edition could have never
previously been certified.
• ‘‘Revised’’ certification criteria are
those that include the capabilities
referenced in a previously adopted
edition of certification criteria as well as
changed or additional new capabilities;
and to which a Health IT Module
presented for certification to the 2015
Edition could not have been previously
certified to all of the included
capabilities.
• ‘‘Unchanged’’ certification criteria
are those that include the same
capabilities as compared to prior
certification criteria of adopted editions;
and to which a Health IT Module
presented for certification to the 2015
Edition could have been previously
certified to all of the included
capabilities (80 FR 62608).
We propose that these same concepts
as applied to the certification criteria
would continue to be used by the
Program in the absence of a year named
‘‘edition.’’ However, for clarity, we now
propose to define ‘‘revised certification
criterion (or criteria)’’ in § 170.102 to
mean a certification criterion that meets
at least one of the following: (1) has
added or changed the functions or
capabilities described in the existing
criterion in 45 CFR 170 part C; (2) has
an added or changed standard or
implementation specification referenced
in the existing criterion in 45 CFR part
170 subpart B; or (3) is specified
through notice and comment
rulemaking as an iterative or
replacement version of an existing
criterion in 45 CFR part 170 subpart C.
By way of example, proposed
provisions (1) and (2) were met in
§ 170.315(b)(3) in the ONC Cures Act
Final Rule (85 FR 25683) because we
modified this criterion to include new
functions or capabilities in
§ 170.315(b)(3)(ii)(A)(7) through (9) that
did not exist in § 170.315(b)(3). Also, in
§ 170.315(b)(3), in the ONC Cures Act
Final Rule we added cross-references to
the NCPDP SCRIPT standard version
2017071 in § 170.315(b)(3)(ii)(A) and
(b)(3)(ii)(B), which did not exist in
§ 170.315(b)(3). An example of proposed
provision (3) can be found in the ONC
Cures Act Final Rule in § 170.315(b)(6)
‘‘Data export’’ being replaced by
§ 170.315(b)(10) ‘‘Electronic Health
Information export’’ (85 FR 25699). If
finalized as proposed there would not
be an ‘‘edition’’ to differentiate between
such revisions to existing criteria;
instead, such criteria would be
considered ‘‘revised’’ until a subsequent
rulemaking where no further revision to
the criterion renders them
‘‘unchanged.’’
We would continue to use these terms
when: communicating proposals for
future criteria, such as revising a
criterion that will maintain its place in
the CFR or establishing a new criterion
that is an iterative or replacement
criterion in the Program; establishing
scenarios for when gap certification is
an option for developers of certified
health IT; and when setting expiration
dates or applicable timelines related to
standards and certification criteria.
Through the development of
educational resources, such as fact
sheets 23 and resource guides,24 these
designations will help users and the
public understand to which versions of
standards and certification criteria a
Health IT Module may be certified when
multiple versions of standards or
certification criteria are available under
the Program. In this proposed rule, we
propose applicability or implementation
timelines for both our certification
criteria and the standards adopted in 45
CFR part 170 by establishing the dates
by which an existing version of a
criterion is no longer applicable and by
establishing a date by when a new or
revised certification criterion or
standard version is adopted. For
example, if finalized as proposed, a user
and the public would know that a
Health IT Module certified to ‘‘revised’’
§ 170.315(b)(1) would support USCDI v3
(§ 170.213(b)) after January 1, 2025,
because we state that USCDI v1 expires
on January 1, 2025, in § 170.213(a).
We propose the following revised
standards and implementation
specifications: § 170.205(a);
§§ 170.207(a), (c), (d), (e), (f), (m), (n),
(o), (p), (r), and (s); § 170.210(g);
§ 170.213; § 170.215(b), and
§ 170.215(c). We propose new standards
and implementation specifications in
§ 170.205(t) and § 170.205(o). Table 1
below includes the proposed new and
revised certification criteria described in
this rule.
TABLE 1—LIST OF PROPOSED HEALTH IT CERTIFICATION CRITERIA
New Certification Criterion
§ 170.315(d)(14) ...................
Privacy and security—Patient Requested Restrictions.
Revised Certification Criteria
ddrumheller on DSK120RN23PROD with PROPOSALS2
§ 170.315(a)(5) .....................
§ 170.315(a)(9) .....................
§ 170.315(b)(1) .....................
§ 170.315(b)(2) .....................
§ 170.315(e)(1) .....................
§ 170.315(f)(5) ......................
§ 170.315(g)(10) ...................
Clinical—Patient demographics and observations (currently Demographics).
Clinical—Clinical decision support (CDS) (to be recategorized as ‘‘Care Coordination § 170.315(b)(11)’’).
Care Coordination—Transitions of care.
Care Coordination—Clinical information reconciliation and incorporation.
Patient Engagement—View, download, and transmit to 3rd party.
Public Health—Transmission to public health agencies—electronic case reporting.
Design and Performance—Standardized API for patient and population services.
Revised Certification Criteria (standards updates)
§ 170.315(a)(12) ...................
§ 170.315(b)(6) .....................
Clinical—Family health history.
Care Coordination—Data export.
part based on test results issued by a NVLAPaccredited testing laboratory under the ONC Health
IT Certification Program or an ONC–ATL; and
(2) All other applicable certification criteria
adopted by the Secretary at subpart C of this part
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
based on the test results used to previously certify
the Complete EHR or Health IT Module(s) under the
ONC Health IT Certification Program (§ 170.502).
PO 00000
Frm 00016
Fmt 4701
Sfmt 4702
23 See 2015 Edition Cures Update Fact Sheet:
https://www.healthit.gov/sites/default/files/page/
2022-03/Cures-Update-Fact-Sheet.pdf.
24 See API Resource Guide: https://onchealthit.github.io/api-resource-guide/.
E:\FR\FM\18APP2.SGM
18APP2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
23761
TABLE 1—LIST OF PROPOSED HEALTH IT CERTIFICATION CRITERIA—Continued
ddrumheller on DSK120RN23PROD with PROPOSALS2
§ 170.315(b)(9) .....................
§ 170.315(c)(4) .....................
§ 170.315(f)(1) ......................
§ 170.315(f)(3) ......................
§ 170.315(f)(4) ......................
§ 170.315(g)(3) .....................
§ 170.315(g)(6) .....................
§ 170.315(g)(9) .....................
Care Coordination—Care plan.
Clinical Quality Measures—Clinical quality measures—filter.
Public Health—Transmission to immunization registries.
Public Health—Transmission to public health agencies—reportable laboratory tests and values/results.
Public Health—Transmission to cancer registries.
Design and Performance—Safety-enhanced design.
Design and Performance—Consolidated CDA creation performance.
Design and Performance—Application access—all data request.
When we published the 2015 Edition
Final Rule, ONC released educational
resources to inform the public.
Educational and communication
resources included charts on the 2015
Edition certification criteria, readerfriendly fact sheets on specific topics
like addressing health disparities and
patient engagement, the Companion
Certification Guides, and a new ‘‘2015
Edition Standards Hub’’ to help
interested parties quickly crosswalk and
identify standards referenced by 2015
Edition certification criteria. While our
proposal may have the near-term effect
of requiring ONC to revise existing
communications materials, as well as
conforming regulatory updates and
updates to materials by other agencies
such as CMS that reference the 2015
Edition, we believe the overall benefit of
having a single ONC branded set of
certification criteria outweighs the
burdens that result administratively, as
well as for developers of certified health
IT and their customers, from rolling out
a new ‘‘edition.’’ Moreover, starting
with the ONC Cures Act Final Rule, we
developed a new approach for
conformance requirement changes
within certification criteria that, when
applied in conjunction with this
proposed approach, can also reduce
administrative and regulatory burden
and help to ensure the updates to
criteria are clearly defined to support
both a transition period and a
predictable development timeline
aligned to the scope of the specific
update. In the ONC Cures Act Final
Rule, we did not create a new CFR
section as we had done previously but
instead updated the existing CFR
section, § 170.315. The new approach
was designed to make it clear for health
IT developers, as well as ONCAuthorized Testing Labs (ONC–ATLs)
and ONC–ACBs, how long certain
capabilities and standards remain
available for the purposes of
certification. We also implemented new
Maintenance of Certification
requirements as a result of the Cures Act
to give health IT developers specific
deadlines relative to complying with
updated technical requirements, while
still allowing developers to continue
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
supporting technology certified to the
prior version of certification criteria or
standards for use by their customers.
Building upon this approach, in this
proposed rule, we also propose
modifications to our approach for
setting applicability or implementation
timelines for both our certification
criteria and the standards adopted in 45
CFR part 170. This approach includes
establishing the dates by which an
existing version of a certification
criterion is no longer applicable because
a new or revised version of that criterion
is adopted. In addition, we have
proposed to establish applicable
timelines, including expiration dates,
for the adoption of standards when a
new or revised version of the standard
is adopted for the same purpose. This
proposed approach would support the
ongoing establishment of clear timelines
associated with the specific criterion or
standard in alignment with the
development and update cycle for that
specific criterion or standard—again
supporting an incremental and flexible
approach.
In addition, we believe this approach
would facilitate ease of reference for
federal, state, local or tribal programs
seeking to align their program
requirements to the standards and
implementation specifications available
in certified health IT. These programs
may not require use of the entirety of
the Base EHR, or they may not even
require the use of certified health IT, but
they may still seek to align to a specific
certification criterion or a specific
standard where applicable to their
program goals and consistent with their
applicable authorities. Furthermore, as
we move away from the use of editions
to define updated timelines, we believe
it is important to continue to provide
clarity on existing Program
requirements and to ensure that
customers are provided with timely
technology updates. We therefore
propose to incorporate the applicable
timelines and expiration dates for
functional and standards updates within
each individual criterion or standard. In
section III.C.11 of this proposed rule, we
propose to make explicit in the
introductory text in § 170.315 that
PO 00000
Frm 00017
Fmt 4701
Sfmt 4702
health IT developers voluntarily
participating in the Program must
update their certified Health IT Modules
and provide that updated certified
health IT to customers in accordance
with the timelines defined for each
criterion and standard if they intend to
maintain certification of the Health IT
Module. (For ease of reference and
reading, we use ‘‘developer of certified
health IT’’ in this proposed rule to
reference developers who voluntarily
participate in the Program). We believe
this approach will also help to advance
interoperability. Under this proposal, a
developer of certified health IT would
not be required to provide technology
updates for certification criteria or
standards to a user who declined such
updates. However, we note that if such
an update is not provided, and the
Health IT Module was previously
certified to a criterion or criteria that
now make it subject to a ‘‘revised’’
criterion or criteria, the Health IT
Module would no longer be certified
under the Program, in the same manner
that previously removed or expired
‘‘editions’’ are no longer certified under
the Program.
We direct readers to section III.C.11 of
this proposed rule for further discussion
of the requirements for health IT
developers voluntarily participating in
the Program related to health IT
certification updates.
In the ONC Cures Act Final Rule, we
revised the Principles of Proper Conduct
for ONC–ACBs and ONC–ATLs by
revising the records retention policies to
include the ‘‘life of the edition’’ (85 FR
25710 through 25713). Specifically, we
clarified that the records retention
provisions in §§ 170.523 and 170.524
included the ‘‘life of the edition’’ as well
as three years after the retirement of an
edition related to the certification of
Complete EHRs and Health IT Modules.
We explained that ‘‘[b]ecause the ‘life of
the edition’ begins with the codification
of an edition of certification criteria in
the CFR and ends on the effective date
of the final rule that removes the
applicable edition from the CFR, the
start and end dates for the ‘life of the
edition’ are published in the Federal
Register in the rulemaking actions that
E:\FR\FM\18APP2.SGM
18APP2
23762
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
finalize them. The period of three years
beyond the ‘life of the edition’ begins on
the effective date of the final rule that
removes the applicable edition from the
CFR, thus the three-year period after
removal from the CFR continues
through three full calendar years
following that date’’ (85 FR 25710).
Because in this proposed rule we
propose to maintain a single set of
‘‘ONC Certification Criteria for Health
IT’’ and not an edition, we propose to
revise § 170.523 and § 170.524. We
propose that the period of three years
begins on the effective date of the final
rule that removes the applicable ONC
certification criterion or criteria for
health IT from the CFR, thus the threeyear period after removal from the CFR
continues through three full calendar
years following that date (in addition to
the calendar year in which it was
removed). We also retain the ‘‘Complete
EHR’’ language in these sections
because beginning with the 2015
Edition, Complete EHR certifications
could no longer be issued. However,
since the 2014 Edition was not removed
from the CFR until the ONC Cures Act
Final Rule, which became effective on
June 30, 2020, records would need to be
retained (including Complete EHRs)
until June 30, 2023.
ddrumheller on DSK120RN23PROD with PROPOSALS2
B. Standards and Implementation
Specifications
1. National Technology Transfer and
Advancement Act
The National Technology Transfer
and Advancement Act (NTTAA) of 1995
(15 U.S.C. 3701 et seq.) and the Office
of Management and Budget (OMB)
Circular A–119 25 require the use of,
wherever practical, technical standards
that are developed or adopted by
voluntary consensus standards bodies to
carry out policy objectives or activities,
with certain exceptions. The NTTAA
and OMB Circular A–119 provide
exceptions to electing only standards
developed or adopted by voluntary
consensus bodies, namely when doing
so would be inconsistent with
applicable law or otherwise impractical.
Agencies have the discretion to decline
the use of existing voluntary consensus
standards if it is determined that such
standards are inconsistent with
applicable law or otherwise impractical,
and instead use a government-unique
standard or other standard. In addition
to the consideration of voluntary
consensus standards, the OMB Circular
A–119 recognizes the contributions of
standardization activities that take place
25 https://www.whitehouse.gov/wp-content/
uploads/2020/07/revised_circular_a-119_as_of_1_
22.pdf.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
outside of the voluntary consensus
standards process. Therefore, in
instances where use of voluntary
consensus standards would be
inconsistent with applicable law or
otherwise impracticable, other
standards should be considered that
meet the agency’s regulatory,
procurement or program needs, deliver
favorable technical and economic
outcomes, and are widely utilized in the
marketplace. In this proposed rule, we
use voluntary consensus standards
except for:
• The United States Core Data for
Interoperability (USCDI), October 2022
Errata, Version 3 (v3) standard. We
propose to adopt USCDI v3 (October
2022 Errata) in § 170.213. This standard
is a hybrid of government policy (i.e.,
determining which data to include in
the USCDI) and voluntary consensus
standards (i.e., the vocabulary and code
set standards attributed to USCDI data
elements); and
• The standard we propose to adopt
in § 170.207(f)(3) for race and ethnicity.
We are not aware of any voluntary
consensus standards that could serve as
an alternative for the purposes we
describe in further detail throughout
this proposed rule including
establishing a baseline set of data that
can be commonly exchanged across care
settings for a wide range of uses. We
refer readers to section III.C.1 of this
preamble for a discussion of the USCDI.
2. Compliance With Adopted Standards
and Implementation Specifications
In accordance with Office of the
Federal Register regulations related to
‘‘incorporation by reference,’’ 1 CFR
part 51, which we follow when we
adopt proposed standards and/or
implementation specifications in any
subsequent final rule, the entire
standard or implementation
specification document is deemed
published in the Federal Register when
incorporated by reference therein with
the approval of the Director of the
Federal Register. Once published,
compliance with the standard and
implementation specification includes
the entire document unless we specify
otherwise. For example, if we adopted
the HL7® FHIR US Core Implementation
Guide 5.0.1 proposed in this proposed
rule (see section III.C.7.b), health IT
certified to certification criteria
referencing this IG would need to
demonstrate compliance with all
mandatory elements and requirements
of the IG. If an element of the IG is
optional or permissive in any way, it
would remain that way for testing and
certification unless we specified
otherwise in regulation. In such cases,
PO 00000
Frm 00018
Fmt 4701
Sfmt 4702
the regulatory text would preempt the
permissiveness of the IG.
3. ‘‘Reasonably Available’’ to Interested
Parties
The Office of the Federal Register has
established requirements for materials
(e.g., standards and implementation
specifications) that agencies propose to
incorporate by reference in the Code of
Federal Regulations (79 FR 66267; 1
CFR 51.5(a)). To comply with these
requirements, in section V
(‘‘Incorporation by Reference’’) of this
preamble, we provide summaries of,
and uniform resource locators (URLs) to,
the standards and implementation
specifications we propose to adopt and
subsequently incorporate by reference
in the Code of Federal Regulations. To
note, we also provide relevant
information about these standards and
implementation specifications
throughout the relevant sections of the
proposed rule.
C. New and Revised Standards and
Certification Criteria
1. The United States Core Data for
Interoperability Standard (USCDI) v3
a. Background
The United States Core Data for
Interoperability (USCDI) is a
standardized set of health data classes
and constituent data elements for
nationwide, interoperable health
information exchange.26 In the ONC
Cures Act Final Rule, ONC established
USCDI as a standard to replace the
Common Clinical Data Set (CCDS) in
several ONC certification criteria (85 FR
25670). ONC adopted USCDI Version 1
(USCDI v1) in § 170.213 and
incorporated it by reference in
§ 170.299.27 In an interim final rule with
comment period published by ONC on
November 4, 2020, ‘‘Information
Blocking and the ONC Health IT
Certification Program: Extension of
Compliance Dates and Timeframes in
Response to the COVID–19 Public
Health Emergency,’’ ONC adopted and
incorporated by reference the updated
standard USCDI v1 (July 2020 Errata)
(85 FR 70073).
USCDI v1 established a baseline set of
data that can be commonly exchanged
across care settings for a wide range of
uses and is a required part of certain
certification criteria in the 2015 Edition
Cures Update. These certification
criteria include transitions of care;
clinical information reconciliation and
incorporation; view, download, and
26 https://www.healthit.gov/isa/united-statescore-data-interoperability-uscdi.
27 https://www.ecfr.gov/current/title-45/subtitleA/subchapter-D/part-170#p-170.213.
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
transmit to 3rd party; transmission to
public health agencies—electronic case
reporting; consolidated CDA creation
performance; application access—all
data request, and standardized API for
patient and population services
(adopted in § 170.315(b)(1), (b)(2), (e)(1),
(f)(5), (g)(6), (g)(9), and (g)(10)
respectively). USCDI is also referenced
by HHS programs and the healthcare
community to align interoperability
requirements and national priorities for
health IT and healthcare standards
broadly across industry initiatives.
Additionally, at a minimum, entities
that sign the Common Agreement are
required to exchange all available data
elements from USCDI v1.28 USCDI is
composed of data classes which
aggregate data elements by common
themes. Data elements are the granular
level at which a piece of data is defined
for exchange within the USCDI
standard. For example, ‘‘Laboratory’’ is
a data class, and within that data class
there is ‘‘Values/Results’’ which is a
data element. For the overall structure
and organization of USCDI, including
data classes and data elements in USCDI
v1, please see the discussion in the ONC
Cures Act Final Rule (85 FR 25669—
25670) as well as www.healthIT.gov/
USCDI.
ONC stated in the ONC Cures Act
Final Rule that we intended to utilize a
predictable, transparent, and
collaborative process to expand USCDI,
including providing the public with the
opportunity to comment on USCDI’s
expansion (85 FR 25670). We also noted
that health IT developers would be able
to use the Standards Version
Advancement Process (SVAP) to
voluntarily implement and use a newer,
National Coordinator-approved version
of USCDI in the future without waiting
for ONC to propose and adopt via
rulemaking an updated version of the
USCDI (85 FR 25669). ONC, therefore,
established a process for expanding
USCDI based on public input and
submissions of new data elements and
classes.29 To enable these submissions,
ONC created the ONC New Data
Element and Class (ONDEC) submission
system, which provides the public with
the opportunity to submit new data
elements for consideration for inclusion
in future versions of USCDI.30 ONC
accepts submissions for new USCDI
28 Trusted Exchange Framework and Common
Agreement Qualified Health Information Network
(QHIN) Technical Framework (QTF). Version 1.0.
January 2022. https://rce.sequoiaproject.org/wpcontent/uploads/2022/01/QTF_0122.pdf.
29 https://www.healthit.gov/buzz-blog/interoper
ability/uscdi-onc-new-data-element-and-classsubmission-system-now-available.
30 https://www.healthit.gov/isa/ONDEC.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
data elements in ONDEC on an ongoing
basis, with a September cutoff each year
for submissions to be considered for the
next version of USCDI. ONC evaluates
these submissions and assigns ‘‘levels’’
based on technical maturity,
implementation feasibility, overall
breadth of impact on potential users,
and any known challenges to use of
these data. Level 2 elements are those
ONC deems the most mature and ready
for consideration for future versions,
followed by Level 1 elements as less
mature, and Comment Level elements as
the least mature. After the submission
cutoff, ONC selects from Level 2
elements. ONC then publishes a draft of
the next version of USCDI and accepts
public feedback on the draft.31 This
feedback informs the version of USCDI
released in July each year. In this way,
the standard can continue to evolve in
an incremental and predictable manner,
even though ONC might not propose to
adopt each new version in the Code of
Federal Regulations.
ONC has received several hundred
submissions through ONDEC
recommending new and updated data
classes and data elements during each
annual update cycle. In July 2021, ONC
published USCDI Version 2 (USCDI
v2),32 and this version was later added
to the SVAP Approved Standards for
2022.33 SVAP allows health IT
developers to voluntarily update their
products to USCDI v2 without waiting
for rulemaking to update the version of
USCDI listed in the regulations (85 FR
25669). At the time of release of USCDI
v2, ONC also announced additional
criteria on which new and existing
submissions would be evaluated and
selected for USCDI v3 and future
versions. These criteria included the
ability of the data elements to promote
health equity, address the needs of
underserved communities, and enable
public health data interoperability.34 In
January 2022, ONC released Draft
USCDI v3 and provided for a threemonth public feedback period.35 After
reviewing and incorporating public
feedback, ONC finalized and released
USCDI v3 in July 2022.
We propose to update the USCDI
standard in § 170.213 by adding the
31 https://www.healthit.gov/buzz-blog/interoper
ability/opportunity-trifecta-isa-svap-and-draftuscdi-version-3-feedback-period-now-open.
32 https://www.healthit.gov/isa/united-statescore-data-interoperability-uscdi#uscdi-v2.
33 https://www.healthit.gov/sites/default/files/
page/2022-06/SVAP_Approved_Standards_
2022.pdf.
34 https://www.healthit.gov/buzz-blog/interoper
ability/opportunity-trifecta-isa-svap-and-draftuscdi-version-3-feedback-period-now-open.
35 https://www.healthit.gov/sites/default/files/
page/2022-01/Standards_Bulletin_2022-1.pdf.
PO 00000
Frm 00019
Fmt 4701
Sfmt 4702
23763
newly released USCDI v3 and by
establishing a January 1, 2025,
expiration date for USCDI v1 (July 2020
Errata) for purposes of the Program. We
propose to add USCDI v3 in § 170.213(b)
and incorporate it by reference in
§ 170.299. Specifically, USCDI v3 in this
proposed rule refers to the USCDI v3
(October 2022 Errata). We propose to
codify the existing reference to USCDI
v1 (July 2020 Errata) in § 170.213(a). We
propose that as of January 1, 2025, any
Health IT Modules seeking certification
for criteria referencing § 170.213 would
need to be capable of exchanging the
data classes and data elements that
comprise USCDI v3.
b. Certification Criteria That Reference
USCDI
The USCDI standard is currently
cross-referenced, via cross-reference to
§ 170.213, in certain certification
criteria. A Health IT Module could
currently be certified to any of these
criteria by ensuring that it complies
with either the USCDI v1 or USCDI v2
standards, since USCDI v2 is approved
for SVAP. Should we adopt our
proposal to add the USCDI v3 in
§ 170.213, Health IT Modules certified
to these criteria that cross-reference
§ 170.213 could also be certified by
meeting the USCDI v3 standard.
Through December 31, 2024, we
propose that a Health IT Module
certified to criteria that cross-reference
§ 170.213 may be certified by complying
with (1) USCDI v1; (2) USCDI v2 under
SVAP; and (3) USCDI v3. We propose to
allow only USCDI v3 after this date for
the criteria that cross-reference
§ 170.213. The criteria cross-referencing
to USCDI via cross-reference to
§ 170.213 are as follows:
• ‘‘Care coordination—Transitions of
care—Create’’ (§ 170.315(b)(1)(iii)(A)(1));
• ‘‘Care coordination—Clinical
information reconciliation and
incorporation—Reconciliation’’
(§ 170.315(b)(2)(iii)(D)(1) through (3));
• ‘‘Patient engagement—View,
download, and transmit to 3rd party—
View’’ (§ 170.315(e)(1)(i)(A)(1));
• ‘‘Design and performance—
Consolidated CDA creation
performance’’ (§ 170.315(g)(6)(i)(A));
• ‘‘Design and performance—
Application access—all data request—
Functional requirements’’
(§ 170.315(g)(9)(i)(A)(1)); and
• ‘‘Design and performance—
Standardized API for patient and
population services—Data response’’
(§ 170.315(g)(10)(i)(A) and (B)).
We note that § 170.315(f)(5) also
currently references § 170.213.
However, as discussed later in this
preamble, we propose to rely on specific
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
23764
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
IGs for this criterion, rather than
reference § 170.213. As such, we do not
propose to require Health IT Modules
certified to § 170.315(f)(5)(iii) to certify
using either USCDI v1 or USCDI v3
through December 31, 2024, and only
USCDI v3 after December 31, 2024.
As noted previously, a developer of
certified health IT would not be
required to provide technology updates
for certified criteria or standards to a
user who declined such updates.
However, we note that if such an update
is not provided, even if the version of
the Health IT Module in use still
operates, that version would no longer
be considered certified. This means that
it may no longer meet the requirements
of HHS programs requiring the use of
certified health IT.
We propose to add introductory text
to § 170.213 noting that the Secretary
adopts the following standards as the
standards available for the purpose of
representing electronic health
information, and we also propose to
include the date the adoption of the
standard in § 170.213(a) expires.
Consistent with our proposals in
sections III.A and III.C.11, we propose
this expiration date to be January 1,
2025. Health IT developers with Health
IT Modules certified to certification
criteria that reference § 170.213 would
have to update such certified health IT
to USCDI v3 and provide it to customers
by December 31, 2024. Further, we
propose that Health IT Modules
certified to the above-listed certification
criteria would need to update their
Health IT Modules to accommodate
USCDI v3 data elements using the FHIR
US Core Implementation Guide Version
5.0.1 in § 170.215(b)(1)(ii) and the HL7
CDA® R2 IG: C–CDA Templates for
Clinical Notes R2.1 Companion Guide,
Release 3 in § 170.205(a)(6). If the FHIR
US Core Implementation Guide and the
HL7 CDA® R2 IG: C–CDA Templates for
Clinical Notes R2.1 Companion Guide
are updated before the date of
publication of the final rule, it is our
intent to consider adopting the updated
versions that support USCDI v3.
We clarify that under this proposal,
for the time period up to and including
December 31, 2024, USCDI v1 would
remain applicable as the minimum
version of the USCDI required for
certification criteria that reference
§ 170.213. This means that upon the
effective date of a rule finalizing this
proposal, for the identified certification
criteria that reference § 170.213, the
following would apply as available
versions of USCDI for certification and
compliance:
• USCDI v1 (2020 Errata) for the time
period up to and including December
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
31, 2024 (the adoption of the standard
expires on January 1, 2025),
• USCDI v3.
We refer to the term ‘‘expires’’ in
standards throughout this proposed
rule, and it would mean that the
Secretary no longer recognizes the
standard in the Code of Federal
Regulations and its use for purposes of
the Program is no longer available.
USCDI v2 would remain available via
SVAP for developers of certified health
IT who want to voluntarily update their
Health IT Modules, or for developers of
certified health IT who want to certify
to applicable criteria in addition to or
instead of USCDI v1 up to and including
December 31, 2024.
Additionally, because we finalized in
the ONC Cures Act Final Rule that the
Common Clinical Data Set (CCDS)
would no longer be applicable for
certified Health IT Modules 24 months
after the publication date of the ONC
Cures Act Final Rule (85 FR 25671), and
then extended that date to December 31,
2022 in the interim final rule titled
‘‘Information Blocking and the ONC
Health IT Certification Program:
Extension of Compliance Dates and
Timeframes in Response to the COVID–
19 Public Health Emergency’’ (85 FR
70073), we propose to remove
references to CCDS in the following
sections of 45 CFR 170.315:
§ 170.315(b)(1)(iii)(A)(2); (e)(1)(i)(A)(2);
(g)(6)(i)(B); and (g)(9)(i)(A)(2). In each of
those sections, we have instead
proposed to include a reference to
USCDI. Because § 170.315(b)(6)(ii)(A),
which also references CCDS, is still
available for the period before December
31, 2023, we are not removing the
reference to CCDS in that section.
c. USCDI Standard—Data Classes and
Elements Added Since USCDI v1
ONC proposes to update the USCDI
standard in § 170.213 by proposing a
January 1, 2025 expiration date for
USCDI v1 (July 2020 Errata) and by
adding the newly released USCDI v3
(October 2022 Errata). ONC proposes to
incorporate USCDI v3 by reference in
§ 170.299. USCDI v3 includes all data
elements defined in USCDI v1 and
USCDI v2, and includes additional data
elements added in USCDI v3.
Adopting USCDI v3 would provide
more comprehensive health data for
providers and patients accessing and
exchanging electronic health
information. USCDI v3 includes Sexual
Orientation, Gender Identity, Functional
Status, Disability Status, Mental/
Cognitive Status, and Social
Determinants of Health data elements
including: SDOH Assessment, SDOH
Goals, SDOH Interventions, and SDOH
PO 00000
Frm 00020
Fmt 4701
Sfmt 4702
Problems/Health Concerns. Access,
exchange, and use of these data
elements can support more informed
care for patients. These data elements
are described in more detail below.
While the SVAP process provides an
opportunity for health IT developers to
voluntarily update their certified
products to newer versions of USCDI,
setting a new USCDI v3 floor for all
certified health IT that includes Health
IT Modules certified to certification
criteria that reference § 170.213 would
enable a more consistent adoption of an
expanded baseline set of data, realizing
the benefits described above. We
propose to add USCDI v3 to § 170.213
in addition to USCDI v1 (July 2020
Errata). Because USCDI v1 (July 2020
Errata) may be used for the time period
up to and including December 31, 2024,
we propose to amend § 170.213 to
include paragraph (a) that will note that
the USCDI v1 (July 2020 Errata)
standard will expire on January 1, 2025,
and paragraph (b) that will note the
addition of USCDI v3.
Below, we describe the data classes
and data elements in USCDI v3 that are
not included in USCDI v1. We also
describe any data classes or data
elements that were changed through the
USCDI update processes when
comparing USCDI v3 to USCDI v1. For
the overall structure and organization of
the USCDI standard, including USCDI
v3, we urge the public to consult
www.healthIT.gov/USCDI. All the
following data classes and data elements
were added to USCDI based on
submissions through the ONDEC system
and ONC’s determination that they
represented significant additions to core
interoperable health data and met the
prioritization criteria previously set
forth in this process. We propose each
of these data classes or data elements to
be included in the USCDI standard in
§ 170.213 and to be incorporated by
reference in § 170.299 as part of our
proposal to adopt USCDI v3.
i. Social Determinants of Health (SDOH)
SDOH 36 are the conditions in which
people live, learn, work, and play, and
these conditions affect a wide range of
health and quality-of-life risks and
outcomes.37 In the 2015 Edition, ONC
adopted a certification criterion to
enable users of Health IT Modules(s)
that certified to that criterion with the
functionality to electronically capture,
36 See SDOH Toolkit for more information,
https://www.healthit.gov/sites/default/files/202302/Social%20Determinants%20
of%20Health%20Information
%20Exchange%20Toolkit%202023_508.pdf.
37 https://www.healthit.gov/topic/health-it-healthcare-settings/social-determinants-health.
E:\FR\FM\18APP2.SGM
18APP2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
modify, and access SDOH data
elements—that is information that
identifies common SDOH conditions in
a standardized manner—in
§ 170.315(a)(15) social, psychological,
and behavioral data (80 FR 62631).
These functionalities were intended to
support users with the ability to use
technology to comply with applicable
existing legal requirements or
organizational policies that may require
such data collection and broader,
existing industry interests and efforts to
collect and use this data to inform
clinical decision-making and improve
patient care by looking at the whole
patient, including leveraging other types
of care such as home and communitybased services.38 ONC supports the use
of technology to improve the
standardized capture of a set of health
data classes to support the healthcare
industry’s need to electronically capture
the underlying data they need or want
to collect for healthcare.
SDOH data are often categorized into
domains based on the type of
circumstances they are intended to
represent, such as food or housing
insecurity. However, many of these
circumstances overlap, and there are
continuing efforts aiming to capture
additional areas of focus such as
Existing USCDI Data Class
Assessment and Plan of
Treatment.
Goals ....................................
Procedures ...........................
Problems ..............................
SDOH Assessment—related to the conditions in which people live, learn, work and play.
SDOH Goals—related to expected outcomes for interventions addressing the conditions in which people live,
learn, work and play.
SDOH Interventions—related to addressing the conditions in which people live, learn, work and play.
SDOH Problems/Health Concerns—related to the conditions experienced by a person that impact how they live,
learn, work and play. (e.g., transportation insecurity, food insecurity).
In USCDI v1, the Care Team Member
data class had one data element to
capture all aspects about a care team
member. ONC received submissions
recommending the addition of more
granular data elements that provide
greater detail around a patient’s health
care provider and other members of the
care team. USCDI v3 includes five Care
Team Member data elements: Name,
Identifier, Role, Location, and Telecom.
iii. Clinical Notes
For the data element Discharge
Summary Note in the Clinical Notes
data class, we specified additional
requirements in USCDI v3 including
admission and discharge dates and
locations, discharge instructions, and
reason(s) for hospitalization, which are
also required elements in the
Transitions of Care certification
criterion (§ 170.315(b)(1)).
ddrumheller on DSK120RN23PROD with PROPOSALS2
broadband access or environmental risk
factors.
USCDI v3 includes four SDOH data
elements that represent specific aspects
of SDOH data related to the use or
purpose of the SDOH data rather than
based on the domain. In this way, the
data elements can emphasize the use
case aspect of the data and expand to
additional domains over time. These
data elements are new for USCDI v3 as
compared to USCDI v1. However,
because each of these aspects is closely
related to data elements that exist in
USCDI data classes, these new data
elements were organized into the
applicable existing data classes.
New Data Element
ii. Care Team Member
tests are routinely performed on patients
and result in structured or unstructured
(narrative) findings that facilitate the
diagnosis and management of a patient’s
condition(s).
v. Diagnostics Imaging
USCDI v3 includes the Diagnostic
Imaging data class and its two elements:
Diagnostic Imaging Test and Diagnostic
Imaging Report. This is a new data class
as compared to USCDI v1. These data
elements added a critical missing
capability of health IT to capture and
exchange structured and unstructured
imaging test and report data for a
patient.
iv. Clinical Tests
vi. Encounter Information
USCDI v3 includes the Encounter
Information data class, which includes
five data elements: Encounter Type,
Encounter Diagnosis, Encounter Time,
Encounter Location, and Encounter
Disposition. This is a new data class as
compared to USCDI v1.
USCDI v3 includes a data class for
Clinical Tests, which has two data
elements, Clinical Test and Clinical Test
Result/Report. This is a new data class
as compared to USCDI v1. These
elements will enable the capture and
exchange of non-imaging and nonlaboratory tests. Some examples include
electrocardiogram (ECG), visual acuity
exam, macular (ophthalmic) exam, or
graded exercise testing (GXT). These
vii. Health Insurance Information
USCDI v3 includes the Health
Insurance Information data class, which
provides an opportunity for health IT to
capture and exchange key elements of
healthcare insurance coverage. This
information can be useful for patient
matching and record linkage, coverage
determination, prior authorization, price
transparency, claims and
reimbursement efficiencies, and
identifying disparities related to
insurance coverage. This is a new data
class as compared to USCDI v1. This
data class includes seven data elements:
Coverage Status, Coverage Type,
Relationship to Subscriber, Member
Identifier, Subscriber Identifier, Group
Identifier, and Payer Identifier.
viii. Health Status Assessments
USCDI v3 includes a data class called
Health Status Assessments, which
contains four new data elements:
Disability Status, Mental/Cognitive
Status, Functional Status, and
Pregnancy Status. This is a new data
class as compared to USCDI v1. In
USCDI v3, the Health Status
Assessments data class also includes
two data elements that have been
recategorized, Health Concerns and
Smoking Status, which were previously
part of different data classes in USCDI.
The Health Status Assessments data
class provides a broader context for
these data elements. The ability to
capture and exchange data that
represent the assessment performed and
the assessment component results helps
health care providers address inequities
by being able to readily identify and
address a patient’s conditions
characterized with these data.
ix. Laboratory
USCDI v3 includes Specimen Type
and Result Status data elements, which
38 https://www.federalregister.gov/d/2015-25597/
p-406.
VerDate Sep<11>2014
18:57 Apr 17, 2023
23765
Jkt 259001
PO 00000
Frm 00021
Fmt 4701
Sfmt 4702
E:\FR\FM\18APP2.SGM
18APP2
23766
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
have been added to the USCDI
Laboratory data class to address public
health reporting priorities. These new
data elements are key components of
laboratory reports and can help with
ongoing public health needs, including
Covid–19, MPox and future public
health emergencies, to ultimately
improve patient care.
ddrumheller on DSK120RN23PROD with PROPOSALS2
x. Medications
USCDI v3 includes Dose, Dose Units
of Measure, Indication, and Fill Status
data elements, which have been added
to the USCDI Medications data class in
response to public feedback and because
these data elements are necessary for
certain CMS reporting programs and are
also critical to certain ONC certification
criteria (including the electronic
prescribing certification criterion at
§ 170.315(b)(3)).
xi. Patient Demographics/Information
Based on submissions and comments
during the USCDI update processes
described above, ONC changed or added
data elements in the Patient
Demographics/Information data class.
USCDI v3 includes data elements
Sexual Orientation and Gender Identity,
which have been added to the USCDI
Patient Demographics/Information data
class. Previously, ONC adopted
standards for Sexual Orientation in the
demographics criterion in
§ 170.315(a)(5)(i)(D) and for Gender
Identity in the demographics criterion
in § 170.315(a)(5)(i)(E). These criteria
include requirements to code Sexual
Orientation and Gender Identity
according to the adopted SNOMED CT®
codes and HL7 Version 3 Standard,
Value Sets for AdministrativeGender
and NullFlavor as referenced
§ 170.207(o)(1) and § 170.207(o)(2),
respectively.
These codes reflect an attempt to
exchange data regarding Sexual
Orientation and Gender Identity in a
consistent manner. Public feedback has,
however, indicated that the required
SNOMED CT® codes do not
appropriately and accurately capture all
applicable sexual orientations or gender
identities. We also understand that the
existing standards reference specific
codes from the HL7 Version 3 Standard,
Value Set for NullFlavor, which are
primarily used by health IT developers
to indicate when there is not
information available to represent
Sexual Orientation or Gender Identity.
The HL7 Gender Harmony Project has
developed an informative document 39
39 https://confluence.hl7.org/download/
attachments/81017270/HL7_GENDER_R1_
INFORM_2021AUG.pdf?version=1&
modificationDate=1639425849713&api=v2.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
that includes codes for Gender Identity
such as ‘‘Nonbinary’’ that are not
present in adopted values sets
(§ 170.207(o)(2)). Additionally,
representatives of the healthcare
community and patient advocates have
indicated a desire to expand the codes
for Sexual Orientation and Gender
Identity in the future to reflect the need
to be more inclusive and to aid in
identifying and addressing health
disparities.
Accordingly, we propose to remove
the requirement to use specific codes for
representing Sexual Orientation and
Gender Identity and have removed the
codes as applicable vocabulary
standards from USCDI v3. Rather, to
continue to promote interoperability
while also providing health care
providers with flexibility to better
support clinical care, certified health IT
with Health IT Modules certified to
criteria that reference § 170.213 would
be required to be capable of representing
Sexual Orientation and Gender Identity
in SNOMED CT® when such
information is exchanged as part of
USCDI. We believe that it is best to let
the health IT community develop the
list of appropriate values for Sexual
Orientation and Gender Identity,
whether through implementation
specifications or developing additional
codes in SNOMED CT®.
We received strong support from
commenters in response to our request
during the Draft USCDI v3 public
feedback period that the USCDI term
Sex (Assigned at Birth) was too limiting
for the industry. In subsequent
exploration and analysis, we learned
that this element is represented in
different ways in a number of
jurisdictions, so the meaning is unclear.
There was support to align the term
in USCDI with the term Recorded Sex
or Gender as part of the Gender
Harmony Project. We understand that
the term Recorded Sex or Gender is a
more expansive term that defines the
value of patient’s sex recorded in
administrative or legal documents, and
indeed Sex (Assigned at Birth) could be
considered as a specific type or
recorded value with the identifier being
assigned at birth. However, in order to
be least disruptive to the industry, while
at the same time, acknowledging the
shortcomings of our current term, we
have recharacterized the USCDI data
element Sex (Assigned at Birth) to Sex.
We note that this is presently a change
in the name of the element and will
have no immediate impact on health IT
developers of certified health IT, which
will continue to exchange the value of
patient’s sex they have been historically
exchanging using USCDI. However, we
PO 00000
Frm 00022
Fmt 4701
Sfmt 4702
anticipate this change to support future
enhancements to improve precision in
the meaning through work done by
health IT developers of certified health
IT.
USCDI v3 does not require the use of
certain specific codes for representing
Sex. As discussed previously, we
propose to remove the requirement in
§ 170.315(a)(5)(i)(C) and
§ 170.315(b)(1)(iii)(G)(3) to code Sex
according to the adopted value sets of
HL7 Version 3 Value Sets for
AdministrativeGender and NullFlavor
as referenced in the value sets in
§ 170.207(n)(1). We propose instead to
permit coding according to either the
adopted value sets of HL7 Version 3
Value Sets for AdministrativeGender
and NullFlavor as referenced in the
value sets in § 170.207(n)(1) until
December 31, 2025, or in accordance
with the standard in proposed
§ 170.207(n)(2). These codes reflect an
attempt to exchange Sex in a consistent
manner. Our analysis has, however,
indicated that the value sets do not
appropriately and accurately capture all
applicable values for Sex. Interested
parties have indicated a desire to
expand the codes for Sex in the future
to be more inclusive and to aid in efforts
to address health disparities.
Accordingly, we no longer require the
use of specific code sets for representing
Sex and have removed the codes from
USCDI v3. Rather, to continue to
promote interoperability while also
granting providers with flexibility to
better support clinical care, certified
health IT with Health IT Modules
certified to criteria that reference
§ 170.213 would be required to be
capable of representing Sex in SNOMED
CT when such information is exchanged
as part of USCDI. We have similarly
proposed to adopt the same changes for
relevant certification criteria that
reference these standards (see sections
III.C.8 and III.C.9).
Finally, we have taken note of the
substantial effort in this area to develop
a clinically meaningful way for
identifying a patient’s sex from
observable information (e.g., Clinical
Observation, Radiology report,
Laboratory report, genetic testing data)
that may be suitable for clinical care,
including the development of a new
data element Sex for Clinical Use,
which we may consider including in
future standards adoption. We welcome
public comment on this concept and
approach. In addition, as noted in our
proposals to the Patient Demographics
and Observations certification criterion
in § 170.315(a)(5), we have proposed to
adopt the same changes for relevant
certification criteria that reference these
E:\FR\FM\18APP2.SGM
18APP2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
standards (see sections III.C.8 and
III.C.9).
ONC also sought feedback on the
value of adoption of an applicable
vocabulary standard for patient
addresses.40 USCDI v1 required Current
Address and Previous Address as
discrete data elements, but there are no
existing standards available for
healthcare use cases. Through a
collaboration between ONC and the
standards development community, a
new standard, the Unified Specification
for Address in Health Care (US@),41
emerged and was released in 2022. After
receiving broad support from the public,
ONC has incorporated the Project US@
Technical Specification version 1 as the
applicable standard for Current Address
and Previous Address in USCDI v3.
USCDI v3 includes six data elements
added to the prior USCDI Patient
Demographics/Information data class:
Related Person’s Name, Related Person’s
Relationship, Date of Death,
Occupation, Occupation Industry, and
Tribal Affiliation. Related Person’s
Name and Related Person’s Relationship
enable linkages between maternal and
child records as well as identifying and
linking other related persons, such as
custodians and guardians. Date of Death
supports patient matching, adverse
event, public health, and vital records
reporting. Occupation and Occupation
Industry data elements were added to
support public health, and to capture
military service. Finally, Tribal
Affiliation is captured by the Indian
Health Service (IHS), an agency within
the Department of Health and Human
Services, to aid in the determination of
eligibility for IHS services, carecoordination with non-tribal medical
facilities, and identification of
disparities in healthcare in and across
American Indian and Alaska Native
populations.
ddrumheller on DSK120RN23PROD with PROPOSALS2
xii. Problems
As discussed in sub-section i of this
section, USCDI v3 includes the SDOH
Problems/Health Concerns data element
added to the prior USCDI Problems data
class. In addition, USCDI v3 includes
Date of Diagnosis and Date of Resolution
data elements added to the prior USCDI
Problems data class to include timing
elements for recorded and maintained
problem lists within electronic health
records.
40 https://www.healthit.gov/sites/default/files/
page/2022-01/Standards_Bulletin_20221.pdf#page=5.
41 https://oncprojectracking.healthit.gov/wiki/
pages/viewpage.action?pageId=180486153.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
xiii. Procedures
USCDI v3 includes the Reason for
Referral data element added to the prior
USCDI Procedures data class. This data
element is already part of the Program
requirements for the transitions of care
certification criterion
(§ 170.315(b)(1)(iii)(E)) in the
ambulatory setting and is broadly
implemented in health IT. As discussed
in sub-section i of this section, the
USCDI v3 also includes the SDOH
Interventions data element added to the
prior USCDI Procedures data class.
xiv. Updated Versions of Vocabulary
Standard Code Sets
In the 2015 Edition Final Rule, we
established a policy for minimum
standards code sets that update
frequently throughout a calendar year at
80 FR 62612, and we have listed several
standards as minimum standards code
sets in 45 CFR part 170 subpart B. As
with all adopted minimum standards
code sets, health IT can be certified to
newer versions of the adopted baseline
version minimum standards code sets
for purposes of certification, unless the
Secretary specifically prohibits the use
of a newer version (see § 170.555 and 77
FR 54268). In USCDI v3, we included
the most recent versions of the
minimum standards code sets.
2. C–CDA Companion Guide Updates
We propose to adopt the HL7® CDA®
R2 Implementation Guide: C–CDA
Templates for Clinical Notes STU
Companion Guide, Release 3—US
Realm in § 170.205(a)(6) (‘‘C–CDA
Companion Guide R3’’). The C–CDA
Companion Guide R3 provides
supplemental guidance and additional
technical clarification for specifying
data in the C–CDA Release 2.1 for
USCDI v2. However, it is our
understanding that HL7 is working on
updating the C–CDA R2.1 Companion
Guide (Release 4) for USCDI v3. If the
C–CDA Companion Guide Release 4
(R4) is published before the date of
publication of the final rule, it is our
intention to consider adopting the
updated Companion Guide R4 that
provides guidance and clarifications for
specifying data in USCDI v3 since we
propose to adopt USCDI v3 as the
baseline in this proposed rule.
As mentioned above, HL7® has been
updating the C–CDA Companion Guide
to accommodate the new data classes
and elements in each USCDI version. To
allow developers to voluntarily update
to USCDI v2, ONC included the C–CDA
Companion Guide R3 in the SVAP
Approved Standards List for 2022. ONC
released the SVAP Approved Standards
PO 00000
Frm 00023
Fmt 4701
Sfmt 4702
23767
List for 2022 in June 2022. We
anticipate that the C–CDA Companion
Guide R4 would support updates
included in proposed USCDI v3. We
note that the adoption of the C–CDA
Companion Guide R4 would align with
our goal to increase the use of
consistently implemented standards
among health IT developers and
improve interoperability. We propose to
adopt the C–CDA Companion Guide R3
as a standard in § 170.205(a)(6) and
incorporate it by reference in § 170.299.
As stated above, if the C–CDA
Companion Guide R4 is available at the
time of publication of the final rule, we
intend to consider adopting the C–CDA
Companion Guide R4, which would
support the updates included in
proposed USCDI v3.
Consistent with our proposals in
sections III.A and III.C.11, we propose to
revise § 170.205(a)(5) to add that the
adoption of the standard in
§ 170.205(a)(5) expires on January 1,
2025. Developers of certified health IT
with Health IT Modules certified to
criteria that reference § 170.205(a)(5)
would have to update those Health IT
Modules to § 170.205(a)(6) and provide
them to customers by January 1, 2025.
We clarify that under this proposal, for
the time period up to and including
December 31, 2024, HL7 CDA® R2
Implementation Guide: C–CDA
Templates for Clinical Notes R2.1
Companion Guide, Release 2 would
remain applicable as the minimum
version required in the Program. This
means that upon the effective date of a
final rule, for the identified certification
criteria, the following would apply as
the minimum version for C–CDA for
certification and compliance:
• HL7 CDA® R2 Implementation
Guide: C–CDA Templates for Clinical
Notes R2.1 Companion Guide, Release 2
(incorporated by reference in § 170.299)
for the time period up to and including
December 31, 2024,
• HL7 CDA® R2 IG: C–CDA
Templates for Clinical Notes R2.1
Companion Guide, Release 3.
Further, we propose that Health IT
Modules certified to the certification
criteria below would need to update to
the HL7 CDA® R2 IG: C–CDA Templates
for Clinical Notes R2.1 Companion
Guide, Release 3 in § 170.205(a)(6) by
January 1, 2025:
• ‘‘transitions of care’’
(§ 170.315(b)(1)(iii)(A));
• ‘‘clinical information reconciliation
and incorporation’’ (§ 170.315(b)(2)(i),
(ii), and (iv));
• ‘‘care plan’’ (§ 170.315(b)(9)(ii));
• ‘‘view, download, and transmit to
3rd party’’ (§ 170.315(e)(1)(i)(A) and
(B));
E:\FR\FM\18APP2.SGM
18APP2
23768
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
• ‘‘consolidated CDA creation
performance’’ (§ 170.315(g)(6)(i)); and
• ‘‘application access—all data
request’’ (§ 170.315(g)(9)(i)).
For the purposes of meeting that
compliance timeline, we expect health
IT developers to update their certified
health IT without new mandatory
testing and notify their ONC–ACB on
the date at which they have reached
compliance. Developers would also
need to factor these updates into their
next real world testing plan.
3. ‘‘Minimum Standards’’ Code Sets
Updates
We established a policy in the 2015
Edition Final Rule for minimum
standards code sets that update
frequently (80 FR 62612). In prior
rulemaking, we discussed the benefits of
adopting newer versions of minimum
standards code sets, including the
improved interoperability and
implementation of health IT with
minimal additional burden (77 FR
54170). When determining whether to
propose newer versions of minimum
standards code sets, we consider the
impact on interoperability and whether
a newer version would require
substantive effort for developers of
certified health IT to implement. If
adopted, newer versions of minimum
standards code sets would serve as the
baseline for certification and developers
of certified health IT would be able to
use newer versions of these adopted
standards on a voluntary basis. We
reiterate that while minimum standard
code sets update frequently, perhaps
several times in a single year, these
updates are confined to concepts within
the code system, not substantive
changes to the standards themselves.
We propose to adopt the following
versions of the minimum standards
codes sets listed below.
ddrumheller on DSK120RN23PROD with PROPOSALS2
• § 170.207(a)—Problems
We propose to remove and reserve
§ 170.207(a)(3), IHTSDO SNOMED CT®
International Release July 2012 and US
Extension to SNOMED CT® March 2012
Release. We propose to revise
§ 170.207(a)(1), which is currently
reserved, to reference SNOMED CT US
Edition March 2022 and incorporate it
by reference in § 170.299.
• § 170.207(c)—Laboratory Tests
We propose to remove and reserve
§ 170.207(c)(2), Logical Observation
Identifiers Names and Codes (LOINC®)
Database version 2.40. We propose to
revise § 170.207(c)(1), which is
currently reserved, to reference LOINC
Database version 2.72, February 16,
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
2022, and incorporate it by reference in
§ 170.299.
• § 170.207(d)—Medications
We propose to revise § 170.207(d)(1),
which is currently reserved, to reference
RxNorm July 5, 2022, Full Monthly
Release and incorporate it by reference
in § 170.299. We propose to reference
the code sets specified in 45 CFR
162.1002(c)(1) which include
International Classification of Diseases,
10th Revision, Clinical Modification
(ICD–10–CM); International
Classification of Diseases, 10th
Revision, Procedure Coding System
(ICD–10–PCS) (including The Official
ICD–10–PCS Guidelines for Coding and
Reporting); National Drug Codes (NDC);
the combination of Health Care
Financing Administration Common
Procedure Coding System (HCPCS), as
maintained and distributed by HHS, and
Current Procedural Terminology, Fourth
Edition (CPT–4), as maintained and
distributed by the American Medical
Association, for physician services and
other healthcare services; Health Care
Financing Administration Common
Procedure Coding System (HCPCS) as
maintained and distributed by HHS, for
all other substances, equipment,
supplies, or other items used in
healthcare services; and Code on Dental
Procedures and Nomenclature, in
§ 170.207(d)(4).
• § 170.207(e)—Immunizations
We propose to revise § 170.207(e)(1),
which is currently reserved, to reference
CVX—VaccinesAdministered, June 15,
2022, and incorporate it by reference in
§ 170.299. We also propose to revise
§ 170.207(e)(2), which is currently
reserved, to reference NDC—Vaccine
NDC Linker, updates through July 19,
2022, and incorporate it by reference in
§ 170.299.
• § 170.207(f)—Race and ethnicity
We propose to add § 170.207(f)(3) to
reference CDC Race and Ethnicity Code
Set Version 1.2 (July 2021) and
incorporate it by reference in § 170.299.
• § 170.207(m)—Numerical
references
We propose to revise § 170.207(m)(2),
which is currently reserved, to reference
the Unified Code of Units of Measure
(UCUM), Revision 2.1, November 21,
2017, and incorporate it by reference in
§ 170.299.
• § 170.207(n)—Sex
As described in this proposed rule in
sections III.C.1 and III.C.8, we propose
to revise § 170.207(n)(2), which is
currently reserved, to reference the
version of SNOMED CT® codes
specified in § 170.207(a)(1). We also
propose to add § 170.207(n)(3) to
reference the version of LOINC® codes
specified in § 170.207(c)(1).
PO 00000
Frm 00024
Fmt 4701
Sfmt 4702
• § 170.207(o)—Sexual orientation
and gender information
We propose to change the heading of
§ 170.207(o) from ‘‘sexual orientation
and gender identity’’ to ‘‘sexual
orientation and gender information’’ to
acknowledge that § 170.207(o) may
include standard code sets to support
other gender related data items.
Additionally, as described in this
proposed rule in sections III.C.1 and
III.C.8, we propose to add
§ 170.207(o)(3) to reference the version
of SNOMED CT® codes specified in
§ 170.207(a)(1) and to add
§ 170.207(o)(4) to reference the version
of LOINC® codes specified in
§ 170.207(c)(1) for Pronouns.
• § 170.207(p)—Social, psychological,
and behavioral data
We propose to revise § 170.207(p)(1)
through (8) to reference the version of
LOINC® codes specified in proposed
§ 170.207(c)(1) instead of
§ 170.207(c)(3). We propose to revise
§ 170.207(p)(4), (5) and (7) and (8) to
reference the version of the Unified
Code of Units of Measure in proposed
§ 170.207(m)(2), instead of
§ 170.207(m)(1). We also propose to
revise § 170.207(p)(6) to include a
reference to the version of the Unified
Code of Units of Measure in proposed
§ 170.207(m)(2).
• § 170.207(r)—Provider type
We propose to revise § 170.207(r)(2),
which is currently reserved, to reference
Crosswalk: Medicare Provider/Supplier
to Healthcare Provider Taxonomy,
October 29, 2021, and incorporate it by
reference in § 170.299.
• § 170.207(s)—Patient insurance
We propose to revise § 170.207(s)(2),
which is currently reserved, to reference
Public Health Data Standards
Consortium Source of Payment
Typology Code Set Version 9.2
(December 2020) and incorporate it by
reference in § 170.299.
In addition to updating the minimum
standards code sets listed above, we
propose to update the certification
criteria that reference those minimum
standards. We propose to update some
of the certification criteria that reference
§ 170.207(a) Problems, by replacing the
reference to § 170.207(a)(4) in those
criteria that reference it with a reference
to the new proposed § 170.207(a)(1).
These criteria include § 170.315(a)(12),
(b)(1)(iii)(B)(2), (b)(6)(ii)(B)(2),
(c)(4)(iii)(I), and (f)(4)(ii). We also
propose to update § 170.315(f)(3)(ii) by
replacing the reference to § 170.207(a)(3)
with a reference to the new proposed
§ 170.207(a)(1). We propose to update
the certification criteria that reference
§ 170.207(c) Laboratory Tests by
replacing the references to
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
§ 170.207(c)(2) and (c)(3) in those
criteria with a reference to the new
proposed § 170.207(c)(1). These criteria
include § 170.315(f)(3)(ii) and (f)(4)(ii).
We propose to update two
certification criteria that reference
§ 170.207(e) Immunizations. We
propose to update the certification
criterion § 170.315(f)(1)(i)(B), which
references § 170.207(e)(3), to instead
reference the new proposed
§ 170.207(e)(1). We also propose to
update the certification criterion
§ 170.315(f)(1)(i)(C), which references
§ 170.207(e)(4), by replacing the
reference to § 170.207(e)(4) in that
criterion with a reference to the new
proposed § 170.207(e)(2).
We propose to update several
certification criteria that reference
§ 170.207(f) Race and Ethnicity. We
propose to update certification criteria
that reference § 170.207(f)(2) to instead
reference the new proposed
§ 170.207(f)(3). These criteria include
§ 170.315(a)(5)(i)(A)(1) and (2) and
§ 170.315(c)(4)(iii)(H).
As described in sections III.C.1 and
III.C.8 of this proposed rule, we propose
to update criteria that reference
§ 170.207(n) Sex by updating criteria
that reference § 170.207(n)(1) to
reference the new proposed
§ 170.207(n)(2). More specifically, we
propose to update § 170.315(a)(5)(i)(C)
to reference § 170.207(n)(1) for the time
period up to and including December
31, 2025, or to reference § 170.207(n)(2).
We also propose to update
§ 170.315(c)(4)(iii)(G) to reference
§ 170.207(n)(2) and to update
§ 170.315(b)(1)(iii)(G)(3) to reference the
standards adopted in § 170.213.
Additionally, as described in sections
III.C.1 and III.C.8 of this proposed rule,
we propose to update the criteria that
reference § 170.207(o) Sexual
orientation and gender information (as
we propose to rename the criterion) by
updating criteria that reference
§ 170.207(o)(1) and (2). We propose to
replace the reference to § 170.207(o)(1)
in § 170.315(a)(5)(i)(D) with a reference
to the new proposed § 170.207(o)(3) and
propose to replace the reference to
§ 170.207(o)(2) in § 170.315(a)(5)(i)(E)
with a reference to the new proposed
§ 170.207(o)(3). More specifically, we
propose to update § 170.315(a)(5)(i)(D)
to reference § 170.207(o)(1) for the time
period up to and including December
31, 2025, or to reference § 170.207(o)(3).
We propose to update
§ 170.315(a)(5)(i)(E) to reference
§ 170.207(o)(2) for the time period up to
and including December 31, 2025, or to
reference § 170.207(o)(3).
We also propose to update
§ 170.315(c)(4)(iii)(C), which references
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
§ 170.207(r) Provider Type. Specifically,
we propose to replace the reference to
§ 170.207(r)(1) in that criterion with a
reference to the new proposed
§ 170.207(r)(2). We also propose to
update § 170.315(c)(4)(iii)(E), which
references § 170.207(s) Patient
insurance. Specifically, we propose to
replace the reference to § 170.207(s)(1)
in that criterion with a reference to the
new proposed § 170.207(s)(2).
4. Electronic Case Reporting
a. Background
Case reporting serves as early
notification to Public Health Agencies
(PHAs) for potential disease outbreaks
and includes information that enables
PHAs to start contact tracing and other
prevention measures. Case reports
include critical clinical information that
is not included in syndromic
surveillance or laboratory reporting and
can help illuminate the impact of
comorbidities, treatments, and variable
access to care. Every state has laws
requiring providers to submit case
reports of specific reportable diseases
and conditions. Electronic case
reporting is the automated, real-time,
bidirectional exchange of case report
information between EHRs and PHAs.42
Electronic case reporting uses standard
codes to trigger the transfer of relevant
clinical data to PHAs for case
investigation and follow-up, including
data on demographics, comorbidities,
immunizations, medications,
occupation, and other treatments. Most
states do not require electronic
submission of case reports; rather, case
reporting often occurs through outdated
manual methods (e.g., fax, email, or
phone) which results in delays,
underreporting, and incomplete or
inaccurate case data.43 44 This manual
case reporting also imposes burdens on
health care providers, taking staff time
away from patients to submit case
reports and comply with state reporting
requirements.
ONC established initial content
exchange standards in 45 CFR
170.205(g)(1) and (g)(2) to support a
version of HL7® v2 for ‘‘electronic
submission to public health agencies for
surveillance or reporting’’ in the 2010
42 Centers for Disease Control & Prevention (CDC).
Electronic Case Reporting Fact Sheet. Available at:
https://www.cdc.gov/ecr/docs/eCR-Fact-Sheet508.pdf.
43 ONC. Interoperability Standards Advisory.
Case Reporting to Public Health: https://
www.healthit.gov/isa/case-reporting-public-healthagencies.
44 Ashley Antonelli and Joseph Leonard. CMS is
mandating new electronic case reporting
requirements. Here’s how providers can prepare.
Advisory Board. https://www.advisory.com/blog/
2021/12/electronic-case-reporting.
PO 00000
Frm 00025
Fmt 4701
Sfmt 4702
23769
‘‘Health Information Technology: Initial
Set of Standards, Implementation
Specifications, and Certification Criteria
for Electronic Health Record
Technology’’ Interim Final Rule (75 FR
2033). These standards were not specific
to electronic case reporting; rather they
supported the more generic submission
of information to PHAs. The
‘‘transmission to public health
agencies—electronic case reporting’’
certification criterion in § 170.315(f)(5)
was later adopted in the 2015 Edition
Final Rule to ‘‘support the electronic
transmission of case reporting
information to public health agencies’’
as part of the CMS EHR Incentive
Programs (80 FR 62667).
In the ONC 2015 Edition Proposed
Rule (80 FR 16804), we requested
comment on whether to adopt a
standardized method for electronic case
reporting, including potentially
adopting the ‘‘IHE Quality, Research,
and Public Health Technical Framework
Supplement, Structured Data Capture,
Trial Implementation (September 5,
2014) standard’’ and the ‘‘HL7 FHIR
Implementation Guide: SDC DSTU that
would be balloted in mid-2015 in place
of, or together with, the IHE Quality,
Research, and Public Health Technical
Framework Supplement’’ (80 FR 16855).
In response to comments, we did not
adopt a standard for this criterion in the
2015 Edition Final Rule, but instead
outlined functional requirements that
Health IT Modules would need to
support for certification to the electronic
case reporting criterion. These
functional requirements included a
requirement that a Health IT Module
support the ability to ‘‘(1) consume and
maintain a table of trigger codes to
determine which encounters should
initiate an initial case report being sent
to public health to determine
reportability; and (2) when a trigger is
matched, create an initial case report
that includes specific data (Common
Clinical Data Set; encounter diagnoses;
provider name, office contact
information, and reason for visit, and an
identifier representing the row and
version of the trigger table that triggered
the case report)’’ (80 FR 62667). In
addition to establishing these functional
requirements in the 2015 Edition Final
Rule, we also described additional
functionalities that would help support
electronic case reporting to public
health but did not adopt them as
requirements for the ONC Health IT
Certification Program (80 FR 62667);
these functional requirements included:
‘‘(3) receive and display additional
information, such as a ‘‘notice of
reportability’’ and data fields to be
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
23770
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
completed; and (4) submit a completed
form.’’
ONC described some of the context
for standards development and the
future for electronic case reporting. We
stated ‘‘[a]s standards evolve . . . the
future might include a FHIR-based
approach. Therefore, we believe this
overall initial certification approach
establishes necessary flexibility within
the ONC Health IT Certification Program
related to electronic case reporting in
that as technical approaches evolve to
accomplish electronic case reporting
they can be certified. In the future, we
may be able to consider a specific
standard for certification through
rulemaking’’ (80 FR 62667).
In 2017, ONC established selfdeclaration as the demonstration
method for electronic case reporting.45
In the ONC Cures Act Final Rule (85 FR
25642), electronic case reporting was
included as part of the Real World
Testing Condition and Maintenance of
Certification requirements (codified in
45 CFR 170.405), which require health
IT developers with Health IT Modules
certified to criteria specified in
§ 170.405(a) to ‘‘successfully test the
real world use of those Health IT
Module(s) for interoperability (as
defined in 42 U.S.C.300jj(9) and
§ 170.102) in the type of setting in
which such Health IT Module(s) would
be/is marketed’’ (85 FR 25948). Health
IT developers with Health IT Modules
certified to applicable criteria have the
flexibility to establish their own Real
World Testing plan and submit results
based on measures they develop.
However, it is expected that developers
use Real World Testing plans and
results to demonstrate ongoing
conformance to standards and
functionality required as part of the
Program, per 45 CFR 170.405(b)(2)(i).
We also modified
§ 170.315(f)(5)(iii)(B) in the ONC Cures
Act Final Rule to require Health IT
Modules to support creation of
electronic case reports based on (1) the
data classes expressed in the standards
in § 170.213, or (2) the Common Clinical
Data Set (CCDS) until December 31,
2022 (85 FR 25667). This was proposed
as part of a Program-wide effort to
transition Health IT Modules certified to
certification criteria that referenced the
CCDS to instead support the USCDI v1
(85 FR 25670). ONC subsequently
clarified that while either the CCDS or
the USCDI v1 data set needed to be
supported, ‘‘a health IT developer must
attest to their product’s ability to
45 https://www.healthit.gov/test-method/
transmission-public-health-agencies-electroniccase-reporting.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
support the referenced standard(s) in
§ 170.315(f)(5)(iii)(B)(1) or (2). However,
individual PHAs may require a subset of
this data for reporting.’’ 46
b. Standards Landscape for Case
Reporting
Since ONC adopted 45 CFR
170.315(f)(5) as a functional
requirement for Health IT Modules in
the 2015 Edition, standards
development organizations (SDOs),
public health, and interested parties
within the healthcare industry have
balloted several standards related to
electronic case reporting. The standards
were produced and developed through
a collaborative effort among many
partners, including CDC, the Council of
State and Territorial Epidemiologists
(CSTE), the Association of State and
Territorial Health Officials (ASTHO),
the Association of Public Health
Laboratories (APHL), electronic health
record (EHR) developers, and the Health
Level Seven (HL7) Public Health (PH)
Work Group.47 These standards pertain
to both HL7® FHIR and HL7® CDA and
include multiple Implementation
Guides (IGs).
Recognizing advancement of
standards development in this area,
ONC analyzed the currently balloted
standards for potential inclusion in the
existing 45 CFR 170.315(f)(5) criterion.
ONC examined the following standards
for potential inclusion as a part of this
criterion:
• HL7 FHIR® Implementation Guide:
Electronic Case Reporting (eCR)—US
Realm STU2 (HL7 FHIR eCR IG): 48 The
HL7 FHIR eCR IG contains multiple
FHIR profiles that correspond to the
HL7 CDA eICR and the HL7 CDA
Reportability Response standards. This
IG also includes profiles for electronic
Reporting and Surveillance Distribution
(eRSD) that enables the electronic
distribution of trigger codes and
reporting guidance and parameters from
public health to clinical care.
Æ HL7 FHIR Electronic Initial Case
Report (eICR) transaction and profile: 49
The HL7 FHIR eCR IG specifies a
standardized method for the
communication of an eICR to a PHA
using the HL7® FHIR standard. The
eICR profiles are intended to contain the
data elements necessary to initiate a
public health investigation or other
appropriate public health action based
on a potentially reportable case
identified by a healthcare organization.
Æ HL7 FHIR Reportability Response
(RR) transaction and profile: 50 The HL7
FHIR eCR IG also describes a
standardized method for a PHA to
communicate a RR to a healthcare
organization that initiated an eICR. The
RR profiles can include determination
of reportability information, contact
information for the involved PHAs,
requests for case investigation
supplemental data that may not have
been recorded in the process of care,
condition-specific information from
public health, and an acknowledgment
that a report has been successfully
conveyed. The IG notes that there may
be several different intermediaries
involved in the transmission of RR
messages including Health Information
Exchanges and Health Data Networks.
• HL7 FHIR Electronic Reporting and
Surveillance Distribution (eRSD)
transaction and profiles: 51 The HL7
FHIR eRSD profiles support the
distribution of reporting guidance and
trigger code value sets from PHAs to
healthcare organizations. The eRSD
profiles are specified in the HL7 FHIR
eCR IG but are intended to be used by
health IT that supports either CDA or
FHIR-based approaches to electronic
case reporting.52 The eRSD profiles
include an ‘‘eRSD Specification
Library,’’ which is composed of a
constrained HL7 FHIR PlanDefinition
resource and the Trigger Value Set
Library, and an ‘‘eRSD Supplemental
Library,’’ which is composed of a
RuleFilters library and a Supplemental
Value Set library. These can be
contained and transacted via a HL7
FHIR Bundle. The eRSD Specification
Library, which can optionally be used in
combination with the eRSD
Supplemental Library, supports the
distribution of reporting guidance and
parameters, trigger code value sets, and
more complex reporting rules to
determine whether a condition may be
reportable to public health. According
to HL7, the eRSD profiles can support
either CDA or FHIR-based approaches to
electronic case reporting.53
46 For further information see: § 170.315(f)(5)
Certification Companion Guide available here:
https://www.healthit.gov/test-method/transmissionpublic-health-agencies-electronic-case-reporting.
47 See work group membership at: https://
confluence.hl7.org/display/PHWG/
Public+Health+Work+Group.
48 https://build.fhir.org/ig/HL7/case-reporting/
index.html.
49 https://build.fhir.org/ig/HL7/case-reporting/
electronic_initial_case_report_eicr_transaction_
and_profiles.html.
50 https://build.fhir.org/ig/HL7/case-reporting/
reportability_response_rr_transaction_and_
profiles.html.
51 https://build.fhir.org/ig/HL7/case-reporting/
electronic_reporting_and_surveillance_distribution_
ersd_transaction_and_profiles.html.
52 See page 11 of CDA eICR IG, at: https://
www.hl7.org/implement/standards/product_
brief.cfm?product_id=436.
53 See page 11 of CDA eICR IG, at: https://
www.hl7.org/implement/standards/product_
brief.cfm?product_id=436.
PO 00000
Frm 00026
Fmt 4701
Sfmt 4702
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
• HL7 CDA® R2 Implementation
Guide: Public Health Case Report—the
Electronic Initial Case Report (eICR)
Release 2, STU Release 3.1—US Realm
(HL7 CDA eICR IG) 54
Æ HL7 CDA Electronic Initial Case
Report (eICR): The purpose of the HL7
CDA eICR IG is to specify a standard for
the creation of an eICR in Clinical
Document Architecture, Release 2 (CDA
R2) US Realm format. The eICR is
intended to contain the data elements
necessary to initiate a public health
investigation or other appropriate public
health action.
• HL7 CDA® R2 Implementation
Guide: Reportability Response, Release
1, STU Release 1.1—US Realm (HL7
CDA RR IG) 55
Æ HL7 CDA Reportability Response
(RR): The HL7 CDA RR IG was produced
and developed to specify a standard for
a RR document using the HL7 CDA R2
standard and is a companion to the HL7
CDA eICR IG. The RR can function to:
Communicate the reportability status,
for the responsible PHA(s), of each
condition included in the eICR; identify
who (a PHA or an intermediary)
prepared the RR; provide contact
information for the responsible PHA(s);
provide suggested or required clinical
follow-up activities from the responsible
PHA(s), including any additional
reporting needs or infection control
activities; and confirm eICR receipt and
processing.
• Reportable Conditions Trigger
Codes Value Set for Electronic Case
Reporting. RCTC OID:
2.16.840.1.114222.4.11.7508, Release
March 29, 2022 56
Æ The Reportable Condition Trigger
Codes (RCTC) are a nation-wide set of
standardized codes to be implemented
within an EHR that provide a
preliminary identification of events that
may be of interest to PHAs for electronic
case reporting. The RCTC are the first
step in a two-step process to determine
reportability. The RCTC are single factor
codes that represent any event that may
be reportable to any PHA in the United
States. A second level of evaluation still
must be done against jurisdictionspecific reporting regulations, to
confirm whether the event is reportable
and to which PHA or agencies. The
RCTC currently includes ICD 10 CM,
SNOMED CT, LOINC, RxNorm, CVX,
and CPT codes, representing conditionspecific diagnoses, resulted lab tests
names, lab results, lab orders for
54 https://www.hl7.org/implement/standards/
product_brief.cfm?product_id=436.
55 https://www.hl7.org/implement/standards/
product_brief.cfm?product_id=470.
56 https://ecr.aimsplatform.org/ehr-implementers/
triggering/.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
conditions reportable upon suspicion,
and medications for select conditions.
c. Proposed Updates to Case Reporting
in § 170.315(f)(5)
We propose a deliberate path towards
greater standardization and
specification of electronic case
reporting, moving from functional
requirements to standards-based
requirements in § 170.315(f)(5) to
improve consistency of
implementations and interoperability
over time. Improvements in consistent
implementation and case report
interoperability would enable PHAs to
have a vastly improved picture of where
and when disease outbreaks occur.
These standards would also enable
health care providers and PHAs to
engage in better, bi-directional exchange
of information.
In this rule, we propose to revise the
criterion in § 170.315(f)(5) to adopt
consensus-based, industry-developed
standards. These proposed standards
would supplement the functional,
descriptive requirements in the present
criterion in § 170.315(f)(5) for the time
period up to and including December
31, 2024, and ultimately replace them.
We note that these electronic standards
are standards-based representations of
the functional requirements described
in the existing criterion in
§ 170.315(f)(5). We propose to allow
certification to the existing version of
the certification criterion, which we
propose to move to § 170.315(f)(5)(i), or
the revised version of the certification
criterion in proposed § 170.315(f)(5)(ii)
beginning on the effective date of the
final rule, and to allow certification to
only the revised certification criterion in
§ 170.315(f)(5)(ii) after December 31,
2024.
For the revised version of the
certification criterion, we propose
requirements in regulation text that
align with the functionalities included
in the specified CDA and FHIR-based
IGs proposed for adoption for the
purpose of electronic case reporting. We
propose to adopt three standards-based
requirements for Health IT Modules
certified to the revised certification
criterion in § 170.315(f)(5). Specifically,
in § 170.315(f)(5)(ii) we propose that a
Health IT Module enable a user to:
• Consume and process electronic
case reporting trigger codes and
parameters and identify a reportable
patient visit or encounter based on a
match from the Reportable Conditions
Trigger Code value set in § 170.205(t)(4)
contained in the eRSD Specification
Library as specified in the HL7 FHIR
eCR IG in § 170.205(t)(1);
PO 00000
Frm 00027
Fmt 4701
Sfmt 4702
23771
• Create a case report consistent with
at least one of the following standards:
Æ The eICR profile of the HL7 FHIR
eCR IG in § 170.205(t)(1), or
Æ The HL7 CDA eICR IG in
§ 170.205(t)(2);
• Receive, consume, and process a
case report response that is formatted to
either the RR profile of the HL7 FHIR IG
in § 170.205(t)(1) or the HL7 CDA RR IG
in § 170.205(t)(3); and
• Transmit a case report
electronically to a system capable of
receiving an electronic case report.
For the proposal in
§ 170.315(f)(5)(ii)(A) requiring a system
to consume and process trigger codes,
we propose that a certified Health IT
Module identify a reportable patient
visit or encounter based on a match
from the Reportable Conditions Trigger
Code value set in § 170.205(t)(4)
contained in the eRSD Specification
Library as specified in the HL7 FHIR
eCR IG in § 170.205(t)(1) to support the
functionality in § 170.315(f)(5)(ii)(A).
We describe the standards and
implementation specifications in further
detail in the subsequent section of this
proposed rule.
For the proposal in
§ 170.315(f)(5)(ii)(B) requiring a Health
IT Module to enable a user to create a
case report consistent with at least one
of the proposed standards in that
proposed certification criterion, we
clarify that ‘‘at least,’’ means that Health
IT Modules must support either the HL7
CDA eICR IG (in § 170.205(t)(2)) or the
eICR profile of the HL7 FHIR eCR IG (in
§ 170.205(t)(1)), or both the CDA and
FHIR IGs for the purposes of
certification. Our intent is that a
certified Health IT Module supports at
least one of these kinds of IGs, but we
do not preclude a Health IT Module
from supporting both. For the proposal
in § 170.315(f)(5)(ii)(C) to require that a
certified Health IT Module support the
receipt, consumption, and processing of
reportability responses, we propose that
a certified Health IT Module may
implement this capability for receipt of
responses formatted to either the
reportability response profile of the HL7
FHIR eCR IG in § 170.205(t)(1) or the
reportability response profile of the HL7
CDA RR IG in § 170.205(t)(3). However,
we seek comment on whether we
should instead require Health IT
Modules to implement this capability
for reportability responses formatted to
both standards. As part of these
proposed standards-based requirements
in § 170.315(f)(5)(ii), we reiterate that
Health IT Modules would need to
follow the respective IG requirements
for all ‘‘mandatory’’ and ‘‘must support’’
data elements listed in each IG, as
E:\FR\FM\18APP2.SGM
18APP2
23772
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
applicable. Specifically, by
‘‘mandatory’’ we mean support for data
elements with minimum cardinality
requirements equal to or greater than
‘‘1.’’ By ‘‘must support,’’ we mean
‘‘must support’’ as it is defined in the
referenced HL7 FHIR implementation
specifications. For equivalency of ‘‘must
support’’ data in CDA IGs, a certified
Health IT Module must support data
elements with minimum cardinality
requirements equal to or greater than
‘‘1’’ or a conformance verb of ‘‘SHALL’’
even if null values are allowed by the
applicable data elements in the
referenced CDA IGs.
Additionally, we propose in
§ 170.315(f)(5)(ii) a fourth non-standards
based functional requirement for Health
IT Modules certified to
§ 170.315(f)(5)(ii). We propose in
§ 170.315(f)(5)(ii)(D) that such Health IT
Modules be required to enable a user to
electronically transmit a case report to
a system capable of receiving case
reports electronically. We emphasize
that this fourth requirement is agnostic
to the recipient of the electronic case
report and does not prescribe a specific
transport standard, reporting
mechanism, or platform. We propose
that certification to the updated
criterion would be available for Health
IT Modules upon the effective date of
the final rule. In addition, because
certification to § 170.315(f)(5)(i) would
only be available through December 31,
2024, health IT developers with Health
IT Modules certified to the
§ 170.315(f)(5) criterion based on
meeting the requirements of
§ 170.315(f)(5)(i) would be required to
update and provide their customers
with a Health IT Module updated to the
revised certification criterion by
December 31, 2024, to keep their
certification to § 170.315(f)(5) active,
consistent with our proposals in
sections III.A and III.C.11.
Finally, we note that for Health IT
Modules certified to § 170.315(f)(5), the
developer of such health IT must
continue to demonstrate conformance to
these requirements for Real World
Testing plans and results per the
requirements in § 170.405 regardless of
whether the Health IT Module is
certified to § 170.315(f)(5)(i) or (f)(5)(ii).
d. Proposed Adoption of Standards for
Electronic Case Reporting
ONC has received feedback from
numerous interested parties, including
developers of certified health IT, PHAs,
and federal partners, that it would be
premature to identify a single set of
standards for case reporting. We
understand that many PHAs use
systems that handle CDA-based
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
messages and that many PHAs have not
adopted FHIR-based messaging
information systems. However, we also
have heard that there is interest among
some PHAs to leverage FHIR, and we
see an opportunity to align requirements
for electronic case reporting with other
Program requirements that leverage
FHIR for developers of certified health
IT.
Given the emerging interest in FHIR,
and the need to support current public
health capabilities, we propose in
§ 170.315(f)(5)(ii)(B) to require a Health
IT Module to create a case report for
electronic transmission according to at
least one of the following two HL7®
standards: in accordance with the eICR
profiles specified in the HL7 FHIR eCR
IG in § 170.205(t)(1) or in accordance
with the eICR profiles specified in the
HL7 CDA eICR IG in § 170.205(t)(2). We
anticipate that health IT developers
would choose to support a CDA-based
approach or a FHIR-based approach to
support this criterion, but we would not
want to preclude a developer from
pursuing both approaches with its
Health IT Module(s). We clarify that for
purposes of Program requirements, a
Health IT Module certified to
§ 170.315(f)(5) would not need to
support both approaches; however, we
acknowledge the possibility that a
developer of certified health IT may
choose to support both approaches to
meet the needs of its customer base. As
part of the proposed requirement in
§ 170.315(f)(5), we propose that Health
IT Modules support all ‘‘mandatory’’
and ‘‘must support’’ data elements as
applicable in either the eICR profiles of
the HL7 FHIR eCR IG 57 or the HL7 CDA
eICR IG,58 depending on which
approach they choose. We invite
comment on our proposal to require that
Health IT Modules certified to
§ 170.315(f)(5) support at least the eICR
profiles of the HL7 FHIR eCR IG or the
HL7 CDA eICR IG.
We propose in § 170.315(f)(5)(ii)(C) to
require that Health IT Modules certified
to § 170.315(f)(5) support the receipt,
consumption, and processing of
reportability responses formatted
according to the RR profiles defined in
the HL7 FHIR eCR IG or the HL7 CDA
RR IG. We seek comment on whether we
should instead require Health IT
Modules to have the capability to
receive, consume and process a
reportability response formatted to both
standards. Again, as part of the
proposed consume and process
reportability response requirement in
§ 170.315(f)(5)(ii)(C), we propose that
Health IT Modules support consuming
and processing all ‘‘mandatory’’ and
‘‘must support’’ data elements as
applicable in either the RR profiles of
the HL7 FHIR eCR IG or the RR profiles
of the HL7 CDA RR IG,59 depending on
which approach the developer chooses.
Specifically, we note that Health IT
Modules supporting a FHIR-based
approach must support the RR profiles,
and corresponding ‘‘mandatory,’’ and
‘‘must support’’ data elements,
according to section 10.0.2 of the FHIR
eCR IG.60 It is critical for the health IT
industry to support clinicians or other
appropriate personnel (e.g., infection
preventionists) in receiving reportable
response information in a usable format
from public health, in order to enhance
communication between the public
health community and the healthcare
community. Processing the reportability
response will help clinicians access
responses from public health, including
where the PHA has deemed a case
reportable.
We believe that the health IT industry
eventually will coalesce with the public
health community around a single set of
standards, but for the near-term, we
believe that both CDA-based and FHIRbased standards will be leveraged for
eICR and RR, depending on the unique
circumstances of geography,
jurisdiction, and users of certified
health IT. We reiterate that health IT
developers may choose to support both
CDA and FHIR-based approaches for
electronic case reporting, but we only
propose to require support of at least
one of these approaches for Health IT
Modules certified to § 170.315(f)(5)
pursuant to the Program. Additionally,
health IT developers may choose to
support functionalities beyond these
requirements depending on their
approach to electronic case reporting.
We invite comment on our proposal to
require Health IT Modules certified to
§ 170.315(f)(5) to support at least the RR
profiles of the HL7 FHIR eCR IG or the
HL7 CDA RR IG.
Finally, we propose in
§ 170.315(f)(5)(ii)(A) that a Health IT
Module certified to § 170.315(f)(5)
support the consumption and
processing of electronic case report
trigger codes and parameters based on a
match from Reportable Conditions
Trigger Code value set in § 170.205(t)(4)
57 Available at: https://hl7.org/fhir/us/ecr/
artifacts.html#eicr-profiles.
58 See page 73 of the HL7 CDA eICR IG, ‘‘6.3
Mapping of Data Elements to CDA R2 Templates’’
at: https://www.hl7.org/implement/standards/
product_brief.cfm?product_id=436.
59 See page 63 of the HL7 CDA RR IG, ‘‘6.3
Mapping of Elements to CDA R2 Templates.’’
Available at: https://www.hl7.org/implement/
standards/product_brief.cfm?product_id=470.
60 Available at: https://hl7.org/fhir/us/ecr/
artifacts.html#reportability-response-profiles.
PO 00000
Frm 00028
Fmt 4701
Sfmt 4702
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
received from the eRSD profiles as
specified in the HL7 FHIR eCR IG in
§ 170.205(t)(1).
We understand that the eRSD profiles
include both trigger codes, as described
in the RCTC value set, and more
complex reporting parameters. We
understand that the basics of electronic
case reporting require a health IT
developer to use, at a minimum,
reportable conditions as represented in
the RCTC value set to match with a
patient visit and/or encounter, so we
propose to require that Health IT
Modules support the eRSD profiles in
the HL7 FHIR eCR IG proposed
§ 170.205(t)(1) using the RCTC value set
in proposed § 170.205(t)(4).
We propose to require certified Health
IT Modules to support the ability to
consume and process the eRSD profiles,
which include the RCTC value set,
regardless of whether such a Health IT
Module supports a FHIR-based or CDAbased approach to certification. As part
of the proposal to require Health IT
Modules to consume and process the
eRSD profiles in § 170.315(f)(5)(ii)(A),
we clarify that a Health IT Module must
support consuming and processing all
‘‘mandatory’’ and ‘‘must support’’ data
elements of the eRSD Specification
Library and the eRSD Supplemental
Library specified in section 10.0.3 of the
HL7 FHIR eCR IG.61
We clarify that a certified Health IT
Module need only support parsing and
consuming the eRSD Specification
Library and eRSD Supplemental Library
because we understand that health IT
developers may choose to either
manually encode the electronic case
reporting trigger logic into Health IT
Modules or may support a more
automated process for encoding the
trigger logic into Health IT Modules. We
request comment on this approach and
on whether there is general support of
the eRSD Specification Library and
eRSD Supplemental Library for
electronic case reporting triggering.62
Per documentation in the HL7 CDA
eICR IG,63 we believe that the HL7 FHIR
eRSD profile can be used by certified
Health IT Modules that leverage either
the FHIR-based or CDA-based
approaches we propose. We invite
comment on the proposed adoption of
the eRSD profiles for Health IT Modules
certified to § 170.315(f)(5) and our
61 Available at: https://hl7.org/fhir/us/ecr/
artifacts.html#ersd-profiles-instances.
62 See https://hl7.org/fhir/us/ecr/STU2.1/
electronic_reporting_and_surveillance_distribution_
ersd_transaction_and_profiles.html#suspectedreportability-criteria.
63 See page 11 of HL7 CDA eICR IG at: https://
www.hl7.org/implement/standards/product_
brief.cfm?product_id=436.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
understanding that the eRSD profiles
can be used by Health IT Modules that
implement a CDA-approach to
electronic case reporting. We welcome
comment on the eRSD profiles within
the HL7 FHIR IG and its use by certified
Health IT Modules that choose a CDAbased approach to certification.
We note that in the 2015 Edition Final
Rule, we established a policy for
minimum standards code sets that
update frequently throughout a calendar
year (80 FR 62612), and we have listed
several standards as minimum standard
code sets in 45 CFR part 170 subpart B.
As with all adopted minimum standards
code sets, health IT can be certified to
newer versions of the adopted baseline
version minimum standards code sets
for purposes of certification, unless the
Secretary specifically prohibits the use
of a newer version (see § 170.555 and 77
FR 54268).
The RCTC value set comprises single
factor codes that represent any event
that may be reportable to any PHA in
the United States. The RCTC value set
currently includes ICD–10 CM,
SNOMED CT, LOINC, RxNorm, CVX,
and CPT, representing conditionspecific diagnoses, resulted lab tests
names, lab results, lab orders for
conditions reportable upon suspicion,
and medications for select conditions.
Given that the contents of the RCTC
value set update frequently, we propose
to recognize the RCTC value set as a
minimum standard code set in
§ 170.205(t)(4), and we propose that the
reference standard for the RCTC value
set be established as RCTC OID:
2.16.840.1.114222.4.11.7508, Release
March 29, 2022, IBR approved
(incorporated by reference in § 170.299)
(available at: https://
ecr.aimsplatform.org/ehr-implementers/
triggering/). This approach will have the
practical impact of enabling ONC to
reference a persistent version of the
RCTC value set, establishing a baseline
for use in the Program, and will enable
developers of certified health IT to
support newer or updated versions of
RCTC value sets for their customers as
soon as new releases are available,
unless the Secretary prohibits the use of
a newer version for certification. Given
that the RCTC value set reflects both
current and emerging reportable
conditions, we believe it is important to
frame it as a minimum standard code
set, thus making newer versions
available for frequent update by
developers of certified health IT. At a
minimum, we expect that Health IT
Modules certified to § 170.315(f)(5)(ii) to
support this reference version of the
RCTC value set (RCTC OID:
2.16.840.1.114222.4.11.7508, Release
PO 00000
Frm 00029
Fmt 4701
Sfmt 4702
23773
March 29, 2022, IBR approved
(incorporated by reference in
§ 170.299)). Health IT Modules certified
to § 170.315(f)(5)(ii) may voluntarily
support an updated version (e.g., a
subsequent release) of the RCTC value
set, and we anticipate that health IT
developers would be incentivized by
their customers to take advantage of this
opportunity to voluntarily support
updated versions of the RCTC value set
because it will include new codes
reflecting new or emerging infectious
diseases. We note that there is no
requirement to support the RCTC value
set for Health IT Modules certified to
§ 170.315(f)(5)(i). We invite comment on
these proposals and our assessment
regarding the desirability of developers
of certified health IT to use updated
versions of the RCTC value set in their
Health IT Modules.
The eCR FHIR IG is a relatively new
standard with standard for trial use
(STU1) status published on January 29,
2020, STU2 published on January 18,
2022, and an updated STU2 published
on August 31, 2022. While we propose
to adopt the eICR, RR, and eRSD profiles
of the FHIR eCR IG as described in this
section, we are also interested in
receiving specific comments from the
public regarding their experiences with
implementation and use of the FHIR
eCR IG.
We note that requiring standards in
the proposed § 170.315(f)(5)(ii)(A), (B),
and (C) for Health IT Modules certified
to § 170.315(f)(5) will enable ONC to
approve newer versions of these
standards through SVAP per existing
provisions at 45 CFR 170.405(b)(8) and
170.405(b)(9), which will enable health
IT developers to voluntarily keep pace
with the latest improvements in
standards outside the timeframes
dictated by the rulemaking process. We
invite comment on the proposed
adoption of these HL7 standards and
IGs, including whether we should
finalize only the FHIR-based standards
and IGs or only the CDA-based
standards and IGs, or both as proposed.
e. Proposal for Reporting
Finally, we propose in
§ 170.315(f)(5)(ii)(D) to require Health IT
Modules certified to § 170.315(f)(5) to be
capable of electronically reporting to a
system that is capable of receiving case
reports electronically. This proposed
reporting function would be agnostic to
a specific standard or reporting
mechanism or platform. We note that all
currently balloted HL7 standards
directly reference optional use of a
centralized decision support solution
called the Reportable Condition
Knowledge Management System
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
23774
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
(RCKMS) made available through the
Association of Public Health
Laboratories (APHL) Informatics
Messaging Services (AIMS) platform.64
We understand that many PHAs directly
input their jurisdiction’s reporting
criteria into RCKMS through the AIMS
platform, so that eICRs from a
healthcare setting can be processed
against those reporting criteria to
determine if the case report is reportable
and to which PHA(s) the report should
be sent.
At this time, ONC is not proposing to
require Health IT Modules certified to
§ 170.315(f)(5) to specifically connect to
AIMS or support RCKMS to meet the
proposed requirements in
§ 170.315(f)(5)(ii)(D). While we
understand the role AIMS and RCKMS
play in a centralized, hub-and-spoke
model for electronic case reporting, we
propose that the functional
requirements for § 170.315(f)(5)(ii)(D)
remain agnostic as to which reporting
platform and which decision support
tool are used. However, we note that
different PHAs are likely to have
different reporting requirements,
including specific systems, decision
support logic, or both. While we are not
requiring the use of a specific reporting
platform, the certified functionality in
§ 170.315(f)(5)(ii)(D) requires that the
Health IT Module be capable of
transmitting electronic case reports
consistent with the reporting
requirement(s) established by a PHA.
We know that some states and
jurisdictions have implemented separate
electronic reporting requirements that
do not involve the use of the AIMS
platform, RCKMS, or both, and we
believe that reporting requirements
should be determined by PHAs at this
time. Therefore, developers of certified
health IT can meet the requirements in
§ 170.315(f)(5)(ii)(D) by demonstrating
that their Health IT Modules possess the
capability to send a case report
electronically to any system capable of
receiving a case report. A developer of
certified health IT could also elect to
support more than one reporting option
in a Health IT Module.
As stated previously, the primary
motivation for proposing standards for
electronic case reporting in
§ 170.315(f)(5) is to enable the use of
SVAP to allow industry to leverage
improved versions of standards on an
expedited timeline, as the standards
continue to evolve and mature. We
encourage members of the standards
development community to iterate and
improve these HL7®-balloted standards
for electronic case reporting so that the
64 https://www.rckms.org/.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
benefits of this technology may be
widely shared.
5. Decision Support Interventions and
Predictive Models
Since 2010, the Program has
maintained a CDS certification criterion,
consistent with the ‘‘qualified electronic
health record’’ definition in section
3000(13) of the PHSA, which defines a
qualified EHR as an electronic record of
health-related information on an
individual that has the capacity to
‘‘provide clinical decision support’’ (42
U.S.C. 300jj(13)(B)(i)). The initial
requirements for the CDS certification
criterion were intended to ensure that
Health IT Modules support broad
categories of CDS while being agnostic
toward the intended use of the CDS
beyond drug-drug and drug-allergy
interaction checks. The initial CDS
criterion required that a Health IT
Module could: (1) implement rules,
‘‘according to specialty or clinical
priorities;’’ (2) ‘‘automatically and
electronically generate and indicate in
real-time, alerts and care suggestions
based upon clinical decision support
rules and evidence grade;’’ and (3) track,
record, and generate reports on the
number of alerts responded to by a user
(75 FR 2046).
In 2012, largely based on
recommendations made by ONC’s
Health Information Technology Policy
Committee (HITPC),65 ONC established
a new set of functionalities for Health IT
Modules supporting CDS, including: (1)
Display source or citation of CDS; (2) be
configurable based on patient context
(e.g., inpatient, outpatient, problems,
meds, allergies, lab results); (3) be
presented at a relevant point in clinical
workflow; (4) include alerts presented to
users who can act on alerts (e.g.,
licensed professionals); (5) be integrated
with the EHR (i.e., not standalone). ONC
finalized the current instantiation of the
Program’s CDS criterion in
§ 170.315(a)(9) and required Health IT
Modules certified to that criterion to
provide users with four source attributes
related to each CDS intervention (80 FR
62622).
Since the adoption of the CDS
criterion in § 170.315(a)(9), health IT
implementation and technology
resources used to support clinical
decision-making have continued to
evolve. Within healthcare today,
predictive models are increasingly being
used and relied upon to inform an array
of decision-makers, including
65 Health Informational Technology Policy
Committee (HITPC) Transmittal Letter to the
National Coordinator. June 2011. https://
www.healthit.gov/sites/default/files/facas/hitpcstage-2-mu-recommendations.pdf#page=4.
PO 00000
Frm 00030
Fmt 4701
Sfmt 4702
clinicians, payers, researchers, and
individuals, and to aid decision-making
through CDS.66 In many cases, certified
health IT is a key component and data
source of these predictive models, often
providing the data used to build and
train algorithms and serving as the
vehicle to influence day-to-day
decision-making.67 Both structured and
unstructured data generated by, and
subsequently made available through
certified Health IT Modules, power the
training and real-world use of predictive
models. Either as part of testing data or
as real-time inputs into deployed
predictive models, certified Health IT
Modules provide data these predictive
models need to work. Developers of
certified health IT also create and
deploy predictive algorithms or models
for use in production environments
through their Health IT Modules and,
increasingly, such developers also
enable other parties, including thirdparty developers and customers of the
developer of certified health IT, to
create and deploy predictive models
through the developer’s Health IT
Modules. In turn, certified Health IT
Modules are often the vehicle or
delivery mechanism for predictive
model outputs to reach users, such as
clinicians, through decision support.
The National Academy of Medicine
(NAM) described in a 2019 report how
predictive models and other forms of
artificial intelligence (AI) have the
potential to represent the ‘‘payback’’ of
using health IT ‘‘by facilitating tasks
that every clinician, patient, and family
would want, but are impossible without
electronic assistance.’’ 68 The NAM
report also identified a crucial ‘‘need to
present each healthcare AI tool along
with the spectrum of transparency
related to the potential harms and
context of its use. Evaluating and
addressing appropriate transparency, in
66 See e.g., American Hospital Association.
‘‘Surveying the AI Health Care Landscape’’ 2019.
https://www.aha.org/system/files/media/file/2019/
10/Market_Insights_AI-Landscape.pdf; Darshali A
Vyas, et al., Hidden in plain sight—reconsidering
the use of race correction in clinical algorithms
§ 383 (Mass Medical Soc 2020); Fact Versus Fiction:
Clinical Decision Support Tools and the (Mis)use of
Race. (2021); Goldhill, Olivia. Artificial intelligence
can now predict suicide with remarkable accuracy,
Quartz, (July 2022), https://qz.com/1001968/
artificial-intelligence-can-now-predict-suicide-withremarkable-accuracy/ (discussing the use of ML
algorithms to predict and prevent suicide).
67 See, e.g., Burdick, Hoyt, et al. ‘‘Effect of a sepsis
prediction algorithm on patient mortality, length of
stay and readmission: a prospective multicentre
clinical outcomes evaluation of real-world patient
data from US hospitals.’’ BMJ health & care
informatics 27.1 (2020).
68 Michael Matheny, et al., Artificial intelligence
in health care: the hope, the hype, the promise, the
peril, WASHINGTON, DC: NATIONAL ACADEMY
OF MEDICINE (2019).
E:\FR\FM\18APP2.SGM
18APP2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
each sub-domain of data, algorithms,
and performance, and systematically
reporting it, must be a priority.’’ 69
As the evolution of technology has
continued, there has been a bi-partisan
effort to ensure the Department and the
Federal Government optimize the use of
AI while working to address potential
risks in the development and use of
predictive models and AI, including
efforts to promote transparency and
notice, ensure fairness and nondiscriminatory practices, and protect the
privacy and security of health
information.
In November of 2020, the Office of the
Management and Budget released a
Memorandum for the Heads of
Executive Departments and Agencies on
Guidance for Regulation of Artificial
Intelligence Applications, which
directed that ‘‘[w]hen considering
regulations or policies related to AI
applications, agencies should continue
to promote advancements in technology
and innovation, while protecting
American technology, economic and
national security, privacy, civil liberties,
and other American values, including
the principles of freedom, human rights,
the rule of law, and respect for
intellectual property.’’ 70 This was
followed by an executive order in
December of 2020: E.O. 13960
Promoting the Use of Trustworthy
Artificial Intelligence in the Federal
Government.71 The executive order
stated: ‘‘The ongoing adoption and
acceptance of AI will depend
significantly on public trust. Agencies
must therefore design, develop, acquire,
and use AI in a manner that fosters
public trust and confidence while
protecting privacy, civil rights, [and]
civil liberties[.]’’ (85 FR 78939).
In June of 2021, the Government
Accountability Office (GAO) published
Artificial Intelligence: An
Accountability Framework for Federal
Agencies and Other Entities, which
specifically outlined key principles and
actions ‘‘[t]o help entities promote
accountability and responsible use of AI
systems.’’ This included outlining four
principles for the framework, including
governance, data, performance, and
monitoring.72
ddrumheller on DSK120RN23PROD with PROPOSALS2
69 Id.
70 OMB–EOP—Memorandum for the Heads of
Executive Departments and Agencies on Guidance
for Regulation of Artificial Intelligence M–21–06, p.
6 (Nov. 17, 2020).
71 E.O. No. 13960, 85 FR 78939: https://
www.federalregister.gov/documents/2020/12/08/
2020-27065/promoting-the-use-of-trustworthyartificial-intelligence-in-the-federal-government.
72 GAO, Artificial Intelligence: An Accountability
Framework for Federal Agencies and Other Entities:
(June 2021), https://www.gao.gov/assets/gao-21519sp.pdf. See generally Artificial Intelligence in
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
In September of 2022, the BidenHarris Administration published
Principles for Enhancing Competition
and Tech Platform Accountability,
which included a principle related to
stopping discriminatory algorithmic
decision-making.73 In October of 2022,
the Biden-Harris Administration
published a Blueprint for an AI Bill of
Rights, which outlines five principles,
informed by public input, that should
guide the design, use, and deployment
of automated systems to protect the
American public in the age of artificial
intelligence. These principles are safe
and effective systems; algorithmic
discrimination protections; data
privacy; notice and explanation; and
human alternatives, consideration, and
fallback.74
Finally, in February of 2023, E.O.
14901: Further Advancing Racial Equity
and Support for Underserved
Communities Through the Federal
Government was issued (88 FR 10825–
10833).75 E.O. 14091 of Feb. 16, 2023,
builds upon previous equity-related
E.O.s, including E.O. 13985.76 Section 1
of E.O. 14091 requires the Federal
Government to ‘‘promote equity in
science and root out bias in the design
and use of new technologies, such as
artificial intelligence.’’ Section 8,
subsection (f) of E.O. 14091 requires
agencies to consider opportunities to
‘‘prevent and remedy discrimination,
including by protecting the public from
algorithmic discrimination.’’
A growing body of peer-reviewed
evidence, technical and socio-technical
expert analyses, and government
activities and reports 77 focus on
ensuring that the promise of AI and
machine learning (ML) can equitably
accelerate advancements in healthcare
Health Care: Benefits and Challenges of
Technologies to Augment Patient Care, (Nov. 2020),
https://www.gao.gov/products/gao-21-7sp.
73 See White House, Principles for Enhancing
Competition and Tech Platform Accountability,
Sept. 8, 2022, https://www.whitehouse.gov/briefingroom/statements-releases/2022/09/08/readout-ofwhite-house-listening-session-on-tech-platformaccountability/.
74 The White House, Blueprint for an AI Bill of
Rights (October 4, 2022), https://
www.whitehouse.gov/ostp/ai-bill-of-rights/.
75 E.O. 14091, 88 FR 10825–10833: https://
www.federalregister.gov/documents/2023/02/22/
2023-03779/further-advancing-racial-equity-andsupport-for-underserved-communities-through-thefederal.
76 E.O. 13985, 88 FR 7009: https://www.federal
register.gov/documents/2021/01/25/2021-01753/
advancing-racial-equity-and-support-forunderserved-communities-through-the-federalgovernment.
77 We discuss additional federal and HHS
activities—including activities resulting from the
executive orders—in the sub-section entitled
‘‘Relationship to Other Federal Agencies’ Relevant
Activities, Interests, and Regulatory Authority.’’
PO 00000
Frm 00031
Fmt 4701
Sfmt 4702
23775
to improve the health and well-being of
the American public. We are therefore
proposing to incorporate new
requirements into the ONC Health IT
Certification Program for Health IT
Modules that support AI and ML
technology. These requirements align
with the Federal Government’s efforts to
promote trustworthy AI and the
Department’s stated policies on
advancing equity in the delivery of
health and human services.78
We believe that the continued
evolution of decision support software,
especially as it relates to AI- and MLdriven predictive DSIs, necessitates new
requirements for the Program’s CDS
criterion. These include proposed
requirements for new sets of
information that are necessary to guide
decision-making based on
recommendations (outputs) from
predictive DSIs, such as an expanded
set of ‘‘source attributes’’ and
information related to how intervention
risk is managed by developers of
certified health IT with Health IT
Modules that enable or interface with
predictive DSIs. We believe that these
new sets of information would provide
appropriate information to help guide
decisions at the time and place of care,
consistent with 42 U.S.C. 300jj–11(b)(4).
Artificial Intelligence, Algorithms, and
Predictive Models in Healthcare
We consider AI to encompass a broad
and varied set of technologies that
generally incorporate algorithms or
statistical models. Early examples of AI
in healthcare, sometimes referred to as
‘‘expert systems,’’ were based on
codified expert knowledge, logic
models, and deterministic rules to
recommend treatment for individuals,
and systems of this type are widely used
today to provide clinical decision
support (CDS).79 More recently, the use
of AI based on statistical and related ML
approaches to generate predictions (that
are used in classifications,
recommendations, and related outputs)
has grown in healthcare. That growth
has been propelled by what is
sometimes referred to as the ‘‘AI
Triad’’ 80—improvements in data
78 HHS, Statements on New Plan to Advance
Equity in the Delivery of Health and Human
Services, April 14, 2022, https://www.hhs.gov/
about/news/2022/04/14/hhs-statements-on-newplan-advance-equity-delivery-health-humanservices.html.
79 See Edward H Shortliffe, et al., An artificial
intelligence program to advise physicians regarding
antimicrobial therapy, 6 Computers and Biomedical
Research (1973).
80 Ben Buchanan, The AI triad and what it means
for national security strategy, Center for Security
and Emerging Technology (2020). https://
E:\FR\FM\18APP2.SGM
Continued
18APP2
23776
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
availability, algorithm effectiveness, and
computing power—which allows
complex models to be applied to large
data sets. To date, the most successful
application of these models in the
domain of healthcare has focused on the
processing of images to inform
diagnosis.81 However, they have already
been applied to a wide range of
healthcare use cases leveraging certified
health IT, many times to aid decisionmaking.82 The current and potential
applications of AI to healthcare are vast
ranging from interpretation of medical
imaging; efficient allocation of scarce
healthcare resources; improved
diagnostic and prognostic accuracy; and
reduced clinician burden and
subsequent burnout.83
Within healthcare today, predictive
models are increasingly being used to
inform an array of key decision-makers,
including clinicians, payers,
researchers, and individuals, and to aid
decision-making through CDS.84 We
describe the implementation of models
to support or inform decision-making
across the health industry as ‘predictive’
decision support interventions (DSI),
though others have used the terms
‘augmented intelligence,’ ‘automated
decision-making,’ or ‘augmented
decision-making,’ to describe such tools
and technologies.85 Often, these
cset.georgetown.edu/research/the-aitriad-and-whatit-means-for-national-security-strategy.
81 Aggarwal, Ravi, et al. ‘‘Diagnostic accuracy of
deep learning in medical imaging: A systematic
review and meta-analysis.’’ NPJ digital medicine 4.1
(2021): 1–23.
82 See Romero-Brufau, Santiago, et al.
‘‘Implementation of artificial intelligence-based
clinical decision support to reduce hospital
readmissions at a regional hospital.’’ Applied
clinical informatics 11.04 (2020): 570–577; Sendak,
Mark P., et al. ‘‘Real-world integration of a sepsis
deep learning technology into routine clinical care:
implementation study.’’ JMIR medical informatics
8.7 (2020): e15182; Andrew L Beam & Isaac S
Kohane, Big data and machine learning in health
care, 319 Jama (2018).
83 See Michael Matheny, et al., Artificial
intelligence in health care: the hope, the hype, the
promise, the peril, WASHINGTON, DC: NATIONAL
ACADEMY OF MEDICINE (2019); Davenport,
Thomas, and Ravi Kalakota. ‘‘The potential for
artificial intelligence in healthcare.’’ Future
healthcare journal 6.2 (2019): 94.
84 See e.g., American Hospital Association.
‘‘Surveying the AI Health Care Landscape’’ 2019.
https://www.aha.org/system/files/media/file/2019/
10/Market_Insights_AI-Landscape.pdf; Darshali A
Vyas, et al., Hidden in plain sight—reconsidering
the use of race correction in clinical algorithms
§ 383 (Mass Medical Soc 2020); Fact Versus Fiction:
Clinical Decision Support Tools and the (Mis)use of
Race. (2021); Goldhill, Olivia. Artificial intelligence
can now predict suicide with remarkable accuracy,
Quartz, (July 2022), https://qz.com/1001968/
artificial-intelligence-can-now-predict-suicide-withremarkable-accuracy/ (discussing the use of ML
algorithms to predict and prevent suicide).
85 Elliott Crigger, et al., Trustworthy Augmented
Intelligence in Health Care, 46 Journal of Medical
Systems (2022).
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
predictive DSIs include a ‘‘human in the
loop’’ or are otherwise used in
conjunction with an expert’s judgment,
though in some cases, these tools could
initiate clinical management that
requires a clinician to contest.86
Increasingly, predictive DSIs are
embedded into health IT systems
including certified health IT, within a
medical device, or as a standalone
medical device.87 In addition to
informing treatment at the point-of-care
(e.g., clinical guidelines, pathways, and
CDS), predictive models can also form
the basis for the ‘back end’ of DSIs used
by integrated delivery systems, payers,
and consumers including for
administrative, payment, or operations
workflows. These models thereby
influence decisions beyond the point of
care such as by prompting use of default
order sets, prior authorization
workflows, or recommending doublebooking certain patients.88
The expanding use of and reliance on
predictive models in healthcare are
demonstrating value in many
circumstances.89 However, growing
evidence indicates that predictive
models introduce or increase the
potential for a variety of risk types. The
use of some predictive models can have
unintended, adverse or negative impacts
on patients, patient populations, or
communities due to a range of factors
related to model risk.90
In this proposed rule, model risk
refers to the potential that an entity is
negatively influenced by a potential
circumstance or event based on
86 This latter case is referred to as Level 2
Autonomous AI in CPT® Appendix S: Artificial
Intelligence Taxonomy for Medical Services and
Procedures (ama-assn.org), doi: 10.1164/
rccm.202109–2092OC.
87 A device, as defined in section 201(h) of the
FD&C Act, can include an instrument, apparatus,
implement, machine, contrivance, implant, in vitro
reagent, or other similar or related article, including
a component part, or accessory which is, among
other criteria, intended for use in the diagnosis of
disease or other conditions, or in the cure,
mitigation, treatment, or prevention of disease in
man. The term ‘‘device’’ does not include software
functions excluded pursuant to section 520(o) of the
FD&C Act.
88 See e.g., Michele Samorani, Shannon L. Harris,
Linda Goler Blount, Haibing Lu, Michael A. Santoro
(2021) Overbooked and Overlooked: Machine
Learning and Racial Bias in Medical Appointment
Scheduling. Manufacturing & Service Operations
Management 0(0), https://pubsonline.informs.org/
doi/10.1287/msom.2021.0999.
89 Dean NC, Vines CG, Carr JR, et al. A Pragmatic
Stepped-wedge, Cluster-controlled Trial of Realtime Pneumonia Clinical Decision Support. Am J
Respir Crit Care Med. 2022 Mar 8.
90 See e.g., Cutillo, C.M., Sharma, K.R., Foschini,
L. et al. Machine intelligence in healthcare—
perspectives on trustworthiness, explainability,
usability, and transparency. npj Digit. Med. 3, 47
(2020), https://doi.org/10.1038/s41746-020-02542https://www.nature.com/articles/s41746-020-02542.
PO 00000
Frm 00032
Fmt 4701
Sfmt 4702
incorrect, misused, or otherwise
harmful model outputs and reports, the
likelihood of those adverse
consequences, and their magnitude.91
Risks related to predictive models can
impact healthcare decisions in a myriad
ways, including models that: exhibit
harmful bias; are broadly inaccurate;
have degraded due to model or data
drift; 92 misuse of the model (incorrect
or inappropriate use); or result in
widening health disparities.93 Several of
these risks can be heightened by
inattention to human factors, which can
heighten the risk that models are not
designed to effectively support their
real-world use, that models are
misinterpreted or misapplied by users,
and that users do not have the necessary
means to identify or alter models that
are not effective or exhibit harmful
bias.94 The extent to which predictive
models can be misused and provide low
validity or biased predictions (outputs)
has only recently come into sharper
focus.95
One of the most consequential
adverse events resulting from the use of
predictive models relates to bias in the
predictions of such models. While the
use of AI has the potential to reduce
unlawful discrimination caused by
systemic biases,96 it can also reinforce
or introduce bias. When AI introduces
or exacerbates bias, it can lead to
discriminatory outcomes or decisions,
violate anti-discrimination laws, and
91 See Bd. Governors Fed. Rsrv. Sys., Off. of
Comptroller of the Currency, Supervisory Guidance
on Model Risk Management, SR Letter 11–7, (April
2011), https://www.federalreserve.gov/
supervisionreg/srletters/sr1107.htm and NIST, AI
Risk Management Framework (AI RMF), January
2023, https://www.nist.gov/itl/ai-risk-managementframework.
92 Model drift has been defined as ‘‘the
degradation of model performance due to changes
in data and relationships between input and output
variables.’’ See https://www.ibm.com/cloud/watsonstudio/drift. See e.g., Davis SE, Lasko TA, Chen G,
Siew ED, Matheny ME. Calibration drift in
regression and machine learning models for acute
kidney injury. J Am Med Inform Assoc. 2017 Nov
1;24(6):1052, https://pubmed.ncbi.nlm.nih.gov/
28379439/.
93 See, e.g., Bias at warp speed: how AI may
contribute to the disparities gap in the time of
COVID–19: https://academic.oup.com/jamia/
article/28/1/190/5893483.
94 See Section 3.3 of NIST Special Publication
1270, ‘‘Towards a Standard for Identifying and
Managing Bias in Artificial Intelligence.’’
95 Darshali A Vyas, et al., Hidden in plain sight—
reconsidering the use of race correction in clinical
algorithms § 383 (Mass Medical Soc 2020); Fact
Versus Fiction: Clinical Decision Support Tools and
the (Mis)use of Race. (2021).
96 See Adnan Asar, AI Could Reduce Racial
Disparities in Healthcare, Forbes (Oct. 1, 2021)
(discussing algorithms that read knee x-rays and
evaluate patient pain did a better job than doctors),
https://www.forbes.com/sites/forbestechcouncil/
2021/10/01/ai-could-reduce-racial-disparities-inhealthcare/?sh=3deb4cf75a4a.
E:\FR\FM\18APP2.SGM
18APP2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
undermine public trust and confidence
in AI.97 Bias in predictive models and
other forms of AI is defined as unequal
performance among individuals across
groups or unequal predictions for
similar individuals belonging to specific
groups and comparator groups.98 The
use of biased models has the potential
to worsen disparities in health, access to
healthcare, and the quality of healthcare
for individuals or groups.
For example, a widely used algorithm
designed to identify patients with high
needs for healthcare systematically
assigned lower scores to Black patients
than to White patients, even when those
individuals had similar numbers of
chronic conditions and other markers of
health.99 In this instance, the model was
designed to predict healthcare costs
rather than individual’s health, and bias
emerged because healthcare costs are
systematically lower for Black than
White patients due to structural biases
and differences in access to care. The
application of this model to determine
enrollment into preventive services may
have led users to select far more White
patients than Black patients of similar
health, exacerbating health disparities.
There are numerous other instances in
which the deployment of AI
technologies has been accompanied by
concerns about whether and how
societal biases are being perpetuated or
amplified.100 While an essential issue,
97 See Off. of Mgmt. & Budget, Exec. Off. of the
President, Memorandum for the Heads of Executive
Departments and Agencies on Guidance for
Regulation of Artificial Intelligence Applications,
M–21–06, p. 6 (Nov. 17, 2020).
98 See Ninareh Mehrabi, et al., A survey on bias
and fairness in machine learning, 54 ACM
Computing Surveys (CSUR) (2021); Jenna Wiens, et
al., Do no harm: a roadmap for responsible machine
learning for health care, 25 Nature medicine (2019);
Ziad Obermeyer, et al., Dissecting racial bias in an
algorithm used to manage the health of
populations, 366 Science (2019); Michael Feldman,
et al., Certifying and removing disparate impact
(2015); Cathy O’neil, Weapons of math destruction:
How big data increases inequality and threatens
democracy (Broadway Books. 2016).
99 Ziad Obermeyer, et al., Dissecting racial bias in
an algorithm used to manage the health of
populations, 366 SCIENCE (2019).
100 See, e.g., M. Evans and A.W. Mathews, ‘‘New
York Regulator Probes UnitedHealth Algorithm for
Racial Bias,’’ Wall Street Journal, Oct. 2019, https://
www.wsj.com/articles/new-york-regulator-probesunitedhealth-algorithmfor-racial-bias-11572087601;
M.A. Gianfrancesco, S. Tamang, J. Yazdany, and G.
Schmajuk, ‘‘Potential Biases in Machine Learning
Algorithms Using Electronic Health Record Data,’’
JAMA Intern Med, vol. 178, no. 11, p. 1544, Nov.
2018, https://archinte.jamanetwork.com/
article.aspx?doi=10.1001/
jamainternmed.2018.3763; H. Ledford, ‘‘Millions of
black people affected by racial bias in healthcare
algorithms,’’ Nature, vol. 574, no. 7780, pp. 608–
609, Oct. 2019, 55/77 number: 7780 Publisher:
Nature Publishing Group. [Online]. https://
www.nature.com/articles/d41586-019-03228-6; T.
Simonite, ‘‘How an Algorithm Blocked Kidney
Transplants to Black Patients | WIRED,’’ Wired,
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
concerns related to model fairness and
bias are only one of several potential
sources of potential risks related to
predictive models.101 The use of
predictive models, including those that
are part of DSIs, invariably present
model risk (the potential that use of a
model negatively influences an entity).
This includes models performing
differently among certain patients,
populations, and communities without
the user’s knowledge or due to
inappropriate use. Model risk can lead
to patient harm, bias, widening health
disparities, discrimination,102
inefficient resource allocation decisions,
or ill-informed clinical decisionmaking.103
Model risk—and resulting harmful
bias—may be driven by a number of
potential factors, which we seek to
address in this proposed rule. For
instance, there may be additional bias
introduced, either unintentionally or
deliberately, by the developer of a DSI
based on their vested interest in the
2020, https://www.wired.com/story/how-algorithmblocked-kidney-transplants-black-patients/.
101 See NIST, AI RMF 1.0, https://www.nist.gov/
itl/ai-risk-management-framework.
102 See White House, Principles for Enhancing
Competition and Tech Platform Accountability,
Sept. 8, 2022, available at https://
www.whitehouse.gov/briefing-room/statementsreleases/2022/09/08/readout-of-white-houselistening-session-on-tech-platform-accountability/
(noting a principle that includes stopping
discriminatory algorithmic decision-making). See
also U.S. Dept of Health & Human Servs., Office for
Civil Rights, Notice of Proposed Rulemaking,
Nondiscrimination in Health Programs and
Activities, 87 FR 47824, 47880 (Aug. 4, 2022)
https://www.federalregister.gov/documents/2022/
08/04/2022-16217/nondiscrimination-in-healthprograms-and-activities; Section 1557 of the
Affordable Care Act, 42 U.S.C. 18116 (prohibiting
discrimination on the basis of race, color, national
origin (including limited English proficiency), sex
(including sexual orientation and gender identity),
age, or disability in certain health programs or
activities), Title VI of the Civil Rights Act of 1964,
42 U.S.C. 2000d et seq. (prohibiting discrimination
on the basis of race, color, or national origin
(including limited English proficiency) in federally
funded programs or activities), Title IX of the
Education Amendments of 1972, 20 U.S.C. 1681 et
seq. (prohibiting sex discrimination in federally
funded education programs or activities), the Age
Discrimination Act of 1975, 42 U.S.C. 6101 et seq.
(prohibiting age discrimination in federally funded
programs or activities), Section 504 of the
Rehabilitation Act of 1973, 29 U.S.C. 794
(prohibiting disability discrimination in federally
funded programs or activities), and the Americans
with Disabilities Act, 42 U.S.C. 12101 et seq.
(prohibiting disability discrimination by state and
local government entities).
103 See e.g., NIH, National Center for Advancing
Translational Sciences (NCATS), Bias Detection
Tools in Health Care Challenge, (October 2022),
https://www.challenge.gov/?challenge=minimizingbias-and-maximizing-long-term-accuracy-ofpredictive-algorithms-in-healthcare; NIH, National
Institute on Minority Health and Health Disparities,
Science Collaborative for Health disparities and
Artificial intelligence bias Reduction (ScHARe),
https://www.nimhd.nih.gov/resources/schare/.
PO 00000
Frm 00033
Fmt 4701
Sfmt 4702
23777
outcome, clinical intervention, or
recommendation. Developers of
predictive models and decision support
modules sometimes include
pharmaceutical manufacturers,
pharmacies, clinical laboratories, and
other entities that have a financial
interest in the treatment selected by
health care providers. We note the
Federal anti-kickback statute makes it a
criminal offense to knowingly and
willfully offer, pay, solicit, or receive
any remuneration to induce, or in return
for, the referral of an individual to a
person for the furnishing of, or
arranging for the furnishing of, any item
or service reimbursable under a Federal
health care program. The statute’s
prohibition also extends to
remuneration to induce, or in return for,
the purchasing, leasing, or ordering of,
or arranging for or recommending the
purchasing, leasing, or ordering of, any
good, facility, service, or item
reimbursable by a Federal health care
program. Accordingly, if any individual
or entity offers or provides
remuneration to health IT developers,
their customers, or others (including
patients) to arrange for the furnishing of
any item or service or arrange for or
recommend purchasing, leasing, or
ordering any good, facility, service, or
item payable in whole or in part under
a Federal health care program may
implicate and potentially violate the
Federal Anti-Kickback Statute for both
those who offer or pay and those who
solicit or receive remuneration. This
may include, for example, remuneration
by third parties to developers of
certified health IT for integrating or
enabling DSI where one purpose is to
increase sales of the third-party’s
products or services. Our existing
certification criterion for clinical
decision support in § 170.315(a)(9)
includes a source attribute to describe
the funding source of any evidencebased DSIs. In this proposed rule, we
include the same transparency on
funding source requirements within the
proposed source attributes for the new
DSI criterion in § 170.315(b)(11) as well
as additional requirements described
further in the summary of proposals in
this section with the intent of support
users in fully understanding the model
risk in predictive DSI their Health IT
Module enables or interfaces with.
Model risk occurs primarily for two
reasons. First, the model may have
fundamental errors and may produce
inaccurate outputs when viewed against
the design objective and intended uses.
The mathematical calculation and
quantification exercise underlying any
model generally involves application of
E:\FR\FM\18APP2.SGM
18APP2
23778
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
theory, choice of sample design and
numerical routines, selection of inputs
and estimation, and implementation in
information systems. Errors can occur at
any point in the software life cycle from
design through implementation and
after deployment. For instance, model
developers may omit key data elements
that are essential for accurately
predicting outcomes in real-world
environments. Or model developers
may assume that data will be available
at the time of model use, when in
practice, that data is often not yet
available. These oversights can lead to
model outputs that may not be fair,
appropriate, valid, effective, or safe, if
implemented in real-world
environments. In addition, shortcuts,
simplifications, or approximations used
to manage complicated problems could
compromise the integrity and reliability
of outputs from those calculations.
Finally, the quality of model outputs
depends on the quality and
representativeness of input data and
assumptions, and errors in inputs or
incorrect assumptions will lead to
inaccurate outputs or outputs that vary
in accuracy or effectiveness across
different populations.104
Second, the model may be used
incorrectly or inappropriately. Even a
fundamentally sound model producing
accurate outputs consistent with the
design objective of the model may
exhibit high model risk if it is
misapplied or misused. Models by their
nature are simplifications of reality, and
real-world events may prove those
simplifications inappropriate. This is
even more of a concern if a model is
used outside the environment for which
it was designed. Decision makers need
to understand the limitations of a model
to avoid using it in ways that are not
consistent with the original intent.
Limitations come in part from
weaknesses in the model due to its
various shortcomings, approximations,
and uncertainties. Limitations are also a
consequence of assumptions underlying
a model that may restrict the scope to
a limited set of specific circumstances
and situations.105
Greater transparency in model theory,
assumptions, design, and evaluation
could allow users of certified health IT
104 See Bd. Governors Fed. Rsrv. Sys., Off. of
Comptroller of the Currency, Supervisory Guidance
on Model Risk Management, SR Letter 11–7, (April
2011), https://www.federalreserve.gov/
supervisionreg/srletters/sr1107.htm; Off.
Comptroller Currency, Comptroller’s Handbook:
Model Risk Management (Aug. 2021), https://
www.occ.gov/publications-and-resources/
publications/comptrollers-handbook/files/modelrisk-management/index-model-riskmanagement.html.
105 Id.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
to review model design and evaluation
and determine whether a particular
model is appropriate for their purposes.
Despite the need for information about
predictive model development
processes, evaluations of performance,
and risk management, this information
is often unavailable to users and
purchasers of certified health IT. This
may be because such information does
not exist, because it is not made
available to those outside the
organization that developed the model,
or because there is a lack of industry
consensus around what information
should be available and to whom,
among other potential reasons. In turn,
complex predictive models are often
referred to as ‘black boxes’ because it
can be difficult or impossible to
determine why the model arrives at a
specific prediction.106 Even simpler
models, such as the Modification of Diet
in Renal Disease (MDRD) Estimate
Glomerular Filtration Rate (eGFR), can
include difficult-to-observe validity or
fairness issues that may lead to harm.107
In contrast to the U.S. financial
services industry,108 the U.S. healthcare
industry does not have universally
applicable, consistently applied
framework(s), best practices, or norms
for transparency about technical and
performance aspects and organizational
competencies (e.g., model risk
management) in place for DSIs.
Research has indicated that while there
is a proliferation of industry ‘‘reporting
guidelines’’ for various purposes and
scopes within healthcare,109 commonly
106 Leo Breiman, Statistical modeling: The two
cultures (with comments and a rejoinder by the
author), 16 Statistical Science (2001).
107 Darshali A Vyas, et al., Hidden in plain sight—
reconsidering the use of race correction in clinical
algorithms § 383 (Mass Medical Soc 2020); Fact
Versus Fiction: Clinical Decision Support Tools and
the (Mis)use of Race. (2021).
108 See e.g., Model Risk Management: New
Comptroller’s Handbook Booklet, https://
www.occ.treas.gov/news-issuances/bulletins/2021/
bulletin-2021-39.html; Consumer Financial
Protection Bureau (CFPB), (February 23, 2022),
https://files.consumerfinance.gov/f/documents/
cfpb_avm_outline-of-proposals_2022-02.pdf
(outlining CFPB’s proposals and alternatives to
prevent algorithmic bias in home valuations); See
also Fed. Trade Comm’n, Using Artificial
Intelligence and Algorithms (Apr. 8, 2020), https://
www.ftc.gov/business-guidance/blog/2020/04/
using-artificial-intelligence-and-algorithms.
109 See for example, Mitchell, et al., Model cards
for model reporting and Sendak, et al., Presenting
machine learning model information to clinical end
users with model facts labels, and Silcox, et al., AIenabled clinical decision support software: a ‘‘Trust
and Value Checklist’’ for clinicians, 1 NEJM
CATALYST INNOVATIONS IN CARE DELIVERY
(2020); Viknesh, Sounderajah, et al., Developing
specific reporting guidelines for diagnostic accuracy
studies assessing AI interventions: The STARD–AI
Steering Group, 26 NATURE MEDICINE (2020). H
Echo Echo Wang, et al., A bias evaluation checklist
for predictive models and its pilot application for
PO 00000
Frm 00034
Fmt 4701
Sfmt 4702
used ML models developed by health IT
developers frequently do not adhere to
such guidelines.110 This lack of
adherence to voluntary ‘‘reporting
guidelines’’ contributes to the lack of
information available about predictive
models, which can have negative
consequences for users, patients, and
the market underlying these models.
Model developers are likely to have
substantially greater information on the
underlying quality of the models,
hindering potential users’ ability to
select the model they would prefer with
full information, or to choose not to use
any model given the limitations of
available offerings.111 In the absence of
information about how models were
developed and tested or are intended to
function, many users will be unable to
distinguish between products and may
choose technologies that provide
inaccurate information or predictions,
or are ill-suited for a given task or
context. In this context, adverse
selection would occur when developers
offering higher quality predictive
models, or models that provide more
balanced performance across a
representative sample of input data, are
not adequately rewarded in the market
because health care providers and other
potential users do not fully believe or
understand the model developers’
quality claims. This ultimately leads to
high-quality, high-cost model
developers to exit the market.112
Interested parties within the industry
have identified numerous and varied
areas of potential concerns between the
optimal use of predictive models in
healthcare and the real world
deployment of such technologies.113
These concerns stem from a range of
issues including incomplete or nonrepresentative training data,
30-day hospital readmission models, Journal of the
American Medical Informatics Association: JAMIA
(2022); Baptiste Vasey, et al., Reporting guideline
for the early-stage clinical evaluation of decision
support systems driven by artificial intelligence:
DECIDE–AI, 377 BMJ (2022); Gary S Collins, et al.,
Protocol for development of a reporting guideline
(TRIPOD–AI) and risk of bias tool (PROBAST–AI)
for diagnostic and prognostic prediction model
studies based on artificial intelligence, 11 BMJ
OPEN (2021).
110 Fifteen reporting guidelines are employed in
Lu, et al., Low adherence to existing model
reporting guidelines by commonly used clinical
prediction models. medRxiv 2021.07.21.21260282;
doi: https://doi.org/10.1101/2021.07.21.21260282.
111 George A Akerlof, The market for ‘‘lemons’’:
Quality uncertainty and the market mechanism, in
Uncertainty in Economics (1978).
112 Id. At David Dranove & Ginger Zhe Jin,
Quality disclosure and certification: Theory and
practice, 48 Journal of Economic Literature (2010).
113 See, e.g., Michael Matheny, et al., Artificial
intelligence in health care: the hope, the hype, the
promise, the peril, Washington, DC: National
Academy of Medicine (2019).
E:\FR\FM\18APP2.SGM
18APP2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
inconsistent and absent model
performance validation, scarcity of
transparency regarding the composition,
semantics, provenance, and quality of
data used to develop AI tools, and
underdeveloped organizational
competencies or resources to surface
and address ethical and fairness issues
that arise from AI tool deployment,
among others.114 We fundamentally
agree with these assertions, and as we
consider the shared goals expressed by
multiple vantage points of this
discussion, we believe that significant
progress towards optimizing the use of
predictive models in healthcare
decision-making is attainable.
We are aware of existing and
emerging efforts to establish guidelines,
frameworks, and principles to
encourage optimization of predictive
models in healthcare, including recent
industry recognition for evaluation,
monitoring, and guardrails.115 In
addition, many organizations have
adopted a set of high-level principles for
their AI-driven technology to inform
decisions in an ethical fashion and
cause no harm. States are also
concerned about AI, algorithms, and
predictive models and have taken
action,116 including proposing state
114 See also The Council of Europe’s Steering
Committee for Human Rights in the fields of
Biomedicine and Health (CDBIO), Impact of
Artificial Intelligence on the Doctor-Patient
Relationship, https://www.coe.int/en/web/
bioethics/report-impact-of-ai-on-the-doctor-patientrelationship.
115 See, e.g., John Halamka, Suchi Saria, Nigam
Shah. STAT. Health-related artificial intelligence
needs rigorous evaluation and guardrails, https://
www.statnews.com/2022/03/17/health-related-aineeds-rigorous-evaluation-and-guardrails/; Price II,
William Nicholson and Sachs, Rachel and
Eisenberg, Rebecca S., New Innovation Models in
Medical AI (February 11, 2021). 99 Wash. U. L. Rev.
1121 (2022), U of Michigan Public Law Research
Paper No. 21–009, https://ssrn.com/
abstract=3783879 or https://dx.doi.org/10.2139/
ssrn.3783879; Cardiovascular Quality and
Outcomes: 2022; Health AI Partnership (HAIP),
https://dihi.org/health-ai-partnership-aninnovation-and-learning-network-to-facilitate-thesafe-effective-and-responsible-diffusion-of-healthai-software-applied-to-health-care-delivery-settings/
. See generally Petersen C, Smith J, Freimuth RR,
Goodman KW, Jackson GP, Kannry J, Liu H,
Madhavan S, Sittig DF, Wright A.
Recommendations for the safe, effective use of
adaptive CDS in the US healthcare system: an
AMIA position paper. J Am Med Inform Assoc.
2021 Mar 18;28(4):677–684, https://
www.ncbi.nlm.nih.gov/pmc/articles/PMC7973467/.
116 See e.g., State of California Department of
Justice, Press Release. Attorney General Bonta
Launches Inquiry into Racial and Ethnic Bias in
Healthcare Algorithms (Aug. 2022), https://
oag.ca.gov/news/press-releases/attorney-generalbonta-launches-inquiry-racial-and-ethnic-biashealthcare; California Privacy Protection Agency,
Invitation for Preliminary Comments on Proposed
Rulemaking Cybersecurity Audits, Risk
Assessments, and Automated Decisionmaking,
(February 2023), https://cppa.ca.gov/regulations/
pdf/invitation_for_comments_pr_02-2023.pdf.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
legislation.117 Further, many State
Attorneys General also provided
extensive comments on the
Nondiscrimination in Health Programs
and Activities proposed rule to
recommend more stringent oversight of
algorithm-based discrimination.118
Similarly, national and international
governing bodies have identified a need
for enhanced oversight and advanced
tools and metrics to aid in adherence to
best-practice guidelines.119
We believe predictive DSIs can
promote positive outcomes and avoid
harm when those DSIs are FAVES. We
refer to DSIs that are fair, appropriate,
valid, effective, and safe as FAVES. Fair
DSIs do not exhibit biased performance,
prejudice, or favoritism toward an
individual or group based on their
inherent or acquired characteristics.120
Appropriate DSIs are well matched to
the specific contexts and populations to
which they are applied.121 Valid DSIs
117 See e.g., Brookings Institute Commentary. How
California and other states are tackling AI
legislation (March 2023), https://
www.brookings.edu/blog/techtank/2023/03/22/howcalifornia-and-other-states-are-tackling-ailegislation/?utm_
campaign=Brookings%20Brief&utm_
medium=email&utm_content=251387757&utm_
source=hs_email; Office of the Attorney General for
District of Columbia, (December 2021), Stop
Discrimination by Algorithms Act of 2021, https://
oag.dc.gov/sites/default/files/2021-12/DC-BillSDAA-FINAL-to-file-.pdf.
118 Comment from Attorneys General of
California, New York, Massachusetts, and nineteen
other States, HHS–OS–2022–0012, HHS–OS–2022–
0012–0001, 2022–16217: https://
www.regulations.gov/comment/HHS-OS-2022-001273216.
119 See, e.g., H.R. 6580—117th Congress (2021–
2022), Algorithmic Accountability Act of 2022;
European Union AI Act, https://
artificialintelligenceact.eu/ (proposing European
law on AI); Organisation for Economic Cooperation
and Development (OECD), OECD AI Principles,
https://oecd.ai/en/ai-principles; OECD,
Recommendation of the Council on Artificial
Intelligence, https://legalinstruments.oecd.org/en/
instruments/OECD-LEGAL-0449; Word Health
Organization (WHO), Ethics and governance of
artificial intelligence for health, (June 2021), Pan
American Health Organization (PAHO), CE168/11—
Policy on the Application of Data Science in Public
Health Using Artificial Intelligence and Other
Emerging Technologies, (May 2021), https://
www.who.int/publications/i/item/9789240029200;
https://www.paho.org/en/documents/ce16811policy-application-data-science-public-healthusing-artificial-intelligence-and; NIH NCATS, Bias
Detection Tools in Health Care Challenge, (October
2022), https://www.challenge.gov/
?challenge=minimizing-bias-and-maximizing-longterm-accuracy-of-predictive-algorithms-inhealthcare.
120 Alvin Rajkomar, et al., Ensuring fairness in
machine learning to advance health equity, 169
ANNALS OF INTERNAL MEDICINE (2018), https://
www.ncbi.nlm.nih.gov/pmc/articles/PMC6594166/.
121 Richard Ribo
´ n Fletcher, et al., Addressing
fairness, bias, and appropriate use of artificial
intelligence and machine learning in global health,
3 FRONTIERS IN ARTIFICIAL INTELLIGENCE
(2021), https://www.frontiersin.org/articles/
10.3389/frai.2020.561802/full.
PO 00000
Frm 00035
Fmt 4701
Sfmt 4702
23779
have been demonstrated to estimate
targeted values accurately and as
expected in both internal and external
data.122 Effective DSIs have
demonstrated meaningful benefit in
real-world conditions.123 And safe DSIs
are free from any unacceptable risks,
including risks to privacy and security,
and are DSIs for which the probable
benefits outweigh any probable risks.124
Together, we refer to predictive DSIs
and models that are FAVES as highquality. We believe that the rigorous
evaluation of predictive DSIs and
models, and the subsequent transparent
reporting of those evaluations, can
support potential implementers and
users to more easily determine FAVES
models,125 leading to greater use of
FAVES models and consequently,
benefit more patients. In contrast, a
failure to undertake such evaluation can
lead to harmful or, at best, unhelpful
models. One important example comes
from recent evidence that has
documented widespread use of
predictive models that likely provide
low validity predictions—that is,
predictions that are often incorrect and
so may not meaningfully inform
decisions, may raise safety issues, or
potentially cause harm.126 For instance,
one study highlighted the relatively
poor performance of a predictive model
widely used to detect sepsis onset in
‘‘external validation,’’ that is, when it
was evaluated on data generated from a
health system that was not the initial
source for training and test data used to
develop and internally validate the
122 Collins, Gary S., et al. ‘‘Transparent reporting
of a multivariable prediction model for individual
prognosis or diagnosis (TRIPOD): the TRIPOD
statement.’’ Journal of British Surgery 102.3 (2015):
148–158.
123 Amit G Singal, et al., A primer on
effectiveness and efficacy trials, 5 CLINICAL AND
TRANSLATIONAL GASTROENTEROLOGY (2014).
124 Cf. ISO 14971, which considers safety to be
‘‘free from unacceptable risks.’’ If the product is a
device as defined in section 201(h) of the FD&C Act,
there may be different or additional requirements
that apply.
125 FAVES aligns with the five principles of the
Blueprint for an AI Bill of Rights. The Blueprint
includes two additional principles of ‘‘Notice and
Explanation’’ and ‘‘Human Alternatives,
Consideration, and Fallback’’, pertaining to
implementation by users of health IT, which, while
important are outside the scope of the certification
criterion functionality. See The White House,
Blueprint for an AI Bill of Rights, (October 2022)
https://www.whitehouse.gov/ostp/ai-bill-of-rights/.
126 Casey Ross, STAT. AI gone astray: How subtle
shifts in patient data send popular algorithms
reeling, undermining patient safety, 2022, available
at: https://www.statnews.com/2022/02/28/sepsishospital-algorithms-data-shift; Generalizability of
Cardiovascular Disease Clinical Prediction Models:
158 Independent External Validations of 104
Unique Models, https://www.ahajournals.org/doi/
10.1161/CIRCOUTCOMES.121.008487.
E:\FR\FM\18APP2.SGM
18APP2
23780
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
model.127 The goal of our proposals,
described herein, and as aligned with
our authority, is to assist in addressing
the gaps between the promise and peril
of AI in health articulated in the
aforementioned NAM report.
Objectives of the Proposals To Address
Predictive Modeling in DSI
Our proposals in § 170.315(b)(11) are
intended to introduce much-needed
information transparency to address
uncertainty regarding the quality of
predictive DSIs that certified Health IT
Modules enable or interface with, so
that potential users have sufficient
information about how a predictive DSI
was designed, developed, trained, and
evaluated to determine whether it is
trustworthy. We propose a dual
emphasis for transparency on (1) the
technical and performance aspects of
predictive DSIs and (2) the
organizational competencies employed
to manage risks for predictive DSIs.
Together, this information would
support potential users to make more
informed decisions about whether and
how to use predictive DSIs in their
decision-making given the specifics of
their context, patients and needs. We
consider the information included in
these proposed transparency
requirements as a prerequisite to
determine the quality of predictive
models. In addition, such transparency
would provide essential information
needed to determine whether and how
to use the predictive model’s outputs.
Our proposals are not aimed at
approving or guaranteeing the quality of
predictive DSIs or the models they are
based on. Instead, our proposals are
intended to provide users and the
public greater information, available in
a consistent manner, on whether
predictive DSIs are fair, appropriate,
valid, effective, and safe. We believe
that the resulting transparency from the
proposed requirements for the
certification criterion in § 170.315(b)(11)
described in this section would promote
the design, development, and
deployment of high-quality predictive
models in that they adhere to FAVES
principles.128 We further anticipate that
a long-term outcome of such
transparency would be increased public
trust and confidence in predictive DSIs,
so that users, including healthcare
127 Andrew Wong, et al., External validation of a
widely implemented proprietary sepsis prediction
model in hospitalized patients, 181 JAMA Internal
Medicine (2021).
128 See Rogers, Parker, et al. ‘‘Optimizing the
Implementation of Clinical Predictive Models to
Minimize National Costs: Sepsis Case Study.’’
Journal of Medical Internet Research 25 (2023):
e43486.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
systems, clinicians, and patients, can
expand the use of these technologies in
safer, more appropriate, and more
equitable ways. We refer readers to
‘‘Decision Support Interventions and
Predictive Models’’ in section VIII.C.1.a
of this proposed rule for a discussion
about the estimated value associated the
impacts of the decision support
proposals and efforts to promote highquality predictive DSIs.
We do not propose to establish or
define regulatory baselines, measures, or
thresholds of FAVES for predictive
DSIs. Instead, we propose, as part of the
proposed certification criterion in
§ 170.315(b)(11), to establish
requirements for information that would
enable users, based on their own
judgment, to determine if a predictive
DSI that is enabled by or interfaced with
a Health IT Module is acceptably fair,
appropriate, valid, effective, and safe.
We understand that numerous and
parallel efforts led by industry groups
are developing methods to evaluate
predictive DSIs for fairness,
appropriateness, validity, effectiveness,
and safety, among other kinds of
evaluations. These efforts are also
devising means to communicate
measures of FAVES through model
cards,129 model nutrition labels,130
datasheets,131 data cards,132 or
algorithmic audits.133 However, these
efforts lack consensus and have not
been widely or consistently
implemented to date. Thus, while we
believe it is premature to propose
requirements for specific measures or
thresholds for FAVES, our proposed
requirements would enable consistent
and routine access to source attribute
information about technical and
performance dimensions specifically
relevant to FAVES, which would
support users to make informed
129 Mitchell, Margaret, et al. ‘‘Model cards for
model reporting.’’ Proceedings of the conference on
fairness, accountability, and transparency. 2019.
130 Sendak MP, Gao M, Brajer N, Balu S.
Presenting machine learning model information to
clinical end users with model facts labels. NPJ Digit
Med. 2020 Mar 23;3:41. Doi: 10.1038/s41746–020–
0253–3.
131 Gebru, Morgenstern, Vecchione, et al,
Datasheets for Datasets, https://arxiv.org/abs/
1803.09010.
132 FaccT ‘22: 2022 ACM Conference on Fairness,
Accountability, and Transparency (June 2022) Pages
1776–1826, https://dl.acm.org/doi/proceedings/
10.1145/3531146.
133 See James Guszcza, et al., Why We Need to
Audit Algorithms. Harvard Business Review. Nov.
28, 2018. https://hbr.org/2018/11/why-we-need-toaudit-algorithms; Xiaoxuan Liu, et al., The medical
algorithmic audit, The Lancet Digital Health (2022).
See generally Outsider Oversight: Designing a
Third-Party Audit Ecosystem for AI Governance, ID
Raji, P Xu, C Honigsberg, D Ho—Proceedings of the
2022 AAAI/ACM Conference on AI, 2022, https://
dl.acm.org/doi/pdf/10.1145/3514094.3534181.
PO 00000
Frm 00036
Fmt 4701
Sfmt 4702
decisions about whether and how to use
predictive DSIs.
While we believe that transparency
regarding the technical and performance
dimensions of the predictive DSI is
needed, we also believe that
transparency regarding the
organizational and socio-technical
competencies employed by those who
develop predictive DSIs is foundational
for users to determine whether their
predictive DSI is FAVES. Therefore, in
addition to the proposed requirements
for predictive DSI-specific source
attributes, we also propose that
developers of certified health IT with
Health IT Modules that enable or
interface with predictive DSIs and that
are certified to § 170.315(b)(11), employ
or engage in intervention risk
management practices, subsequently
making summary information about
these practices available publicly. We
propose three intervention risk
management practices: (1) risk analysis,
(2) risk mitigation, and (3) governance.
Overall, we identify these practices to
promote transparency regarding how the
developer of certified health IT analyzes
and mitigates risks, at the organization
level, including proposals that would
have such developers establish policies
and implement controls for governance,
including how data are acquired,
managed, and used in predictive DSIs.
Whereas our proposals for source
attributes in § 170.315(b)(11)(vi)(C) are
intended to bring transparency into the
technical and performance dimensions
of the predictive DSI, such as
underlying details of the predictive
model, how the model was trained, and
how its outputs were validated, the
proposals for intervention risk
management in § 170.315(b)(11)(vii)
would focus on the developer of
certified health IT’s organizational
competencies employed, and would
bring transparency into the sociotechnical dimensions of the predictive
DSI. Together, transparency regarding
the technical and performance details of
a predictive DSI, as well as the
organizational competencies of the
developer of certified health IT to
manage risks for a predictive DSI are
intended to contribute to the
trustworthiness of these emerging and
important technologies.
The proposed requirements for the
certification criterion in § 170.315(b)(11)
would also support health equity by
design 134 by, for example, (1)
emphasizing transparency regarding the
134 See ‘‘Embracing Health Equity by Design’’
ONC, February 2022: https://www.healthit.gov/
buzz-blog/health-it/embracing-health-equity-bydesign.
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
use of specific data elements relevant to
health equity 135 in predictive DSIs; (2)
enabling users to review whether and
how the predictive DSI was tested for
fairness; and (3) enabling transparency
about how developers of certified health
IT manage risks related to fairness for
the predictive DSIs their Health IT
Modules enable or interface with.
Specifically, we propose that when
evidence-based and predictive DSIs
include Patient Observations and
Demographics data, Social Determinants
of Health data, and Health Status
Assessments data, the certified Health
IT Modules enable a user to review
these data as part of the source attribute
requirements in § 170.315(b)(11)(vi)(A).
We also propose, as part of source
attribute requirements for Health IT
Modules that enable or interface with
one or more predictive decision support
interventions, that users have
transparency into how and whether a
predictive DSI’s recommendation or
output was measured for fairness in test
data, external data (if available), and
local data (if available) in
§ 170.315(b)(11)(vi)(C)(3)(ii),(iv), and
(C)(4)(iii), respectively.
We believe the existing scope and
structure of the Program are fit for these
purposes because the Program has
existing requirements to make
transparent information regarding the
authorship, bibliography, and other
kinds of ‘‘source attribute’’ information
for evidence-based decision support and
linked referential intervention types. By
requiring developers of certified health
IT with Health IT Modules certified to
§ 170.315(b)(11) to display additional
source attributes on evidence-based
DSIs, to display source attribute
information on the predictive DSI(s)
within their certified products, and to
disclose approach(es) to intervention
risk management in a publicly
accessible manner, these proposals
would have an important impact on the
Department’s efforts to address
disparities and bias that may be
propagated through DSIs. Consequently,
we hope to enhance market
transparency and encourage trust across
the software development life cycle
(SDLC) of DSIs in healthcare. This
transparency would serve as a
foundation for establishing consistency
in information availability, improving
overall data stewardship, and guiding
the appropriate use of data derived from
health information about individuals.
135 See HHS’s Strategic Approach to Addressing
Social Determinants of Health to Advance Health
Equity—At a Glance (April 2022), https://
aspe.hhs.gov/sites/default/files/documents/
aabf48cbd391be21e5186eeae728ccd7/SDOHAction-Plan-At-a-Glance.pdf.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
We are being intentional with the
level of prescriptiveness in our
proposals because these are nascent
technologies with enormous potential
benefit. Thus, we seek to establish
appropriate guardrails for information
transparency about predictive DSIs that
do not undercut the value that could be
offered to patients and clinicians from
such promising technologies.
b. Summary of Proposals
We propose the certification criterion,
‘‘decision support interventions (DSI)’’
in § 170.315(b)(11). The DSI criterion is
a revised certification criterion as it
serves as both an iterative and
replacement criterion for the ‘‘clinical
decision support (CDS)’’ criterion in
§ 170.315(a)(9). We believe that the
continued evolution of decision support
software, especially as it relates to AIand ML-driven predictive models,
necessitates new requirements and a
new name for the Program’s CDS
criterion. We propose to revise the name
of the CDS criterion to ‘‘decision
support interventions’’ to reflect the
various and expanding forms of
decision support that certified Health IT
Modules enable or interface with.
Increasingly, DSIs include use cases or
are intended to support decision-making
across all areas of healthcare, including
early detection of disease, automating
billing procedures, facilitating
scheduling, supporting public health
disease surveillance, and other uses
beyond traditional CDS. We intend for
the DSI criterion to be inclusive of the
wide variety of use cases that Health IT
Modules may support moving forward.
As part of the DSI criterion, we
propose to add in § 170.315(b)(11)(v)
‘‘predictive decision support
interventions’’ and propose to add a
corresponding definition for that term to
§ 170.102. In addition to predictive
DSIs, we propose to include in
§ 170.315(b)(11) the list of current
intervention types in § 170.315(a)(9),
including evidence-based decision
support in § 170.315(b)(11)(iii) and
linked referential DSI in
§ 170.315(b)(11)(iv). Together, we
believe these intervention types reflect
the variety of DSIs increasingly enabled
by or interfaced with, certified Health IT
Modules.
In addition to proposing to adopt all
source attributes listed in
§ 170.315(a)(9)(v) in § 170.315(b)(11), we
also propose in
§ 170.315(b)(11)(vi)(A)(5) through (7) to
include new source attributes for
evidence-based DSIs in
§ 170.315(b)(11)(iii). In
§ 170.315(b)(11)(vi)(A)(5) through (7) we
propose that Health IT Modules enable
PO 00000
Frm 00037
Fmt 4701
Sfmt 4702
23781
users to review what, if any, of the
following data elements were used in
the DSI: Patient Demographics and
Observations data specified in
paragraph § 170.315(a)(5)(i), including
data on race, ethnicity, language, sexual
orientation, and gender identity; SDOH
data elements as expressed in the
standards in § 170.213; and the data
elements of the Health Status
Assessments data class as expressed in
the standards in § 170.213. We note that
the Health Status Assessments data
class includes several data elements,
including Health Concerns, Functional
Status, Disability Status, Mental or
Cognitive Status, Pregnancy Status, and
Smoking Status, as part of the USCDI v3
proposed for adoption in § 170.213(b).
We also note that SDOH data elements
include SDOH Assessment, SDOH
Goals, SDOH Problems/Health
Concerns, and SDOH Interventions as
part of the USCDI v3 in proposed
§ 170.213(b). We do not propose any
changes to the source attributes for
linked referential DSIs in
§ 170.315(b)(11)(vi)(B) from what is
currently in § 170.315(a)(9).
We propose that the new evidencebased DSI source attributes in
§ 170.315(b)(11)(vi)(A)(5) through (7)
would also pertain to predictive DSIs in
§ 170.315(b)(11)(v) that are enabled by
or interface with certified Health IT
Modules, by means of a cross-reference
in § 170.315(b)(11)(vi)(C). In
§ 170.315(b)(11)(vi)(C)(1) through (4),
we also propose several additional
source attributes for Health IT Modules
that enable or interface with predictive
DSIs, as described in paragraph
§ 170.315(b)(11)(v)(A). These additional
source attributes that pertain to
predictive DSIs, would include (1)
interventiondetails, such as a
description of the output and intended
use of the intervention; (2) intervention
development details, such as input
features, training and test data details,
and process(es) used to ensure fairness
in development of the intervention, as
well as external validation process(es),
if available; (3) quantitative measures of
intervention performance, such as
validity and fairness of prediction in
test data and references to any
evaluations of the intervention on
outcomes; and (4) ongoing maintenance
of intervention implementation and use,
including an update schedule and to the
extent practicable, how well the
intervention works (i.e., its validity and
fairness) in the specific setting for
which it is designed or deployed in.
We believe that these additional
source attributes would better support
the transparency of predictive DSIs and
that such information is necessary for
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
23782
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
users to decide whether and how to use
the predictive DSI, including whether to
apply the predictive DSI to individual
patients.
Given the potential of a growing
market of third-party developed
predictive DSIs and development of
predictive DSI by customers of
developers of certified health IT, we
expect that Health IT Modules certified
to § 170.315(b)(11) would provide users
with source attribute information from
these other parties. In circumstances
where the developer of certified health
IT does not receive source attribute
information, we propose in
§ 170.315(b)(11)(vi)(D) that Health IT
Modules clearly indicate when source
attributes related to DSIs developed by
others are not available for the user to
review. We believe it is important that
users be made aware when source
attribute information is missing or
unknown. We propose in
§ 170.315(b)(11)(vi)(E) that Health IT
Modules enable users to author
attributes and revise attributes beyond
what is proposed in
§ 170.315(b)(11)(vi)(A) and
§ 170.315(b)(11)(vi)(C) to support the
ongoing evolution of what source
attributes are important to users to make
informed decisions regarding the DSI’s
recommendation(s).
We propose in § 170.315(b)(11)(vii) to
require developers of certified health IT
with Health IT Modules certified to
§ 170.315(b)(11) that enable or interface
with predictive DSIs (i.e., developers
that attest ‘‘Yes’’ in
§ 170.315(b)(11)(v)(A) for one or more
modules) to employ or engage in and
document information regarding their
intervention risk management (IRM)
practices. These practices are listed in
proposed § 170.315(b)(11)(vii)(A)(1)
through (3). We propose three categories
of IRM practices, including ‘‘risk
analysis,’’ in § 170.315(b)(11)(vii)(A)(1),
‘‘risk mitigation,’’ in
§ 170.315(b)(11)(vii)(A)(2), and
‘‘governance,’’ in
§ 170.315(b)(11)(vii)(A)(3) for each
predictive DSI, as defined in § 170.102,
they enable or interface with. We
propose in § 170.315(b)(11)(vii)(B) that
developers of certified health IT
compile detailed documentation
regarding the results of IRM practices
listed in § 170.315(b)(11)(vii)(A). As an
additional requirement of that
provision, we propose that developers
of certified health IT must make
detailed documentation available to
ONC upon request from ONC for any
predictive decision support
intervention, as defined in § 170.102,
that the Health IT Module enables or
interfaces with. In
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
§ 170.315(b)(11)(vii)(C), we propose that
developers of certified health IT submit
summary information related to their
IRM practices described in
§ 170.315(b)(11)(vii)(A) to ONC–ACBs
via publicly accessible hyperlink that
allows any person to directly access the
information without any preconditions
or additional steps. We propose in
§ 170.315(b)(11)(vii)(D) that health IT
developers subject to these requirements
review annually and, as necessary,
update their documentation described
in § 170.315(b)(11)(vii)(B) and
(b)(11)(vii)(C). The proposed
requirement to make summary
information regarding IRM practices
publicly accessible is similar to
requirements related to API
documentation requirements in
§ 170.315(g)(9)(ii). We believe disclosure
of summary information regarding IRM
practices is necessary for users to
evaluate the organizational
competencies of those parties that
develop predictive DSIs, further
improving users’ understanding of the
steps that have been taken to mitigate
negative impacts or prevent future harm
and better support the transparency of
predictive DSIs.136 We also propose a
new Principle of Proper Conduct for the
ONC–ACBs in § 170.523(f)(1)(xxi) to
require ONC–ACBs to report the
proposed summary information in
§ 170.315(b)(11)(vii)(C), that they
received from health IT developers of
certified health IT, on the Certified
Health IT Product List (CHPL) for the
applicable certified Health IT Modules.
We believe this new Principle of Proper
Conduct is consistent with existing
public disclosure requirements under
the Program (e.g., 45 CFR
170.523(f)(1)(xii) and § 170.523(f)(1)(xx))
and will help ensure accountability for
the public availability of information in
§ 170.315(b)(11)(vii)(C).
Additionally, we propose in
§ 170.315(a)(9)(vi) that the adoption of
the CDS criterion, for purposes of the
Program, expires on January 1, 2025.
This timeline would support our
proposal that developers of certified
health IT must certify their Health IT
Modules to § 170.315(b)(11) by
December 31, 2024, if they wish such
Health IT Modules to meet the newly
proposed Base EHR definition and
136 For example, NIST developed a voluntary AI
Risk Management Framework (AI RMF) and
Playbook. The AI RMF provides a flexible,
structured, and measurable process to address AI
risks prospectively and continuously throughout
the AI life cycle, offering guidance for the
development and use of trustworthy and
responsible AI. Activities are organized as govern,
map, measure, and manage risks. See https://
www.nist.gov/itl/ai-risk-management-framework/
nist-ai-rmf-playbook.
PO 00000
Frm 00038
Fmt 4701
Sfmt 4702
ensure continuity for customers using
Health IT Modules currently certified to
§ 170.315(a)(9).
Finally, we propose in § 170.405(a) to
require health IT developers of certified
health IT with a Health IT Module
certified to § 170.315(a)(9) to submit real
world testing plans and results
consistent with § 170.405 for the period
until the CDS criterion is no longer part
of the Program. We note that developers
of certified health IT with a Health IT
Module certified to any of the criteria in
§ 170.315(b) are already subject to
requirements in § 170.405, thus Health
IT Modules certified to § 170.315(b)(11)
would be subject to the requirements in
§ 170.405.
c. Proposed Requirements for Decision
Support Interventions (DSI)
Certification Criterion
i. Proposed Structural Revisions and
New Criterion Categorization
We propose to adopt the certification
criterion ‘‘decision support
interventions,’’ (DSI) in § 170.315(b)(11)
as a ‘‘revised certification criterion’’
according to the proposed definition in
§ 170.102. The proposed new criterion
in 170.315(b)(11) is a revised version of
45 CFR 170.315(a)(9), ‘‘clinical decision
support (CDS).’’ We propose to adopt in
§ 170.315(b)(11) the structural
paragraphs currently in § 170.315(a)(9)
with modifications that reflect an array
of contemporary functionalities, data
elements, and software applications that
certified Health IT Modules enable or
interface with to aid decision-making in
healthcare. We propose that the policies
established in § 170.315(a)(9)(i) through
(iv) will be included as
§ 170.315(b)(11)(i) through (iv) with
modifications described later in this
preamble. We propose to introduce a
new intervention type in
§ 170.315(b)(11), predictive decision
support interventions, with a
corresponding definition in § 170.102
for predictive decision support
interventions.
We believe that these modifications to
§ 170.315(a)(9), proposed in
§ 170.315(b)(11), reflect a functionality
that is better categorized as part of the
‘‘care coordination certification
criteria,’’ as opposed to the ‘‘clinical
certification criteria,’’ supported by the
Program. Hence, we propose to adopt
the decision support intervention
certification criterion in the ‘‘care
coordination criteria’’ section adopted
within § 170.315(b). The capabilities
included within the certification
criterion in § 170.315(a)(9) are unlike
other certification criteria currently
adopted in the ‘‘clinical’’ section in that
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
the functionality expressed in the
criterion does not result in enabling a
user to ‘‘record,’’ ‘‘change,’’ and
‘‘access’’ specific data types. Rather, the
functionality in § 170.315(a)(9) is more
complex and multi-faceted. The primary
functionality of both § 170.315(a)(9) and
the proposed § 170.315(b)(11) is to
ensure that multiple decision support
intervention types are: (1) supported
through interaction with certified health
IT, and (2) configurable based on a
specified set of data types (including
data listed from the § 170.315(a)(5)
demographics criterion). Additionally,
the existing and proposed criteria
specify that Health IT Modules must
support the availability of an
intervention’s source attributes for users
to review. In this regard, ONC’s existing
CDS criterion and the proposed
criterion in § 170.315(b)(11) are more
like the care coordination criteria in
§ 170.315(b)(1) ‘‘transitions of care’’ and
§ 170.315(b)(2) ‘‘clinical information
reconciliation and incorporation.’’
Further, to be enabled, interventions in
§ 170.315(a)(9) must rely on a wide
array of problems, medications,
demographics, laboratory tests and vital
signs—both generated in the source
system and received through a
transition of care or referral.
We propose modifications to the
‘‘Base EHR’’ definition in § 170.102 to
identify the dates when § 170.315(b)(11)
replaces § 170.315(a)(9) in the Base EHR
definition. In keeping with the proposal
to modify the Base EHR definition in
§ 170.102, we propose that the adoption
of § 170.315(a)(9) as part of the Program
would expire January 1, 2025. We note
that if we finalize these proposals,
developers of certified health IT with
Health IT Modules certified to
§ 170.315(a)(9) who wish for those
Health IT Modules to continue to meet
the Base EHR definition would need to
certify those Health IT Modules to
§ 170.315(b)(11) by December 31, 2024,
which is the effective date we propose
elsewhere in this preamble to modify
the Base EHR definition to include
§ 170.315(b)(11).
As a consequence of proposing to
adopt this criterion in § 170.315(b), we
note that developers of certified health
IT with Health IT Module(s) certified to
§ 170.315(b)(11) would be required to
submit real world testing plans and
corresponding real world testing results,
consistent with § 170.405,
demonstrating the real world use of
each DSI type the developer of certified
health IT supports in § 170.315(b)(11),
including evidence-based decision
support (§ 170.315(b)(11)(iii)), linked
referential (§ 170.315(b)(11)(iv)), and
predictive DSI (§ 170.315(b)(11)(v)) as
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
applicable. We refer readers to 85 FR
25766 for further explanation and
discussion regarding real world testing.
We also note that we propose in a
separate section to include
§ 170.315(a)(9) as part of the applicable
certification criteria for real world
testing in § 170.405(a). We invite
comment on these proposals.
ii. Proposed § 170.315(b)(11)(ii)
Decision Support Configuration
We propose in § 170.315(b)(11)(ii) to
establish ‘‘decision support
configuration,’’ requirements based on
what is currently in § 170.315(a)(9)(ii)
with modifications and additional
requirements. To reflect ONC’s focus on
the USCDI and to acknowledge the
varied data for which DSIs may be
enabled, we propose that data elements
listed in § 170.315(b)(11)(ii)(B)(1)(i)
through (iii) and (v) through (viii) be
expressed according to the standards
expressed in § 170.213, including the
proposed USCDI v3, as proposed
elsewhere in this rule. We propose to
reference the USCDI in
§ 170.315(b)(11)(ii)(B)(1) to define the
scope of the data ‘‘at a minimum.’’ We
note the intention is to establish
baseline expectations that Health IT
Modules certified to § 170.315(b)(11)
must support DSIs that use those data
elements listed in
§ 170.315(b)(11)(ii)(B)(1). We are not
establishing requirements for specific
interventions to be supported, only that
Health IT Modules certified to
§ 170.315(b)(11) be capable of
supporting interventions that use those
listed data elements. This proposed
requirement would pertain to both
evidence-based DSIs and predictive
DSIs that are enabled by or interfaced
with a certified Health IT Module,
including any predictive DSIs that are
developed by users of the certified
Health IT Module. We propose to adopt
in § 170.315(b)(11) the existing reference
in § 170.315(a)(9)(ii)(B)(1)(iv) to
demographic data in § 170.315(a)(5)(i).
These proposals are intended to support
scenarios where, for example, a
clinician may want to leverage their
collection of ‘‘SDOH problems,’’ which
are data elements included as part of the
Problems data class in USCDI v3 in
§ 170.213(b), for decision support. In
such a scenario, we would expect the
Health IT Module certified to
§ 170.315(b)(11) to support such DSIs
based on their conformance to
§ 170.315(b)(11)(ii)(B) and report SDOH
Problem data element(s) as source
attribute information, discussed further
in this section.
Additionally, we propose to include
two USCDI data classes not currently
PO 00000
Frm 00039
Fmt 4701
Sfmt 4702
23783
found in § 170.315(a)(9)(ii)(B)(1). In
§ 170.315(b)(11)(ii)(B)(1)(vii)–(viii), we
propose to include the Procedures and
Unique Device Identifier(s) for a
Patient’s Implantable Device(s) data
classes, respectively, as expressed in the
standards in § 170.213, including the
proposed USCDI v3. We believe that
data regarding a patient’s procedures
and whether a patient has an
implantable medical device, as
indicated by a unique device identifier
(UDI) can play a significant role in
contemporary DSIs; hence, we propose
to require that Health IT Modules would
support data from the Procedures data
class and the Unique Device Identifier(s)
for a Patient’s Implantable Device(s)
data class as an input to DSIs. The
addition of UDI complements
medications and proposed procedures
as an important focal point for various
decision support including those related
to MRIs, post-implant clinical care,
among other care scenarios. Making
these changes would ensure that DSIs
leverage USCDI data elements, and
these changes include a reasonable
scope of USCDI data elements used in
contemporary DSIs, such as SDOH
Problems/Health Concerns. We invite
comment on the additional data classes
described in
§ 170.315(b)(11)(ii)(B)(1)(vii).
We note that in our 2015 Edition
Proposed Rule, we proposed to adopt
new functionality that would require a
Health IT Module certified to
§ 170.315(a)(9) to be able to record at
least one action taken, and by whom it
was taken, when a CDS intervention is
provided to a user (e.g., whether the
user viewed, accepted, declined,
ignored, overrode, provided a rationale
or explanation for the action taken, took
some other type of action not listed
here, or otherwise commented on the
CDS intervention) (80 FR 16821). We
also proposed that a Health IT Module
certified to § 170.315(a)(9) be able to
generate either a human readable
display or human readable report of the
responses and actions taken and by
whom when a CDS intervention is
provided (80 FR 16821). We received
mixed comments in response to our
proposal for this functionality, and
commenters stated that current systems
already provide a wide range of
functionally to document decisions
concerning CDS interventions (80 FR
62622). We did not finalize these
proposed functionalities (for a
‘‘feedback loop’’) in the 2015 Edition
Final Rule, but believe it is important to
do so now.
Research indicates that simple
‘‘feedback loops’’ on the performance of
DSIs implemented at the point of care
E:\FR\FM\18APP2.SGM
18APP2
23784
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
can have important impacts on the
safety, appropriateness, and
effectiveness of those
interventions.137 138 For example, this
functionality is important for users’
ability to monitor the outcomes of the
technology’s use—e.g., to understand
how often and under what
circumstances users override the DSI’s
outputs or recommendations and to
include the outcome of an action in
response to a DSI as a component of
quality measurement. During the 2015
Edition rulemaking process, ONC
proposed a functionality that would
require a Health IT Module to be able
to record at least one action taken and
by whom when a CDS intervention is
provided to a user (e.g., whether the
user viewed, accepted, declined,
ignored, overrode, provided a rationale
or explanation for the action taken, took
some other type of action not listed
here, or otherwise commented on the
CDS intervention) (80 FR 16821). In the
2015 Edition Final Rule, we noted that
many commenters stated that current
systems already provide a wide range of
functionality to enable providers to
document decisions concerning CDS
interventions and that such
functionality is unnecessary to support
providers participating in the EHR
Incentive Programs (80 FR 62622).
While we are aware that some health
care providers have implemented
functionalities to enable ‘‘feedback
loops,’’ we understand through
conversations with interested parties
that such functionality is far from
commonplace or that information
regarding the use of CDS interventions
is standard across industry. Subsequent
to the 2015 Edition Final Rule,
additional evidence has confirmed the
effectiveness of this functionality.
Consequently, we propose to adopt in
§ 170.315(b)(11)(ii)(C) a new
functionality to enable users to provide
electronic feedback data based on the
information displayed through the DSI.
We propose that a Health IT Module
certified to § 170.315(b)(11) must be able
to export such feedback data, including
but not limited to the intervention,
action taken, user feedback provided (if
applicable), user, date, and location, so
that the exported data can be associated
137 Adam Wright, et al., Best practices for
preventing malfunctions in rule-based clinical
decision support alerts and reminders: results of a
Delphi study, 118 International journal of medical
informatics (2018).
138 See John D McGreevey III, et al., Reducing
alert burden in electronic health records: state of
the art recommendations from four health systems,
11 APPLIED CLINICAL INFORMATICS (2020); Juan
D Chaparro, et al., Reducing interruptive alert
burden using quality improvement methodology, 11
APPLIED CLINICAL INFORMATICS (2020).
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
with other relevant data. We believe the
proposed feedback data identified for
export represents a minimum set that
users would find valuable for evaluation
of DSIs they use. However, we welcome
comment on the proposed scope of
these feedback data, utility for
evaluation of their DSIs, and the
potential for such data to be used in
conjunction with quality metrics.
We propose that such feedback data
be available for export by users for
analysis in a computable format, so that
it can be associated with other relevant
data, such as diagnosis, other inputs
into the DSI, and the outputs of the DSI
for a particular patient, to evaluate and
improve DSI performance. We note that
‘‘computable format,’’ is consistent with
current requirements in
§ 170.315(b)(10)(i)(D) for EHI Export,
and we clarify that ‘‘computable format’’
is also referred to as ‘‘machine
readable,’’ in other contexts, which is
not synonymous with ‘‘digitally
accessible.’’ 139 In addition to quality
improvement of the DSI, such an export
would facilitate research, associating
feedback data with other relevant data,
and linking the DSI to patient health
outcomes, including assisting in
identifying and reducing health
disparities and possible discriminatory
outcomes. This proposal would not
require specific formatting requirements
for such feedback mechanisms. We
invite comment on these proposals.
iii. Proposed § 170.315(b)(11)(iii)
Evidence-Based Decision Support
Interventions
We propose in § 170.315(b)(11)(iii) to
establish ‘‘evidence-based decision
support interventions,’’ with a minor
revision to current requirements that are
part of the CDS criterion in
§ 170.315(a)(9)(iii). This proposal would
replace the current construct in
§ 170.315(a)(9)(iii), which states a
Health IT Module must enable
evidence-based decision support
interventions ‘‘based on each one and at
least one combination of’’ the data
referenced in paragraphs
§ 170.315(a)(9)(ii)(B)(1)(i) through (vi).
We propose that Health IT Modules
supporting evidence-based DSIs must
have the ability to support ‘‘any,’’
meaning all, of the revised data
referenced in paragraphs
§ 170.315(b)(11)(ii)(B)(1)(i) through
(viii). This proposal would broaden the
scope of data elements that Health IT
Modules must support when enabling
evidence-based DSIs to include data
expressed by the standards in § 170.213,
139 See also 85 FR 25879 discussion of machine
readable.
PO 00000
Frm 00040
Fmt 4701
Sfmt 4702
which is proposed to include USCDI v3
elsewhere in this preamble.
This proposal would not prescribe the
intended use of the evidence-based DSI.
Rather, this subparagraph, in
combination with the data referenced in
§ 170.315(b)(11)(ii)(B)(1), represent the
scope of evidence-based DSIs and scope
of data that Health IT Modules certified
to § 170.315(b)(11) should enable for
purposes of certification under our
Program. We invite comment on this
proposal.
iv. Proposed § 170.315(b)(11)(iv) Linked
Referential CDS
We propose to replicate what is
currently in § 170.315(a)(9)(iv) as
§ 170.315(b)(11)(iv) with a modification
to reference the criterion in
§ 170.315(b)(11) wherever the current
reference is to § 170.315(a)(9). We
propose no further changes at this time.
This proposal therefore reflects the
capabilities included in the CDS
criterion for which health IT developers
of certified health IT have years of
familiarity and can find, for comparison
purposes in 45 CFR 170.315(a)(9).
However, we welcome comment
regarding the functionalities and
standards listed in § 170.315(a)(9)(iv),
the HL7 Context Aware Knowledge
Retrieval Application (‘‘Infobutton’’)
standards, including whether linked
referential CDS are commonly used
with, or without, the named standards
in § 170.315(a)(9)(iv)(A)(1) and (2) and
whether we should continue to require
use of these standards.
v. Proposed § 170.315(b)(11)(v)
Predictive Decision Support
Interventions
We propose to reference a new
intervention type, ‘‘predictive decision
support intervention,’’ in
§ 170.315(b)(11)(v), and we propose a
corresponding definition in § 170.102.
We also propose in
§ 170.315(b)(11)(v)(A) that developers of
certified health IT with Health IT
Modules certified to § 170.315(b)(11)
attest ‘‘yes’’ or ‘‘no’’ as to whether their
Health IT Module enables or interfaces
with one or more predictive DSIs based
on any of the data expressed in the
standards in § 170.213, including USCDI
v3 as proposed elsewhere in this
preamble. Below we discuss our
proposal in § 170.102 for a definition of
predictive DSIs to provide necessary
context for our proposals for attestation
in § 170.315(b)(11)(v).
Proposed Definition of Predictive
Decision Support Intervention
We propose a definition of
‘‘predictive decision support
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
intervention’’ in § 170.102 to mean
‘‘technology intended to support
decision-making based on algorithms or
models that derive relationships from
training or example data and then are
used to produce an output or outputs
related to, but not limited to, prediction,
classification, recommendation,
evaluation, or analysis.’’
Such predictive DSIs are based on the
use of predictive model(s). In this
proposed rule, ‘‘model’’ refers to a
quantitative method, system, or
approach that applies statistical,
economic, bioinformatic, mathematical,
or other techniques (e.g., algorithm or
equations) to process input data into
quantitative estimates. Models are
simplified representations of real-world
relationships among observed
characteristics, values, and events.
Predictive models are those that have
‘learned’ relationships from a training or
historic data source, generally using
some form of statistical or machine
learning approach. Predictive models
are then used to predict unknown
values such as scores, classifications,
recommendations, or evaluations using
electronic data based on the
relationships learned in the training
data.140 Other terms that may be used in
healthcare to describe this area and may
have similar meanings include ‘clinical
algorithm,’ ‘automated decision-making
system,’ or ‘augmented decisionmaking’ tools or technologies, although
some of these terms may also be used
to refer to evidence-based DSIs. Our use
of the term predictive DSI is not tied to
a specific use case, such as those that
fall under treatment (clinical or medical
purpose), payment (financial) or health
care operations (administrative), nor
those that support clinical research or
public health,141 but rather
encompasses the broad forms that DSIs
can take, including but not limited to
alerts, order sets, flowsheets,
dashboards, patient lists, documentation
forms, relevant data presentations,
protocol or pathway support, reference
information or guidance and reminder
messages.142
We intend for our use of the phrase
‘‘intended to support decision-making’’
to be interpreted broadly and to
encompass technologies that require
users’ interpretation and action as well
as those that initiate management and
140 Cf. https://www.gartner.com/en/informationtechnology/glossary/predictive-modeling.
141 See 45 CFR 164.501 and 45 CFR 164.512(b).
142 Agency for Healthcare Research and Quality,
Section 4—Types of CDS Interventions: https://
digital.ahrq.gov/ahrq-funded-projects/currenthealth-it-priorities/clinical-decision-support-cds/
chapter-1-approaching-clinical-decision/section-4types-cds-interventions.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
require action to contest. Our use of
predictive DSI is not tied to the level of
risk or degree to which the predictive
DSI informs or drives treatment, is
relied upon by the user, relates to time
sensitive action, or whether the
predictive DSI is augmentative or
autonomous.143
We intentionally use the term
‘‘predictive decision support
intervention’’ in addition to the
Program’s existing and parallel use of
the term ‘‘evidence-based decision
support intervention,’’ for example as
used in § 170.315(a)(9)(iii). We
differentiate predictive DSIs as those
that support decision-making by
learning or deriving relationships to
produce an output, rather than those
that rely on pre-defined rules based on
expert consensus, such as computable
clinical guidelines, to support decisionmaking. This distinction is not meant to
convey that predictive DSIs are without
evidence or that such interventions have
not demonstrated clinical effectiveness.
We expect that predictive DSIs will be
supported by a robust evidence base,
which may include prospective clinical
trials, observational studies, and other
evidence published as peer-reviewed
literature describing the intervention’s
purpose, intended use, and
performance. We seek comment on
whether this definition effectively
delineates between DSIs that would be
considered predictive versus those that
are evidence-based DSIs, to use existing
terminology.
We propose a definition of predictive
DSI that would cover a wide variety of
techniques from algebraic equations to
machine learning and natural language
processing (NLP). For example, the
proposed definition would include the
Acute Physiology and Chronic Health
Evaluation IV (APACHE IV) model. That
model, which predicts in-hospital
mortality for patients in intensive care
units, was initially trained and
validated in data from 45 hospitals
including over one hundred thousand
143 See generally IMDRF | Software as a Medical
Device: Possible Framework for Risk Categorization
and Corresponding Considerations: https://
www.imdrf.org/documents/software-medicaldevice-possible-framework-risk-categorization-andcorresponding-considerations. See AMA | CPT®
Appendix S: Artificial Intelligence Taxonomy for
Medical Services and Procedures: https://
www.ama-assn.org/system/files/cpt-appendix-s.pdf
for definitions of ‘‘augmentative’’ and
‘‘autonomous’’; ANSI/CTA Standard, The Use of
Artificial Intelligence in Health Care:
Trustworthiness ANSI/CTA–2090: https://
shop.cta.tech/collections/standards/products/theuse-of-artificial-intelligence-in-healthcaretrustworthiness-cta-2090?_ga=2.195226476.
1947214965.1652722036-709349392.1645133306.
PO 00000
Frm 00041
Fmt 4701
Sfmt 4702
23785
individuals in 2006.144 Similarly,
models designed to estimate risk of a
first Atherosclerotic Cardiovascular
Disease, trained and validated on
pooled cohorts of large studies, would
meet the proposed definition.145
Because these models used multiple
regression methods, the trained model
can be expressed as a relatively simple
algebraic equation.
Our proposed definition would also
include more complex predictive
models leveraging machine learning.
For example, readmission models
developed by combining multiple Naı¨ve
Bayes algorithms or deep unified
networks trained and validated on over
ten thousand individuals and resulting
in models that can be applied to
patients in operational contexts would
meet the proposed definition of a
predictive DSI.146 This definition would
include predictive DSIs that use
adaptive, online or unlocked models,
that is, models that continue to adapt
when exposed to new data, as well as
those that are locked to the relationships
learned in training data. This definition
would also include predictive DSIs that
use NLP and large language models
(LLMs) (sometimes referred to as
generative AI),147 like GPT–3 and
LaMDA that power chatbots like
ChatGPT and Bard, respectively.148 The
definition would not be limited based
on the specific nature of the data to be
144 Zimmerman, Jack E., et al. ‘‘Acute Physiology
and Chronic Health Evaluation (APACHE) IV:
hospital mortality assessment for today’s critically
ill patients.’’ Critical care medicine 34.5 (2006):
1297–1310.
145 Goff Jr, David C., et al. ‘‘2013 ACC/AHA
guideline on the assessment of cardiovascular risk:
a report of the American College of Cardiology/
American Heart Association Task Force on Practice
Guidelines.’’ Circulation 129.25_suppl_2 (2014):
S49–S73.
146 Sara Bersche Golas, et al., A machine learning
model to predict the risk of 30-day readmissions in
patients with heart failure: a retrospective analysis
of electronic medical records data, 18 BMC medical
informatics and decision making (2018); Khader
Shameer, et al., Predictive modeling of hospital
readmission rates using electronic medical recordwide machine learning: a case-study using Mount
Sinai heart failure cohort (World Scientific 2017).
147 See McKinsey & Company, What is generative
AI? (January 2023), https://www.mckinsey.com/
featured-insights/mckinsey-explainers/what-isgenerative-ai?cid=other-eml-ofl-mip-mck&
hlkid=87d4afa80191467ab48
07f2084f75dc3&hctky=12683708&hdpid=42989045434a-40cd-ab7e-3d75ebf84ed8.
148 See generally Primack, Dan. Here come the
robot doctors. (January 18, 2023), https://
www.axios.com/2023/01/18/chatgpt-ai-health-caredoctors; OpenAI, ChatGPT: https://openai.com/
blog/chatgpt/; Pichai, Sundar. Optimizing Language
Models for Dialogue, (Feb. 6, 2023) https://
openai.com/blog/chatgpt/; https://blog.google/
technology/ai/bard-google-ai-search-updates/.
E:\FR\FM\18APP2.SGM
18APP2
23786
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
processed; for instance, models that
analyze text or images are included.149
Predictive models represent one
widely used form of AI, but do not
include all AI. Our proposed definition
would not include the computer
readable implementation of clinical
guidelines or similar types of knowledge
except when those guidelines—and the
interventions implemented based on
them—incorporate a predicted value,
such as a predicted risk, in guiding
clinical decision-making. We note that,
in this proposed rule, the term
‘‘intervention’’ in ‘‘prediction decision
support intervention’’ is not intended to
mean an intervention (medicine,
medical procedure, or medical
treatment) as the term is used in the
practice of medicine,150 but rather, an
intervention occurring within a
workstream, including but not limited
to alerts, order sets, flowsheets,
dashboards, patient lists, documentation
forms, relevant data presentations,
protocol or pathway support, reference
information or guidance, and reminder
messages. Our use of the term
intervention is consistent with how the
Program has used the term in
§ 170.315(a)(9).
As proposed in § 170.102, the
definition of a predictive decision
support intervention would not include
simulation models that use modelerprovided parameters rather than
training data or unsupervised machine
learning techniques that do not predict
an unknown value (i.e., are not labeled)
among other technologies. For instance,
the use of an unsupervised learning
model within decision support would
not meet our definition of a predictive
DSI, nor would the use of developersupplied parameters to simulate
operating-room usage and develop an
effective scheduling strategy. We seek
comment on whether the definition
should be scoped to include these or
other additional forms of decisionmaking algorithms, tools, and models.
We request comment on whether there
are prominent models (e.g., simulation
models, unsupervised learning models)
149 Prakash M Nadkarni, et al., Natural language
processing: an introduction, 18 Journal of the
American Medical Informatics Association (2011);
Thomas M Maddox & Michael A Matheny, Natural
language processing and the promise of big data:
small step forward, but many miles to go § 8 (Am
Heart Assoc 2015); Xiong Liu, et al., Predicting
heart failure readmission from clinical notes using
deep learning (IEEE 2019).
150 The ONC Program’s use of the term
‘‘intervention’’ is different from ‘‘clinical
intervention’’ as defined under FDA regulation that
includes a range of regulated products, such as a
medication or medical device. We note that there
may be a software-as-a-medical device (SaMD) that
is considered a ‘‘clinical intervention’’ and subject
to FDA authority.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
used to support decision-making in
healthcare that are not effectively
captured under the proposed definition
of a predictive DSI, and, if so, whether
it is feasible and appropriate to include
such models in the scope of this
proposed rule.
Attestation for Predictive Decision
Support Interventions
In § 170.315(b)(11)(v)(A), we propose
that developers of certified health IT
with Health IT Modules certified to
§ 170.315(b)(11) attest ‘‘yes’’ or ‘‘no’’ to
whether their Health IT Module enables
or interfaces with predictive DSIs based
on any of the data expressed in the
standards in § 170.213. This attestation
requirement would have the effect of
permitting developers of certified health
IT to certify to § 170.315(b)(11) without
requiring their Health IT Modules to
enable or interface with predictive DSIs.
However, for those developers of
certified health IT that attest ‘‘yes’’ as
described in § 170.315(b)(11)(v)(A), we
describe further in this section
applicable requirements related to such
developers and their Health IT Modules.
By way of example, we expect that
developers of certified health IT should
attest ‘‘yes,’’ if any of the following are
true: (1) the developer develops (selfdevelops) predictive DSIs for use in
their certified Health IT Module; (2) the
developer’s Health IT Module enables or
interfaces with predictive DSIs
developed by its end users or customers,
such as a healthcare organization or
medical center; or (3) the developer’s
Health IT Module enables or interfaces
with predictive DSIs developed by a
third-party content provider or
developer, such as a technology firm
that specializes in predictive model
development.
We clarify that ‘‘enables’’ means that
the developer of certified health IT has
the technical capability to support a
predictive model or DSI within the
developer’s Health IT Module. We
understand that predictive DSIs can be
configured in various ways, including as
user-developed or third party-developed
applications for use within or as a part
of a Health IT Module. We also
understand that predictive DSIs can be
developed by a developer of certified
health IT for use within or as a part of
their own Health IT Module. We clarify
that applications developed by other
parties and self-developed applications
that are used within or as a part of a
Health IT Module would mean that the
Health IT Module is considered to
‘‘enable’’ predictive DSIs. For example,
if the calculations or processing for a
predictive DSI occur within the Health
IT Module, either through a standalone
PO 00000
Frm 00042
Fmt 4701
Sfmt 4702
application developed by other parties
or an application self-developed by a
developer of certified health IT for use
within a Health IT Module, we would
consider this ‘‘enabling.’’ We clarify that
this technical capability to support a
predictive model or DSI includes
instances where predictive DSIs are
enabled by default and instances where
they can be enabled by users. We
propose that if a developer’s Health IT
Module enables predictive DSIs, based
on any of the data expressed in the
standards in § 170.213, then a developer
of certified health IT must attest ‘‘yes,’’
in § 170.315(b)(11)(v)(A).
In contrast, we clarify that ‘‘interfaces
with’’ means that the Health IT Module
facilitates either (1) the launch of a
predictive model or DSI or (2) the
delivery of a predictive model or DSI
output(s) to users when such a
predictive model or DSI resides outside
of the Health IT Module. For example,
scenarios where the calculations for a
predictive DSI occur outside the Health
IT Module, and the predicted value or
output gets sent to or through a Health
IT Module, or to or through an
application used within or as part of a
Health IT Module, would be considered
to ‘‘interface with.’’ We would also
consider a Health IT Module to
‘‘interface with,’’ a predictive DSI in
scenarios where an application is
launched from a certified Health IT
Module, including through the use of a
single sign-on functionality. If a
developer of certified health IT’s Health
IT Module interfaces with predictive
DSIs based on any of the data expressed
in § 170.213, then a developer of
certified health IT must attest ‘‘yes,’’ to
§ 170.315(b)(11)(v).
We are aware that some organizations
may use USCDI data exported or
sourced from a certified Health IT
Module to develop data-driven
advanced analytics leveraging
predictive models or technologies to
provide insights for healthcare. In such
circumstances, our proposed
requirements would only pertain if the
output of the predictive model
subsequently interfaced with a Health
IT Module. The proposed requirement
would not establish requirements for
predictive technologies that are not
enabled or do not interface with a
Health IT Module.
We note that developers of certified
health IT with a Health IT Module that
enables or interfaces with predictive
DSIs that use any of the data expressed
in the proposed standards in § 170.213
must attest ‘‘yes’’ in § 170.315(b)(11)(v)
if their Health IT Module(s) is certified
to § 170.315(b)(11). We also propose as
part of this attestation requirement in
E:\FR\FM\18APP2.SGM
18APP2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
§ 170.315(b)(11)(v) the option for a
developer of certified health IT to attest
‘‘no,’’ affirming the Health IT Module
does not enable or interface with
predictive DSIs that use any of the data
expressed in the proposed standards in
§ 170.213. Should a developer of
certified health IT’s Health IT Module
enable or interface with predictive DSIs
that use only data elements outside the
scope of the standards in § 170.213, we
propose that the developer of certified
health IT may attest ‘‘no.’’ We invite
comment on this proposal and whether
the descriptions of ‘‘enable,’’ or
‘‘interface with,’’ are appropriately
scoped to reflect the design,
development, and use of these emerging
technologies in healthcare.
Finally, we note that developers of
certified health IT that attest ‘‘no’’ in
§ 170.315(b)(11)(v) would still be
required to conform to the full scope of
this criterion, including the provision of
source attribute information as
described in § 170.315(b)(11)(vi)(A) and
(B) through their Health IT Module. The
attestation requirement in
§ 170.315(b)(11)(v) is constructed to
make support of predictive DSIs
optional for a Health IT Module
certifying to § 170.315(b)(11) and to
establish conditional requirements if the
developer of certified health IT with a
Health IT Module attests ‘‘yes.’’
Developers of certified health IT that
attest ‘‘yes’’ in § 170.315(b)(11)(v) would
be required to provide source attribute
information through their Health IT
Module in § 170.315(b)(11)(vi)(C),
which includes by reference those
source attributes listed in
§ 170.315(b)(11)(vi)(A) and employ or
engage in intervention risk management
practices as discussed in
§ 170.315(b)(11)(vii). We invite
comment on these proposals.
vi. Proposed § 170.315(b)(11)(vi) Source
Attributes
We propose in § 170.315(b)(11)(vi)
that Health IT Module certified to
§ 170.315(b)(11) enable a user to review
a plain language description of source
attribute information as indicated at a
minimum via direct display, drill down,
or link out from a Health IT Module.
This requirement would be for source
attribute information pertinent to each
DSI type: evidence-based DSIs in
(b)(11)(iii), linked referential DSIs in
(b)(11)(iv), and source attributes
required for Health IT Modules that
enable or interface with predictive DSIs
as defined in § 170.102 when a certified
health IT developer attests ‘‘yes’’ to the
‘‘predictive decision support
interventions attestation’’ in
§ 170.315(b)(11)(v). We note that
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
§ 170.315(g)(3) ‘‘safety-enhanced
design,’’ applies to the existing
§ 170.315(a)(9) criterion and in keeping
with that applicability, we propose that
safety-enhanced and user-centered
design processes described in
§ 170.315(g)(3) would apply to the new
certification criterion proposed in
§ 170.315(b)(11) as well. We propose to
update § 170.315(g)(3) accordingly to
reference the proposed § 170.315(b)(11).
We believe that requiring developers of
certified health IT to make available the
source attributes information referenced
at those sections via direct display, drill
down, or link out from their certified
Health IT Modules would have an
important impact in enabling informed
and appropriate selection of DSIs for
implementation and use. Addressing
quality uncertainty similarly underlies
the rationale for certification of all
Health IT Modules. We discuss
proposed revisions and additions to
source attributes later in this section.
We invite comment on this proposal.
vii. Proposed § 170.315(b)(11)(vi)(A)
Source Attributes—Demographic,
SDOH, and Health Status Assessment
Data Use
We propose to include as source
attributes in § 170.315(b)(11)(vi)(A)(1)
through (4) the source attributes
currently found in
§ 170.315(a)(9)(v)(A)(1) through (4).
Additionally, we propose that the use of
three additional specific types of data in
a DSI be included as source attributes in
§ 170.315(b)(11)(vi)(A)—Demographic
data elements in
§ 170.315(b)(11)(vi)(A)(5), SDOH data
elements in § 170.315(b)(11)(vi)(A)(6),
and Health Status Assessment data
elements in § 170.315(b)(11)(vi)(A)(7).
We note that ‘‘types of data in a DSI’’
means that the DSI includes any of these
data as inputs or otherwise expressly
rely on any of these data in generating
an output or outputs. By proposing to
modify the source attributes in
§ 170.315(b)(11)(vi)(A) relative to the
existing attributes in
§ 170.315(a)(9)(v)(A), we expect that
information would be made available to
users if the specific data elements
within these three data types were used
in the DSI.
We propose in
§ 170.315(b)(11)(vi)(A)(5) that the use of
Patient Demographics and Observations
data identified in proposed
§ 170.315(a)(5)(i) be included as a
source attribute. As noted in the
Background section, demographic data,
especially race, ethnicity, and preferred
language (REL) and sexual orientation
and gender identity, can influence how
PO 00000
Frm 00043
Fmt 4701
Sfmt 4702
23787
effective the DSI is for a given patient
population and use case.
We propose in
§ 170.315(b)(11)(vi)(A)(6) that the use of
SDOH data, represented in the proposed
standards in § 170.213, be included as a
source attribute. Specifically, we
propose that if any of the four SDOH
data elements that are part of USCDI v3
are used in a DSI, then they should be
reported as part of the source attributes
proposed in § 170.315(b)(11)(vi)(A)(6).
These elements include ‘‘SDOH
Assessment,’’ ‘‘SDOH Goals,’’ ‘‘SDOH
Interventions,’’ and ‘‘SDOH Problems/
Health Concerns.’’ We note that SDOH
data elements are not categorized as a
single data class in the USCDI, rather
they are included across several
different data classes in USCDI v3. We
note that during the period of time
when USCDI v1 is referenced in
§ 170.213, a Health IT Module certified
to USCDI v1 is not required to include
these and other data elements specific to
USCDI v3 as part of source attributes.
We propose in
§ 170.315(b)(11)(vi)(A)(7) that the use of
Health Status Assessment data
represented in the standards in
§ 170.213 be included as source
attributes. The data elements included
in the Health Status Assessments data
class include Health Concerns,
Functional Status, Disability Status,
Mental/Cognitive Status, Pregnancy
Status, and Smoking Status. We believe
that SDOH and Health Status
Assessment data will play a greater role
in DSIs moving forward and including
the use of these data elements as source
attributes would provide much-needed
transparency. We again note that during
the period of time when USCDI v1 is
referenced in § 170.213, a Health IT
Module certified to USCDI v1 is not
required to include these and other data
elements specific to USCDI v3 as part of
source attributes.
Including the use of REL, Sexual
Orientation, Gender Information, SDOH,
and Health Status Assessment data
elements as part of source attributes for
each DSI, so that information about
them can be provided to users, as
proposed in § 170.315(b)(11)(vi), would
greatly improve the possibility of
identifying and mitigating the risks of
employing both evidence-based and
predictive DSIs for patient care,
including those related to exacerbating
racial disparities and promoting bias.
We encourage readers to review the
Background of this section, III.C.5, for
more discussion and evidence for
relevant examples of such risks. We
invite comment on these additions to
source attributes in
§ 170.315(b)(11)(vi)(A), and we invite
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
23788
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
comment on additional data classes and
elements, reflected in the standards in
§ 170.213, that ONC should consider
including as source attributes.
We propose in § 170.315(b)(11)(vi)
that all source attribute information
must be available, as applicable, for user
review via direct display, drill down, or
link out from the Health IT Module
when the intervention is developed by
the developer of the Health IT Module.
The intent of this proposed requirement
is to enable users to make a more
informed decision regarding whether
and how a DSI should be used. For
example, an evidence-based DSI that is
based on Joint National Committee
(JNC) Hypertension guidelines should
indicate for the user of the certified
Health IT Module that the DSI output
(recommendation) for the first-line
hypertension therapy incorporates Race
so that the user is aware that the DSI’s
recommendation for Black patients and
non-Black patients differs. Historically,
we have not made the expectation that
source attribute information be available
via drill down or link out an explicit
requirement, but we required that such
information be available to end-users for
CDS interventions (77 FR 54215). We
understand that source attribute
information may be presented in varied
ways at various points of workflow and
contain varying levels of detail and do
not intend to limit the options by which
this information can be made available.
However, through conversations with
interested parties, we learned that
source attribute information is not
routinely available to users at the point
of care, so we propose to require source
attribute information be available at a
minimum, via direct display, drill
down, or link out now to better ensure
consistency in source attributes
information availability.
We encourage developers of certified
health IT to consider a hierarchy of
users’ needs when making these
attributes available for users. Consistent
with prior ONC discussion related to
existing § 170.315(a)(9)(v) requirements
for source attributes (77 FR 54215), the
proposal would not require the
automatic display of source attributes
information when a recommendation,
alert, or decision support output is
presented that resulted from a DSI. We
invite comment on this proposal.
viii. Proposed § 170.315(b)(11)(vi)(C)
Source Attributes for Predictive
Decision Support Intervention
As stated in the previous section, we
propose in § 170.315(b)(11)(vi) to
establish ‘‘source attributes’’
requirements. In this section we discuss
proposals to include additional source
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
attributes for predictive DSIs as we
propose to define them in § 170.102.
Specifically, we propose to add new
source attributes in
§ 170.315(b)(11)(vi)(C) for all predictive
DSIs that are enabled by or interface
with certified Health IT Modules
certified to § 170.315(b)(11). These
source attributes are intended to provide
users with greater insight into the model
incorporated into a particular predictive
DSI and will provide information for an
array of uses, including in support of socalled ‘‘model cards’’ or algorithm
‘‘nutrition labels’’ that have been
described by others.151 This proposed
requirement would apply to developers
of certified health IT that, under
proposed § 170.315(b)(11)(v)(A), attest
‘‘yes’’ to enabling or interfacing with a
DSI that meets the definition of a
predictive DSI as proposed in § 170.102.
We believe additional transparency
for predictive DSIs that enable or
interface with Health IT Modules is
appropriate because these DSIs often
involve relatively opaque computational
processes to arrive at the predictions on
which such DSIs are based and rely on
specific data and populations to learn
relationships between features of the
data. While the use of such models has
enormous potential to improve many
aspects of the healthcare delivery
system including treatment, payment,
health care operations (TPO); research;
and public health activities, it can also
result in harm, bias, or unlawful
discrimination, as discussed earlier in
this preamble in section III.C.5.a. This
can be especially true in instances
where the user is not fully informed of
the potential limitations of the model,
where there is potential misalignment
between the user’s application of the
model and its intended use, where
known inappropriate uses of the model
are not communicated, or when the
model is specified to accomplish known
tasks without meeting the intended
outcome.152
In developing proposed source
attributes for predictive DSIs, we sought
to balance prescriptiveness and
flexibility. Our selection of proposed
attributes was guided by review of
existing model reporting guidelines,
including fourteen different sets of
recommendations for information to be
reported on models and related
standards.153 In our review, we
151 Mitchell, Margaret, et al. ‘‘Model cards for
model reporting.’’ Proceedings of the conference on
fairness, accountability, and transparency. 2019.
152 Sendak, et al., NPJ digital medicine, (2020);
Victoria Krakovna, et al., Specification gaming: the
flip side of AI ingenuity, April 21. 2020.
153 See, e.g., Lu, et al., Low adherence to existing
model reporting guidelines by commonly used
PO 00000
Frm 00044
Fmt 4701
Sfmt 4702
emphasized attributes that (1) were most
commonly included in the reviewed
reporting guidelines, (2) we believe
would be most interpretable by both
health IT professionals and users, (3)
were focused on identifying issues of
bias, and (4) were intended to show that
the model would perform effectively
outside of the specific context in which
it was developed. In describing the
proposed source attributes below, we
have provided information on what we
believe should be included in each
attribute based on our understanding of
the current best practices in this area;
however, given the varied technologies,
applications, and contexts in which
predictive DSIs may be used, we have
sought to keep requirements sufficiently
flexible to meet varied use cases.
The proposals in
§ 170.315(b)(11)(vi)(C) would not
require disclosing or sharing intellectual
property (IP) existing in the developer’s
health IT (including other parties’
intellectual property). For example, the
proposed requirement would not
require developers of certified health IT
(or any other model developers, for
example, models developed by third
parties or customers of the developer of
certified health IT) to provide
information about or report any details
of the specific code, pipeline, statistical
processes, or algorithms used to
generate model predictions, which
might be considered the developer’s
intellectual property. Instead, the
proposed requirement would have
developers of certified health IT report
source attribute information related to
data that was used to train the model,
the proper (intended) use of the model,
and the performance of the model as
assessed through validation and fairness
metrics. In this regard, the proposed
source attributes are intended to
establish consistent categories of
minimum information availability that
potential users need to make informed
decisions regarding their use of a
predictive DSI. We view this proposal as
complementary to transparency efforts
in other areas for product users such as
nutrition labels, medication fact labels,
and clinical trial results, which also
focus on inputs, demonstrated value,
and proper use.154
clinical prediction models, medRxiv
2021.07.21.21260282; ANSI/CTA–2090 The Use of
Artificial Intelligence in Health Care:
Trustworthiness; ISO/IEC TR 24028:2020
Information technology—Artificial intelligence—
Overview of trustworthiness in artificial
intelligence.
154 Sendak MP, Gao M, Brajer N, Balu S.
Presenting machine learning model information to
clinical end users with model facts labels. NPJ Digit
Med. 2020 Mar 23;3:41. doi: 10.1038/s41746–020–
0253–3. PMID: 32219182; PMCID: PMC7090057.
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
Proposed New Source Attributes for
Predictive DSI
We propose to add fourteen new
source attributes for predictive DSIs that
enable or interface with Health IT
Modules. These include attributes that
describe the models (sources) on which
predictive DSIs are based in four broad
categories: in § 170.315(b)(11)(vi)(C)(1)
Intervention Details, in
§ 170.315(b)(11)(vi)(C)(2) Intervention
Development, in
§ 170.315(b)(11)(vi)(C)(3) Quantitative
Measures of Intervention Performance,
and in § 170.315(b)(11)(vi)(C)(4)
Ongoing Maintenance of Intervention
Implementation and Use. We describe
the proposed specific attributes to be
made available to users below. We also
reiterate that we propose that this
criterion remain subject to safetyenhanced design requirements for user
centeredness by proposing changes to
§ 170.315(g)(3).
Consistent with our proposals in
§ 170.315(b)(11)(vi), we propose that
these new source attributes listed in
§ 170.315(b)(11)(vi)(C) would be in plain
language and available for user review
via direct display, drill down, or link
out from a Health IT Module certified to
§ 170.315(b)(11) and for which the
developer attested ‘‘yes’’ in
§ 170.315(b)(11)(v)(A).
For six of the listed source attributes,
we propose to include a phrase noting
that information must be provided ‘‘if
available.’’ These include source
attributes we propose in
§ 170.315(b)(11)(vi)(C)(2)(iii),
(b)(11)(vi)(C)(3)(iii), (b)(11)(vi)(C)(3)(iv),
(b)(11)(vi)(C)(3)(v). (b)(11)(vi)(C)(4)(ii),
and (b)(11)(vi)(C)(4)(iii). Proposing
flexibility to report on these source
attributes ‘‘if available,’’ reflects our
understanding that the relevant
information for these source attributes
may not be available because, for
instance, the related evaluation has not
been conducted, such as in local data.
We do not seek to prohibit the use of
such models for lack of evaluation or
validation, but our proposal intends to
ensure that users are aware when such
information exists and, if not, that the
users understand the related attribute
information is not available. In
instances where information related to
one of these six source attributes is not
available, we propose in
§ 170.315(b)(11)(vi)(D)(1) that a Health
IT Module clearly indicate when this
information is not available for a user to
review. While we do not prescribe how
a Health IT Module must indicate that
an attribute is missing, we clarify that
the Health IT Module must
communicate an attribute is missing
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
unambiguously and in a conspicuous
manner to a user.
We propose to require that
information be provided for the
remaining eight attributes that do not
include the ‘‘if available’’ phrase, except
as described in § 170.315(b)(11)(vi)(D).
We note that developers of certified
health IT that develop predictive DSIs
for use in their Health IT Modules must
provide this information and, if
necessary, establish processes and
protocols to generate or gather the eight
attributes that do not include the ‘‘if
available’’ phrase. We note that the eight
attributes that do not include the ‘‘if
available’’ phrase reflect information
that is routinely generated during model
planning, development, and testing.
These attributes are often commonly
reported in academic validation studies
of predictive models in healthcare and
relate to information readily available
for model creators, developers, or
owners to report to users or customers.
However, we clarify that we are
establishing two affirmative actions: (1)
developers of certified health IT that
develop their own predictive DSIs, that
are enabled by or interface with a Health
IT Module, must generate or gather the
proposed source attribute information in
§ 170.315(b)(11)(vi)(C); and (2) report
the proposed source attribute
information.
Intervention Details
We propose three source attributes
related to details of predictive models
and their proper use in
§ 170.315(b)(11)(vi)(C)(1) ‘‘Intervention
Details.’’ These source attributes are
designed to convey information about
how the model is incorporated into
healthcare organizations’ and into users’
workflows, so that the model is
presented at a time and for a population
that would benefit from use of a
predictive DSI based on the model. The
following are descriptions of the
proposed subsections related to
Intervention Details:
• § 170.315(b)(11)(vi)(C)(1)(i) ‘‘Output
of the intervention,’’ is a description of
the value that the model produces as an
output, including whether the output is
a prediction, classification, or other type
of output. Users evaluating the model or
deciding whether to use it should know
what the model is predicting to ensure
that the output is directly relevant to the
way in which the users intend to use it.
The absence of this information could
greatly increase the risk that the model
is misused or that its output is assumed
to relate to something other than the
‘label’ (the target the model is
predicting, e.g., the outcome the model
is trained to predict as it has occurred
PO 00000
Frm 00045
Fmt 4701
Sfmt 4702
23789
and been recorded in historic or training
data) the model was trained to predict.
The output of the model is the
predicted value of the ‘label’ (outcome)
that the model is trained on to make a
prediction. An example would be to
describe that the model is trained on
patients labeled as either experiencing
or not experiencing a readmission for
heart failure within 30-days of initial
discharge in training data where that
event is known. The trained model
would then produce as its output the
likelihood that an individual will be
readmitted among individuals recently
discharged (for whom the event is not
yet known). The absence of this
information could greatly increase the
risk that the model is misused or that its
output is assumed to relate to something
other than the label the model was
trained to predict. Specifying the output
allows users to determine if the output
is appropriate or may inherently reflect
low validity or bias because of concerns
about the process that produces an
output in the training data.155 Recent
evidence has shown that selecting a
label and output—healthcare costs—that
was created through biased historical
and social processes that were reflected
in the training data produced biased
predictions when used to identify
patients with high healthcare needs for
preventive care.156
• § 170.315(b)(11)(vi)(C)(1)(ii)
‘‘Intended use of the intervention,’’ is a
description of the intent of the model
developers in how the model is meant
to be deployed and used, including its
intended role in the identified use case.
Whereas the ‘‘output of the
intervention’’ describes the ‘‘what’’ that
the model predicts, this attribute is
about the ‘‘how,’’ ‘‘to what end,’’
‘‘where,’’ and ‘‘for whom’’ the model is
designed and should be used.
Information on intended use should
clarify: (1) whether the model is
intended for specific or general tasks
and what those tasks are; (2) who the
intended patient population is; (3) who
the intended users of the model are, as
well as the intended action of the user;
(4) the role of the model (e.g., whether
it informs, augments, or replaces
clinical management), which may be
most clearly conveyed through use of a
taxonomy such as those described by
155 Wei Luo, et al., Guidelines for developing and
reporting machine learning predictive models in
biomedical research: a multidisciplinary view, 18
Journal of medical Internet research (2016);
Christina Silcox, et al., AI-enabled clinical decision
support software: a ‘‘Trust and Value Checklist’’ for
clinicians, 1 NEJM Catalyst Innovations in Care
Delivery (2020).
156 Ziad Obermeyer, et al., Dissecting racial bias
in an algorithm used to manage the health of
populations, 366 Science (2019).
E:\FR\FM\18APP2.SGM
18APP2
23790
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
the International Medical Device
Regulators Forum (IMDRF), American
Medical Association, Consumer
Technology Association, and others; 157
and (5) the logic underlying the model
(for instance, the exact question the
algorithm is supposed to answer, how it
fits into specific clinical decisionmaking, and in what ways the inputs are
appropriate to answer that question and,
if appropriate, how that logic is
associated with how the model should
be used.
A description of how the model
should be used can inform how the
model is deployed in healthcare settings
and help assure users that the model is
fit for the purpose they are using it for.
The absence of this information could
greatly increase the risk that the model
is deployed or used in situations that
the model developers did not intend
and that may result in invalid
predictions or harm to the intended
beneficiaries (model subjects, e.g.,
patients). For example, using a model
whose described output is ‘‘predicted
risk of death’’ to triage patients to higher
acuity care may be inappropriate if the
model learned the risk of death based on
whether those patients were previously
effectively triaged. In this example,
prior triage decisions are incorporated
into the model’s prediction, and this
could lead to invalid predicted risk of
death.158 Information clarifying that the
intended use is for post-triage
management decisions could be useful
to avoid this inappropriate use.
• § 170.315(b)(11)(vi)(C)(1)(iii)
‘‘Cautioned out-of-scope use of the
intervention,’’ is a description of tasks,
situations, or populations to which the
model developer cautions a user against
applying the predictive model. An
example of a description could be ‘‘this
model is intended for use on inpatients
only. Insufficient patient data in the
emergency department may lead to poor
model performance in that context.’’
This description should include known
risks, inappropriate settings,
inappropriate uses, or known
limitations of the model. To the extent
157 IMDRF | Software as a Medical Device:
Possible Framework for Risk Categorization and
Corresponding Considerations: https://
www.imdrf.org/documents/software-medicaldevice-possible-framework-risk-categorization-andcorresponding-considerations. AMA | CPT®
Appendix S: Artificial Intelligence Taxonomy for
Medical Services and Procedures: https://
www.ama-assn.org/system/files/cpt-appendix-s.pdf.
CTA | ANSI/CTA Standard, The Use of Artificial
Intelligence in Health Care: Trustworthiness ANSI/
CTA–2090: https://shop.cta.tech/collections/
standards/products/the-use-of-artificialintelligence-in-healthcare-trustworthiness-cta2090?_ga=2.195226476.1947214965.1652722036709349392.1645133306.
158 Sendak, et al., NPJ digital medicine, (2020).
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
possible, the description should inform
users about tasks, situations or
populations related to the intended use
of the model in which the model may
not perform as expected. Paired with
information on the intended use source
attribute proposed in
§ 170.315(b)(11)(vi)(C)(1)(ii), a
description of out-of-scope uses is
important to inform use of models and
avoid potential misinterpretation of
model output by healthcare organization
leaders and clinicians, thereby ensuring
potential harm is avoided.159
Intervention Development
We propose three source attributes
related to model development in
§ 170.315(b)(11)(vi)(C)(2), ‘‘Intervention
Development.’’ These proposed
attributes relate to describing steps in
the model design and development
process to provide users with a sense of
how well the model is likely to perform
across diverse patients and
environments (e.g., diverse clinical care
settings, technologies, and work/
treatment patterns). The following are
descriptions of the proposed source
attributes related to Intervention
Development:
• § 170.315(b)(11)(vi)(C)(2)(i) ‘‘Input
features of the intervention including
description of training and test data’’ is
a description of the data on which the
model learned relationships (often
called the training data or training set)
and the data on which the model was
tested during development (often called
the test data or test set). This description
should include: (1) exclusion and
inclusion criteria that influenced who
was included in data sets; (2) statistical
characteristics—including sample size—
of the demographic and other key
variables in these data (including those
listed in § 170.315(b)(11)(vi)(A), as the
developer views as appropriate) to
assess representativeness; (3) the source
and clinical setting from which the data
was generated, which should be
described so that the relevance of the
data to the deployed setting and the
potential for bias in that setting can be
considered; (4) the extent of missing
values in the training and testing data
sets; and (5) other attributes related to
data quality, such as the
comprehensiveness of the data and the
process of collecting the data should be
included as the developer determines
what is relevant while examining the
data during pre-processing, creation,
and testing of the model.
The information listed above is
similar to requirements for clinical trials
159 Mitchell, et al. 2019; Sendak, et al., NPJ digital
medicine, (2020).
PO 00000
Frm 00046
Fmt 4701
Sfmt 4702
to report information on the baseline
data of the sample included in the trial.
Beyond the information above, the
description of this source attribute
should include what data is expected to
be present for the model to generate
accurate predictions. This description
should allow users to evaluate whether
sufficient data is available for the model
to make valid predictions.
Descriptions of training and test data
could allow model users to ensure that
the development data the model was
trained on had sufficient patients
similar to those for whom the model
would be used to inform effective model
predictions. Predictive models
developed using datasets that are not
broadly representative may learn
relationships applicable only to some
groups. Those models are then likely to
perform well only within those groups.
For example, models predicting heart
attack onset trained on data containing
few women may perform poorly because
diagnostic patterns are different for
women.160 Displaying information on
the data sets that models were trained
on could also help identify ethical
issues in the data set.161
• § 170.315(b)(11)(vi)(C)(2)(ii)
‘‘Process used to ensure fairness in
development of the intervention’’ is a
description of the approach the model
developer has taken to ensure that the
model output is fair—that is, that the
output is not unduly biased toward an
individual or group based on an
individual’s or group’s inherent or
acquired characteristics. For example,
this attribute might state that in preprocessing the data before training the
model, the developers employed a
‘‘disparate impact remover’’
transformation across race or ethnicity
groups based on a well-known
approach.162
This description should include
approaches to manage, reduce, or
eliminate bias in models and could be
similar to a brief synopsis of risk
mitigation practices and outcomes
related to fairness for this DSI, as
described further in the intervention
risk management practices proposed in
§ 170.315(b)(11)(vii)(A)(1) through (3).
160 Charles Maynard, et al., Gender differences in
the treatment and outcome of acute myocardial
infarction: results from the Myocardial Infarction
Triage and Intervention Registry, 152 Archives of
internal medicine (1992); Viola Vaccarino, et al.,
Sex-based differences in early mortality after
myocardial infarction, 341 New England journal of
medicine (1999).
161 Karen L Boyd, Datasheets for Datasets help
ML Engineers Notice and Understand Ethical Issues
in Training Data, 5 Proceedings of the ACM on
Human-Computer Interaction (2021); Mitchell, et al.
2019.
162 Feldman, et al. 2015.
E:\FR\FM\18APP2.SGM
18APP2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
Many such approaches exist; however,
there is no universal best process to
ensure fairness.163 We believe it is a best
practice for approaches to fairness to be
informed by privacy-related needs
because of concerns that some fairness
enhancing approaches could increase
privacy risks.164 Providing information
on what approaches were applied to
address potential bias in model
development would allow users to
better evaluate whether model
developers have adequately considered
and addressed risk of bias in model
development, and therefore the
likelihood of bias in the model, which
could potentially result in bias model
outputs and patient outcomes if the
model is used.
• § 170.315(b)(11)(vi)(C)(2)(iii)
‘‘External validation process, if
available’’ is a description of how and
in what source, clinical setting, or
environment a model’s validity and
fairness has been assessed other than
the source training and testing data.
This should include a description of: (1)
who conducted the external testing (e.g.,
the model developer, developer of
certified health IT, or an independent
third party); (2) the setting from which
the external data was derived; (3) the
demographics of patients in external
data; and (4) a brief description of how
external validation was carried out.
A description of the external
validation process undertaken can allow
users to consider how well the model
has been shown to perform, and in
particular, how well it performs in
similar settings as presented by
independent parties.165 Model
performance measured in novel data
sources, measured by independent
third-parties, or both, conveys a stronger
signal that the model is likely to
perform well in new environments
compared to models that are tested only
by the developer or tested only within
a test data set split from the training
data but originating from the same data
source as the original training data
set.166
163 Jon Kleinberg, et al., Inherent trade-offs in the
fair determination of risk scores, arXiv preprint
arXiv:1609.05807 (2016); Mehrabi, et al., ACM
Computing Surveys (CSUR), (2021).
164 Hongyan Chang & Reza Shokri, On the privacy
risks of algorithmic fairness (IEEE 2021).
165 Richard D Riley, et al., External validation of
clinical prediction models using big datasets from
e-health records or IPD meta-analysis: opportunities
and challenges, 353 bmj (2016); Wong, et al., JAMA
Internal Medicine, (2021).
166 Silcox, et al., NEJM Catalyst Innovations in
Care Delivery, (2020); Hernandez-Boussard, et al.,
Journal of the American Medical Informatics
Association, (2020).
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
Quantitative Measures of Intervention
Performance
We propose five source attributes
relevant to validation or evaluation of
the performance (including accuracy,
validity, and fairness) of the predictive
model and evaluation of its
effectiveness in
§ 170.315(b)(11)(vi)(C)(3) ‘‘Quantitative
measures of Intervention Performance.’’
• § 170.315(b)(11)(vi)(C)(3)(i)
‘‘Validity of prediction in test data,’’ is
the presentation of the measure or set of
measures related to the model’s validity
(often referred to as performance) when
tested in data derived from the same
source as the initial training data. These
measures show that the model is
accurate because its output aligns with
observed values in data where label
values are known. These measures show
whether the model’s predictions
(intended outcome) match the actual
outcomes.
Selection of measures should be
guided by the model developer’s
consideration of what measures might
be most meaningful and relevant to
users of the model according to the
expected use of the model and the
technical knowledge of expected users
and implementation teams. For
example, sensitivity, specificity, and
positive predictive values—which are
generally familiar to clinicians through
experience with diagnostic tests—might
be preferred versus area under the
receiver operator curve and area under
the precision-recall curve for binary
classifiers, which less directly relate to
the performance of models as
implemented at specific thresholds.
This proposal would not prescribe the
specific performance or validation
measures to be used or included as part
of the source attributes requirements but
would require that some performance or
validation measure(s) be used and
included in the source attribute.
Numerous measures exist to measure
validity and performance because of the
variety of types of predictive models,
their outputs, and intended uses. It is
likely that selection of informative
performance measures would depend
on model type and task (e.g., prediction,
classification, recommendation or
other). For instance, mean-squared error
might be the appropriate measure for
models predicting continuous values
while recall at rank k, mean average
precision at rank k, or similar measures
might be appropriate for recommender
systems.
Information on the model’s measured
performance is important to users for
determining how much weight to apply
to its prediction, given that predictive
PO 00000
Frm 00047
Fmt 4701
Sfmt 4702
23791
DSIs are based on models and data that
they have learned from and generally do
not rely on clinical guidelines to
support the model’s decision-making, as
discussed earlier in this section and in
the definition of predictive DSI
proposed in § 170.102.
• § 170.315(b)(11)(vi)(C)(3)(ii)
‘‘Fairness of prediction in test data,’’ is
the presentation of the measure or set of
measures related to the model’s fairness
(evaluation of fairness in a model) in
terms of the accuracy of its output
across certain groups in data derived
from the same source as the initial
training data.
Evaluation of the fairness of models is
one essential component in ensuring
that models are not producing biased
predictions or resulting in biased
impacts to individuals. Numerous
approaches and related measures exist
to measure the fairness of model
outputs. Examples of potential fairness
measures include positive predictive
parity, false positive error rate balance
and false negative error rate balance,
equivalent calibration within groups,
and mean residual difference. The
relevant groups or factors across which
fairness should be established are also
likely to vary from one model to the
next, and model developers would need
to determine which factor their model’s
performance should be evaluated or
stratified by. Likely candidates include
but are not limited to race, ethnicity,
preferred language, sex, gender
information, sexual orientation, religion,
age, national origin, disability, veteran
status, and genetic information or
additional information related to care
that has historically been stigmatized
such as reproductive or behavioral
health information.167 Similar to
measures related to validation described
above, measures should be selected
based on their relevance to users and
the model task or function. The
appropriateness of these approaches
would depend on the specific context.
This proposal would not prescribe the
specific fairness measures to be used or
presented (reported) because we are
unaware of universal measures that
would be applicable to all predictive
DSIs. However, we reiterate that our
proposals would require that some
fairness measure(s) be used or
presented. We seek comment on
whether specific measures of fairness
would be relevant across all predictive
DSIs.
167 See section III.C.10. See also Blueprint for an
AI Bill of Rights (October 4, 2022), https://
www.whitehouse.gov/ostp/ai-bill-of-rights/
#discrimination (discussing algorithmic
discrimination protections).
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
23792
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
• § 170.315(b)(11)(vi)(C)(3)(iii)
‘‘Validity of prediction in external data,
if available,’’ is the presentation of the
same or similar measures used to report
model validity in test data in
§ 170.315(b)(11)(vi)(C)(3)(i) except that
these measures relate to validity
measured in data external to—that is,
from a different source than—the
primary training data. As noted above,
validity as tested in data from sources
external to the initial training and test
data (which are often drawn from the
same source), especially when evaluated
by independent parties, provides more
confidence in the performance of the
model in different environments. It is
therefore important for users to see
measures related to model performance
outside the development data or to be
clearly informed when the model has
not been evaluated in external data.
• § 170.315(b)(11)(vi)(C)(3)(iv)
‘‘Fairness of prediction in external data,
if available,’’ is the presentation of the
same or similar measures used to report
model fairness in test data described in
§ 170.315(b)(11)(vi)(C)(3)(ii) except that
these measures relate to fairness
measured in external data (i.e., data
from a different source than the primary
training data). Fairness in external data,
especially when evaluated by an
independent party, provides more
confidence that the model would
produce useful predictions in different
environments and for diverse
populations. It is therefore important for
users to be able to view measures
related to model performance outside
the development environment or to be
informed when the model has not been
evaluated in external data.
• § 170.315(b)(11)(vi)(C)(3)(v)
‘‘References to evaluation of use of the
model on outcomes, if available,’’ are
bibliographic citations or links to
evaluations of how well the
intervention, or model on which it is
based accomplished specific objectives
such as reduced morbidity, mortality,
length of stay or other important
outcomes. We are aware that the
impacts of predictive models on
outcomes are not always evaluated. We
are therefore requiring source attribute
information on the use of the model on
outcomes ‘‘if available.’’ Clearly labeling
when that information is not available
would be important to inform users as
they implement and use the model.
Although it is important to assess a
model’s performance and fairness, the
best indicator of whether and how the
model should be used will come from
evidence of its impact on health
outcomes and other goals (e.g.,
operational efficiency) from various
means of evaluating efficacy and
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
effectiveness, including clinical trials.
However, rigorous evaluations of impact
may be limited in scope and context or
diversity, for instance, due to challenges
related to clinical trial recruitment and
participation or biases in the
populations treated by health centers
best poised to conduct real-world
evidence studies. These issues may
impact a broad range of clinical
evaluations, and potentially limit the
external validity of evidence supporting
use of some therapies as well as, in this
context, some predictive DSIs.168 These
challenges may be particularly acute in
the evaluation of predictive DSIs
because predictive models may perform
substantially differently in novel
environments.169 Therefore, evidence
from the evaluation of outcomes from
model outputs is best coupled with
measures of the model’s validity and
fairness as described above.
Ongoing Maintenance of Intervention
Implementation and Use
We propose three source attributes
related to the ‘‘ongoing maintenance of
intervention implementation and use,’’
in § 170.315(b)(11)(vi)(C)(4). The
following are descriptions of the
proposed source attributes related to
ongoing maintenance of intervention
implementation and use:
• § 170.315(b)(11)(vi)(C)(4)(i) ‘‘Update
and continued validation or fairness
assessment schedule,’’ is a description
of the process and frequency by which
the model’s performance is measured
and monitored in the local environment
and corrected when risks related to
validity and fairness are identified. It is
therefore similar to a synopsis of risk
analysis and mitigation practices
described later in this preamble and
applies to the individual DSI. This
information would be similar to a
synopsis of a plan for controlled
changes of the model.170 A description
168 See FDA, Enhancing the Diversity of Clinical
Trial Populations—Eligibility Criteria, Enrollment
Practices, and Trial Designs Guidance for Industry,
(November 2020), https://www.fda.gov/regulatoryinformation/search-fda-guidance-documents/
enhancing-diversity-clinical-trial-populationseligibility-criteria-enrollment-practices-and-trial.
169 Steyerberg & Harrell, Journal of clinical
epidemiology, (2016).
170 See FDA, Marketing Submission
Recommendations for a Predetermined Change
Control Plan for Artificial Intelligence/Machine
Learning (AI/ML)-Enabled Device Software
Functions, Draft Guidance, (April 2023), https://
www.fda.gov/regulatory-information/search-fdaguidance-documents/marketing-submissionrecommendations-predetermined-change-controlplan-artificial?utm_medium=email&utm_
source=govdelivery; FDA, Proposed Regulatory
Framework for Modifications to Artificial
Intelligence/Machine Learning (AI/ML)-Based
Software as a Medical Device (SaMD), Discussion
Paper and Request for Feedback, https://www.
PO 00000
Frm 00048
Fmt 4701
Sfmt 4702
of which measures are used to assess
validity, across which specific groups
fairness is evaluated, and by what
criteria poor performance or low
fairness would be identified are
important to inform users of the likely
value of model predictions. Information
should also include how often
performance is evaluated and how often
the model is updated to provide users
with insight into the likelihood that the
model may have degraded (i.e., no
longer provides valid or accurate
predictions) since it was last updated.
• § 170.315(b)(11)(vi)(C)(4)(ii)
‘‘Validity of prediction in local data, if
available,’’ is the presentation of the
same or similar measures used to report
model validity in test and external data
in § 170.315(b)(11)(vi)(C)(3)(i) and (iii),
except that these measures are derived
in local data and that model validity in
the local environment is monitored over
time. As noted above, validity in local
data may differ from validity in either
test or external data and when available,
provides additional confidence in the
performance of the model within the
setting, population, and context most
relevant to users. Local validity
measures should be included when
available. However, we understand that
it is likely that local evaluation of model
performance may not be feasible in all
contexts. For instance, small practices
or critical access hospitals may lack the
resources, staff, population, and sample
sizes to effectively evaluate performance
in the local environment.171
• § 170.315(b)(11)(vi)(C)(4)(iii)
‘‘Fairness of prediction in local data, if
available,’’ is the presentation of the
same or similar measures used to report
model validity in test and external data
in § 170.315(b)(11)(vi)(C)(3)(ii) and(iv),
except that these measures are derived
in local data. We include the reporting
of fairness as an individual source
attribute distinct from validity because
users should be informed, separately
from issues of overall validity, of the
observed fairness of the model in the
local environment to identify how likely
it is that the model is providing valuable
predictions for the type of individual
about whom the model is being used to
inform a decision. Because of concern
that model performance in local
implementations may differ
substantially from performance in test
and even external data, several groups
fda.gov/files/medical%20devices/published/USFDA-Artificial-Intelligence-and-Machine-LearningDiscussion-Paper.pdf.
171 Wong et al. External Validation of a Widely
Implemented Proprietary Sepsis Prediction Model
in Hospitalized Patients. JAMA Intern Med.
2021;181(8):1065–1070. doi:10.1001/
jamainternmed.2021.2626.
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
have highlighted the importance of
evaluating fairness of models within
local information systems to ensure that
model performance in the specific
environment of their use is similar to
performance in other data.172
We believe these proposed additional
source attributes are necessary to
enhance information transparency about
the fairness, appropriateness, validity,
effectiveness, and safety of predictive
DSIs, so that users can make informed
decisions about their application and
use. As noted above, we have sought a
balance between limited
prescriptiveness and sufficient detail to
enable robust and broadly applicable
reporting of information on source
attributes to users. We request comment
on whether there are items contained
within the proposals described above
that we should explicitly require as
elements of source attributes
information. In particular, we request
comment on whether to divide the
proposed ‘‘intended use’’ source
attribute in § 170.315(b)(11)(vi)(C)(1)(ii)
described above into multiple attributes
including a statement of the intended
use, the role of the model in decisionmaking, the logic underlying the model
(including information on the clinical
rationale, which could allow users or
implementers to evaluate whether the
logic underlying the model is applicable
to the individual and context in which
they are using the model), the intended
users, and the intended patient
population or object of the model. We
also request comment on whether to
divide the proposed ‘‘input features of
the intervention’’ source attribute in
§ 170.315(b)(11)(vi)(C)(2)(i) into
multiple attributes including
information on inclusion and exclusion
criteria, demographics, data source or
setting, data quality, missingness, and
data that must be available to facilitate
prediction. We similarly request
comment on whether to divide the
proposed ‘‘external validation process’’
at source attribute
§ 170.315(b)(11)(vi)(C)(2)(iii) into subelements related to who conducted the
evaluation, the setting, demographics of
the data, and the process.
Because the proposed source
attributes described here and the
intervention risk analysis and mitigation
practices proposed in
172 Silcox, et al., NEJM Catalyst Innovations in
Care Delivery, (2020); Sendak, et al., NPJ digital
medicine, (2020); Variable generalization
performance of a deep learning model to detect
pneumonia in chest radiographs: a cross-sectional
study; Andrew Wong, et al., External validation of
a widely implemented proprietary sepsis prediction
model in hospitalized patients, 181 JAMA Internal
Medicine (2021).
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
§ 170.315(b)(11)(vii)(A) cover closely
related topics, such as processes and
measures related to fairness and
validity, it is likely that some of the
information used to provide
descriptions of source attributes, would
be substantially similar or identical to
information the developer of certified
health IT uses to describe their IRM
practices as described later in
§ 170.315(b)(11)(vii). In particular, this
may be the case with information
related to the ‘‘Process used to ensure
fairness in development of the
intervention’’ proposed in
§ 170.315(b)(11)(vi)(C)(2)(ii), the
‘‘External validation process’’ proposed
in § 170.315(b)(11)(vi)(C)(2)(iii), and
‘‘Update and continued validation or
fairness assessment schedule’’ proposed
in § 170.315(b)(11)(vi)(C)(4)(i). This
parallel structure is intentional to
support alignment and not intended to
be duplicative; rather it reflects that
source attributes and IRM practices
information would be available in
different media (through a Health IT
Module versus a publicly available
hyperlink), to different individuals
(potential users of the predictive DSI
versus the public) and likely reviewed
at different times (when using or
implementing the predictive DSI versus
more general availability). We
encourage developers to consider these
differing media, audiences, and uses
when considering the type and depth of
information to report for each item.
In this proposed rulemaking, we are
also considering requirements that
would enable a user to review via direct
display, drill down, or link out from the
Health IT Module additional source
attributes beyond the fourteen attributes
proposed and discussed above. Some of
these additional attributes relate to
facets of intervention risk management
practices in § 170.315(b)(11)(vii), as
discussed in section III.C.5.c.x. There
are many voluntary reporting guidelines
developed by industry, academia, and
other interested parties designed to
facilitate evaluation of predictive
models, their output, and in some cases
their impact, and the relevance of
results of those evaluations to specific
contexts, patients, and clinical
decisions. However, these reporting
guidelines do not uniformly highlight
the same type of information to make
available about a model. Based on our
review of available literature and
documentation, interested party input,
and in consultation with the Agency for
Healthcare Research and Quality
(AHRQ) and Food and Drug
Administration (FDA), we believe that
the following additional source
PO 00000
Frm 00049
Fmt 4701
Sfmt 4702
23793
attributes could help achieve our stated
objectives, and we are considering
requiring certified Health IT Modules to
enable a user to review information
about these additional source attributes
via direct display, drill down, or link
out from the certified Health IT Module,
consistent with proposed requirements
in § 170.315(b)(11)(vi):
Intervention Details
• Information on the explainability
(defined as the ability to explain a ‘black
box’ model, often through the use of a
second model),173 or interpretability of
the model, which means models that are
directly understandable by their
intended users and often subject to
some constraints that make it easier to
follow relationships within the data and
how predictions were generated (we
note that this information would be
available if we adopt the proposed
intervention risk management in
§ 170.315(b)(11)(vii), but we are
considering requiring this information
as source attributes);
• Information on whether a DSI meets
the definition of a medical device under
the FDA definition according to an
internal review or because it has been
reviewed by FDA in a premarket
submission; 174
• Any known ethical considerations
related to data acquisition and use (e.g.,
information on consent from
individuals whose data is used during
model development and validation); 175
Intervention Development
• Specifics on the source of the
output or information presented through
the DSI, including whether it was
derived from meta-analysis, other
synthesis of clinical studies, statistical
modeling, AI/ML techniques, or some
other method, and details on the type of
model used, and model-building
procedures; 176
• Details on how model prediction
and classification cut-points were
selected relative to defined outcomes
(e.g., how ‘‘high’’ risk groups were
173 Cynthia Rudin, Stop explaining black box
machine learning models for high stakes decisions
and use interpretable models instead, 1 Nature
Machine Intelligence (2019).
174 See FDA discussion on device software
functionality, https://www.fda.gov/regulatoryinformation/search-fda-guidance-documents/
clinical-decision-support-software.
175 See also section III.C.5.c.xi of this proposed
rule ‘‘Data Practices and Governance: Ethical, Legal,
and Social Implications of Data Collection and
Use.’’
176 See also FDA, Clinical Decision Support
Software Final Guidance (September 2022), https://
www.fda.gov/regulatory-information/search-fdaguidance-documents/clinical-decision-supportsoftware?utm_medium=email&utm_
source=govdelivery.
E:\FR\FM\18APP2.SGM
18APP2
23794
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
defined or what threshold was used to
recommend a given course of action,
such as selection of a therapy);
• Security and privacy-preserving
approaches included in model
development (e.g., how personal
identifiers were removed or masked); 177
• List of data elements or data classes
used in the model and how they were
used in the model in terms of categories
or transformation;
• Model verification, usually
associated with simulation models and
defined as the process of confirming
through the provision of objective
evidence that specified requirements
have been fulfilled and that model
implementation accurately represents
the developer’s conceptual description
of the model (which may reflect
information in the intended use of the
intervention and output of the
intervention source attributes) and its
solution;
Quantitative Measures of Intervention
Performance
• Model calibration or calibration
curve, which represent the relationship
between predicted values generated by
the model and observed probabilities;
• Confidence intervals or other
measures of uncertainty related to
measures of performance, fairness, and
effectiveness, which would provide
more information on the precision of
evaluations and assure users that
reported performance was unlikely to
have been achieved by chance;
• Model reliability, using reliability
to mean the ‘‘ability of an item to
perform as required, without failure, for
a given time interval, under given
conditions.’’ 178
• Prediction intervals or other
measures of uncertainty around the
prediction generated, which would help
inform users of the precision of a given
prediction and whether the true value
may vary widely or narrowly from the
predicted estimate;
Ongoing Maintenance of Intervention
Implementation and Use
ddrumheller on DSK120RN23PROD with PROPOSALS2
• Information on data quality and
completeness,179 which would be useful
to ensure that the model is effectively
implemented; 180
177 See also section III.C.5.c.xi of this proposed
rule ‘‘Data Practices and Governance: Ethical, Legal,
and Social Implications of Data Collection and
Use.’’
178 See ISO/IEC TS 5723:2022, https://
www.iso.org/obp/ui/#iso:std:iso-iec:ts:5723:ed1:v1:en:term:3.2.12.
179 See section III.C.5.c.xi of this proposed rule
‘‘Technical Standards and Data Management:
Electronic Data Source, Capture, and Use.’’
180 See supra note, 176.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
• Whether the model incorporates
data generated from the setting it has
been deployed in and uses it to update
the model in real-time, sometimes
referred to as a model being ‘online’ or
‘unlocked’.
• For online or unlocked models, any
additional organizational or technical
controls in place to evaluate the impact
of the online or unlocked updating and
results of that evaluation.
• For online or unlocked models, the
controls in place to update the
descriptions of source data to reflect the
changing composition of the data.
We are soliciting comments in this
proposed rulemaking on whether we
should require developers of certified
health IT with Health IT Modules
certified to proposed § 170.315(b)(11) to
make all source attributes information
in the proposed § 170.315(b)(11)(vi)
publicly available or accessible, for
example, on a website, similar to the
existing API documentation
requirement in § 170.315(g)(10)(viii)(B).
We are considering whether the public
availability of this information is
necessary to effectively improve the
emerging market for predictive DSIs, or
is necessary to ensure public confidence
in predictive DSIs by enabling research
use of source attribute information. For
example, without this information,
certified health IT purchasers (e.g.,
health care providers) may find it hard
to effectively understand and determine
whether models they are considering are
FAVES or to anticipate the issues they
may face when using the predictive DSI.
This lack of transparency also could
limit incentives for developers of
certified health IT to improve their
products and can potentially lead to
practices that interfere with the flow of
health information and the use of
predictive DSIs to improve care.
Accordingly, we solicit comment on
whether we should require health IT
developers of certified health IT with
Health IT Modules certified to proposed
§ 170.315(b)(11) to make source attribute
information available for the general
public. We solicit comment on whether
having this information publicly
available would be beneficial for
potential users that purchase models or
associated technology or software, and
would help inform them prior to
procurement of certified health IT and
procurement of predictive DSIs
integrated with certified health IT. We
also solicit comment on whether having
this information publicly available
would improve public confidence in
predictive DSIs by enabling research on
source attribute information. We also
welcome any comments on whether
there should be a requirement to
PO 00000
Frm 00050
Fmt 4701
Sfmt 4702
provide machine readable or
computable versions of this information.
We believe that such a requirement
could improve consistency and
comparability of source attribute
information across Health IT Modules
certified to proposed § 170.315(b)(11),
regardless of whether these source
attributes are made publicly available or
are only made directly available to a
developer of certified health IT’s
customers.
We welcome comment on whether we
should require a certain format or order
in which these attributes must appear to
users. We note that we are presenting
these source attributes here in preamble
and in proposed regulation text
according to how a developer may
encounter them as part of the software
or product development life cycle. We
are not aware of widely agreed upon
best practices for the format in which
these elements or source attributes
information should be displayed.
However, we are aware of industry
efforts to standardize a format to display
information about technology in the
form of a ‘‘model card’’ or ‘‘nutritional
label’’ for healthcare.181 We solicit
comment on the desirability and
feasibility of requiring a standardized
format to display and communicate
source attributes information as a
requirement of the Program. We also
request comment on how to ensure that
users are aware that this information is
available for them to review and how
users can readily and easily access
information about these source
attributes as part of their overall
workflow.
We solicit feedback on additional
opportunities to help bring algorithmic
transparency and improved
trustworthiness in health IT design,
development, and implementation as
well as user needs for the procurement,
implementation, and use of such
technology. We are aware of a growing
trend in industry and academia aiming
to identify and address various
algorithmic biases through audits.182
181 See, e.g., Stat News, Health-related artificial
intelligence needs rigorous evaluation and
guardrails, (March 2022), https://
www.statnews.com/2022/03/17/health-related-aineeds-rigorous-evaluation-and-guardrails/?utm_
source=STAT+Newsletters&utm_
campaign=ac551f3b51-health_tech_COPY_
01&utm_medium=email&utm_term=0_8cab1d7961ac551f3b51-153157394.
182 See James Guszcza, et al. Why We Need to
Audit Algorithms. Harvard Business Review. (Nov.
28, 2018). https://hbr.org/2018/11/why-we-need-toaudit-algorithms; Xiaoxuan Liu, et al., The medical
algorithmic audit, The Lancet Digital Health (2022).
See generally Outsider Oversight: Designing a Third
Party Audit Ecosystem for AI Governance ID Raji,
P Xu, C Honigsberg, D Ho—Proceedings of the 2022
E:\FR\FM\18APP2.SGM
18APP2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
Audits are often described as being
performed by independent (or even
adversarial) third parties, certified
practitioners, and by a normalized set of
rules.183 We support facilitating
continuous monitoring over time,
sometimes referred to as
‘‘algorithmovigilance,’’ and an overall
life cycle approach to analyzing and
monitoring algorithm-driven healthcare
for effectiveness and equity.184 We
believe the proposed source attribute
requirements in § 170.315(b)(11)(vi)
would provide much-needed
information to aid algorithmic audits
and algorithmovigilance. We also solicit
comment on testing or assessment tools
that might further support transparency
and trustworthiness including:
consensus metrics and technical
standards for evaluating fairness
(assessing for bias) and validating
performance (including testing
performance in different populations
and evaluating applicability or
generalizability) of predictive models
that are enabled by or interface with
Health IT Module(s) prior to and during
deployment; development and
engineering of algorithmic impact
assessments (AIAs); development of
documentation of datasets used, such as
datasheets for datasets and data cards as
well as tools that could be useful in
these areas so that Health IT Modules
certified to § 170.315(b)(11) can
demonstrate it meets a given
requirement on an ongoing basis.
We understand that any data used by
developers of certified health IT and
other parties in the development of DSIs
should be used in ways that balance
data use interests with patients’
interests. For example, model
developers should use data for training
and testing consistent with applicable
law, patients’ expectations, and any
patient consent or preference given. We
invite the public to read section
III.C.5.c.xi of this proposed rule for the
discussion about data collection and
use. We are aware that digital and
algorithmic literacy is important,
including to help detect and mitigate
bias. In turn, potential subjects
(patients) of automated decisions could
benefit from information about how
AAAI/ACM Conference on AI . . ., 2022, https://
dl.acm.org/doi/pdf/10.1145/3514094.3534181.
183 See, e.g., International Organization for
Standardization. Guidelines for auditing
management systems. https://www.iso.org/obp/ui/
#iso:std:iso:19011:ed-3:v1:en.
184 See Embi, Peter, Algorithmovigilance—
Advancing Methods to Analyze and Monitor
Artificial Intelligence–Driven Health Care for
Effectiveness and Equity, (April 2021), https://
jamanetwork.com/journals/jamanetworkopen/
fullarticle/2778569.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
these technologies function and are
used in healthcare.
Patients want to know if AI is being
used in their care, and understand how
and why it is being used in their care.185
We understand an emerging trend is for
health care providers to inform patients
about the use of these technologies,
including predictive DSIs, in making
decisions about their care.186 We
support patients being informed about
technologies that directly affect
individuals or their health information
and understand transparency can
increase public trust and confidence in
technology. In turn, we solicit comment
on whether existing Program
requirements in the Communications
condition and maintenance of
certification requirements in § 170.403
are sufficient to ensure open and
transparent discussion regarding the use
of predictive DSIs in patient care—
including discussion between users of
certified health IT and patients. We are
especially interested in whether we
should require developers of certified
health IT to provide the technical
capability for users to support patients
electronically accessing underlying
source attribute information (e.g.,
through a patient portal) for predictive
DSIs or otherwise indicate to a patient
when a predictive DSI was used to make
decisions about the patient in the course
of the patient’s care. We also are
interested in learning more about how
to incorporate the patient perspective
and overall engagement meaningfully
and sustainably. Specifically, we are
interested in comments on how to
improve the public’s awareness of their
ability to obtain information about any
use of predictive DSI—or other
emerging technologies—in their
healthcare and summary information
about IRM practices associated with
such use through the HIPAA Privacy
Rule individual’s right of access.187
Similar to when a patient wants to
obtain access to more than just test
results from a clinical laboratory that is
a covered entity (health plans, health
care clearinghouses, or health care
providers that conduct standard
electronic transactions),188 if a patient
requests access to their information held
by a health care provider, the designated
record set (DRS) could include, for
185 See, e.g., https://www.radiologybusiness.com/
topics/healthcare-management/businessintelligence/consumers-anticipate-betterhealthcare-through.
186 See, e.g., AHRQ-funded patient-centered CDS
Innovation Collaborative (CDSiC), https://
cds.ahrq.gov/cdsic.
187 45 CFR 164.524.
188 See definition of ‘‘covered entity’’ at 45 CFR
160.103.
PO 00000
Frm 00051
Fmt 4701
Sfmt 4702
23795
example, the underlying data used to
generate recommendations about their
healthcare, underlying information
about any use of predictive DSI
generated as part of the healthcare
decision, and other information (e.g.,
summary information about
intervention risk management practices)
associated with such use of a predictive
DSI.189
ix. Proposed § 170.315(b)(11)(vi)(D)
Missing Source Attribute Information
We believe that source attributes
proposed in § 170.315(b)(11)(vi)(A), (B),
and (C) are foundational for users’
understanding of the DSI regardless of
whether the intervention developer is a
developer of certified health IT, a
customer of the developer of certified
health IT, an academic health system,
integrated delivery network, a thirdparty software developer, or other party.
This belief underpins our proposed
requirements in § 170.315(b)(11)(vi) that
certified Health IT Modules enable a
user to review a plain language
description of all source attribute
information in § 170.315(b)(11)(vi)(A)
through (C) via direct display, drill
down, or link out. However, as
discussed previously, we understand
there may be circumstances where a
developer of certified health IT may not
have information pertaining to a source
attribute for a Health IT Module to
enable such user review. We, therefore,
propose in § 170.315(b)(11)(vi)(D) that a
certified Health IT Module must clearly
indicate when a source attribute listed
in § 170.315(b)(11)(vi)(A), (B), and (C),
as applicable, is not available for the
user to review, including two specific
circumstances. First, we propose in
§ 170.315(b)(11)(vi)(D)(1) that for source
attributes in § 170.315(b)(11)(vi) that
include the ‘‘if available’’ phrase, a
Health IT Module must clearly indicate
when such source attribute is not
available for review. Second, we
propose in § 170.315(b)(11)(vi)(D)(2)
that when a Health IT Module enables
or interfaces with a DSI developed by
other parties that are not developers of
certified health IT, that Health IT
Module must clearly indicate when any
source attribute listed in
§ 170.315(b)(11)(vi)(A), (B), or (C), as
applicable, is not available for the user
to review. This means that a certified
Health IT Module that enables or
interfaces with a DSI developed by other
parties that are not developers of
189 See, e.g., OCR’s HIPAA FAQs 2048 and 2049,
https://www.hhs.gov/hipaa/for-professionals/faq/
2048/does-an-individual-have-a-right-under-hipaa/
index.html; https://www.hhs.gov/hipaa/forprofessionals/faq/2049/does-an-individual-have-aright-under/.
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
23796
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
certified health IT must clearly indicate
when any attribute listed in
§ 170.315(b)(11)(vi)(A), (B), or (C) is not
available for the user to review,
regardless of whether the DSI is a
predictive DSI, as defined at § 170.102,
an evidence-based DSI, as described at
§ 170.315(b)(11)(iii), or a linked
referential DSI, as described at
§ 170.315(b)(11)(iv).
We clarify that ‘‘other parties,’’ in
§ 170.315(b)(11)(vi)(D)(2) includes any
party that develops a DSI, a model, or
an algorithm that is used by a DSI and
is not a developer of certified health IT.
These can include, but are not limited
to: a customer of the developer of
certified health IT, such as an
individual health care provider,
provider group, hospital, health system,
academic medical center, or integrated
delivery network; a third-party software
developer, such as those that publish or
sell medical content or literature used
by a DSI; or researchers and data
scientists, such as those who develop a
model or algorithm that is used by a
DSI.
We reiterate that while we do not
prescribe how a certified Health IT
Module must indicate that an attribute
is missing, we clarify that the certified
Health IT Module must communicate an
attribute is missing unambiguously and
in a conspicuous manner to a user. We
note that these ‘‘other parties’’ may or
may not have a contractual relationship
with the developer of certified health IT.
However, we seek comment on whether
we should require developers of
certified health IT with Health IT
Modules that enable or interface with
predictive DSIs to display source
attributes for other parties with which
the developer of certified health IT has
a contractual relationship.190
When predictive DSIs are developed
by other parties, rather than the
developer of the certified Health IT
Module, we recognize that it may not be
feasible for developers of certified
health IT to have access to or possess
information about each source attribute
required in § 170.315(b)(11)(vi)(C),
available for user review. Therefore, we
propose to allow developers of certified
health IT with Health IT Modules that
enable or interface with predictive DSIs
that are developed by other parties to
clearly indicate when any source
attribute information is not available for
user review. Consistent with prior
discussion regarding third-party
developed evidence-based DSIs (77 FR
54215), we anticipate that developers of
certified health IT would obtain
information on the predictive DSI from
the model developers, owners, or
creators in most instances. This is
consistent with what we have
historically expected, noting in the 2014
Edition Proposed Rule that it would be
the third party from which the
developer of certified health IT would
get this information (77 FR 54215). We
also noted in the 2014 Edition Proposed
Rule that ‘‘The absence of
[bibliographic] information is . . .
valuable information and may (or may
not) cause the [user] to heed or ignore
the guidance. Note that our goal here is
not to assess the quality or evidence
basis of decision support, but to enable
the [user] to do so.’’ We also stated, ‘‘In
cases where [funding source]
information is unknown, then the [user]
should have access to the fact that this
information is unknown’’ (77 FR 54215).
We believe that indicating the absence
of information on source attributes
would provide an important signal to
users that the model may not have been
rigorously developed and evaluated.
This signal would provide motivation to
developers to perform the tasks
necessary to generate information
relevant to each source attribute and to
provide that information to health IT
developers of certified health IT or their
customers for incorporation into the
source attributes information about the
model to be made available for user
review as discussed earlier in the
section and proposed in
§ 170.315(b)(11)(vi). We invite comment
on these proposals.
We are aware of some standards
related to DSIs, such as CDS Hooks v1.0,
that could invoke decision support from
within a clinician’s workflow, and that
include a source attribute field designed
to include URLs to relevant supporting
documentation.191 We are also aware
that the emerging Evidence-Based
Medicine on FHIR project includes a
more detailed resource structure for the
presentation of source information
related to a recommendation.192 We
request comment on whether those or
related standards could support
provision of information on source
attributes for DSIs, including predictive
DSIs, to meet the proposed requirement
in § 170.315(b)(11)(vi) for source
attributes information to be available for
user review, either in the form of ‘‘drilldown’’ links, link out, or through direct
display within the certified Health IT
Module.
191 See
190 See
the definition of ‘‘business associate’’ at 45
CFR 160.103.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
https://cds-hooks.hl7.org/.
192 https://confluence.hl7.org/display/CDS/
EBMonFHIR.
PO 00000
Frm 00052
Fmt 4701
Sfmt 4702
x. Proposed § 170.315(b)(11)(vi)(E)
Authoring and Revising Source
Attributes
We propose in § 170.315(b)(11)(vi)(E)
that Health IT Modules certified to
§ 170.315(b)(11) support the ability for a
limited set of identified users to author
(i.e., create) and revise source attributes
and information provided for user
review beyond what is proposed in
§ 170.315(b)(11)(vi)(A) and (C). This
proposed requirement would pertain to
source attributes related to both
evidence-based DSIs and predictive
DSIs that are enabled by or interfaced
with a certified Health IT Module,
including any predictive DSIs that are
developed by users of the certified
Health IT Module. This means, for
example, a hospital that develops its
own predictive DSI that is interfaced
with a certified Health IT Module would
be able to create new or revise existing
source attributes information related to
that predictive DSI that is made
available through the certified Health IT
Module without the developer of
certified health IT’s direct involvement.
This would also mean that, following a
local evaluation of a predictive DSI
created by a developer of certified
health IT, a health organization would
have the ability to add a new attribute
(for instance) named ‘‘local reliability’’
for display within the certified Health
IT Module and include information on
this additional attribute of the
organization’s predictive DSI or model
and that this information would be
made available through and within the
certified Health IT Module for display to
users. While we are not proposing to
require a developer of certified health IT
to be directly involved in the authoring
or revision of source attribute
information provided for user review,
we are proposing that the certified
Health IT Module would need to
support the technical ability for a
limited set of identified users to create
new or revised attribute information
alongside other source attribute
information proposed in
§ 170.315(b)(11)(vi)(A) and (C). As
described in the examples above, we
envision that innovative source
attributes, reflective of local
circumstances, could be authored by
users without direct development
support from the developer of certified
health IT. Like all source attributes we
proposed in § 170.315(b)(11)(vi), these
authored source attributes should be
available ‘‘via direct display, drill down,
or link out from a certified Health IT
Module.’’
As previously noted, multiple
reporting guidelines exist for predictive
E:\FR\FM\18APP2.SGM
18APP2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
models and there is no single list of
agreed upon attributes for model
transparency.193 We believe the
proposed source attributes information
in § 170.315(b)(11)(vi)(C) would
represent a useful floor, baseline, or
minimum level of information to enable
consistent transparency of predictive
DSIs. We similarly believe that the
proposed source attributes in
§ 170.315(b)(11)(vi)(A) represent a
useful floor, baseline, or minimum level
of information to enable transparency
for evidence-based DSIs. However, we
are aware of trends towards shareable
and interoperable decision support that
may result in a need for local
customization of the source attributes
describing the DSI or require additional
information on a local instantiation of a
DSI.194 We believe health systems,
health care providers, and other users of
DSIs should have the capability to
customize and expand the source
attributes displayed for a DSI to meet
their specific needs and at their
discretion. Allowing for user revision
would also ensure that the information
available through source attributes can
be updated in a timely manner and
remain informative. We invite comment
on this proposal.
ddrumheller on DSK120RN23PROD with PROPOSALS2
Display of Predictive DSI Source
Attributes
In the previous sections, we propose
that developers of certified health IT
would make source attributes available
for DSIs their Health IT Modules enable
or interface with. We are aware that
several technical architectures exist to
provide outputs of predictive and
evidence-based models to certified
health IT or otherwise use these models
as the back-end of DSIs that are
subsequently delivered through a
certified product.195 These approaches
could be used to deliver the output of
models developed by customers of the
developer of certified health IT health
care providers to their own health IT—
a common approach at academic
193 Sendak, et al., NPJ digital medicine, (2020);
Mitchell, et al. 2019; Hernandez-Boussard, et al.,
Journal of the American Medical Informatics
Association, (2020); Norgeot, et al., Nature
medicine, (2020); Gary S Collins, et al., Transparent
reporting of a multivariable prediction model for
individual prognosis or diagnosis (TRIPOD): the
TRIPOD statement, 102 Journal of British Surgery
(2015).
194 See, e.g., https://cds.ahrq.gov/cdsconnect.
195 Julian Gruendner, et al., KETOS: Clinical
decision support and machine learning as a
service–A training and deployment platform based
on Docker, OMOP–CDM, and FHIR Web Services,
14 PloS one (2019); Mohammed Khalilia, et al.,
Clinical predictive modeling development and
deployment through FHIR web services § 2015
(American Medical Informatics Association 2015);
CDS Hooks, https://cds-hooks.org/.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
medical centers and one that may be
more widely used as the underlying
technology becomes more ubiquitous.
These approaches could also be used to
deliver model output or a DSI
developed by third-party developers,
which we believe already occurs at a
wide scale and anticipate would grow
increasingly pervasive as the market for
effective predictive decisions support
interventions continues to grow.
We request comment on whether
developers of certified health IT would
be able to differentiate clearly between
other-party DSIs that they implement
into their Health IT Modules and make
available to their customers versus those
other-party products that their
customers purchase, develop, or
otherwise integrate without direct
involvement of the developer of
certified health IT.
xi. Proposed § 170.315(b)(11)(vii)
Intervention Risk Management (IRM)
Requirements for Predictive Decision
Support Interventions
We propose in § 170.315(b)(11)(vii) to
establish ‘‘intervention risk
management’’ requirements. We
propose to require in
§ 170.315(b)(11)(vii) that by December
31, 2024, a developer of certified health
IT that attests ‘‘yes’’ in
§ 170.315(b)(11)(v)(A) employs or
engages in the following IRM practices
for all predictive decision support
interventions, as defined in § 170.102,
that the developer’s certified Health IT
Module enables or interfaces with:
• In § 170.315(b)(11)(vii)(A)(1) Risk
Analysis, we propose that developers of
certified health IT analyze potential
risks and adverse impacts associated
with a predictive decision support
intervention for the following
characteristics: validity, reliability,
robustness, fairness, intelligibility,
safety, security, and privacy;
• In § 170.315(b)(11)(vii)(A)(2) Risk
Mitigation, we propose that developers
of certified health IT implement
practices to mitigate risks, identified in
accordance with
§ 170.315(b)(11)(vii)(A)(1), associated
with a predictive decision support
intervention; and
• In § 170.315(b)(11)(vi)(A)(3)
Governance, we propose that developers
of certified health IT establish policies
and implement controls for predictive
decision support intervention
governance, including how data are
acquired, managed, and used in a
predictive decision support
intervention.
We propose in § 170.315(b)(11)(vii)(B)
that developers of certified health IT
compile detailed documentation of
PO 00000
Frm 00053
Fmt 4701
Sfmt 4702
23797
intervention risk management practices
listed in § 170.315(b)(11)(vii)(A) and
upon request from ONC make available
such detailed documentation for any
predictive DSI that their certified Health
IT Module enables or interfaces with.
We also propose in
§ 170.315(b)(11)(vii)(C) to require
developers of certified health IT to
submit summary information to their
ONC–ACB regarding IRM practices
listed in proposed
§ 170.315(b)(11)(vii)(A) via publicly
accessible hyperlink that allows any
person to directly access the
information without any preconditions
or additional steps. Consistent with
Program implementation for similar
documentation requirements (84 FR
7484), we clarify that for this proposed
summary information in
§ 170.315(b)(11)(vii)(C), the required
documentation would need to be
submitted to ONC–ACBs for review
prior to issuing a certification.
Finally, we propose in
§ 170.315(b)(11)(vii)(D) to require that
developers of certified health IT review
annually and, as necessary, update both
detailed documentation and summary
information. We propose in
§ 170.315(b)(11)(vii) to establish a
deadline of December 31, 2024, for
developers of certified health IT with
Health IT Modules to which the
proposed requirements in that section
apply to engage in intervention risk
management practices and develop both
detailed documentation and summary
information. This proposed deadline
corresponds with our proposal in
§ 170.315(a)(9)(vi) and supports our
proposal to update the Base EHR
definition in § 170.102, as discussed in
section III.C.5.c.xii.
Background on Risk Management and
Connection to Other § 170.315(b)(11)
Proposals
Model development is not a
straightforward or routine technical
process. The experience and judgment
of developers, as much as their
technical knowledge, greatly influence
the appropriate selection of inputs and
processing components. The training
and experience of developers exercising
such judgment affects the extent of
model risk. In addition, even with
skilled modeling and robust validation,
model risk cannot be eliminated, so
other tools should be used to manage
model risk effectively. Among these are
establishing limits on model use,
monitoring model performance,
adjusting or revising models over time,
and supplementing model results with
E:\FR\FM\18APP2.SGM
18APP2
23798
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
other analysis and information.196 IRM
efforts should prioritize the
minimization of potential negative
impacts, and may need to include
human intervention in cases where the
predictive DSI cannot detect or correct
errors.197
Overall, the proposals in
§ 170.315(b)(11)(vii)(A) are intended to
promote the management of risks in
pursuit of predictive DSI
trustworthiness. Trustworthy predictive
DSIs, models that are FAVES, mitigate
risks and contribute to benefits for
people, organizations, and systems.
Trustworthy predictive DSIs should
achieve a high degree of control over
risk while retaining a high level of
performance quality. Achieving this
goal requires a comprehensive approach
to intervention risk management. Risk
management can drive developers and
users to understand and account for the
inherent uncertainties and inaccuracies
in their models and systems, which in
turn can improve their overall
performance and trustworthiness.198
We note that a central component of
effective risk management lies in a clear
acknowledgment that risk mitigation,
rather than risk avoidance, is often the
most effective factor in managing such
risks.199 We also note that risks to any
software or information-based system
also apply to predictive DSIs, including
important concerns related to
cybersecurity, privacy, safety, and
infrastructure. Consequently, many
activities related to managing risk for
predictive DSIs are common to
managing risk for other types of
software development and
deployment.200 We believe that
predictive DSI risk should be managed
like other types of risk, continuously
across the SDLC. For example, under
the FDA’s existing Quality System (QS)
regulation, the FDA has current good
manufacturing practice (CGMP)
requirements for medical device
manufacturers to integrate risk
management activities throughout their
QS and across the total product life
cycle (TPLC).201 Likewise, we believe it
196 Bd. Governors Fed. Rsrv. Sys., Supervisory
Guidance on Model Risk Management, SR 11–7
(Apr. 4, 2011), https://www.federalreserve.gov/
supervisionreg/srletters/sr1107.htm.
197 See NIST, AI RMF, January 2023, https://
www.nist.gov/itl/ai-risk-management-framework.
198 Id.
199 Id.
200 See NIST, AI Risk Management Framework
(AI RMF), January 2023, https://www.nist.gov/itl/airisk-management-framework.
201 See 21 CFR part 820. See also, FDA Proposed
Rule Medical Devices; Quality System Regulation
Amendments, https://www.federalregister.gov/
documents/2022/02/23/2022-03227/medicaldevices-quality-system-regulation-amendments.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
is critical for developers of certified
health IT with Health IT Modules
certified to § 170.315(b)(11) that enable
or interface with predictive DSIs to
establish risk management strategies
that address their own unique risks and
circumstances. We encourage the use of
a framework to help facilitate
intervention risk management. For
example, the intent and approach to
govern, map, measure, and manage
risks, defined in the National Institute of
Standards and Technology (NIST) AI
Risk Management Framework (AI RMF),
the draft AI RMF Playbook, and Special
Publication 1270: ‘‘Towards a Standard
for Identifying and Managing Bias in
Artificial Intelligence’’ can be applied
when complying with proposed
requirements in
§ 170.315(b)(11)(vii)(A).202
Given a lack of healthcare sectorspecific guidance and the nascency of
several emerging efforts for risk
management of predictive software, our
proposals in § 170.315(b)(11)(vii)(A)
would not require a specific framework,
guideline, or approach that such
developers of certified health IT must
use—only that they employ or engage in
IRM practices in accordance with
proposed requirements in
§ 170.315(b)(11)(vii)(A) through (D). In
the proposals and related preamble, we
have sought a balance between
prescriptiveness and sufficient
description to enable robust reporting of
information on IRM practices. Within
this preamble, we have described
several items that we believe are best
practices. We request comment on
whether there are best practices or other
items contained within the proposals in
§ 170.315(b)(11)(vii)(A) that should be
explicitly required. We invite comment
on the proposals in
§ 170.315(b)(11)(vii)(A) to require
developers of certified health IT with
Health IT Modules certified to
§ 170.315(b)(11) and that attest ‘‘Yes’’ in
accordance with our proposal in
§ 170.315(b)(11)(v)(A) to employ or
engage in IRM practices for all
predictive DSIs that their certified
Health IT Modules enable or interface
with, without being prescriptive as to
how such practices must be carried out.
We view our proposals for risk
management of predictive DSIs in
§ 170.315(b)(11)(vii) as complementary
to our proposals for predictive DSI
source attributes in
§ 170.315(b)(11)(vi)(C). The proposed
source attributes information
202 See https://nvlpubs.nist.gov/nistpubs/ai/
NIST.AI.100-1.pdf; https://pages.nist.gov/AIRMF/;
and https://nvlpubs.nist.gov/nistpubs/Special
Publications/NIST.SP.1270.pdf.
PO 00000
Frm 00054
Fmt 4701
Sfmt 4702
requirement is meant to provide users
and implementers with sufficient
information to understand how the
model was designed, developed, and
tested, including the model’s purpose,
known limitations, and intended use(s).
Correspondingly, the proposals for
intervention risk management would
provide users, implementers, and the
wider public, including patients, with
information to understand how
developers of certified health IT with
Health IT Modules that enable or
interface with predictive DSIs analyze,
mitigate, and govern risks throughout
the technology’s life cycle. We
anticipate that these actions would
dramatically increase the likelihood that
a predictive DSI, enabled by or
interfaced with a certified Health IT
Module, is FAVES by providing
information transparency regarding how
risks to individuals, groups,
communities, organizations, and society
would be managed more effectively,
consistent with best practices.203
Together, our proposals for predictive
DSI-specific source attributes and IRM
practices information are intended to
help guide medical decisions at the time
and place of care, consistent with 42
U.S.C. 300jj–11(b)(4). Beyond the
application of predictive DSI-specific
source attributes and IRM practices
information to an episode of care, for
example, we believe such transparency
would also foster confidence and trust
among interested parties that the
technical and organization processes
used in designing and developing the
predictive DSI were FAVES and highquality. Finally, we anticipate these
proposed requirements would help
developers of certified health IT,
themselves, know if a predictive DSI
that their certified Health IT Module
enables or interfaces with is FAVES,
and then show to their customers and
the wider public that they support highquality predictive DSIs, thus improving
user and public trust in the technology.
Proposals in § 170.315(b)(11)(vii)(A)
In § 170.315(b)(11)(vii)(A), we
propose that developers of certified
health IT with Health IT Modules
certified to § 170.315(b)(11) employ or
engage in ‘‘risk analysis,’’ ‘‘risk
mitigation,’’ and ‘‘governance,’’ IRM
practices for all predictive DSIs, as
proposed to be defined in § 170.102,
that the certified Health IT Module
enables or interfaces with.
For purposes of proposed
§ 170.315(b)(11)(vii), we define ‘‘risk’’ as
a measure of the extent to which an
203 NIST, AI RMF, https://nvlpubs.nist.gov/
nistpubs/ai/NIST.AI.100-1.pdf.
E:\FR\FM\18APP2.SGM
18APP2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
entity is negatively influenced by a
potential circumstance or event.
Typically, risk is a function of: (1) the
negative impacts, or magnitude of harm,
that would arise if the circumstance or
event occurs; and (2) the likelihood of
occurrence.204 Entities can be
individuals, groups, communities, and
society. These risks sometimes are
referred to as model harms.
We believe that many such developers
of certified health IT already employ or
engage in IRM practices, thus, the
proposed requirement to provide
information on these practices in
(b)(11)(vi)(B) and (C) represent a lowlevel of burden. However, we propose to
make explicit our expectations that to
provide the proposed information, such
developers of certified health IT must
‘‘employ or engage’’ in IRM practices in
§ 170.315(b)(11)(vi)(A). We view the
proposal in § 170.315(b)(11)(vii)(A) as
similar to existing Program
requirements in § 170.315(g)(3) safetyenhanced design (SED) and
§ 170.315(g)(4) Quality management
systems (QMS), and we propose the
requirements in § 170.315(b)(11)(vii) for
similar reasons that we adopted the SED
and QMS criteria (77 FR 13843). First,
all developers of certified health IT that
seek certification to § 170.315(b)(11) and
have certified Health IT Modules that
enable or interface with predictive DSIs
would become familiar with
foundational IRM practices if not
already familiar; second, the public
disclosure of the summary information
of IRM practices employed or engaged
by the developer of certified health IT,
as described further below, would
provide transparency to purchasers
(potential users), users, and other
interested parties, and contribute to
appropriate information to help guide
medical decisions; and lastly, our
proposals in § 170.315(b)(11)(vii)(A)
would encourage development of
healthcare-specific, consensus and
industry-based best practices for risk
management.
Proposals in
§ 170.315(b)(11)(vii)(A)(1)—Risk
Analysis
In § 170.315(b)(11)(vii)(A)(1), we
propose to require developers of
certified health IT to analyze potential
risks and adverse impacts associated
with a predictive DSI that their certified
Health IT Modules enable or interface
with. NIST’s AI RMF describes seven
characteristics of trustworthy AI, and in
§ 170.315(b)(11)(vii)(A)(1) we propose to
adapt these concepts and require that
204 NIST,
AI RMF, https://nvlpubs.nist.gov/
nistpubs/ai/NIST.AI.100-1.pdf.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
developers of health IT with certified
Health IT Modules that enable or
interface with predictive DSIs employ or
engage in risk management practices
related to the following characteristics:
(1) validity; (2) reliability; (3)
robustness; (4) fairness; (5)
intelligibility; (6) safety; (7) security;
and (8) privacy.
We have adapted these emphasis
areas, and we propose that such
developers of certified health IT analyze
risks related to the lack or failure of
validity, reliability, robustness, fairness,
intelligibility, safety, security, and
privacy. Consistent with the NIST AI
RMF, we encourage developers of
certified health IT to include the
following in their analysis: (1) estimates
of the likelihood and magnitude of the
negative impact (harm), or
consequences, of each risk; (2) to whom
each risk applies (including, for
example, individual, group, and societal
harm); and (3) the source of each risk.
In addition to assessing and measuring
the magnitude of the risk, we encourage
developers of certified health IT to
identify who is accountable for any
negative impact potentially resulting
from the outcome of the risk if it is
realized.205 We are aware that many
risks are affected by the extent, quality,
source, and representativeness of the
data used in development of the
predictive DSI as well as the
management, storage, and governance of
that data. We strongly encourage
developers to consider how issues
related to data practices may contribute
to risks related to the eight, interrelated
characteristics proposed in
§ 170.315(b)(11)(vii)(A)(1). See section
III.C.5.c.xi of this proposed rule for the
discussion about data collection and use
in ‘‘Data Practices and Governance:
Ethical, Legal, and Social Implications
of Data Collection and Use’’ and data
quality ‘‘Technical Data Standards and
Data Management Source or Input Data
and Data Collection or Capture’’ under
‘‘Request for Comment.’’
It is likely that some of the
information used to identify risk would
be substantially similar or identical to
the information provided as source
attributes proposed in
§ 170.315(b)(11)(vi). As examples,
analysis of validity, fairness, and safety
may be important processes in
development of source attributes and
risk analysis such that the two proposals
are closely aligned. Developers of
certified health IT should consider risk
from individual predictive DSIs and in
205 For a discussion about ‘‘accountability,’’ see
NIST, AI RMF, https://nvlpubs.nist.gov/nistpubs/ai/
NIST.AI.100-1.pdf.
PO 00000
Frm 00055
Fmt 4701
Sfmt 4702
23799
the aggregate. Aggregate risk is affected
by interaction and dependencies among
models; reliance on common
assumptions, data, or methodologies;
and any other factors that could
adversely affect several DSIs and their
outputs at the same time.206 These risks
must be assessed prospectively, in a
timely manner to inform the summary
information of IRM practices, as
proposed in § 170.315(b)(11)(vii)(C).
Analyzing risk is a continual process
that should begin in the initial concept
and design phase of the predictive DSI
and continue through its development,
deployment and full period of use, as
the technology should be responsive to
new risks as they occur. Health IT
developers may use model risk
assessments to help determine the
types, frequency, and extent of
evaluation activities necessary to assess
risk. Information on these evaluation
activities may be useful in presenting
proposed source attributes information
describing the ‘‘process used to ensure
fairness in development of the
intervention’’ in
§ 170.315(b)(11)(vi)(C)(2)(ii), the
‘‘external validation process’’ in
§ 170.315(b)(11)(vi)(C)(2)(iii) (if
available), and in particular the ‘‘update
and continued validation or fairness
assessment schedule’’ in
§ 170.315(b)(11)(vi)(C)(4)(i).
We do not propose or describe risk
tolerance associated with the eight
characteristics, as we believe these
should be decisions made by those
involved with the design, development,
deployment, and use of the technology.
We propose that developers of certified
health IT must analyze the potential
risks and adverse impacts, associated
with a predictive DSI that their certified
Health IT Modules enable or interface
with, related to lack or failure in the
following characteristics:
• ‘‘Validity,’’ as discussed earlier in
section III.C.5.b of this proposed rule in
the proposal for source attributes in
§ 170.315(b)(11)(vi)(C), of models used
as sources for predictive DSIs can be
assessed using technical characteristics.
‘‘Validity’’ for deployed predictive DSIs
is often assessed with ongoing testing or
monitoring that confirms a system is
performing as intended (similar to the
description of the source attributes
related to ‘‘Ongoing Maintenance of
Intervention Implementation and Use,’’
in section III.C.5.b of this proposed
rule).207 Accuracy and robustness are
206 See https://www.federalreserve.gov/
supervisionreg/srletters/sr1107.htm.
207 For discussion of the definition of the terms
or characteristics, see NIST, AI RMF, https://
nvlpubs.nist.gov/nistpubs/ai/NIST.AI.100-1.pdf.
E:\FR\FM\18APP2.SGM
18APP2
23800
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
interdependent factors contributing to
the validity and trustworthiness of AI
systems. Deployment of AI systems
which are inaccurate, unreliable, or
non-generalizable to data beyond their
training data (i.e., not robust) creates
and increases AI risks and reduces
trustworthiness.208 Assessment of risk
related to validity should include and
consider the following areas:
Æ Validation of the accuracy and
completeness of data used in
development and testing of the
predictive DSI; 209
Æ Evaluation plans and results for
validation in testing environments and
ongoing evaluation in deployment; 210
Æ Both technical validity and clinical
validity, which is closely related to
measurement of effectiveness such as
those discussed in the proposed source
attribute ‘‘References to evaluation of
use of the model on outcomes’’ in
§ 170.315(b)(11)(vi)(C)(3)(v).211
• ‘‘Reliability’’ indicates whether a
model used in a predictive DSI
consistently performs as required,
without failure, for a given time
interval, under given conditions.212
Techniques designed to mitigate
overfitting (e.g., regularization) and to
adequately conduct model selection in
the face of the bias-variance tradeoff can
increase model reliability. Assessment
of reliability should include defining
what range of behaviors is considered
reliable for a model, the error rate
considered acceptable, and the results of
evaluations that demonstrate reliability
in both testing and deployed
environments.213
• ‘‘Robustness’’ or generalizability is
the ability of a model used in a
predictive DSI to maintain its level of
performance under a variety of
ddrumheller on DSK120RN23PROD with PROPOSALS2
208 Id.
209 See, e.g., ANSI/CTA–2090 The Use of
Artificial Intelligence in Health Care:
Trustworthiness.
210 See, e.g., Microsoft Responsible AI Standard,
v2: General Requirements (June 2022), https://
blogs.microsoft.com/wp-content/uploads/prod/
sites/5/2022/06/Microsoft-Responsible-AIStandard-v2-General-Requirements-3.pdf; Google
Responsible AI with TensorFlow (June 2020),
https://blog.tensorflow.org/2020/06/responsible-aiwith-tensorflow.html.
211 As described in the FDA’s Software as a
Medical Device (SAMD): Clinical Evaluation. Issued
on December 8, 2017, https://www.fda.gov/
regulatory-information/search-fda-guidancedocuments/software-medical-device-samd-clinicalevaluation.
212 See NIST, AI RMF, https://nvlpubs.nist.gov/
nistpubs/ai/NIST.AI.100-1.pdf.
213 See, e.g., Microsoft Responsible AI Standard,
v2: General Requirements (June 2022), https://
blogs.microsoft.com/wp-content/uploads/prod/
sites/5/2022/06/Microsoft-Responsible-AIStandard-v2-General-Requirements-3.pdf.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
circumstances.214 Robustness not only
means that the model performs exactly
as it does under expected uses, but also
that it performs in ways that minimize
potential harms to people if it is
operating in an unexpected setting or
environment. Measurement of validity,
accuracy, robustness, and reliability
contribute to trustworthiness, and
developers of certified health IT should
consider that certain types of failures
can cause greater harm—and risks
should be managed to minimize the
negative impact of those failures.215
Assessment of robustness should
evaluate limitations of the model based
on the source of the training and testing
data used and how features of that data
and its source might relate to
performance outside of the training and
testing environment, which are likely to
relate to information discussed in the
proposed source attribute ‘‘input
features of the intervention including
description of training and test data’’ in
§ 170.315(b)(11)(vi)(C)(2)(i) discussed
earlier in this preamble. In analyzing
robustness, developers of certified
health IT should also include the variety
of sources, settings, or environments in
which the model has been tested and its
performance in those environments.
• ‘‘Fairness,’’ as noted above in this
section, is defined by a lack of bias
against certain groups, and fairness
enhancing (or bias managing) processes
seek to ensure that models are fair. This
includes addressing concerns for
equality and equity by addressing issues
such as bias and unlawful
discrimination. NIST has identified
three major categories of AI bias that
should be addressed and managed to
enhance fairness of models: systemic,
computational and statistical, and
human-cognitive. In the analysis of
potential risks, an approach should
consider all three categories of bias and
report results of evaluations of those
categories in both testing and deployed
environments.216 It is likely that some of
the information used to identify risk
associated with fairness would be
substantially similar or identical to the
information provided as source
attributes related to fairness proposed in
§ 170.315(b)(11)(vi)(vii)(C).
• ‘‘Intelligibility’’ refers to the extent
to which the predictive DSI can be
understood, often through a
representation of the mechanisms
underlying an algorithm’s operation and
through the meaning of AI systems’
214 See NIST, AI RMF, https://nvlpubs.nist.gov/
nistpubs/ai/NIST.AI.100-1.pdf (Source ISO/IEC TS
5723:2022).
215 Id.
216 See NIST, AI RMF, https://nvlpubs.nist.gov/
nistpubs/ai/NIST.AI.100-1.pdf.
PO 00000
Frm 00056
Fmt 4701
Sfmt 4702
output in the context of its designed
functional purpose. Generally,
perceptions of risk related to
intelligibility stem from concerns that
unintelligible models, which produce
output that is difficult to make sense of
or contextualize, may lead to
inappropriate interpretation or use of
the decision support. Risks from
ambiguity on the mechanisms
underlying operation can be managed
by clear descriptions of how models
work. Risks from an ambiguity in output
in the context of functional purpose can
often be addressed by communicating a
description of why the predictive DSI or
other systems made a particular
prediction or recommendation.217 In
assessing intelligibility, developers of
certified health IT should delineate the
expected and acceptable context of use,
including the intended users and
operational setting. Developers should
assess whether the predictive DSI
provides intelligible information as an
output that will allow for its intended
users to make effective interpretation of
relevant predictive DSI behavior when
applied or used in the expected
operational setting.218
• ‘‘Safety’’ as a concept is highly
correlated with risk and generally
denotes that the product is free from any
unacceptable risks and the probable
benefits outweigh any probable risk.219
Safety-related risks may overlap with
privacy, security, and fairness.
Predictive DSIs and the models used in
predictive DSIs should not, under
defined conditions, cause physical or
psychological injury or lead to a state in
which human life, health, property, or
the environment is endangered.220
Developers should assess who could be
injured, when injury could arise and
how injury could arise, engaging
external parties in this assessment when
such risks are not obvious. Because
assessment is a continuous process,
developers should also implement
procedures for regularly evaluating
safety.
• ‘‘Security’’ (and relatedly resilience)
is a predictive DSI’s and model’s ability
to withstand adversarial attacks, or more
generally, unexpected changes in its
environment or use, including not only
those related to the provenance of the
217 See NIST, AI AI RMF, January 2023, https://
www.nist.gov/itl/ai-risk-management-framework.
218 GAO–21–519SP: AI Accountability
Framework for Federal Agencies & Other Entities,
https://www.gao.gov/assets/gao-21-519sp.pdf.
219 Cf. ISO 14971, which considers safety to be
‘‘free from unacceptable risks.’’ If the product is a
device as defined in section 201(h) of the FD&C Act,
there may be different or additional requirements
that apply.
220 See supra note, 218.
E:\FR\FM\18APP2.SGM
18APP2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
data, but also, encompassing
unexpected or adversarial use of the
model or data. In assessing security,
developers should consider common IT
security concerns related to the
exfiltration of models, training data, or
other intellectual property through the
technology’s endpoints as well as any
potential weaknesses in the controls for
the access, transmission, and storage of
sensitive information.221
• ‘‘Privacy’’ refers generally to the
norms and practices that help to
safeguard human autonomy, identity,
and dignity,222 as well as data autonomy
and intrusions on information about an
individual.223 Privacy-related risks may
overlap with safety, security, and
fairness. Analysis of privacy should
consider the NIST Privacy Framework
and application of NIST Privacy Risk
Assessment Tools.224 Privacy values
such as anonymity, confidentiality, and
control generally should guide choices
for AI or ML-enabled technology design,
development, and deployment.225 Like
safety and security, specific technical
features of AI or ML-enabled
technologies may promote or reduce
privacy, and assessors can identify how
the processing of data could create
privacy-related problems.226 We invite
readers to review section III.C.5.c.xi of
this proposed rule for the discussion
about ethical, legal, and social
implications of data collection and use
in ‘‘Data Practices and Governance:
Ethical, Legal, and Social Implications
of Data Collection and Use.’’
Consistent with our proposed
requirement in § 170.315(b)(11)(vii),
summary information of the risk
analysis IRM practices, as proposed in
§ 170.315(b)(11)(vii)(C), must be made
available by December 31, 2024.
We seek comments on these proposals
and on related tools and frameworks to
support this area in healthcare,
including those tools that help identify
observable indicators of risks.
221 Id.
ddrumheller on DSK120RN23PROD with PROPOSALS2
222 Id.
223 See The HIPAA Privacy Rule, 65 FR 82461,
82464 (Dec. 28, 2000) (noting that ‘‘privacy is a
fundamental right,’’ and ‘‘many people believe that
individuals should have some right to control
personal and sensitive information about
themselves,’’ including health information).
224 See https://www.nist.gov/privacy-framework;
https://www.nist.gov/itl/applied-cybersecurity/
privacy-engineering/collaboration-space/focusareas/risk-assessment/tools.
225 See NIST, AI RMF, January 2023, https://
www.nist.gov/itl/ai-risk-management-framework.
226 Id.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
Proposals in
§ 170.315(b)(11)(vii)(A)(2)—Risk
Mitigation
We propose in
§ 170.315(b)(11)(vii)(A)(2) ‘‘Risk
Mitigation’’ to require implementation
of practices to mitigate risks associated
with predictive DSIs, as proposed in
§ 170.315(b)(11)(vii)(A)(1). Risk
mitigation practices should seek to
address adverse impacts or minimize
anticipated negative impacts of
predictive DSIs on patients and
populations. Model risk mitigation
should include disciplined and
knowledgeable development and
implementation practices that are
consistent with the real world context of
the model’s use, intended specific
application of the model, and goals of
the model user.227
Risk mitigation practices
implemented by developers of certified
health IT should cover the following:
• Practices to prioritize (establish
different levels of) risks based on their
impact and likelihood. Developers
should prioritize risks based on the
magnitude of negative impact, the
likelihood of risk, and the categorization
of the predictive DSI.228 We encourage
developers to consider these dimensions
of risks as they apply to their users or
customers, patients, and other
individuals served by customers who
the predictive DSI may be applied to, as
well as consideration of how risks could
impact multiple parties. Prioritization of
risk should guide the implementation of
mitigation practices.
• Practices to mitigate or minimize
identified potential risks. Numerous
approaches exist to minimize predictive
DSIs risks.229 We encourage developers
to consider selection of an alternative
label or output for the predictive model,
to evaluate how information is
presented to users through the
227 Id.
228 For example, according to existing taxonomy,
the role of the CDS, and the situation, such as
IMDRF | Software as a Medical Device: Possible
Framework for Risk Categorization and
Corresponding Considerations: https://
www.imdrf.org/documents/software-medicaldevice-possible-framework-risk-categorization-andcorresponding-considerations.
229 For example, practices described in NIST AI
RMF 1.0, https://nvlpubs.nist.gov/nistpubs/ai/
NIST.AI.100-1.pdf; Off. Comptroller Currency,
Comptroller’s Handbook: Model Risk Management
(Aug. 2021), https://www.occ.gov/publications-andresources/publications/comptrollers-handbook/
files/model-risk-management/index-model-riskmanagement.html; See generally The Association of
Food and Drug Officials (AFDO)/Regulatory Affairs
Professionals Society (RAPS) Healthcare Products
Collaborative, Bias in Artificial Intelligence in
Healthcare Deliverables, White Paper (2022),
https://www.healthcareproducts.org/wp-content/
uploads/2023/02/Final-Bias-in-ArtificialIntelligence-11.27.22.pdf.
PO 00000
Frm 00057
Fmt 4701
Sfmt 4702
23801
predictive DSI, or to add additional
context to the display of the predictive
DSI. We are aware that many risks are
impacted by the extent, quality, source,
and representativeness of the data used
to develop predictive DSIs, as well as
data management, governance, and
storage practices. We encourage
developers to closely evaluate the
adequacy of the data used to develop a
predictive DSI and consider selection of
alternative or additional data. We
further encourage developers to monitor
and mitigate any privacy or security risk
introduced by acquisition and curation
of data for use by a predictive DSI, the
storage and management of that data,
the data’s use in developing the
predictive DSI, and the application of
the predictive DSI to individuals in a
deployed setting. Human factors such as
participatory design techniques and
multi-stakeholder approaches, and a
human-in-the-loop are also important
for mitigating risks related to AI bias.230
• Change control plans, including
schedule of validation and updating
processes. We encourage developers to
create plans for monitoring the
performance, fairness, calibration, and
other aspects of predictive DSIs and
associated models. Developers should
include anticipated modifications
related to retraining models,
recalibrating models, updating models,
and associated methodology.231 The
plan should also include information on
how those changes will be implemented
in a controlled manner that manages
risks to patients.
• Processes to supersede, disengage,
or deactivate an existing predictive
decision support intervention that
demonstrate performance or outcomes
that are inconsistent with their intended
use. We encourage developers to
consider how variation in performance
across customer sites is monitored and
addressed and to implement processes
by which performance inconsistent with
intended use is defined and measured.
Developers should implement practices
to notify customers in a timely manner
to disengage or otherwise alter use of
predictive DSIs.
230 For more information about Human Factors
and AI risks such as bias, see Section 3.3 of NIST
Special Publication 1270, ‘‘Towards a Standard for
Identifying and Managing Bias in Artificial
Intelligence’’, https://nvlpubs.nist.gov/nistpubs/
SpecialPublications/NIST.SP.1270.pdf and See
NIST AI RMF 1.0, https://nvlpubs.nist.gov/
nistpubs/ai/NIST.AI.100-1.pdf.
231 See, e.g., FDA, Proposed Regulatory
Framework for Modifications to AI/ML-based
Software as a Medical Device (SaMD), Discussion
Paper and Request for Feedback, https://
www.fda.gov/files/medical%20devices/published/
US-FDA-Artificial-Intelligence-and-MachineLearning-Discussion-Paper.pdf.
E:\FR\FM\18APP2.SGM
18APP2
23802
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
• Approaches to including subject
matter experts in measuring and
validating whether the system is
performing consistently with their
intended use and as expected in the
specific deployment setting. We
encourage developers to include diverse
participants with diverse expertise
relevant to a predictive DSI in risk
mitigation processes. To maximize
value from these participants,
developers should consider not only
who to include but how to include
diverse voices in the development
process.
We seek comments on these
proposals.
Proposals in
§ 170.315(b)(11)(vii)(A)(3)—Governance
We propose in
§ 170.315(b)(11)(vii)(A)(3)
‘‘Governance’’ to require that health IT
developers of certified health IT
establish policies and implement
controls for predictive DSIs. We propose
that a health IT developer of a certified
Health IT Module that enables or
interfaces with a predictive DSI must
establish policies and implement
controls for how data are acquired,
managed, and used for said predictive
DSI. We note that the term ‘‘establish’’
is intended to describe the process of
analysis, identification, and application
of appropriate processes and protocols
related to data governance for the use of
DSI. ‘‘Establish’’ does not mean that
health IT developers are unable to
leverage or apply policies designed or
developed by other organizations, such
as guidance established by federal
agencies or consensus-based standards
organizations, in order to comply with
§ § 170.315(b)(11)(vii)(A)(3). Governance
should encompass models, software and
data developed or provided by other
parties as well as internally developed
interventions.232
We believe that governance sets an
effective framework for risk
management, with defined roles and
responsibilities for clear communication
of a predictive DSI’s limitations and
assumptions.233 Effective governance
should inform each phase of the
technology development process.234
Governance cultivates and implements a
culture of risk management within
organizations developing, acquiring, or
232 See NIST AI RMF 1.0, https://
nvlpubs.nist.gov/nistpubs/ai/NIST.AI.100-1.pdf.
233 See Bd. Governors Fed. Rsrv. Sys.,
Supervisory Guidance on Model Risk Management,
SR 11–7 (Apr. 4, 2011), https://www.federal
reserve.gov/supervisionreg/srletters/sr1107.htm.
234 See NIST Special Publication 1270, https://
nvlpubs.nist.gov/nistpubs/SpecialPublications/
NIST.SP.1270.pdf.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
implementing interventions. Clear
documentation of policies and controls
is an essential component of
governance, which can help to
systematically implement policies and
controls and standardize how an
organization’s risk management
practices are implemented and recorded
at each step in the software
development life cycle.235 A strong
governance framework provides explicit
support and structure to risk
management practices through policies
defining relevant risk management
activities, controls, or procedures that
implement those policies.
Our use of the term ‘‘policies’’ means
statements of management intent
regarding the objectives and required
components of intervention risk
management. Our use of the term
‘‘controls’’ means a system of internal
controls that the developer has in place
to implement the associated risk
management policies, including those at
the organizational and technology level
(e.g., processes for controlling the
quality of the data inputs; internal and
external audits; process to escalate
conflicting views between the model
development and validation groups). In
model risk management, this sometimes
is referred to as the ‘‘lines of
defense.’’ 236
Developers of certified health IT
would have the flexibility to choose an
approach to meeting this proposed
requirement that addresses their own
unique circumstances for their
predictive DSIs. However, we encourage
developers to implement policies and
controls to evaluate whether risk
analysis and risk mitigation practices
are being carried out as specified; to
consider how policies and controls are
monitored and updated; and to plan a
schedule for updating those policies and
controls. Policies and controls should
include details on roles, responsibilities,
staff expertise, authority, reporting
lines, and continuity. We further
encourage developers to have
accountability and escalation policies
and controls related to how
management oversees the development,
deployment, and management of
predictive DSIs. These policies should
describe the developer of certified
health IT’s decision-making parameters
and include how management is held
accountable for the impact of predictive
235 Id.
236 Off. Comptroller Currency, Comptroller’s
Handbook: Model Risk Management (Aug. 2021),
https://www.occ.gov/publications-and-resources/
publications/comptrollers-handbook/files/modelrisk-management/index-model-riskmanagement.html.
PO 00000
Frm 00058
Fmt 4701
Sfmt 4702
DSIs.237 We encourage developers to
identify staff that are responsible for
predictive DSIs and related models and
to develop policies to hold those staff
accountable to the developer’s
established policies and procedures.238
We believe that developers should plan
escalation processes that permit
significant issues with predictive DSI
development, integration or use to reach
appropriate levels of management and
describe standards for timely resolution
of issues with predictive DSIs and
related models.239 If the developer uses
a third-party to assess risk, the
developer should describe processes for
determining whether assessments
performed by a third party meet the
standards and controls set forth in the
developer’s governance framework.
We propose to require that the
governance policies and controls
developers of certified health IT
implement relate to how they acquire,
manage, and use data in predictive
DSIs.240 This includes setting and
enforcing priorities for managing and
using data as a strategic asset, which is
a concept that identifies key activities of
data governance as data identification,
data management policy, data issues
management, data assessment, data
oversight, and data communications.241
We expect developers of health IT to
consider how the policies and controls
they implement for data governance
ensure the responsible acquisition,
management, and use of data, including
how the developer of certified health IT
factors in and addresses ethical, legal,
and social implications (ELSI)
underlying data collection (acquisition)
and use,242 including any frameworks
for data practices to address consumer
protection and data stewardship
concerns that are beyond traditional
privacy and confidentiality practices.243
237 Id.
238 Id.
239 Id.
240 See, e.g., OECD, Recommendation of the
Council on Health Data Governance, https://
legalinstruments.oecd.org/en/instruments/OECDLEGAL-0433; General Accountability Office (GAO),
AI: An Accountability Framework for Federal
Agencies and Other Entities (June 2021), https://
www.gao.gov/assets/gao-21-519sp.pdf; See
generally GAO, Artificial Intelligence in Health
Care: Benefits and Challenges of Technologies to
Augment Patient Care, (Nov. 2020), https://
www.gao.gov/products/gao-21-7sp.
241 See for example Federal Data Strategy, Data
Governance Playbook, https://resources.data.gov/
assets/documents/fds-data-governanceplaybook.pdf.
242 See, e.g., https://www.healthit.gov/sites/
default/files/facas/HITPC_Health_Big_Data_
Report_FINAL.pdf.
243 See, e.g., The Department of Veterans Affairs
(VA), including the Veterans Health Administration
(VHA), and its partners are governed by the
Principle-Based Ethics Framework for Access to and
E:\FR\FM\18APP2.SGM
18APP2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
As part of how a developer of certified
health IT establishes policies and
implements controls for data
governance, we suggest developing a
model that establishes authority,
management and decision-making
parameters related to the acquisition,
management, and use of data related to
predictive DSIs. We invite readers to
review section III.C.5.c.xi of this
proposed rule for a discussion about
‘‘Data Practices and Governance:
Ethical, Legal, and Social Implications
of Data Collection and Use’’ and
‘‘Technical Data Standards and Data
Management: Source or Input Data and
Data Collection or Capture.’’ We invite
readers to also review section III.C.1.c
for a discussion about other proposals
aimed at helping to address priorities
such as public health and health equity
or disparities in health outcomes.
We strive to create systemic
improvements in health and care
through access, exchange, and use of
data to have better health enabled by
data. There are risks associated with
data use across the predictive DSI life
cycle. Our use of the terms ‘‘acquired,’’
‘‘managed,’’ and ‘‘used’’ are intended to
describe the stages of data governance.
As data is acquired, there should be
rigorous assessment of data quality and
relevance, and appropriate
documentation. Developers of certified
health IT should be able to demonstrate
that such data and information are
suitable for the predictive DSI, and that
they are consistent with the theory
behind the approach and with the
chosen methodology. As part of data
management, the use of data proxies
should be carefully identified, justified,
and documented. If data and
Use of Veteran Data. 87 FR 40451 (July 7, 2022) (to
be codified at 38 CFR 0 (noting that the ‘‘data ethics
framework is intended to be applied by all parties
who oversee the access to, sharing of, or the use of
veteran data, or how access or use veteran data
themselves in the context of all other specific
clinical, technical, fiscal, regulatory, professional,
industry, and other standards’’); VA, Artificial
Intelligence (AI) Strategy, (July 2021), https://
www.research.va.gov/naii/VA_AI%20Strategy_V2508.pdf (providing a vision to improve outcomes
and experiences for Veterans by developing
trustworthy AI capabilities); Principles of Artificial
Intelligence Ethics for Intelligence Community,
https://www.intelligence.gov/principles-of-artificialintelligence-ethics-for-the-intelligence-community;
AI Ethics Framework for the Intelligence
Community, Version 1.0, June 2020, https://
www.intelligence.gov/artificial-intelligence-ethicsframework-for-the-intelligence-community
(assisting with the Principles of AI Ethics for the
Intelligence Community); See generally National
Committee on Vital and Health Statistics (NCVHS),
Health data stewardship: what, why, who, how An
NCVHS primer, https://www.ncvhs.hhs.gov/wpcontent/uploads/2014/05/090930lt.pdf; NCVHS,
Toolkit for Communities Using Health Data, (May
2015), https://www.ncvhs.hhs.gov/wp-content/
uploads/2013/12/Toolkit-for-Communities.pdf.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
information are not representative of the
developer’s customer base or other
characteristics, or if assumptions are
made to adjust the data and information,
these factors should be properly tracked
and analyzed. This is particularly
important for external data and
information (from a vendor or outside
party), especially as they relate to new
products or activities.244
Developers of certified health IT have
the flexibility to choose an approach to
meeting this proposed requirement that
addresses their own unique
circumstances and risks for their
predictive DSIs but may wish to
examine industry data governance, data
management, data stewardship, data
ethics, or responsible use of data
resources to determine if they are
relevant and useful in their own
implementation efforts.245 We invite
comments on this proposal, and we seek
comment on whether this requirement
should include more specificity. We are
aware that there are instances in which
predictive DSIs are developed by other
parties, such that the proposed
intervention risk management practices
might reasonably be shared between
those other parties and the developer of
certified health IT or reside primarily
with or be performed by those other
parties. For instance, risk analysis
related to the quality and
representativeness of training data
would likely be performed by the party
that engaged in initially developing the
predictive DSI or model used by the
DSI.
In such circumstances, the proposed
requirement for developers of certified
health IT to employ or engage in
intervention risk management practices
in § 170.315(b)(11)(vii) includes
determining whether or not the other
party has engaged in risk management
practices, such as through review of risk
analysis, risk mitigation, and
governance information from the other
party. Consistent with previous
discussions in this proposed rule
regarding the availability of source
attribute information for predictive DSIs
developed by other parties, we expect
those other parties to also provide the
developer of certified health IT with
244 See NIST AI 100–1, https://nvlpubs.nist.gov/
nistpubs/ai/NIST.AI.100-1.pdf.
245 See e.g., Federal Data Strategy, Data
Governance Playbook, https://resources.data.gov/
assets/documents/fds-data-governanceplaybook.pdf; Federal Data Strategy, Data Ethics
Framework, https://resources.data.gov/assets/
documents/fds-data-ethics-framework.pdf; Health
data stewardship: what, why, who, how An NCVHS
primer, https://www.ncvhs.hhs.gov/wp-content/
uploads/2014/05/090930lt.pdf. See also NIST AI
RMF 1.0, https://nvlpubs.nist.gov/nistpubs/ai/
NIST.AI.100-1.pdf.
PO 00000
Frm 00059
Fmt 4701
Sfmt 4702
23803
relevant intervention risk management
information so that such information
may be available for both detailed and
summary documentation in
§ 170.315(b)(11)(vii)(B) and
§ 170.315(b)(11)(vii)(C), respectively.
We invite comments on this proposal
and ways in which developers of
certified health IT can best determine
that intervention risk management
practices have been conducted for all
predictive DSIs that their Health IT
Module enables or interfaces with,
including those predictive DSIs
developed by other parties.
We believe requiring the proposed
IRM practices in § 170.315(b)(11)(vii)
are necessary to enhance the
transparency of predictive DSIs, and
thus improve their capacity to be
evaluated and their utility to healthcare
professionals and patients. We have
sought a balance between limited
prescriptiveness and sufficient detail to
enable robust and broadly applicable
reporting of information on risk
management practices to users. We
request comment on whether there are
items contained within the proposals
described above that we should
explicitly require as elements of the
overall IRM practices in these proposals.
We invite comments on this proposal,
and we seek comment on whether these
proposed requirements should include
more specificity, and what actions
developers of certified health IT should
take to mitigate potential discriminatory
outcomes of predictive DSIs.
Proposals in § 170.315(b)(11)(vii)(B)—
Compile Detailed IRM Practice
Documentation
In § 170.315(b)(11)(vii)(B), we propose
that a health IT developer that attests
‘‘yes’’ in § 170.315(b)(11)(v)(A) must
compile detailed documentation
regarding IRM practices listed in
§ 170.315(b)(11)(vii)(A) and upon
request from ONC make available such
detailed documentation to ONC for any
predictive decision support
intervention, as defined in § 170.102,
that the certified Health IT Module
enables or interfaces with. We believe
that a developer of certified health IT
subject to this proposed requirement
should be able to provide detailed
documentation of their IRM practices, if
ONC requests such information, without
much effort because this information
should be a byproduct of employing or
engaging in IRM practices in
§ 170.315(b)(11)(vii)(A). While ONC has
the authority to conduct Direct Review
consistent with § 170.580(a)(2), for any
known non-conformity or where it has
a reasonable belief that a nonconformity exists, this proposal would
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
23804
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
enable ONC to have oversight of the
requirements in § 170.315(b)(11)(vii)(A)
without necessarily initiating Direct
Review. Further, this proposal would
enable ONC to gain insights on the IRM
practices employed or engaged in by
developers of certified health IT with
Health IT Modules that enable or
interface with predictive DSIs to inform
potential future policymaking.
We clarify that ‘‘detailed
documentation’’ is documentation that
is specific to an individual predictive
DSI enabled by or interfaced with a
developer of certified health IT’s Health
IT Module, and we clarify that this
documentation should be sufficiently
detailed so that we are able to review,
minimally, the IRM practices
enumerated in
§ 170.315(b)(11)(vii)(A)(1) through (3).
In a scenario where a Health IT Module
enables or interfaces with a predictive
DSI developed by other parties, some or
all of the detailed documentation on
IRM practices may be provided to the
developer of certified health IT by that
other party. This would include other
parties that the developer of certified
health IT may or may not have a formal
contract or directly engaged with.
As discussed below, our proposals in
§ 170.315(b)(vii)(C) describe what
summary information we would require
a health IT developer that attests ‘‘yes’’
in § 170.315(b)(11)(v)(A) must make
publicly accessible. With respect to the
detailed documentation regarding IRM
practices that we propose to require be
submitted to ONC upon request in
§ 170.315(b)(11)(vii)(B), we understand
that health IT developers may have
concerns regarding the disclosure of
proprietary, trade secret, competitively
sensitive, or other confidential
information. ONC would implement
appropriate safeguards to ensure, to the
extent permitted by federal law, that any
proprietary business information or
trade secrets ONC may encounter by
accessing the health IT developer’s
detailed documentation, other
information, or technology, would be
kept confidential by ONC or any third
parties working on behalf of ONC in its
performance of oversight
responsibilities to determine
compliance under the Program.
However, a health IT developer would
not be able to avoid providing ONC
access to relevant, detailed
documentation by asserting that such
access would require it to disclose trade
secrets or other proprietary or
confidential information. Therefore,
similar to our statements in the ONC
Cures Act Proposed Rule (84 FR 7504),
ONC Cures Act Final Rule (85 FR
25785), and the EOA Final Rule (81 FR
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
72431), we recommend health IT
developers clearly mark, as described in
HHS Freedom of Information Act
regulations at 45 CFR part 5, subparts C
and D, any information they regard as
trade secret or confidential prior to
disclosing the information to ONC. We
solicit comment on this proposal.
Further, we solicit comment on
whether existing Program requirements
as part of the Communications
condition and maintenance of
certification requirements in § 170.403
are sufficient to enable open and
transparent discussion, including
between developers of certified health
IT and users (customers) regarding IRM
practices related to predictive DSIs.
Proposals in § 170.315(b)(11)(vii)(C) and
Corresponding Proposals for ONC–ACBs
in § 170.523(f)(1)(xxi)
We propose in § 170.315(b)(11)(vii)(C)
that a health IT developer that attests
‘‘yes’’ in § 170.315(b)(11)(v)(A) must
submit summary information of the IRM
practices listed in
§ 170.315(b)(11)(vii)(A)(1) through (3) to
its ONC–ACB via publicly accessible
hyperlink that allows any person to
directly access the information without
any preconditions or additional steps.
We also propose a new Principle of
Proper Conduct for the ONC–ACBs in
§ 170.523(f)(1)(xxi) to require ONC–
ACBs to report the proposed summary
information in § 170.315(b)(11)(vii)(C),
that they received from developers of
certified health IT, on the Certified
Health IT Product List (CHPL) for the
applicable Health IT Modules. We
believe this new Principle of Proper
Conduct is consistent with existing
public disclosure requirements (e.g., 45
CFR 170.523(f)(1)(xii) and
§ 170.523(f)(1)(xx)) under the Program
and will help ensure accountability for
the public availability of information in
§ 170.315(b)(11)(vii)(C).
We reiterate our proposal in
§ 170.315(b)(11)(vii) which would
require that this summary information
be made available to ONC–ACBs via
publicly accessible hyperlink prior to
the deadline of December 31, 2024, if
finalized as proposed.
We believe that multiple interested
parties, including clinicians, health
systems, patients, academia,
policymakers, the public, and the health
IT industry would benefit from having
generalized information regarding how
developers of certified health IT manage
risk related to the predictive DSIs that
are enabled by or interfaced with their
certified Health IT Modules. Clinicians,
patients, health systems, and the public
could use this information to bolster
their trust in the developers of certified
PO 00000
Frm 00060
Fmt 4701
Sfmt 4702
health IT and those certified Health IT
Modules that enable or interface with
predictive DSIs.
‘‘Summary information’’ should
describe risk management practices,
enumerated in
§ 170.315(b)(11)(vii)(A)(1) through (3),
for the predictive DSIs with which a
certified Health IT Module enables or
interfaces within general terms.
We note that ‘‘summary information,’’
is not specific to any single predictive
DSI, like the availability of detailed
documentation proposed in
§ 170.315(b)(11)(vii)(B). Rather, the
information would pertain to the suite
or portfolio of predictive DSIs enabled
by or interfaced with the certified
Health IT Module. We note that the
summary information would likely
encompass variation in risk
management practices for different
kinds of predictive DSIs. For instance,
we expect that some risk management
practices would be different for
predictive DSIs developed by the
developer of certified health IT;
predictive DSIs developed by other
parties with whom the developer of
certified health IT has contracted or
otherwise formally engaged with to
provide predictive DSIs that are enabled
by or interfaced with the Health IT
Module; and for predictive DSIs
developed or created by the developer
of certified health IT’s customers and
interfaced with the Health IT Module,
potentially without the developer of
certified health IT’s formal involvement.
Summary information must encompass
this variation, to the extent it is present.
We clarify that summary information
should be easily understood by
interested parties. By easily
understandable, we mean the following.
The information describes, in general
terms, how the developer of certified
health IT manages various kinds of risk
related to predictive DSIs that their
Health IT Module enables or interfaces
with. In deciding on the level of detail
to include in the summary information,
developers of certified health IT should
include plain language descriptions of
the developer’s IRM practices that are
sufficient for potential customers or
users of the predictive DSIs to
understand the goals of the health IT
developer’s risk management practices
as proposed in
§ 170.315(b)(11)(vii)(A)(1) through (3).
Developers of certified health IT would
have the flexibility to choose an
approach to meeting this proposed
requirement that addresses the
developer’s own unique circumstances
and risks for predictive DSIs, but such
developers may wish to examine
industry model or AI risk management
E:\FR\FM\18APP2.SGM
18APP2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
frameworks or resources to determine if
they are relevant and useful in their
own implementation efforts.246 In a
scenario where a Health IT Module
enables or interfaces with a predictive
DSI developed by other parties,
summary information on IRM practices
should include any relevant information
provided to the developer of certified
health IT by that other party. We invite
comment on this proposal.
Similar to our policy associated with
the API-focused certification criteria in
§ 170.315(g)(10)(viii)(B), we propose
that all IRM documentation in
§ 170.315(b)(11)(vii)(C) be available via
a publicly accessible hyperlink that
allows any person to directly access the
information without any preconditions
or additional steps. For example, the
developer of certified health IT may not
impose any access requirements,
including, without limitation, any form
of registration, account creation, ‘‘clickthrough’’ agreements, or requirements to
provide contact details or other
information prior to accessing the
documentation. We clarify that for the
proposed IRM documentation in
§ 170.315(b)(11)(vii)(C), summary
information would need to be submitted
to the developer of certified health IT’s
ONC–ACB for review prior to issuing a
certification. The availability of
documentation as part of the
certification process is also consistent
with existing requirements for API
documentation in
§ 170.315(g)(10)(viii)(B) (84 FR 7484).
To support submission of
documentation, and consistent with
other Principles of Proper Conduct in
§ 170.523(f)(1), we propose a new
Principle of Proper Conduct for
documentation in
§ 170.315(b)(11)(vii)(C). We propose in
§ 170.523(f)(1)(xxi) that ONC–ACBs
report the information required in
§ 170.315(b)(11)(vii)(C) on the CHPL for
the applicable certified Health IT
Modules. We believe this new Principle
of Proper Conduct will assist in
promoting greater transparency for the
Program and will strengthen ONC–ACB
oversight regarding IRM documentation.
We invite comments on this proposal,
and we seek comment on whether the
246 See, e.g., NIST, AI RMF, https://www.nist.gov/
itl/ai-risk-management-framework; Microsoft
Responsible AI Standard, v2: General
Requirements, (June 2022), https://
blogs.microsoft.com/wp-content/uploads/prod/
sites/5/2022/06/Microsoft-Responsible-AIStandard-v2-General-Requirements-3.pdf; Off.
Comptroller Currency, Comptroller’s Handbook:
Model Risk Management (Aug. 2021), https://
www.occ.gov/publications-and-resources/
publications/comptrollers-handbook/files/modelrisk-management/index-model-riskmanagement.html.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
23805
requirement for summary information
should include more specificity and
detail.
that enable or interface with numerous
or complex predictive DSIs. We invite
comment on this proposal.
Proposals in § 170.315(b)(11)(vii)(D)
Annual Review
Finally, we propose in
§ 170.315(b)(11)(vi)(D) to require
developers of certified health IT that
attest ‘‘yes’’ in § 170.315(b)(11)(v)(A) to
review annually and, as necessary,
update the documentation described in
§ 170.315(b)(11)(vii)(B) and
§ 170.315(b)(11)(vii)(C). This provision
would apply to both detailed
documentation compiled as part of
proposed § 170.315(b)(11)(vii)(B) and
summary information submitted to
ONC–ACBs via publicly accessible
hyperlink as part of proposed
§ 170.315(b)(11)(vii)(C). As stated
previously, we view the detailed
documentation required in
§ 170.315(b)(11)(vii)(B) as being a byproduct of the proposed requirement for
the developer of certified health IT to
engage or employ in IRM practices.
Thus, we expect that developers of
certified health IT subject to this
proposed requirement would review
documentation associated with their
IRM practices annually and, as
necessary, update their documentation.
Further, we believe that developers of
certified health IT that attest ‘‘yes’’ in
§ 170.315(b)(11)(v)(A) should consider
risk as part of ongoing development
cycles, and these risks should be
assessed in a timely manner so that risk
analysis documentation is up to date.
Similar to the HIPAA Security Rule,247
which requires ongoing risk analysis,248
we propose that developers of certified
health IT with Health IT Modules that
enable or interface with predictive DSIs
review their IRM practices and update
their documentation as necessary.
We believe an annual review
establishes a minimum expectation for
updating IRM documentation, and we
believe it is good practice that
predictive DSIs undergo a full
validation process at some fixed
interval, including updated
documentation of all related activities.
While we are not proposing more
frequent reviews, those may be
appropriate for developers of certified
health IT that have Health IT Modules
Request for Comment
247 45
CFR part 160 and subparts A and C of part
164.
248 45 CFR. 164.306(e) and 164.316(b)(2)(iii); see
also OCR Guidance on Risk Analysis, https://
www.hhs.gov/hipaa/for-professionals/security/
guidance/guidance-risk-analysis/ (noting
that ‘‘in order for an entity to update and document
its security measures ‘as needed,’ which the HIPAA
Security Rule requires, it should conduct
continuous risk analysis to identity when updates
are needed’’).
PO 00000
Frm 00061
Fmt 4701
Sfmt 4702
• Users of Certified Health IT and
Predictive Decision Support
Intervention Management
We are aware that, in addition to
developers of certified health IT, users,
such as healthcare organizations and
clinicians, have responsibilities related
to FAVES DSIs, including intervention
or model risk management during
implementation and use, as well as
model validation. For example, we
believe it is important that users
maintain strong governance and
controls to help manage model risk and
how they will use outputs from
interventions in decision-making,
including monitoring any potential
impacts of model use. Users of a
predictive DSI are also best able to
report on how the predictive DSI
performs in real-world and local settings
(which can differ from their
performance during testing). We have
observed emerging frameworks for the
oversight of predictive DSIs.249 We
understand there are many different
terms used when referring to,
addressing, or describing the desire for
responsible, ethical, transparent,
trustworthy, and accountable algorithms
in healthcare, including those involving
AI and ML (e.g., algorithm and AI
assurance). For purposes of our
proposals, we use terminology
consistent with the Program structure.
We seek input on any information
that the Department can use or action
the Department should consider taking
to ensure that implementation and use
of FAVES DSIs are seen as a shared
responsibility across developers of
certified health IT and their customers.
By shared responsibility, we mean that
determination that a predictive DSI is
FAVES requires an ongoing process
beginning during initial model
development and continuing through
deployment, active use of the predictive
DSI in practice and continued
monitoring throughout that use.250 As
emphasized in this proposal, developers
of predictive DSI are responsible for
ensuring that their risk management
practices and information about
predictive DSI are available to their
customers and presented in plain
249 Bedoya, Armando D., et al. ‘‘A framework for
the oversight and local deployment of safe and
high-quality prediction models.’’ Journal of the
American Medical Informatics Association (2022).
250 See AI actors, life cycle, and activities, as
detailed in Figure 3 and 4 of the NIST AI RMF:
https://nvlpubs.nist.gov/nistpubs/ai/NIST.AI.1001.pdf.
E:\FR\FM\18APP2.SGM
18APP2
23806
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
language to enable their customers to
use that information. Customers of
developers of certified health IT—for
example, healthcare organizations and
clinicians—in turn are likely to be
essential to the overall process of
ensuring predictive DSIs are FAVES and
for determining how these predictive
DSIs can be best used in their settings
and for their patients.
We also seek input on any
information the Department should
consider or action the Department
should consider taking to facilitate
healthcare organizations and clinicians
having the necessary competencies or
expertise to assess whether a predictive
DSI is trustworthy, in that the model is
FAVES. This would be in addition to
the information transparency
(disclosures) that the proposed
requirements would provide users,
should those proposals be finalized. We
seek input on any information
commenters can offer on these topics.
We understand that some aspects of
predictive DSI should be familiar to
clinicians and healthcare organizations
because they parallel diagnostic tests
and long-used risk calculators, but that
other competencies may be novel and
challenging. We seek input on activities,
such as support for, establishment of,
and dissemination of learning
collaboratives, best practices,
‘playbooks,’ or other approaches that the
Department might pursue to facilitate
users of certified health IT being wellequipped to determine whether
predictive DSIs applied in their settings
and to their patients are trustworthy.
ddrumheller on DSK120RN23PROD with PROPOSALS2
• Data Practices and Governance:
Ethical, Legal, and Social Implications
of Data Collection and Use
We are aware of concerns about ELSI
considerations regarding the initial or
underlying data collection (sharing),
data use (processing, analysis), and
future (downstream) use or reuse of
data,251 including PHI,252 in health and
healthcare.253 These considerations
include those related to and impacting
individuals during the design,
development, implementation, and use
of emerging technologies, including AI/
251 See, e.g., National Telecommunications
Information Administration (NTIA), U.S.
Department of Commerce, Privacy, Equity, and
Civil Rights, Request for Comment, January 18,
2023, https://www.ntia.gov/sites/default/files/
publications/ntia_pecr_rfc_final_signed.pdf.
252 See 45 CFR 160.103.
253 See, e.g., Gerke S, Minssen T, Cohen G. Ethical
and legal challenges of artificial intelligence-driven
healthcare. Artificial Intelligence in Healthcare.
2020:295–336, https://www.ncbi.nlm.nih.gov/pmc/
articles/PMC7332220/ (discussing ethical and legal
challenges of AI-driven healthcare and potential
strategies in the U.S. and Europe).
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
ML-driven predictive models (data
analytics tools or software), as well as
the application of big data in healthcare
and how these technologies may be
perceived by different communities.254
For example, we understand the public
concern about AI/ML-enabled
technologies, including the potential for
these technologies to lead to widening
health disparities, perpetuating
historical human or data bias or
inequity, introducing bias or disparities,
and reinforcing existing ones. We also
understand that there are concerns
about negative, adverse, or harmful
consequences that may result from the
use (including data analytics) of digital
data or information about individuals’
health, including historically, their use
in computerized decision making.255
These concerns include, but are not
limited to, those pertaining to bias or
unlawful discrimination (equity), ethics,
information privacy, confidentiality,
and security (safety), data misuse, data
reuse (secondary use), data reidentification, and the ability to link
data or records to individuals.256
Existing federal laws and regulations
address data protection, governance,
and stewardship by providing federal
protections for civil rights, health
information privacy, human subjects,
veteran data, and consumers’ data
privacy. For example, the HIPAA
Privacy,257 Security,258 and Breach
Notification 259 Rules (‘‘HIPAA Rules’’)
provide for the privacy and security of
PHI used and disclosed by covered
entities and their business associates.
Generally, the HIPAA Privacy Rule
establishes national standards for the
use and disclosure of PHI,260 including
when and for what purposes HIPAA
covered entities and business associates
254 See generally University of California Health
Data Governance Task Force, Got Health Data?
Moving Toward a Justice-Based Model of Data Use,
https://www.ucop.edu/uc-health/functions/gothealth-data-moving-toward-a-justice-based-modelof-data-use-conference-april-2022.html ONC Health
IT Policy Committee, Privacy and Security
Workgroup, Recommendations on Health Big Data
(August 2015), https://www.healthit.gov/sites/
default/files/facas/HITPC_Health_Big_Data_
Report_FINAL.pdf.
255 See, e.g., the Department of Health, Education,
& Welfare (HEW) Report, Records, Computers, &
Rights of Citizens, 1973, https://aspe.hhs.gov/
report/records-computers-and-rights-citizens.
256 See, e.g., Andrews, Edmund, Stanford
University Human-Centered Artificial Intelligence,
June 2022, https://hai.stanford.edu/news/rob-reichai-developers-need-code-responsible-conduct.
257 See 45 CFR part 160 and subparts A and E of
part 164.
258 See 45 CFR part 160 and subparts A and C of
part 164.
259 See 45 CFR part 160 and subparts A and D of
part 164.
260 See 45 CFR 164.502(b), 164.514(d); 45 CFR
164.501, 164.508(a)(3), 45 CFR 164.514.
PO 00000
Frm 00062
Fmt 4701
Sfmt 4702
may create, receive, maintain, or
transmit PHI.
The HIPAA Privacy Rule identifies
the purposes for which PHI may be used
and disclosed by covered entities and
their business associates without an
individual’s authorization, including for
treatment, payment, health care
operations, research, and public health
activities.261 Business associates include
persons who, on behalf of the HIPAA
covered entity, create, receive, maintain,
or transmit PHI for a function or activity
regulated under the HIPAA Rules
including, among other things, claims
processing or administration, data
analysis, data aggregation, quality
assurance, patient safety activities, and
practice management.262 Persons who
provide cloud computing services to
covered entities, including those that
may have AI/ML, algorithms, and
predictive technologies that are enabled
by or interface with certified Health IT
Modules, may also be business
associates.263 Those persons or entities
that provide AI/ML, algorithms, and
predictive technologies that do not meet
the definition of a covered entity or
business associate are not regulated by
the HIPAA Rules.
We are aware the use of data related
to a person’s health raises consumer
privacy concerns with these emerging
technologies,264 not only because those
persons or entities that provide these
technologies may not be subject to the
requirements of the HIPAA Rules.265
For example, there are concerns that the
development or use such technologies
could lead to the disclosure of more PHI
than is necessary to accomplish the
261 See
45 CFR part 164.
the definition of ‘‘business associate’’ at 45
CFR 160.103.
263 See also OCR’s Guidance on HIPAA and Cloud
Computing, https://www.hhs.gov/hipaa/forprofessionals/special-topics/health-informationtechnology/cloud-computing/ (noting
that cloud computing services range ‘‘from mere
data storage to complete software solutions (e.g., an
electronic medical records system)’’).
264 See, e.g., Murdoch, B. Privacy and artificial
intelligence: challenges for protecting health
information in a new era. BMC Med Ethics 22, 122
(2021). https://doi.org/10.1186/s12910-021-00687-3;
Na L, Yang C, Lo C, Zhao F, Fukuoka Y, Aswani
A. Feasibility of Reidentifying Individuals in Large
National Physical Activity Data Sets From Which
Protected Health Information Has Been Removed
With Use of Machine Learning. JAMA Netw Open.
2018;1(8):e186040. doi:10.1001/
jamanetworkopen.2018.6040; McKeon, Jill,
Security, Privacy Risks of Artificial Intelligence in
Healthcare, (Dec. 1, 2021), https://
healthitsecurity.com/features/security-privacyrisks-of-artificial-intelligence-in-healthcare.
265 See generally HHS Office of the Chief
Technology Officer and Open Data Enterprise,
Sharing and Utilizing Health Data for AI
Applications, Roundtable Report, 2019, https://
www.hhs.gov/sites/default/files/sharing-andutilizing-health-data-for-ai-applications.pdf.
262 See
E:\FR\FM\18APP2.SGM
18APP2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
requester’s purpose in certain
circumstances; concerns regarding the
use or disclosure of PHI for marketing
purposes; 266 concerns regarding the
commercialization, monetization,
licensure, or sale of PHI; 267 and
concerns regarding compliance with deidentification requirements when
necessary.268 These concerns also
include those related to record linkage
for biomedical research 269 and the
transfer of health information about
individuals in ways that patients might
not expect or want, or that do not reflect
a patient’s reasonable expectation,
knowledge, or consent.
We are also aware of the increased
interest within the healthcare
community in using data and AI-and
ML-driven technologies for populationbased activities related to improving
health or reducing healthcare costs, as
well as for continuity of care purposes
and overall case management, care
planning, and care coordination, both
within and outside of the health care
setting, including with communitybased organizations.270
HIPAA covered entities, such as
health care providers, are generally
among the customers of health IT
developers, and in many cases, health
IT developers serve as HIPAA business
associates to their covered entity
customers. Additionally, as discussed
above, persons who provide cloud
computing services to covered entities
may also be business associates.271 If a
cloud computing service is a business
associate, the uses and disclosures of
266 45 CFR 164.501 for definition of ‘‘marketing,’’
164.508(a)(3).
267 45 CFR 164.502(a)(i), 164.508(a)(4). A covered
entity nor a business associate may not sell PHI
without an authorization from the patient. A
covered entity must obtain an authorization for any
disclosure of PHI which is a sale of PHI.
268 45 CFR 164.514. See also OCR’s Guide
Regarding Methods for De-identification of
Protected Health Information in Accordance with
the HIPAA Privacy Rule, https://www.hhs.gov/
hipaa/for-professionals/privacy/special-topics/deidentification/.
269 See, e.g., The National Institutes of Health
(NIH) Office of Data Science Strategy (ODSS) and
the National Library of Medicine (NLM), NIH
Workshop on the Policy and Ethics of Record
Linkage, June 29–30, 2021, https://
datascience.nih.gov/nih-policy-and-ethics-ofrecord-linkage-workshop-summary. See also, NIH
Common Fund’s Bridge to Artificial Intelligence
(Bridge2AI), https://commonfund.nih.gov/
bridge2ai.
270 See generally ONC AI Showcase, January
2022, https://www.healthit.gov/news/events/oncartificial-intelligence-showcase-seizingopportunities-and-managing-risks-use-ai.
271 See OCR’s Guidance on HIPAA and Cloud
Computing, https://www.hhs.gov/hipaa/forprofessionals/special-topics/health-informationtechnology/cloud-computing/ (noting
that cloud computing services range ‘‘from mere
data storage to complete software solutions (e.g., an
electronic medical records system)’’).
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
PHI by such cloud computing service
provider will be limited by the
limitations imposed by the HIPAA
Privacy Rule and those outlined in their
signed Business Associate Agreements
(BAAs), which may address many of the
public’s concerns.
However, not all entities that collect,
share, and use health data are regulated
by the HIPAA Rules.272 Thus, the
HIPAA Rules do not apply or protect the
privacy or security of all data related to
an individual’s health regardless of
where the data originated or is used
(data source). However, there are other
federal and state laws that may impose
obligations upon organizations to
protect consumer health data.273 For
instance, the FTC Act applies to both
HIPAA covered entities and those
entities not covered under HIPAA, and
prohibits deceptive or unfair business
practices, including in the context of
health data. The FTC also enforces the
Health Breach Notification Rule, which
applies to certain entities not covered
under HIPAA.274
We are aware of potential
intersections with the application and
use of privacy engineering or privacy by
design approaches and techniques (e.g.,
data minimization) to help address
some of the concerns discussed in this
section. For example, the use of privacypreserving data sharing and analytics
(PPDSA) techniques or tools, through
the application of privacy enhancing
technologies (PET),275 could potentially
enable collective data sharing and
analysis while maintaining
disassociability and confidentiality.276
272 See HHS, Examining Oversight of the Privacy
and Security of Health Data Collected by Entities
Not Regulated by HIPAA, Report to Congress, (2016)
https://www.healthit.gov/sites/default/files/noncovered_entities_report_june_17_2016.pdf.
273 See supra note 291 describing applicable
federal consumer protection laws; See supra note
102 describing applicable federal civil rights laws.
274 15 U.S.C. 45(a) (Section 5 of the FTC Act) and
Health Breach Notification Rule in 16 CFR part 318.
275 See generally OECD Report, Emerging privacyenhancing technologies, (March 2023), https://
www.oecd.org/publications/emerging-privacyenhancing-technologies-bf121be4-en.htm; The
Royal Society, From privacy to partnership: The
role of privacy enhancing technologies in data
governance and collaborative analysis, (January
2023), https://royalsociety.org/-/media/policy/
projects/privacy-enhancing-technologies/FromPrivacy-to-Partnership.pdf.
276 See White House, Office of Science and
Technology Policy (OSTP), on behalf of the Fast
Track Action Committee on Advancing (FTAC)
Privacy-Preserving Data Sharing and Analytics,
‘‘Request for Information on Advancing PrivacyEnhancing Technologies,’’ FRN 87 FR 35250, June
9, 2022, https://www.federalregister.gov/
documents/2022/06/09/2022-12432/request-forinformation-on-advancing-privacy-enhancingtechnologies; https://www.nitrd.gov/fast-trackaction-committee-on-advancing-privacy-preservingdata-sharing-and-analytics-roundtable-series/;
White House, Press Release, U.S. U.K. Launch
PO 00000
Frm 00063
Fmt 4701
Sfmt 4702
23807
In addition, we understand that the use
of technology and technical
functionality or capabilities to enable
electronic consent regarding data
sharing and confidentiality, including
how and when data about an individual
can be collected and used as well as
capturing, maintaining, and
communicating patient’s consent
decision, continues to evolve.277 We
also understand that collaboration and
use of an interdisciplinary or crossfunctional approach across one or more
parts of the development life cycle of
these technologies, involving interested
parties or representative actors from
various disciplines (e.g., clinicians, data
scientists, attorneys, social scientists,
programmers, computer engineers or
scientists, bioethicists, informaticians,
compliance officers, patients) as part of
a multi-disciplinary process,278 could
help address some of the privacy and
equity concerns around data practices.
We seek comment on issues the
public believes the Department should
consider addressing: health equity,
information privacy, information
security, patient safety, and data
stewardship concerns while enabling
trusted development and uses of health
data to advance individuals’ well-being
and overall technology innovation,
including AI, ML, and algorithms in
healthcare. In particular, there are
concerns pertaining to appropriate data
de-identification (including managing
re-identification risk), data use
(processing and application), and data
governance in healthcare. We seek
comment on the desirability of federal
guidance or education materials to help
the public better understand and
navigate the implications of existing
federal protections with respect to the
development and application of AI and
ML-driven technologies to healthcare.
We also welcome comment on how
ONC can help developers of certified
health IT further support users or
provide additional technical capabilities
to enhance and support health equity,
data privacy and security with the use
of algorithmic-based technology in
healthcare. This request for comment
Innovation Privacy Challenges for PrivacyEnhancing Technologies to Tackle Financial Crime
and Public Health Emergencies, July 20, 2022,
https://www.whitehouse.gov/ostp/news-updates/
2022/07/20/u-s-and-u-k-launch-innovation-prizechallenges-in-privacy-enhancing-technologies-totackle-financial-crime-and-public-healthemergencies/. See also Selecting Privacy-Enhancing
Technologies for Managing Health Data Use,
(March 2022), https://doi.org/10.3389/
fpubh.2022.814163.
277 See also section III.C.10 of this preamble
‘‘patients right to request restrictions.’’
278 See generally Figure 3 of NIST AI RMF 1.0,
https://www.nist.gov/itl/ai-risk-managementframework/nist-ai-rmf-playbook.
E:\FR\FM\18APP2.SGM
18APP2
23808
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
relates to ONC’s authorities under the
HITECH Act and the Cures Act with
respect to adopting standards,
implementation specifications, and
certification criteria as part of the
Program, overseeing developers of
certified health IT through Conditions
and Maintenance of Certification
requirements, and serving in a
coordinating role with respect to health
IT. Comments will help inform ONC’s
activities in these areas and strategic
objectives, including advancing the
development and use of health IT
capabilities and establishing
expectations for data sharing.
Request for Comment
ddrumheller on DSK120RN23PROD with PROPOSALS2
• Technical Data Standards and Data
Management: Electronic Data Source,
Capture, and Use
As we discuss in our proposals
related to risk management above, we
understand and are aware of concerns
about historical, systemic issues in
source (or input) data collection,
capture and use of routinely collected
data, including data quality (e.g., data fit
for purpose),279 fidelity, utility, access,
de-biasing or standardizing the way data
is collected, and data provenance or
lineage (origin of data).280 We are aware
of the need regarding the development
and advancement of alignment or
harmonization of technical standards
and support for driving adoption of
USCDI data elements for representation
of REL, SDOH, sexual orientation,
gender identity, and various patient
demographic and health status
assessment data, as this data may serve
279 Rajan NS, Gouripeddi R, Mo P, Madsen RK,
Facelli JC. Towards a content agnostic computable
knowledge repository for data quality assessment.
Comput Methods Programs Biomed. 2019
Aug;177:193–201. doi: 10.1016/j.cmpb.2019.05.017.
Epub 2019 May 24. PMID: 31319948.Rajan NS,
Gouripeddi R, Mo P, Madsen RK, Facelli JC.
Towards a content agnostic computable knowledge
repository for data quality assessment. Comput
Methods Programs Biomed. 2019 Aug;177:193–201.
doi: 10.1016/j.cmpb.2019.05.017. Epub 2019 May
24. PMID: 31319948.
280 See generally https://www.sciencedirect.com/
science/article/pii/S1064748121003614; https://
www.jmir.org/2018/5/e185; https://doi.org/10.1016/
j.jclinepi.2020.03.028; See e.g., Weikel, B.W.,
Klawetter, S., Bourque, S.L., Hannan, K.E., Roybal,
K., Soondarotok, M., St Pierre, M., Fraiman, Y.S.,
& Hwang, S.S. (2023). Defining an Infant’s Race and
Ethnicity: A Systematic Review. Pediatrics, 151(1),
e2022058756. https://doi.org/10.1542/peds.2022058756; Gagliardi J.P. (2021). What Are the Data
Really Telling Us About Systemic Racism?,
American Association for Geriatric Psychiatry,
29(10), 1074–1076. https://doi.org/10.1016/
j.jagp.2021.06.007; Dullabh, P., Hovey, L., HeaneyHuls, K., Rajendran, N., Wright, A., & Sittig, D.F.
(2020). Application Programming Interfaces in
Health Care: Findings from a Current-State
Sociotechnical Assessment. Applied clinical
informatics, 11(1), 59–69. https://
www.sciencedirect.com/science/article/pii/
S0895435619307668.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
as inputs to algorithmic or model
‘‘outputs.’’ We also understand that
there are technical data standard gaps
for key groups and populations that
could impact the fairness of DSIs that
Health IT Modules enable or interface
with. For example, we are aware there
is limited use of consistent technical
standards for coding patient disability,
impairments, and other functional
limitations. In addition, we support data
representation fairness with an
understanding that incomplete or
underrepresented data that goes into a
DSI could impact the output and overall
use and application of the DSI. Fairness
in representativeness of data includes
how and whether populations are
represented in training and test data for
the design and development of DSI. We
understand having knowledge of and
focusing on addressing health
disparities during model development is
another important consideration related
to fairness. We also are aware of the
Findability, Accessibility,
Interoperability, and Reuse (FAIR) Data
Principles for scientific data
management and stewardship that
support enhancing the reusability of
data with an emphasis on machineactionability for scientific data and
datasets used for data models, given the
increased reliance on computational
systems.281
We understand the importance of
appropriate electronic collection,
standardized capture, and use of
standardized data in healthcare,
including when that data serves as
inputs to algorithms, DSIs, and other
advanced technologies in healthcare.
ONC supports the use of technology to
improve the standardized capture of a
set of health data classes to support the
healthcare industry’s need to
electronically capture the underlying
data they collect for treatment, payment,
health care operations, research, and
public health purposes.282 We seek
comment on how ONC can further
support standardization and
harmonization in these areas.
281 FAIR principles, https://www.go-fair.org/fairprinciples/ (noting the principles emphasize ‘‘the
capacity of computational systems to FAIR data
with no or minimal human intervention, given that
humans increasingly rely on computational support
to deal with data as a result of the increase in
volume, complexity, and creation speed of data’’).
See Wilkinson, M., Dumontier, M., Aalbersberg, I.
et al. The FAIR Guiding Principles for scientific
data management and stewardship. Sci Data 3,
160018 (2016), https://www.nature.com/articles/
sdata201618.
282 See 45 CFR 164.501 for complete definitions
of ‘‘treatment’’, ‘‘payment’’, ‘‘health care
operations’’, and ‘‘research’’; 45 CFR 164.512(b) for
discussion of ‘‘public health’’ activities.
PO 00000
Frm 00064
Fmt 4701
Sfmt 4702
xii. Proposed Update From Clinical
Decision Support to Decision Support
Intervention Criterion
We propose modifications to the
‘‘Base EHR’’ definition in § 170.102 to
identify that a Health IT Module can be
certified to either § 170.315(a)(9) or
§ 170.315(b)(11) to satisfy the definition
for the period up to and including
December 31, 2024. We also propose
that § 170.315(a)(9) would no longer be
included as part of the Base EHR
definition after December 31, 2024.
Rather, only § 170.315(b)(11) and not
§ 170.315(a)(9) would be available as a
certification criterion to satisfy the
definition of ‘‘Base EHR’’ beginning
January 1, 2025.
Additionally, in § 170.315(a)(9)(vi) we
propose that the adoption of
§ 170.315(a)(9) would expire on January
1, 2025, for purposes of the Program.
Together, these proposals identify the
dates when § 170.315(b)(11) replaces
§ 170.315(a)(9) in the Base EHR
definition, and they indicate when
Health IT Modules certified to
§ 170.315(a)(9) would need to be
certified to § 170.315(b)(11) to maintain
compliance with the Base EHR
definition.
d. Proposed Updates to Real World
Testing Condition for CDS Criterion
We propose to revise § 170.405(a) to
include § 170.315(a)(9) within the list of
certification criteria for which a
developer of certified health IT with
Health IT Module(s) certified to such
criteria must successfully test the real
world use of those Health IT Module(s)
for interoperability in the type of setting
in which such Health IT Module(s)
would be or are marketed. This would
mean that a developer of certified health
IT with a Health IT Module certified to
§ 170.315(a)(9) would be subject to the
requirements set forth in § 170.405(a).
This proposal would require developers
of certified health IT with Health IT
Modules certified to § 170.315(a)(9) to
submit real world test plans and results,
among other requirements, as part of the
real world testing Condition and
Maintenance of Certification
requirements. Further, in proposing the
new ‘‘Decision Support Interventions’’
certification criterion in
§ 170.315(b)(11), we recognize and
intend that the developers of Health IT
Modules certified to § 170.315(b)(11)
would be required to conduct real world
testing consistent with the existing
requirements in § 170.405(a). We note
this is because all criteria in
§ 170.315(b) are already subject to those
real world testing requirements.
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
We believe that requiring developers
of certified health IT with Health IT
Modules certified to § 170.315(a)(9) to
participate in real world testing is
consistent with our existing approach to
implementing the real world testing
Condition and Maintenance of
Certification requirements by focusing
on interoperability-related criteria. The
capabilities included within the
certification criterion in § 170.315(a)(9)
are interoperability focused, and
§ 170.315(a)(9) is unlike other
certification criteria currently adopted
in the ‘‘clinical’’ section in § 170.315(a).
The functionality expressed in
§ 170.315(a)(9) does not result in
enabling a user to ‘‘record,’’ ‘‘change,’’
and ‘‘access’’ specific data types; rather,
the functionality in § 170.315(a)(9) is
more complex and multi-faceted. The
primary functionality of both
§ 170.315(a)(9) and the proposed
§ 170.315(b)(11) is to ensure that
multiple decision support intervention
types are (1) supported through
interaction with certified health IT and
(2) configurable based on a specified set
of data types (including data listed in
the § 170.315(a)(5) demographics
criterion). Additionally, the existing
criterion in § 170.315(a)(9) specifies,
and proposed criterion in
§ 170.315(b)(11) would specify, that
certified Health IT Modules must
support the availability of an
intervention’s source attributes for users
to review. In this regard, ONC’s existing
CDS criterion and the proposed
criterion in § 170.315(b)(11) are more
like the care coordination criteria in
§ 170.315(b)(1) ‘‘Transitions of Care’’
and § 170.315(b)(2) ‘‘Clinical
Information Reconciliation and
Incorporation.’’ Further, to be enabled,
interventions in § 170.315(a)(9) must
rely on a wide array of problems,
medications, demographics, laboratory
tests and vital signs—both generated in
the source system and received through
a transition of care or referral. In this
regard, the functionality required by
§ 170.315(a)(9) represents an important
culmination of ONC’s interoperability
efforts, fitting appropriately in with
other criteria listed in § 170.405(a).
We believe there are other important
reasons to include § 170.315(a)(9) in
§ 170.405(a). First, this requirement will
provide developers with an opportunity
to demonstrate how their support of
evidence-based CDS and linked
referential CDS positively impacts
patient care through real world testing
plans and results. We know that
developers of certified health IT support
numerous kinds of CDS, many of which
are foundational to improving patient
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
care or support other important
outcomes in healthcare. Second,
requiring Health IT Modules certified to
§ 170.315(a)(9) to be subject to real
world testing will provide the public at
large with information on how different
certified Health IT Modules are
implementing and supporting the CDS
certification criterion. For example, we
would expect developers to establish a
range of measures as part of their real
world testing plans, described in
§ 170.405(b)(1), because developers have
flexibility to craft real world testing
measures specific to their products and
customers. We would also expect
developers of certified health IT with
Health IT Modules certified to
§ 170.315(a)(9) to report on those
measures as part of real world testing
results, per requirements in
§ 170.405(b)(2), which would have the
potential to provide the public with new
insights on the market for CDS. Finally,
we believe that requiring developers
with Health IT Modules certified to
§ 170.315(a)(9) to participate in real
world testing will be a helpful bridge to
compliance for similar requirements
proposed for the Decision Support
Interventions certification criterion.
We note that the effect of proposing
to include Health IT Modules certified
to § 170.315(a)(9) in § 170.405(a) and the
effect of proposing a revised version of
the CDS criterion in § 170.315(b)(11),
would require developers of certified
health IT certified to § 170.315(a)(9) and
§ 170.315(b)(11) to follow the testing
plans, methods, and results reporting;
submission dates; and August 31
deployment deadline requirements in
§ 170.405(b) similar to the requirements
of other applicable certification criteria
listed in § 170.405(a). We anticipate that
if finalized as proposed this would
mean that Health IT Modules certified
to § 170.315(a)(9) would be subject to
the real world testing Condition and
Maintenance of Certification
requirements beginning with the 2023
real world testing cycle. This means that
Health IT Modules certified to
§ 170.315(a)(9) prior to August 31, 2023,
would need to, among other
requirements, address each of the
elements in § 170.405(b)(1)(iii)(A)
through (G) in their real world testing
plans by December 15, 2023, and submit
results based on those plans no later
than March 15, 2025. We invite
comment on this proposal.
Relationship to Other Federal Agencies’
Relevant Activities, Interests, and
Regulatory Authority
There is broad interest across the
Department in the development,
implementation, and use of algorithms
PO 00000
Frm 00065
Fmt 4701
Sfmt 4702
23809
and AI in healthcare.283 AHRQ is
exploring the impact of existing
healthcare algorithms on racial and
ethnic disparities in health and
healthcare.284 The FDA recently
discussed the development of
sophisticated algorithms that
incorporate AI/ML and the role they
play in health, as part of the FDA’s
strategic priority to advance health
equity 285 as well as provided clarity
around which CDS functionalities they
283 See, e.g., The NIH recently established the
Artificial Intelligence Machine Learning
Consortium to Advance Health Equity and
Researcher Diversity (AIM–AHEAD) to identify
priority research aims in health equity and AI/ML,
as well as the training and infrastructure needed to
support these, https://datascience.nih.gov/artificialintelligence/aim-ahead. The 2022 Centers for
Medicare & Medicaid Servicers (CMS) Strategic
Plan includes a pillar to advance health equity,
including incorporating equity in model design,
https://www.cms.gov/sites/default/files/2022-04/
Health%20Equity%20Pillar%20Fact%20Sheet_
1.pdf; NIH NCATS, Bias Detection Tools in Health
Care Challenge, (October 2022): https://
www.challenge.gov/?challenge=minimizing-biasand-maximizing-long-term-accuracy-of-predictivealgorithms-in-healthcare; The Secretary’s Advisory
Committee on Human Research Protections
(SACHRP) Recommendations, Considerations for
the Institutional Review Board (IRB) Review
Involving AI, (July 2022), https://www.hhs.gov/
ohrp/sachrp-committee/recommendations/
attachment-e-july-25-2022-letter/;
Zuckerman, Brian L., James M. Karabin, Rachel A.
Parker, William E.J. Doane, and Sharon R. Williams
(2022). Options and Opportunities to Address and
Mitigate the Existing and Potential Risks, as well as
Promote Benefits, Associated with AI and Other
Advanced Analytic Methods, OPRE Report #2022–
253, Washington, DC: Office of Planning, Research,
and Evaluation, Administration for Children and
Families, U.S. Department of Health and Human
Services, https://www.acf.hhs.gov/opre/report/
options-opportunities-address-mitigate-existingpotential-risks-promote-benefits; See HHS.
Trustworthy AI (TAI) Playbook. September 2021,
https://www.hhs.gov/sites/default/files/hhstrustworthy-ai-playbook.pdf.
284 See AHRQ, Impact on Healthcare Algorithms
on Racial and Ethnic Disparities in Health and
Healthcare, Systematic Review Protocol, https://
effectivehealthcare.ahrq.gov/products/racialdisparities-health-healthcare/protocol; AHRQ, Draft
Comparative Effectiveness Review, February 2023,
https://effectivehealthcare.ahrq.gov/products/
racial-disparities-health-healthcare/draft-report
AHRQ, Meetings Examine Impact of Healthcare
Algorithms on Racial and Ethnic Disparities in
Health and Healthcare, (March 2023), https://
effectivehealthcare.ahrq.gov/news/meetings.
285 See FDA, Center for Devices and Radiological
Health, 2022–2025 Strategic Priorities, https://
www.fda.gov/media/155888/download. The FDA
also has an action plan to advance regulatory
concepts for AI/ML-based devices and has
identified guiding principles for the development of
good machine learning practices related to AI/MLbased medical devices. See https://www.fda.gov/
medical-devices/software-medical-device-samd/
artificial-intelligence-and-machine-learningsoftware-medical-device; U.S. Food & Drug Admin.,
Good Machine Learning Practice for Medical Device
Development: Guiding Principles (Oct. 2021),
https://www.fda.gov/medical-devices/softwaremedical-device-samd/good-machine-learningpractice-medical-device-development-guidingprinciples.
E:\FR\FM\18APP2.SGM
18APP2
23810
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
consider to be a medical device.286 The
HHS Office for Civil Rights (OCR) is
proposing to clarify through regulation
that Section 1557 of the Affordable Care
Act prohibits a covered entity from
discriminating on the basis of race,
color, national origin, sex, age, or
disability in its health programs and
activities through the use of clinical
algorithms in its decision-making.287
Also, CMS recently requested
information on how Medicare policy
can encourage software developers to
prevent and mitigate bias in algorithms
and predictive modeling as well as how
to accurately evaluate that necessary
steps have been taken to prevent and
mitigate bias in software algorithms.288
Outside of the Department, multiple
federal agencies are also exploring
policies to prevent and mitigate bias in
AI and ML and the intersection with
privacy, equity, and civil rights.289 For
286 For information about the scope of decision
support software functions as a medical device, see
FDA, Clinical Decision Support Software Final
Guidance (September 2022), https://www.fda.gov/
regulatory-information/search-fda-guidancedocuments/clinical-decision-support-software?utm_
medium=email&utm_source=govdelivery; FDA’s
Digital Health Policy Navigator, https://
www.fda.gov/medical-devices/digital-health-centerexcellence/digital-health-policy-navigator?utm_
medium=email&utm_source=govdelivery.
287 See 87 FR 47824.
288 CMS, Medicare Program: Hospital Outpatient
Prospective Payment Systems (OPPS) NPRM, 87 FR
44502, July 2022, https://www.federalregister.gov/
documents/2022/07/26/2022-15372/medicareprogram-hospital-outpatient-prospective-paymentand-ambulatory-surgical-center-payment#p-1338
(noting that ‘‘bias in software algorithms has the
potential to disparately affect the health of certain
populations.’’) In 2020, CMS hosted an AI Health
Outcomes Challenge for innovators to demonstrate
how AI tools can be used to accelerate development
of AI solutions for predicting patient health
outcomes for Medicare beneficiaries for potential
use in CMS Innovation Center innovative payment
and service delivery models and solicited public
feedback to better understand the resource costs for
services involving the use of innovative
technologies, including but not limited to software
algorithms and AI. See https://innovation.cms.gov/
innovation-models/artificial-intelligence-healthoutcomes-challenge#:∼:text=
The%20CMS%20Artificial%20I
ntelligence%20(AI,for%20potential%20
use%20in%20CMS.
289 See, e.g., The U.S. Department of Commerce,
including the National Telecommunications and
Information Administration (NTIA) is exploring the
intersection of privacy, equity, and civil rights,
exploring ways in which commercial data flows of
personal information can lead to disparate impact
and outcomes for marginalized or disadvantaged
communities. See https://hai.stanford.edu/events/
artificial-intelligence-and-economy-charting-pathresponsible-and-inclusive-ai and https://
www.federalregister.gov/documents/2021/11/30/
2021-25999/privacy-equity-and-civil-rightslistening-sessions; The U.S. Department of Justice,
Algorithms, Artificial Intelligence, and Disability
Discrimination in Hiring (2022), https://
beta.ada.gov/ai-guidance/; EEOC: The Americans
with Disabilities Act and the Use of Software,
Algorithms, and Artificial Intelligence to Assess Job
Applicants and Employees, EEOC–NVTA–2022–2
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
example, the Federal Trade Commission
(FTC) has addressed AI repeatedly in its
work through a combination of law
enforcement and policy initiatives,290
(2022), https://www.eeoc.gov/laws/guidance/
americans-disabilities-act-and-use-softwarealgorithms-and-artificial-intelligence; U.S. Equal
Employment Opportunity Commission (EEOC),
Launches Initiative on Artificial Intelligence and
Algorithmic Fairness (Oct. 28, 2021), https://
www.eeoc.gov/newsroom/eeoc-launches-initiativeartificial-intelligence-and-algorithmic-fairness; The
U.S. Department of Veterans Affairs, AI Strategy,
(July 2021), https://www.research.va.gov/naii/VA_
AI%20Strategy_V2-508.pdf; Bd. of Governors of the
Fed. Reserve System, Bureau of Consumer Fin.
Protection, Fed. Deposit Ins. Corp., Nat’l Credit
Union Admin., & Office of the Comptroller of the
Currency, 86 FR 16837 (Mar. 31, 2021) (Request for
Information and Comment on Financial
Institutions’ Use of Artificial Intelligence, Including
Machine Learning, Identifying Unlawful
Discrimination as a Potential Risk of Using
Artificial Intelligence); Bureau of Consumer Fin.
Protection, Circular 2022–03, Adverse Action
Notification Requirements in Connection with
Credit Decisions Based on Complex Algorithms
(May 26, 2022), https://www.consumerfinance.gov/
compliance/circulars/circular-2022-03-adverseaction-notification-requirements-in-connectionwith-credit-decisions-based-on-complexalgorithms/. See also, the National AI Advisory
Committee (NAIAC), https://www.ai.gov/naiac/.
290 See, e.g., The FTC and U.S. Department of
Justice settled a lawsuit against a weight loss app,
requiring it to delete data and its novel algorithms,
and pay a fine for illegally collecting personal data
from children under 13. https://www.justice.gov/
opa/pr/weight-management-companies-kurbo-incand-ww-international-inc-agree-15-million-civilpenalty. See also, ‘‘Everalbum’’ case, https://
www.ftc.gov/legal-library/browse/casesproceedings/192-3172-everalbum-inc-matter
(settling allegations that the company deceived
consumers about the use of facial recognition to
analyze users’ private images, including in
connection with training FRT models); the ‘‘Mole
Detective’’ case: https://www.ftc.gov/legal-library/
browse/cases-proceedings/132-3210-new-consumersolutions-llc-mole-detective (alleging deceptive
conduct, where app developers claimed in
advertisements that their consumer-facing app
could determine based on photographs whether a
mole was cancerous). See FTC Report to Congress
on Privacy and Security, September 2021, https://
www.ftc.gov/system/files/documents/reports/ftcreport-congress-privacy-security/report_to_
congress_on_privacy_and_data_security_2021.pdf;
Aiming for truth, fairness, and equity in your
company’s use of AI, FTC Blog, (April 2021),
https://www.ftc.gov/business-guidance/blog/2021/
04/aiming-truth-fairness-equity-your-companysuse-ai (discussing FTC’s activities in this area);
https://www.ftc.gov/system/files/documents/
public_statements/1587283/fpf_opening_remarks_
210_.pdf; Keep your AI claims in check, FTC Blog,
(February 2023), https://www.ftc.gov/businessguidance/blog/2023/02/keep-your-ai-claims-check
For information on best practices to reduce bias and
discrimination in clinical algorithms, see generally
Fed. Trade Comm’n, Using Artificial Intelligence
and Algorithms (Apr. 8, 2020), https://www.ftc.gov/
news-events/blogs/business-blog/2020/04/usingartificial-intelligence-algorithms; Fed. Trade
Comm’n, Big Data: A Tool for Inclusion or
Exclusion? (Jan. 2016), https://www.ftc.gov/system/
files/documents/reports/big-data-tool-inclusion-orexclusion-understanding-issues/160106big-datarpt.pdf; Rebecca Kelly Slaughter, Algorithms and
Economic Justice, Yale J.L. & Tech. (Aug. 2021),
https://law.yale.edu/sites/default/files/area/center/
isp/documents/algorithms_and_economic_justice_
master_final.pdf.The agency has also held several
PO 00000
Frm 00066
Fmt 4701
Sfmt 4702
and recently sought comment on harms
from businesses of collecting, analyzing,
and monetizing information about
people.291 In addition, NIST is actively
working to move toward standardizing
ways to identify and manage the
harmful effects of bias in AI
technology,292 and developing a
standard risk management framework
for AI.293
We note that ONC regulates
developers of certified health IT and
their Health IT Modules, ensuring that
both conform to technical standards,
certification criteria, implementation
specifications, and adhere to Conditions
and Maintenance of Certification
requirements. As it relates to the current
CDS criterion in § 170.315(a)(9), ONC’s
regulatory oversight of developers of
certified health IT includes
requirements that their Health IT
Modules certified to that criterion can
enable two types of decision support
interventions, evidence-based and
linked referential, which must be (1)
configurable based on data specified in
§ 170.315(a)(9)(ii) and (2) include source
attributes in § 170.315(a)(9)(v) relevant
to the individual decision support
public events focused on AI issues, including
workshops on dark patterns and voice cloning,
sessions on AI and algorithmic bias at PrivacyCon
2020 and 2021, a hearing on competition and
consumer protection issues with algorithms and AI,
a FinTech Forum on AI and blockchain, and an
early forum on facial recognition technology
(resulting in a 2012 staff report). See https://
www.ftc.gov/news-events/events/2021/04/bringingdark-patterns-light-ftc-workshop; https://
www.ftc.gov/news-events/events-calendar/youdont-say-ftc-workshop-voice-cloning-technologies;
https://www.ftc.gov/news-events/events-calendar/
privacycon-2021; https://www.ftc.gov/news-events/
eventscalendar/privacycon-2020; https://
www.ftc.gov/news-events/events-calendar/ftchearing-7-competition-consumerprotection-21stcentury; https://www.ftc.gov/news-events/eventscalendar/2017/03/fintech-forumblockchainartificial-intelligence; and https://
www.ftc.gov/news-events/events-calendar/2011/12/
face-facts-forum-facialrecognition-technology.
291 See also Press Release, FTC, California
Company Settles FTC Allegations It Deceived
Consumers about use of Facial Recognition in Photo
Storage App (Jan. 11, 2021), https://www.ftc.gov/
news-events/news/press-releases/2021/01/
california-company-settles-ftc-allegations-itdeceived-consumers-about-use-facial-recognitionphoto (announcing settlement of allegations that
company deceived consumers about the use of
facial recognition to analyze users’ private images,
including in connection with training FRT models);
Press Release, FTC, FTC Cracks Down on Marketers
of ‘‘Melanoma Detection’’ Apps (Feb. 23, 2015)
https://www.ftc.gov/news-events/news/pressreleases/2015/02/ftc-cracks-down-marketersmelanoma-detection-apps (announcing settlements
of allegations that operators of mobile applications
engaged in unlawful deception by claiming that
their applications could detect a mole’s melanoma
risk based on a photograph taken with a smart
phone).
292 NIST, SP 1270, https://nvlpubs.nist.gov/
nistpubs/SpecialPublications/NIST.SP.1270.pdf.
293 NIST, AI 100–1, https://www.nist.gov/itl/airisk-management-framework.
E:\FR\FM\18APP2.SGM
18APP2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
intervention enabled by the certified
Health IT Module. We note that our
authority to regulate developers of
certified health IT under the Program is
separate and distinct from other federal
agencies’ regulatory authorities focused
on the same or similar entities and
technology. For example, the safety and
effectiveness of a software function,
including clinical decision support or
other kinds of decision support
interventions, is within the purview of
Food and Drug Administration (FDA)
regulatory oversight, if such software
functionality meets the definition of a
‘‘device.’’ 294 In the area of predictive
technology, ONC and FDA support a
harmonized and complementing
approach, independent of the platform
that the technology exists on, in
accordance with our existing
intersecting regulatory oversight.
We note that the questions of whether
DSIs enabled by or interfaced with
certified health IT are subject to FDA
regulations, under the Federal Food,
Drug, & Cosmetic Act, or are used by
entities subject to the HIPAA Rules,295
federal nondiscrimination laws,296
federal consumer protection laws 297 or
other federal regulations,298 are separate
and distinct from the question of
whether a developer or such technology
is subject to regulatory oversight by
ONC’s Health IT Certification Program,
to which our proposals pertain.
Given the intersecting nature and
interest across the Department to
address the use of AI for purposes of
health, we consulted extensively with
our HHS partners. Specifically, we
worked with counterparts at AHRQ,
FDA, and OCR in developing proposals
to advance our shared goals of
promoting predictive DSIs in healthcare
that are valid, fair, appropriate,
294 See supra 87. For more information about
determining whether a software function is
potentially the focus of the FDA’s oversight, please
visit the FDA’s Digital Health Policy Navigator
Tool: https://www.fda.gov/medical-devices/digitalhealth-center-excellence/digital-health-policynavigator.
295 For more information about entities subject to
the HIPAA Rules, please visit: https://www.hhs.gov/
hipaa/for-professionals/covered-entities/
index.html. See also definitions of ‘‘covered entity’’
and ‘‘business associate’’ at 45 CFR 160.103.
296 For more information about covered entities
that must comply with federal nondiscrimination
laws enforced by OCR, please visit: https://
www.hhs.gov/civil-rights/for-providers/.
297 See FTC, Report to Congress on Privacy and
Security, September 2021, https://www.ftc.gov/
system/files/documents/reports/ftc-report-congressprivacy-security/report_to_congress_on_privacy_
and_data_security_2021.pdf.
298 See, e.g., SACHRP, Considerations for IRB
Review of Research Involving AI (discussing the
Common Rule), (July 2022) https://www.hhs.gov/
ohrp/sachrp-committee/recommendations/
attachment-e-july-25-2022-letter/.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
effective, and safe to deliver patient
care. We plan to continue to coordinate
with these and other federal agencies so
that to the extent practicable, federal
requirements that may apply to certified
health IT and developers of certified
health IT are aligned and not
duplicative.
In this proposal, we are taking an
approach that is both reflective of our
authorities and aligned with others in
the Department and Federal
Government. We are not establishing
requirements for technology not
certified under the Program.299 We are
also not establishing new requirements
for FDA regulation of software as a
device or expectations for software
functions that meet the definition of a
device,300 including ‘‘Device CDS’’
software functions that are regulated by
FDA as devices.
We anticipate that our collaboration
with our federal partners on these
proposed requirements would assist
AHRQ, CMS, FDA, FTC, NIST, OCR,
Veterans Health Administration, and
other federal partners as they work
within the bounds of their respective
legal authorities with the goal of having
greater consistency across federal
agencies and the entire health IT
ecosystem.
6. Synchronized Clocks Standard
We propose to remove from 45 CFR
170.210(g) the current named
specification for clock synchronization,
which is Network Time Protocol (NTP
v4 of RFC 5905). However, we propose
to amend 45 CFR 170.210(g) so that
Health IT Modules certified to
applicable certification criteria continue
to utilize any network time protocol
(NTP) standard that can ensure a system
clock has been synchronized and meets
time accuracy requirements. The
applicable certification criteria that
either reference our proposed, revised in
§ 170.210(g), or cross-reference a
provision that references § 170.210(g),
include § 170.315(d)(2), § 170.315(d)(3),
§ 170.315(d)(10), and § 170.315(e)(1).
a. Background
In the 2014 Edition Proposed Rule, we
noted that having correctly
synchronized clocks is an information
security best practice and the NTP has
been widely used and implemented
since its publication in 1992 (77 FR
13840). We proposed to finalize a
requirement for Health IT Modules to
use a ‘‘synchronized clocks’’ standard,
299 See the ONC Health IT Certification Program,
https://www.healthit.gov/topic/certification-ehrs/
about-onc-health-it-certification-program.
300 Section 201(h) of the FD&C Act.
PO 00000
Frm 00067
Fmt 4701
Sfmt 4702
23811
and we proposed to permit either
NTPv3 or NTPv4. In response to the
2014 Edition Proposed Rule,
commenters expressed support for our
proposed ‘‘synchronized clocks’’
standard and our proposal to permit
either NTPv3 or NTPv4. Commenters
noted that the use of these
synchronization technologies is very
common and supported in all major
operating systems (77 FR 54184). They
stated that it was unclear why this
would be a requirement for EHR
technology certification because it is
unlikely that the EHR technology itself
will be directly implementing this type
of synchronization and more likely that
it will be relying on the lower-level
systems’ clock functionality (e.g., the
operating system within which the EHR
technology runs). One commenter stated
that it is important to avoid a
requirement that would make the
operating system (that provides the
standard clock) part of what is needed
for EHR certification as this would
impose artificial limits on what
operating systems can be used without
certifying multiple permutations. This
commenter contended that because the
ability to use an operating system clock
is common, it was unnecessary for this
standard to be required for certification.
In response to this comment, we
reiterated our expectation that EHR
technology will likely obtain a system
time from a system clock that has been
synchronized following the NTPv3 or
NTPv4 standard (77 FR 54184). We
expressly worded the standard to
acknowledge this likely scenario by
stating ‘‘[t]he date and time recorded
utilize a system clock that has been
synchronized * * *.’’ (Emphasis
added.) We do not intend for this
specific capability to create a binding
relationship between EHR technology
and a particular operating system. For
certification, EHR technology must be
able to demonstrate, as the standard
states, that it can utilize a system clock
that has been synchronized following
NTPv3 or NTPv4. Accordingly, we
finalized that a Health IT Module
certified to § 170.315(d)(2),
§ 170.315(d)(3), § 170.315(d)(10), or
§ 170.315(e)(1) would be required to
adhere to (RFC 5905) Network Time
Protocol Version 4 or Network Time
Protocol Version 3 for the synchronized
clock requirement.
Feedback from industry has indicated
that some developers rely on Microsoftbased operating systems to synchronize
network time, which is a different
standard than NTP v4. Subsequent to
this feedback, we provided subregulatory flexibility to health IT
developers to permit the use of
E:\FR\FM\18APP2.SGM
18APP2
23812
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
Microsoft’s ‘‘[MS–SNTP]: Network Time
Protocol (NTP) Authentication
Extensions’’ (MS–SNTP) in their Health
IT Modules.301
ddrumheller on DSK120RN23PROD with PROPOSALS2
b. Justification
We propose to remove from
§ 170.210(g) a named standard to which
a system clock has been synchronized
when date and time are recorded. This
would have the effect of modifying the
requirement that Health IT Modules
certified to § 170.315(d)(2),
§ 170.315(d)(3), § 170.315(d)(10), or
§ 170.315(e)(1) record date and time
utilizing a system clock synchronized to
a particular named standard. However,
we propose to modify § 170.210(g) such
that Health IT Modules certified to any
of the certification criteria listed above
would still be required to utilize a
network time protocol standard that can
ensure a system clock has been
synchronized and meets the time
accuracy requirements as defined in the
applicable certification criteria.
We understand that beyond NTP and
MS–SNTP, there are other network time
protocol standards, some of which are
more appropriate than others in specific
contexts. We also understand that
various operating and server systems,
such as systems developed and
published by Microsoft, employ a
Simple Network Time Protocol (SNTP)
extension to NTP. We considered
proposing to add only the use of MS–
SNTP as an alternative to Network Time
Protocol Version 4 (NTP v4) of RFC
5905 (currently specified in
§ 170.210(g)), but decided against
proposing this addition given the
various standards that exist. We believe
that requiring Health IT Modules to
support a network time protocol
standard of their choosing allows
maximum flexibility for both health IT
developers of certified health IT and
end users of certified Health IT Modules
while still ensuring that the time
accuracy requirements in the abovelisted certification criteria will be fully
supported. We welcome comment on
these proposals.
7. Standardized API for Patient and
Population Services
In the ONC Cures Act Final Rule, we
adopted multiple standards and
implementation specifications in
§ 170.215 to support the certification
criterion in § 170.315(g)(10). At that
time, CMS included references to these
standards and implementation
specifications for the purposes of
301 See § 170.315(e)(1) paragraph (ii) Certification
Companion Guide available here: https://
www.healthit.gov/test-method/view-download-andtransmit-3rd-party.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
aligning standards requirements across
HHS in the Medicare and Medicaid
Programs; Patient Protection and
Affordable Care Act; Interoperability
and Patient Access for Medicare
Advantage Organization and Medicaid
Managed Care Plans, State Medicaid
Agencies, CHIP Agencies and CHIP
Managed Care Entities, Issuers of
Qualified Health Plans on the FederallyFacilitated Exchanges, and Health Care
Providers Final Rule (CMS
Interoperability and Patient Access
Final Rule (85 FR 25510–25640)).
Subsequently, we have identified a need
to improve the descriptions and
categorization of these standards and
implementation specifications based on
public input. The healthcare and health
IT communities have indicated that as
HHS continues to advance standards
alignment for different use cases, greater
clarity in the purpose of each standard
and the associated IG may support ease
of understanding for organizations with
less prior experience with certification
criteria and the Program. In addition,
public input suggested ONC should
provide more clarity to differentiate
distinct update timelines for each type
of standard or implementation
specification, for example when related
standards may include different version
identifiers (e.g., FHIR Release 4.0.1 as
compared to US Core Implementation
Guide STU 3.1.1). We are therefore, in
conjunction with the proposals
described in this section, proposing to
reorganize § 170.215 to delineate the
purpose and scope more clearly for each
type of standard or implementation
specification. We propose to revise the
structure of § 170.215, to support the
proposals described in this section, as
follows:
Application Programming Interface
Standards.
(a) API base standard.
(b) API constraints and profiles.
(c) Application access and launch.
(d) Bulk export and data transfer
standards.
(e) API authentication, security, and
privacy.
We believe this approach will help to
provide greater clarity and more specific
identification of a standard or
implementation specification for a
precise purpose or as applicable for a
given point in time.
a. Native Applications and Refresh
Tokens
In the ONC Cures Act Final Rule, we
required Health IT Modules certified to
§ 170.315(g)(10) to issue refresh tokens
to ‘‘confidential applications’’ that
could securely receive and store refresh
tokens. Specifically, we established in
PO 00000
Frm 00068
Fmt 4701
Sfmt 4702
§ 170.315(g)(10)(v)(A)(1)(ii) a
requirement for Health IT Modules to
issue refresh tokens to applications that
are ‘‘capable of storing a client secret’’
(85 FR 25945).
After the publication of the ONC
Cures Act Final Rule, health IT
developers preparing for testing and
certification to the § 170.315(g)(10)
certification criterion, as well as thirdparty application developers, requested
that we clarify this requirement. Health
IT developers identified that we had not
fully explained how our policy would
apply to ‘‘native applications,’’ which,
according to internet Engineering Task
Force (IETF) RFC 6749, are ‘‘clients
installed and executed on the device
used by the resource owner (i.e.,
desktop application, native mobile
application)’’ and their interactions with
OAuth 2.0 authorization servers (85 FR
70076). These health IT developers
noted that a strict interpretation of the
final rule could exclude native
applications. This includes native
applications that use or are capable of
using additional technology that make
them ‘‘capable of storing a client
secret,’’ as well as native applications
that are capable of securely handling a
refresh token without needing a client
secret. Consequently, health IT
developers indicated that the technical
ambiguity around native applications
would negatively impact testing and
certification. Further, health IT
developers contended that without
timely and explicit clarifications, health
IT developers’ support for native
applications would vary widely (85 FR
70076).
We agreed with these concerns and
determined that timely additional
clarification was necessary. On
November 4, 2020, we published an
interim final rule (IFR) with request for
comment that corrected this ambiguity
and provided clarification (85 FR
70064). In the IFR, we clarified and
made the regulation text consistent by
adding a new paragraph in
§ 170.315(g)(10)(v)(A)(1)(iii) and
revising paragraphs
§ 170.315(g)(10)(v)(A)(1)(ii) and
§ 170.315(g)(10)(v)(A)(2)(ii). In the new
paragraph in
§ 170.315(g)(10)(v)(A)(1)(iii), we
specified that a Health IT Module’s
authorization server must issue a refresh
token to native applications that are
capable of securing a refresh token. In
§ 170.315(g)(10)(v)(A)(1)(ii) and
§ 170.315(g)(10)(v)(A)(2)(ii), we updated
the regulation text to be consistent with
the paragraph we added in
§ 170.315(g)(10)(v)(A)(1)(iii) by
specifying that a ‘‘Health IT Module’s
authorization server’’ must issue a
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
refresh token to applications capable of
storing a client secret. And in
§ 170.315(g)(10)(v)(A)(2)(ii) we updated
the regulation text by removing the
word ‘‘new’’ preceding ‘‘refresh token’’
(85 FR 70077). We noted that these
updates make the certification criterion
clear and consistent and disambiguate
the implications for native applications.
We clarified in the IFR preamble that
health IT developers must publish the
method(s) by which their Health IT
Module(s) support the secure issuance
of an initial refresh token to ‘‘native
applications’’ according to the API
technical documentation and
transparency requirements in § 170.404.
In addition, we clarified that application
developer attestations to health IT
developers regarding the ability of their
applications to secure a refresh token, a
client secret, or both, must be treated in
a good faith manner consistent with the
provisions established in the API
openness and pro-competitive
conditions in § 170.404(a)(4) (85 FR
70077). Finally, we clarified in the IFR
that health IT developers can determine
the method(s) they use to support
interactions with ‘‘native applications’’
and that health IT developers are not
required to support all methods that
third-party application developers seek
to use (85 FR 70077).
In response to the IFR, we received
comments expressing concern that the
ability to ‘‘secure a refresh token’’ rather
than meet a ‘‘confidential app profile’’
makes the refresh token a single point
of failure and is a major security risk,
and that it undermines the control
patients exercise when they
reauthenticate an app. Commenters
suggested that ONC should only require
long-term EHR access for native apps
that meet the SMART App Launch
Guide definition of ‘‘confidential app
profile.’’ Other commenters argued that
ONC’s policy creates confusion by
creating disparate rules around different
application architectures and is not
being based in established security
standards. They argued that this would
result in limiting patient choice without
improving security, while also
potentially introducing more security
concerns. They suggested that ONC
should require long-term EHR access to
any patient selected application.
In response to public feedback in the
IFR, and subsequent interaction with
industry, we propose to remove mention
of ‘‘applications capable of storing a
client secret,’’ in
§ 170.315(g)(10)(v)(A)(1)(ii) and
§ 170.315(g)(10)(v)(A)(2)(ii). We propose
to revise § 170.315(g)(10)(v)(A)(1)(ii) to
state, ‘‘A Health IT Module’s
authorization server must issue a refresh
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
token valid for a period of no less than
three months to applications using the
‘confidential app’ profile according to
an implementation specification
adopted in § 170.215(c).’’ We also
propose to revise
§ 170.315(g)(10)(v)(A)(2)(ii) to state, ‘‘A
Health IT Module’s authorization server
must issue a refresh token valid for a
new period of no less than three months
to applications using the ‘confidential
app’ profile according to an
implementation specification adopted
in § 170.215(c).’’ These proposed
revisions will better reflect a Health IT
Module’s obligation for first time and
subsequent connection refresh tokens
using concepts familiar to industry and
according to the HL7 FHIR SMART
Application Launch Framework. We
note that existing requirements for
Health IT Modules to issue a refresh
token to native applications, consistent
with § 170.315(g)(10)(v)(A)(1)(iii),
remains unchanged.
We will continue to monitor
implementation of § 170.315(g)(10),
engage with the standards development
community, and provide information
through existing ONC Certification
Companion Guides (CCGs), the ONC
API Resource Guide, and other
educational materials. We invite
comment on these proposals.
b. FHIR United States Core
Implementation Guide Version 5.0.1
In the ONC Cures Act Final Rule,
ONC adopted the FHIR US Core
Implementation Guide (IG) STU3
version 3.1.0 implementation
specification in § 170.215(a)(2) (85 FR
25740). At the time of the ONC Cures
Act Final Rule’s publication, the US
Core IG STU 3.1.0 was the latest version
available. ONC later adopted the FHIR
US Core IG v3.1.1 in an interim final
rule with comment period published by
ONC on November 4, 2020, and titled
‘‘Information Blocking and the ONC
Health IT Certification Program:
Extension of Compliance Dates and
Timeframes in Response to the COVID–
19 Public Health Emergency’’ (85 FR
70073–74). The US Core v3.1.1 resolved
several technical issues, editorial copy/
paste errors, omissions, and places in
need of minor clarification in v3.1.0.
Both versions define the minimum
conformance requirements for accessing
patient data using FHIR Release 4 and
included profiled resources, operations,
and search parameters for the Data
Elements required in the USCDI
standard (adopted in § 170.213).
Since the publication of the ONC
Cures Act Final Rule, the US Core IG
has evolved. Yearly US Core IG updates
reflect changes to USCDI versions and
PO 00000
Frm 00069
Fmt 4701
Sfmt 4702
23813
requests from the HL7 US Realm FHIR
community. Notable updates to the US
Core IG include v4.0.0, which supports
USCDI v1 and clarifies the definition of
‘‘must support’’ elements, and v5.0.1,
which supports USCDI v2. As of
publication of this NPRM, the National
Coordinator has approved both USCDI
v2 and the US Core IG v5.0.1 under the
Standards Version Adoption Process
(SVAP). Health IT developers taking
advantage of SVAP flexibility can
incorporate these standards into their
Health IT Modules as permitted by 45
CFR 170.405(b)(9).
The US Core IG v6.0.0 is anticipated
to include support for the data elements
and classes added to USCDI v3. At the
time of publication of this NPRM, the
US Core IG v6.0.0 has not been
finalized. Based on the annual US Core
release cycle, we believe US Core IG
v6.0.0 will be published before ONC
issues a final rule.302 Therefore, it is our
intent to consider adopting the updated
US Core IG v6.0.0 that supports the data
elements and data classes in USCDI v3
since we propose to adopt USCDI v3 in
this rule. Each US Core IG update builds
on previous releases to improve the
efficacy of the specification by
addressing feedback from the HL7 FHIR
community. Likewise, as USCDI evolves
to address critical healthcare needs such
as health equity and public health, the
US Core IG provides a foundational
standard for accessing and exchanging
this data. Health IT systems that adopt
the latest version of US Core can
therefore provide the latest consensusbased capabilities for providing access
to USCDI data classes and elements
using FHIR APIs. We propose to adopt
the FHIR US Core IG v5.0.1 in
§ 170.215(b)(1)(ii) and incorporate it by
reference in § 170.299. Additionally,
because the FHIR US Core IG v3.1.1 is
currently referenced (via crossreferences to § 170.215(a)(2)) in
§ 170.315(g)(10)(i)(A) and (B), (ii)(A) and
(iv)(A), we propose to revise each of
those sections to instead cross-reference
§ 170.215(b)(1). We note that we
propose to restructure the standards in
§ 170.215 to better categorize API
standards and to enable simultaneous
use of different versions of IGs for a set
period of time. For example, we propose
to categorize the US Core IGs v3.1.1 in
§ 170.215(b)(1)(i) as part of a group of
standards for constraining and profiling
data elements, and we propose that the
adoption of this standard expires on
January 1, 2025. We propose to include
the US Core IG v5.0.1 in this same group
in § 170.215(b)(1)(ii). Together, this
recategorization and establishment of an
302 https://hl7.org/fhir/us/core/history.html.
E:\FR\FM\18APP2.SGM
18APP2
23814
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
adoption expiration date would give
health IT developers of certified health
IT the option to use either IG for a
period of time and establish a concrete
date for when they would need to
implement and support the newer
version in their Health IT Modules. We
propose similar changes to other
standards listed in § 170.215 and
address those proposals in subsequent
sections of this preamble.
ddrumheller on DSK120RN23PROD with PROPOSALS2
c. FHIR Endpoint for Service Base URLs
The ONC Cures Act Final Rule
established the API Conditions and
Maintenance of Certification
requirements in 45 CFR 170.404(b)(2),
which contain a specific provision that,
for Health IT Modules certified to the
certification criterion in
§ 170.315(g)(10), certain ‘‘service base
URLs’’—otherwise known as
‘‘endpoints’’—must be publicly
published for all customers in a
machine-readable format at no charge
(85 FR 25764–25765). These electronic
endpoints are the specific locations on
the internet that make it possible for
apps to access EHI at the patient’s
request.
In the ONC Cures Act Proposed Rule,
we indicated that we ‘‘strongly
encourage API Technology Suppliers,
health care providers, HINs and patient
advocacy organizations to coalesce
around the development of a public
resource or service from which all
stakeholders could benefit’’ (84 FR
7494). However, we decided against
naming specific standards in the ONC
Cures Act Final Rule and did not
establish requirements for the content or
format of the endpoint lists to provide
industry an opportunity to coalesce on
specifications. We finalized
§ 170.404(b)(2) to require that Certified
API Developers must make their service
base URLs freely accessible and in a
machine-readable format at no charge.
Since the ONC Cures Act Final Rule
was published, we have found that
developers with publicly discoverable
endpoint lists have defined their own,
bespoke publication approaches and
unique formats. There is variability
across developers of certified health IT
in the format they are using to publish
their service base URLs, indicating that
the industry has not coalesced around a
common framework or approach.
Research conducted through ONC’s
Lantern Project confirms that this
variability among developers of certified
health IT is hindering maturation of a
vibrant app ecosystem for patients and
the healthcare community, which is a
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
primary goal of ONC policy and
regulations in this area.303
The inconsistent implementation of
this requirement has rendered important
data meant to facilitate connections to
endpoints difficult to access.304
Specifically, the organization(s)
associated with an endpoint is not
always available, and even where
available, is not always available in a
format that can be readily used. Patientfacing apps require access to these
endpoints to provide patients access to
information maintained by specific
provider organizations; without
standardized formats and an ability to
search for endpoints, patients are unable
to find which endpoint(s) refer to their
provider. Similar barriers exist for
others involved in healthcare seeking to
leverage apps for interoperability.
Additionally, it is difficult to map
multiple, unique organizations to
endpoints. Experience to-date indicates
that the name of the organization
associated is typically formatted as free
text (i.e., String), with no unique
identifier to know which organization is
being supported by the service base
URL. For example, the organization
name given by the endpoint, ‘‘Acme
Children’s Hospital,’’ could be mapped
to six possible organization names,
including ‘‘Acme’s Children’s Hospital
Anesthesiology,’’ ‘‘Acme’s Children’s
Hospital—Urgent Care,’’ and ‘‘Acme
Children’s Hospital—Ambulatory Care
Center Pharmacy,’’ among others. This
endpoint might map to any one of these
organizations, making a definite match
difficult to determine.
Even more complicated is the
possibility of a single endpoint
representing all six of the ‘‘Acme
Children’s Hospital’’ organizations in
the example above. A single String is
unable to represent the complexity of
healthcare systems, where a system can
contain many subsystems, or where a
FHIR API URL can support a set of
systems. Including all organizations that
are serviced by an endpoint is important
for discovery of which endpoint serves
a particular health care provider, which
in turn would allow the user to access
the relevant EHI through that endpoint.
Having all healthcare organizations
serviced by the endpoint accessible and
in a standardized format would help
app developers easily fetch information
to enable patients and other users to
access, exchange, and use information.
303 https://www.healthit.gov/buzz-blog/healthitcertification/shining-a-light-on-fhirimplementation-progress-toward-publishing-fhirendpoints.
304 https://www.healthit.gov/news/events/onclantern-workshop.
PO 00000
Frm 00070
Fmt 4701
Sfmt 4702
We propose to revise the requirement
in § 170.404(b)(2) to include new data
format requirements. We anticipate that
these new specifications would
establish standards for industry
adoption and better facilitate patient
access to their health information. In the
revised § 170.404(b)(2), we also propose
to incorporate the following existing
requirements in § 170.404(b)(2)(i) and
(ii): a Certified API Developer must
publish service base URLs ‘‘For all of its
customers regardless of whether the
Health IT Modules certified to
§ 170.315(g)(10) are centrally managed
by the Certified API Developer or locally
deployed by an API Information
Source;’’ and publish these service base
URLs ‘‘at no charge’’ as part of proposed
§ 170.404(b)(2).
In the ‘‘Service base URL publication’’
requirements in § 170.404(b)(2)(i), we
propose to require that service base
URLs must be formatted in FHIR
‘‘Endpoint’’ resource format according
to the standard adopted in § 170.215(a).
Additionally, in § 170.404(b)(2)(ii), we
propose to require that organization
details such as name, location, and
provider identifiers (e.g., National
Provider Identifier (NPI), CMS
Certification Number (CCN), or health
system ID) for each service base URL
must be published in US Core
‘‘Organization’’ resource format
according to the implementation
specifications adopted in § 170.215(b)(1)
(we note that elsewhere in this proposed
rule in section III.C.7.b we propose to
move US Core IGs to § 170.215(b)(1)),
with the ‘‘Organization.endpoint’’
element referencing the service base
URLs managed by this organization.
We propose these formats because
they are based on the FHIR Release 4
and US Core IG industry standards that
are already adopted for use in the
Program in § 170.315(g)(10). We are
specifically proposing the FHIR
‘‘Endpoint’’ resource because it is used
for representing technical endpoint
details and contains a required
‘‘address’’ element that, according to the
FHIR R4 standard, contains ‘‘the
technical base address for connecting to
this endpoint.’’ Certified API Developers
would be able to populate this element,
in each of their published ‘‘Endpoint’’
resources, with a service base URL that
can be used by patients to access their
electronic health information.
We additionally propose the US Core
‘‘Organization’’ resource because it can
be used to represent important
contextual information around a service
base URL. The US Core ‘‘Organization’’
resource contains an optional
‘‘endpoint’’ element that can be used to
reference ‘‘technical endpoints
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
providing access to services operated for
the organization.’’ 305 To standardize a
link between published ‘‘Endpoint’’
resources and organizational details
relating to the organization that services
these endpoints, we propose to require,
in § 170.404(b)(2)(ii)(A), that this
optional ‘‘endpoint’’ element be
populated on publicly published
‘‘Organization’’ resources and that they
reference the ‘‘Endpoints’’ managed by
the organization. We note that ‘‘publicly
published’’ means that the information
is made publicly available and note that
ONC will host a link to developers’
service base URL list on the Certified
Health IT Product List (CHPL) or
another website hosted by ONC. This
information would give the public a
standard way of knowing how
published ‘‘Endpoint’’ and published
‘‘Organization’’ resources are linked and
which organizational details apply to
which service base URLs.
Additionally, the US Core
‘‘Organization’’ resource contains a
‘‘mandatory’’ element called ‘‘name’’
that contains a ‘‘name used for the
organization.’’ In addition to this
required element, we propose in
§ 170.404(b)(2)(ii)(B) to require Certified
API Developers to make available ‘‘must
support’’ elements of organization
location and provider identifier(s) using
the US Core ‘‘Organization’’ resource.
An organization’s location could be an
address that is populated in the
‘‘address’’ element of the US Core
‘‘Organization’’ resource; and a provider
identifier could be a National Provider
Identifier (NPI), Clinical Laboratory
Improvement Amendments (CLIA)
number, or other health system ID
populated in the ‘‘identifier’’ element.
Altogether, this information helps
contextualize service base URLs and
enables application developers to more
easily and consistently provide patient
access to their electronic health
information. We welcome comment on
this proposal and whether additional
data should be required as part of
organizational details.
Finally, we propose, in
§ 170.404(b)(2)(iii)(A), to require that
these resources be collected in a FHIR
‘‘Bundle’’ resource that the Certified API
Developer would publicly publish.
According to the FHIR specification, a
‘‘Bundle’’ acts as ‘‘a container for a
collection of resources’’ and is widely
used in use cases like returning search
results and grouping resources as part of
a message exchange.306 Given the broad
use of the ‘‘Bundle’’ resource
throughout the FHIR specification (e.g.,
FHIR search), we expect that most FHIR
clients and FHIR application developers
would be familiar with the ‘‘Bundle’’
resource and be able to parse ‘‘Bundle’’
resources electronically and extract
relevant information from them for use
in their application. Alternatively, we
are considering a different format for
requiring that the Endpoint and
Organization resources be collected for
publication. We are also considering the
Newline Delimited JSON (ndjson)
format. According to the ndjson
specification, this format is convenient
for publishing ‘‘structured data that may
be processed one record at a time.’’ 307
The ndjson format is an efficient way for
machines to parse large amounts of data
given that the entire file does not need
to be read into memory before parsing.
We expect that these ‘‘Endpoint’’ and
‘‘Organization’’ JSON resource lists may
be large, depending on the developer of
certified health IT’s client base. We
expect that most Certified API
Developers will be familiar with this
format because it is included as an
underlying standard in the FHIR Bulk
Data Access IG required for certification
to § 170.315(g)(10). Given the simplicity
of the ndjson standard, we also expect
that most FHIR clients and FHIR
application developers would easily be
able to parse ndjson files electronically
and extract relevant information from
them for use in their application. We
invite comment on whether we should
finalize our proposal to adopt a
requirement for Endpoint and
Organization resources to be made
publicly available according to the FHIR
Bundle or if we should finalize the
requirement to use a ndjson format.
We also propose, in
§ 170.404(b)(2)(iii)(B), that Certified API
Developers ensure Endpoint and
Organization resources remain current
by reviewing this information quarterly
and, as necessary, update the
information. We recognize that as
customers upgrade and install new
health IT, data provided in the Endpoint
and Organization resources will change.
To serve its intended purpose, we
believe this information should be
updated regularly. We believe these
resources must remain up to date to
ensure application developers can easily
and consistently provide patients access
to their EHI. We note that a one-time
publication of the developer’s current
list of endpoints for active customers
upon certification to the § 170.315(g)(10)
criterion will only meet initial
certification requirements, and we
propose to establish in
§ 170.404(b)(2)(iii)(B) a requirement that
305 https://www.hl7.org/fhir/organization.html.
306 https://hl7.org/fhir/R4/bundle.html.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
Frm 00071
Fmt 4701
Certified API Developers maintain this
information over time. We also note that
failure to maintain the service base
URLs and ensure the associated
organization information remains up to
date and free of errors or defects on a
quarterly basis would be considered a
violation of this Condition and
Maintenance of Certification
requirement and may result in
corrective action. We clarify that any
endpoint or organization information
that is out of date, incomplete, or
otherwise unusable for more than 90days would be considered in violation
of this proposed requirement. However,
we request comment whether we should
shorten this period of time to 60 or 30
days.
We believe that further
standardization will better enable
individuals to connect to their EHI, and
we believe that this requirement will
also support other industry efforts to
leverage and scale endpoint directories.
For example, the FHIR community,
through the Argonaut Project, recently
developed the ‘‘Patient-access Brands’’
conceptual model that specifies
standardized formats for publishing
endpoints and related organizational
information.308 Specifically, this model
includes FHIR ‘‘Endpoint’’ and
‘‘Organization’’ resource profiles for
FHIR formatting of endpoint and
organization details. The model also
specifies how these ‘‘Endpoint’’ and
‘‘Organization’’ resources can be related
to each other in a way that allows app
developers to fetch organization details
related to an endpoint such as
organization name, logo, location,
aliases, and other brand details that
would be recognizable to the patient.
We invite comment on these proposals.
d. Access Token Revocation
In the ONC Cures Act Final Rule, we
established a requirement in
§ 170.315(g)(10)(vi) for Health IT
Modules certified to § 170.315(g)(10) to
be able to revoke an authorized
application’s access at a patient’s
direction (85 FR 25945). This required
capability is intended to enable patients
to ‘‘definitively revoke an application’s
authorization to receive their EHI until
reauthorized, if ever, by the patient’’ (85
FR 25747). We noted in the ONC Cures
Act Final Rule that we finalized
§ 170.315(g)(10)(vi) as a functional
requirement to allow health IT
developers the ability to implement it in
a way that best suits their existing
infrastructure and allows for innovative
models for authorization revocation to
308 https://hackmd.io/@argonaut/patient-accessbrands.
307 https://ndjson.org/.
PO 00000
23815
Sfmt 4702
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
23816
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
develop (85 FR 25747). We understand
that a lack of specificity in the current
requirement has led to some confusion
among health IT developers and
application developers.
As part of health IT developers’
implementation of these requirements,
we have received feedback regarding the
implementation of authorization
revocation, specifically around the
revocation of access tokens. Health IT
developers have requested clarification
regarding letting access tokens expire in
lieu of immediate access token
revocation for the purposes of
certification testing. The OAuth 2.0
Token Revocation specification, RFC
7009, describes expiration of short-lived
access tokens as a design option for
authorization servers to revoke an
application’s access. This design option
conforms with industry standard
practice and may reduce health IT
developer burden as the Health IT
Module would not have to perform
token introspection for each resource
request nor maintain a database of valid
access tokens.
We propose to revise the requirement
in § 170.315(g)(10)(vi) to specify that a
Health IT Module’s authorization server
must be able to revoke and must revoke
an authorized application’s access at a
patient’s direction within 1 hour of the
request. This requirement aligns with
industry standard practice of short-lived
access tokens as specified in internet
Engineering Task Force (IETF) Request
for Comments (RFC) 6819,309 IETF RFC
7009,310 and Section 7.1.3 of the
SMART Application Launch Framework
version 1.0.0, which states that ‘‘Access
tokens SHOULD have a valid lifetime no
greater than one hour. Confidential
clients may be issued longer-lived
tokens than public clients.’’ This
proposal would provide clarity and
create a consistent expectation that
developers revoke access within 1 hour
of a request, regardless of their internal
approach to fulfilling a patient’s request
to revoke access. This proposal would
also assure patients that once requested,
an application’s access to their data
would be revoked within 1 hour. This
would also support situations where a
patient may have an unexpected change
in their privacy concerns and seek to
curtail access to their information in as
short a time as possible, especially
regarding access by entities not
regulated by the HIPAA Rules.
We considered a shorter timeframe,
but we concluded that 1 hour would be
309 Available at: https://www.rfc-editor.org/pdfrfc/
rfc6819.txt.pdf.
310 Available at: https://www.rfc-editor.org/pdfrfc/
rfc7009.txt.pdf.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
both an appropriate expectation for
developers to meet and would be
consistent with industry standards for
revocation of an application’s access.
We also expect that many or most
developers would institute a process
that results in revocation of access in a
timeframe much less than 1 hour.
Investigation into industry best practice
leads ONC to believe that a 1-hour
requirement to revoke an authorized
application’s access at a patient’s
direction is an appropriate baseline
requirement. We invite comment on this
proposal.
e. SMART App Launch 2.0
In the ONC Cures Act Final Rule, we
adopted the HL7 FHIR SMART
Application Launch Framework
(SMART v1) Implementation Guide
Release 1.0.0 implementation
specification, a profile of the OAuth 2.0
specification, in § 170.215(a)(3) (85 FR
25741). SMART v1 provides reliable,
secure authorization for a variety of app
architectures through the use of the
OAuth 2.0 standard. This
Implementation Guide (IG) supports
both required and optional
requirements, known as the ‘‘SMART on
FHIR Core Capabilities’’ (85 FR 25741).
This profile includes required support
for ‘‘refresh tokens,’’ ‘‘Standalone
Launch,’’ and ‘‘EHR Launch’’
capabilities from the SMART IG.
Additionally, as part of adopting the
implementation specification in
§ 170.215(a)(3), the ONC Cures Act Final
Rule required support for optional
capabilities including, ‘‘launch-ehr,’’
‘‘launch-standalone,’’ ‘‘client-public,’’
‘‘client-confidentialsymmetric,’’ ‘‘ssoopenid-connect,’’ ‘‘context-banner,’’
‘‘context-style,’’ ‘‘context-ehr-patient,’’
‘‘context-ehr-encounter,’’ ‘‘contextstandalone-patient,’’ ‘‘contextstandalone-encounter,’’ ‘‘permissionoffline,’’ ‘‘permission-patient,’’ and
‘‘permission-user.’’
As part of the adopted
implementation specification, we
explicitly required mandatory support
of the ‘‘SMART on FHIR Core
Capabilities’’ for Program testing and
certification, and we stated that by
requiring the ‘‘permission-patient’’
‘‘SMART on FHIR Core Capability’’ in
§ 170.215(a)(3), Health IT Modules
presented for testing and certification to
§ 170.315(g)(10), via cross-references to
§ 170.215(a)(3), must include the ability
for patients to authorize an application
to receive their electronic health
information (EHI) based on FHIR
resource-level scopes (85 FR 25741,
25746). Practically, this means that
patients would need to have the ability
to authorize access to their EHI at the
PO 00000
Frm 00072
Fmt 4701
Sfmt 4702
individual FHIR resource-level, from
one specific FHIR resource (e.g.,
‘‘Immunization’’) up to all FHIR
resources necessary to implement the
standard adopted in § 170.213 and
implementation specification adopted
in § 170.215(a)(2). This capability gives
patients increased control over how
much EHI they authorize applications of
their choice to receive. For example, if
a patient downloaded a medication
management application, they would be
able to use these authorization scopes to
limit the EHI accessible by the
application to only information
contained in FHIR ‘‘MedicationRequest’’
and ‘‘Medication’’ profile.
The SMART Application Launch
Framework Implementation Guide
Release 2.0.0 (SMART v2) Guide is the
next major release of the SMART
Application Launch Framework IG.311
The SMART v2 Guide iterates on the
features of the SMART v1 Guide by
including revisions aligning with
industry consensus to provide technical
improvements and reflect security best
practices. The SMART v2 Guide
technical enhancements improve the
authentication and authorization
security layer provided by the SMART
v1 Guide and enables increased
capabilities and functionality for
individual control of EHI. Therefore, we
propose to adopt the SMART v2 Guide
in § 170.215(c)(2), and we propose that
the adoption of the SMART v1 Guide in
§ 170.215(c)(1) would expire as of
January 1, 2025. We clarify that both
SMART v1 and SMART v2 will be
available for purposes of certification
where certification criteria reference
§ 170.215(c) until the expiration date of
January 1, 2025, after which time only
SMART v2 will be available for
certification if we finalize our rule as
proposed.
As part of this proposal, we propose
to adopt several sections specified as
‘‘optional’’ in the SMART v2 Guide as
‘‘required’’ for purposes of the Program
for certification criteria that reference
§ 170.215(c). Specifically, we propose to
adopt all Capabilities as defined in
‘‘8.1.2 Capabilities,’’ which include but
are not limited to (1) backward
compatibility mapping for SMART v1
scopes as defined in ‘‘3.0.2 Scopes for
requesting clinical data;’’ (2) asymmetric
client authentication as defined in ‘‘5
Client Authentication: Asymmetric
(public key);’’ and granular scopes as
defined in (3) ‘‘3.0.2.3 Finer-grained
resource constraints using search
parameters.’’ Additionally, we propose
to require support for the ‘‘Patient
311 https://hl7.org/fhir/smart-app-launch/STU2/
index.html.
E:\FR\FM\18APP2.SGM
18APP2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
Access for Standalone Apps’’ and
‘‘Clinician Access for EHR Launch’’
Capability Sets from ‘‘8.1.1 Capability
Sets.’’ Also, we propose to adopt token
introspection as defined in ‘‘7 Token
Introspection.’’ Again, we clarify that for
the period before January 1, 2025,
Health IT Modules certified to
certification criteria that reference
§ 170.215(c) may use either SMART v1
or SMART v2 for certification.
Further, we note that the SMART v2
Guide includes section 3.0.2.3 ‘‘Finergrained resource constraints using
search parameters,’’ and associated
‘‘3.0.2.4 requirement for support’’ and
‘‘3.0.2.5 experimental features,’’ which
present concepts for further
development within the SMART v2
Guide. Together, these optional
functionalities will enable more
granular control for individuals,
clinicians, and other users to share
information with apps of their choice in
more explicit ways. The granular scope
functionality would empower patients
and providers to share health data in a
more granular fashion, which will
improve confidence in the use of thirdparty apps by allowing app users to
decide which specific type of EHI they
share with the app. These
functionalities would help address
privacy and security concerns of thirdparty app access to health data and
further patient empowerment by
providing the ability to limit an app’s
access to a granular, minimum set of
health data, as determined by the app
user. We propose these sections for
adoption as part of SMART v2 Guide
with the understanding that either the
SMART v2 Guide or another
implementation guide such as the US
Core Implementation Guide will define
more specific requirements for finergrained resource constraints using
search parameters.
i. SMART v2 Guide New and Revised
Features Proposed for Adoption
The SMART v2 Guide introduces new
or revised requirements to the previous
version of the implementation guide,
SMART Guide v1. Major requirements
new to the SMART v2 Guide include
support for the OAuth 2.0 security
extension Proof Key for Code Exchange
(PKCE), as well as a revision of the
scope syntax. The SMART v2 Guide
includes requirements that both the
EHR and all apps support the OAuth 2.0
security extension PKCE. PKCE is an
industry standard security extension for
OAuth 2.0 to mitigate the known
security vulnerability of authorization
code interception attacks.312 The
312 https://www.oauth.com/oauth2-servers/pkce/.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
requirement of PKCE especially
improves the security of native apps, or
apps that operate from an individual’s
phone or tablet, which were particularly
vulnerable to authorization code
interception attacks.
Another major change included in the
SMART v2 Guide is revision of the
syntax of scopes provided to apps. To
align with the FHIR interactions of
‘‘Create’’, ‘‘Read’’, ‘‘Update’’, ‘‘Delete’’,
‘‘Search’’, collectively known as
‘‘CRUDS,’’ scopes are constructed to
consist of combinations of five types of
permissions corresponding to the
CRUDS interactions. The use of this
CRUDS scope syntax permits improved
patient choice for persistent access as
more specific combinations of
permissions can be granted to apps as
opposed to the scope syntax used in the
SMART v1 Guide, which only used two
permission types of ‘‘read’’ and ‘‘write.’’
New Feature: PKCE
One of the major security
improvements in the SMART v2 Guide
is the requirement that all apps support
the OAuth 2.0 security extension Proof
Key for Code Exchange (PKCE). PKCE is
designed to mitigate the known security
vulnerability of authorization code
interception attacks, with native apps
especially targeted. According to IETF
RFC 7636, the request for comment
which defines the PKCE extension, this
attack can be used to illegitimately
obtain an access token from the
authorization server and thus obtain
server data in an unauthorized manner.
PKCE mitigates this vulnerability by
creating cryptographically random keys
for every authorization request. The
authorization server performs proof of
possession of the secret key by the
client. This mitigates the vulnerability
as an attacker who intercepts the
authorization code cannot redeem it for
an access token as they do not possess
the secret key associated with the
authorization request.
Support for PKCE is important
because PKCE makes health app access
of patient health information more
secure in a standardized manner. ONC
recognizes healthcare participants and
patients are interested in the secure use
of health apps, including native apps, to
access health information. PKCE
support makes the granting of access to
health information via health apps more
secure by mitigating the known
vulnerability of authorization code
interception attacks. We believe the
support of PKCE would further our goal
of secure access of health information
without special effort by further
securing health app access, especially
for native apps. Therefore, we propose
PO 00000
Frm 00073
Fmt 4701
Sfmt 4702
23817
to require the support of PKCE as
specified in the SMART v2 Guide. We
invite comment on this proposal.
New Feature: CRUDS Scope Syntax
Another major update in the SMART
v2 Guide is the revision of the scope
syntax to align with the FHIR REST API
interactions for FHIR resources.
Previously in the SMART v1 Guide,
scope syntax for FHIR resources was
delineated in terms of combinations of
‘‘read’’ and ‘‘write’’ permissions. The
SMART v2 Guide revises this scope
syntax by splitting ‘‘read’’ permissions
into two types of permissions which
correspond to FHIR REST API
interactions, ‘‘Read’’ and ‘‘Search.’’
Similarly, the ‘‘write’’ permissions from
the SMART v1 Guide are split into
‘‘Create,’’ ‘‘Update,’’ and ‘‘Delete.’’ This
alignment of scope syntax to the FHIR
REST API interactions permits Health IT
Module authorization servers to provide
greater specificity regarding which
permissions are granted in scopes to
apps and has the benefit of improved
technical clarity to health IT and
application developers. This additional
specificity for scopes also improves a
patient’s control over how an app
accesses their health data by clarifying
for the patient what specific type of API
interactions are permitted to the app.
For example, under this new syntax the
patient could specifically permit an app
‘‘read’’ access to a FHIR resource but
deny ‘‘search’’ access for the same FHIR
resource.
Currently, as stated in 85 FR 25742,
the § 170.315(g)(10) certification
criterion only requires health IT
developers to support ‘‘read’’
capabilities according to the standard
and implementation specifications
adopted in § 170.215(a) and in
§ 170.215(b)(1), including the
mandatory capabilities described in ‘‘US
Core Server CapabilityStatement.’’ We
will continue this policy for
§ 170.315(g)(10), as specified in the
SMART v2 Guide, which would include
‘‘Read’’ and ‘‘Search’’ permissions to be
supported for certification to the
§ 170.315(g)(10) criterion. We welcome
comment on these scopes and are
interested in the public’s experience
with other aspects of CRUDS.
ii. SMART v2 Optional Features
Proposed as Required by ONC
We propose to require all Capabilities
as defined in ‘‘8.1.2 Capabilities’’ and
the ‘‘Patient Access for Standalone
Apps’’ and ‘‘Clinician Access for EHR
Launch’’ Capability Sets from ‘‘8.1.1
Capability Sets.’’ The following section
identifies optional component pieces of
8.1.2 Capabilities and optional profiles
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
23818
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
of the implementation guide that we
propose to be required.
First, the SMART v2 Guide introduces
functionality specified as optional in the
implementation guide. We propose to
make several of these optional
functionalities required as part of the
proposed implementation specification,
and therefore required for certification
criteria that reference proposed
§ 170.215(c)(2). First, one such optional
functionality is the mapping between
SMART v1 Guide and SMART v2 Guide
scopes for the purpose of backward
compatibility. We propose to require
support of this mapping for the
purposes of interoperability between
implementations of the SMART v1
Guide and the SMART v2 Guide. As
part of the current ‘‘Authentication and
authorization’’ requirements in
§ 170.315(g)(10)(v) for the certification
criterion in § 170.315(g)(10), Health IT
Modules must support authentication
and authorization during the process of
granting access to patient data. Part of
the authorization process involves an
application requesting permission to
access patient data in the form of OAuth
2.0 scopes as specified in the SMART v1
Guide. The SMART v2 Guide changes
the format of these scopes, making
SMART v2 scopes not directly
compatible with SMART v1 scopes. The
SMART v2 Guide provides a mapping of
SMART v1 scopes to SMART v2 scopes
for the purposes of backward
compatibility. For the purposes of
interoperability with existing API
deployments implementing the SMART
v1 Guide, we propose to require that
servers advertise the ‘‘permission-v1’’
capability in their ‘‘well-known/smartconfiguration’’ discovery document,
return SMART v1 scopes when SMART
v1 scopes are requested and granted,
and process SMART v1 scopes
according to the backward compatibility
mapping specified in SMART v2 Guide
‘‘3.0.2 Scopes for requesting clinical
data.’’
Second, the SMART v2 Guide
introduces an optional profile for
authorization servers to support
asymmetric client authentication for
confidential clients. We propose to
require Health IT Modules support
asymmetric client authentication as an
option for confidential clients during
the process of authentication and
authorization when granting access to
patient data. This proposed requirement
would align with the security practices
of industry as evidenced by the SMART
v2 Guide’s recommendation that
asymmetric client authentication be
used when available and improves
interoperability for clients by making
this API security feature consistently
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
available across § 170.315(g)(10)certified APIs. Client authentication is
the process by which the authorization
server verifies the identity of the client
requesting authorization. The SMART
v1 Guide specifies client authentication
in terms of symmetric client
authentication, in which authentication
is based on a secret key shared by both
the authorization server and the client.
The SMART v2 Guide introduces a new
profile for client authentication,
asymmetric client authentication.
Asymmetric client authentication relies
upon public key cryptography for
authentication, with the client having
public and private keys. The SMART v2
Guide specifies asymmetric client
authentication as an optional profile but
recommends clients use asymmetric
client authentication when available.
Given this recommendation of the
SMART v2 Guide, we believe there
would be a security benefit for servers
to provide clients the option to use
asymmetric client authentication over
symmetric client authentication.
Additionally, clients would benefit from
having asymmetric client authentication
supported by authorization servers
consistently in a standardized way.
Therefore, we propose to require Health
IT Modules support asymmetric client
authentication as defined in ‘‘5 Client
Authentication: Asymmetric (public
key)’’ as an option for confidential
clients during the process of
authentication and authorization when
granting access to patient data. We also
propose to require Health IT Modules
advertise the ‘‘client-confidentialasymmetric’’ capability in their ‘‘wellknown/smart-configuration’’ discovery
document.
Third, the SMART v2 Guide also
introduces a new optional feature of
granular scope constraints using search
parameters. This feature uses the FHIR
REST API search parameter syntax to
specify permissions more granular than
the FHIR resource level, which was the
maximum granularity of scopes in the
SMART v1 Guide. By using search
parameters associated with a FHIR
resource, a scope can be made to apply
only to a specific subset of a FHIR
resource and therefore the permissions
granted to the client via such a scope
would be limited to this subset. For
example, the SMART v2 Guide
mentions how an authorization server
can provide a scope for laboratory
Observations using the ‘‘category’’
search parameter instead of all
Observation resources. This granular
scope functionality would empower
patients with greater control over what
types of information applications of
PO 00000
Frm 00074
Fmt 4701
Sfmt 4702
their choice receive from a Health IT
Module. This would also improve
patients’ ability to select granular
permissions to grant persistent access to
applications. However, the SMART v2
Guide leaves this new functionality as
optional and does not specify specific
search parameter requirements for finergrained scope constraints. We propose
to require ‘‘3.0.2.3 Finer-grained
resource constraints using search
parameters’’ with the clarification that
Health IT Modules certified to
§ 170.315(g)(10) must minimally be
capable of handling finer-grained scopes
using the ‘‘category’’ parameter for (1)
the Condition resource with Condition
sub-resources Encounter Diagnosis,
Problem List, and Health Concern and
(2) the Observation resource with
Observation sub-resources Clinical Test,
Laboratory, Social History, SDOH,
Survey, and Vital Signs. We anticipate
that the US Core IG will provide
guidance for developers to support a
minimum number of search parameters
and this minimum list will be consistent
with the optional scopes described in
section ‘‘3.8 Future of US Core’’ of the
US Core IG v6.0.0. We invite comment
on this proposal, and we seek comment
on whether we should expand the
minimum search parameters for Health
IT Modules certified to § 170.315(g)(10).
Fourth, the SMART v2 Guide revises
how capabilities are categorized. The
‘‘SMART Core Capabilities’’ in the
SMART v1 Guide define capabilities
supported by the server and are made
available to inform clients of supported
functionality. ‘‘Capabilities’’ are
grouped into ‘‘Capability Sets’’ to define
the functionalities required for a
specific use case. The SMART v2 guide
restructures how ‘‘Capabilities’’ are
organized, and no longer includes
‘‘SMART Core Capabilities.’’ Instead,
the SMART v2 Guide includes a list of
‘‘Capabilities’’ and ‘‘Capability Sets.’’ To
align with the capabilities proposed for
adoption and the current
§ 170.315(g)(10) requirement, via crossreference to the existing § 170.215(a)(3),
for Health IT Modules to support
‘‘SMART Core Capabilities’’ as specified
in the SMART v1 Guide, we propose to
require the following ‘‘Capability Sets’’
from the SMART v2 Guide of ‘‘Patient
Access for Standalone Apps’’ and
‘‘Clinician Access for EHR Launch’’ in
addition to the ‘‘8.1.2 Capabilities,’’
enumerated in the SMART v2 Guide,
including the capabilities of: ‘‘launchehr,’’ ‘‘launch-standalone,’’ ‘‘authorize
post,’’ ‘‘client-public,’’ ‘‘clientconfidential-symmetric,’’ ‘‘clientconfidential-asymmetric,’’ ‘‘sso-openidconnect,’’ ‘‘context-banner,’’ ‘‘context-
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
style,’’ ‘‘context-ehr-patient,’’ ‘‘contextehr-encounter,’’ ‘‘context-standalonepatient,’’ ‘‘context-standaloneencounter,’’ ‘‘permission-offline,’’
‘‘permission-online,’’ ‘‘permissionpatient,’’ ‘‘permission-user,’’
‘‘permission-v1,’’ and ‘‘permission-v2.’’
We note that ‘‘context-banner,’’ and
‘‘context-style,’’ which are capabilities
for supporting user interface integration
with the application, are respectively
optional and ‘‘experimental’’ features in
the SMART v2 Guide; however, we
propose to maintain them as required
based on the previously adopted
requirements for the criterion in
§ 170.315(g)(10). We seek comment on
whether these should be maintained as
required or if we should instead modify
this requirement to designate ‘‘contextbanner,’’ and ‘‘context-style,’’ as
optional, in alignment with the SMART
v2 Guide. We propose to require the
‘‘permission-offline’’ and ‘‘permissiononline’’ capabilities as this functionality
would empower individuals, clinicians,
and other users to deny authorization
for online or offline access.
Additionally, we request specific
comment on the inclusion of all of the
aforementioned aspects of the SMART
v2 Guide and any related benefits or
challenges of finalizing as proposed.
Additionally, the SMART v2 Guide
introduces a new requirement to
support POST-based authorization for
the client authorization request. This
new requirement in the SMART v2
Guide is adapted from the OpenID
Connect Core specification and is
related to the requirement in
§ 170.315(g)(10)(v)(A)(1)(i), which
requires a Health IT Module to support
authentication and authorization during
the process of granting access to patient
data according to the OpenID Connect
Core standard. The SMART v2 Guide
includes the ‘‘authorize-post’’ capability
under ‘‘Capabilities’’ for servers to
indicate support for this requirement.
To align with this new technical
requirement in SMART v2 and the
authorization and authentication
requirement in
§ 170.315(g)(10)(v)(A)(1)(i), we propose
to require the ‘‘authorize-post’’
capability.
We propose to require the following
optional capabilities as required:
‘‘permission-v1’’; ‘‘permission-v2’’;
‘‘client-confidential-asymmetric;’’ and
‘‘authorize-post’’ from section ‘‘8.1.2
Capabilities’’ to support new technical
requirement for backward compatibility
with SMART v1 Guide scopes, SMART
v2 Guide granular scopes, asymmetric
client authentication, and support for
authorization via HTTP POST
respectively. In sum, we propose to
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
require all Capabilities as defined in
‘‘8.1.2 Capabilities’’ and the ‘‘Patient
Access for Standalone Apps’’ and
‘‘Clinician Access for EHR Launch’’
Capability Sets from ‘‘8.1.1 Capability
Sets.’’
The SMART v2 Guide also defines a
profile for OAuth 2.0 token
introspection. As described in the ONC
Cures Act Final Rule (85 FR 25748),
commenters on the ONC Cures Act
Proposed Rule requested a requirement
in the § 170.315(g)(10) criterion for
token introspection, a process which
defines how an authorization server can
be queried for information about a
token. In response to this feedback, ONC
subsequently finalized a token
introspection requirement in
§ 170.315(g)(10)(vii) but did not specify
a standard and encouraged industry to
coalesce around a common standard,
such as OAuth 2.0 Token Introspection
(RFC 7662). The SMART v2 Guide
introduces a profile for OAuth 2.0
Token Introspection in ‘‘7 Token
Introspection.’’ We believe a
standardized process for token
introspection would improve
interoperability for FHIR clients and
resource servers by defining specific
expectations around what information a
Health IT Module’s authorization server
returns about a token when queried by
a client or resource server. To facilitate
such interoperability, we propose to
revise the token introspection
requirement in § 170.315(g)(10)(vii) to
state, ‘‘A Health IT Module’s
authorization server must be able to
receive and validate tokens it has issued
in accordance with an implementation
specification in § 170.215(c).’’ This
requirement would ensure that a Health
IT Module’s authorization server must
be able to receive and validate tokens it
has issued in accordance with SMART
v2 Guide ‘‘7 Token Introspection.’’
Finally, we again note that we
propose to restructure the standards
listed in § 170.215 to better categorize
API standards and to enable
simultaneous use of different versions of
IGs for a set period of time. We propose
to categorize the SMART v1 Guide in
§ 170.215(c)(1) as part of a group of
standards that enable client applications
to access and integrate with data
systems, and we propose that the
adoption of this standard expires on
January 1, 2025. In so doing, we propose
to move the implementation
specification currently found in
§ 170.215(a)(3) to § 170.215(c)(1). We
propose the SMART v2 Guide in this
same group in § 170.215(c)(2). Together,
this recategorization and establishment
of an expiration date for § 170.215(c)(1)
would give health IT developers of
PO 00000
Frm 00075
Fmt 4701
Sfmt 4702
23819
certified health IT the option to use
either SMART Guide version for a
period of time, and it would establish a
concrete date for when they would need
to implement and support the newer
version in their Health IT Modules
certified to certification criteria that
reference § 170.215(c).
8. Patient Demographics and
Observations Certification Criterion in
§ 170.315(a)(5)
Background
In the 2015 Edition Final Rule (80 FR
62601), ONC required the recording,
capture, and access to a patient’s sex,
sexual orientation, and gender identity
for Health IT Modules certified to the
‘‘Demographics’’ certification criterion
(§ 170.315(a)(5)) (80 FR 62747). This
rule also defined a required set of
standardized terminology to represent
each of these data elements (80 FR
62618–62620). Since then, ONC has
received recommendations through the
Health Information Technology
Advisory Committee (HITAC) and
public feedback that the current terms
and terminologies used to represent sex,
gender identity, and sexual orientation
are limited and need to be updated.
Meanwhile, the healthcare industry
had similarly taken note of the need for
precision for ideas encompassed in
terms such as ‘‘sex’’ and ‘‘gender’’ and
launched the Gender Harmony
Project 313 to capture these concepts
consistently within healthcare. The
Gender Harmony Project introduced for
the health IT context the concepts ‘‘Sex
for Clinical Use’’ (SFCU), ‘‘Recorded
Sex or Gender,’’ (RSG), ‘‘Name to Use,’’
and ‘‘Pronouns.’’ The Gender Harmony
Project defines Sex for Clinical Use as
a category that is based on clinical
observations typically associated with
the designation of male and female;
Name to Use provides the name that
should be used when addressing or
referencing the patient; Recorded Sex or
Gender is the documentation of a
specific instance of sex and/or gender
information; and Pronouns are
determined by a patient and used when
referring to the patient in speech,
clinical notes and in written
instructions to caregivers (e.g., she/her/
hers or they/them.) Sex for Clinical Use,
Name to Use, Recorded Sex or Gender,
and Pronouns are new concepts
currently not present in the certification
criteria.
Proposals
In this section, we outline our
proposals to modify the
313 https://confluence.hl7.org/display/VOC/
The+Gender+Harmony+Project.
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
23820
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
‘‘Demographics’’ certification criterion
(§ 170.315(a)(5)). We propose to rename
§ 170.315(a)(5) from ‘‘Demographics’’ to
‘‘Patient Demographics and
Observations,’’ to acknowledge that the
data elements being proposed are
broader than demographics information,
as we look to promote a more inclusive
healthcare system.
We propose to add the data elements
‘‘Sex for Clinical Use’’ in
§ 170.315(a)(5)(i)(F), ‘‘Name to Use’’ in
§ 170.315(a)(5)(i)(G), and ‘‘Pronouns’’ in
§ 170.315(a)(5)(i)(H) to the ‘‘Patient
Demographics and Observations’’
certification criterion (§ 170.315(a)(5)).
This addition reflects concepts
developed by the HL7 Gender Harmony
Project and help promote inclusivity in
care delivery.
We propose to revise the terminology
standards specified for ‘‘Sex’’ in
§ 170.315(a)(5)(i)(C). ONC has received
significant feedback reflecting the need
to be more inclusive in the terminology
representing the data element. As such,
ONC proposes to revise the fixed list of
terms for ‘‘Sex’’ in § 170.315(a)(5)(i)(C),
which are represented by HL7® Value
Sets for AdministrativeGender and
NullFlavor in § 170.207(n)(1). We
propose to ultimately replace
§ 170.207(n)(1) with the SNOMED CT
code set proposed in § 170.207(n)(2). We
refer the readers to section III.C.1 of the
rule for additional information about the
proposed change to the terminology
standard. In order to be less disruptive
to developers of certified health IT, we
propose to provide flexibility and allow
recording the element using the specific
codes represented in § 170.207(n)(1) for
the time period up to and including
December 31, 2025, to provide enough
time to transition their health IT
systems to SNOMED CT® by January 1,
2026. By having § 170.207(n)(1) expire
at the end of 2025 and adding (n)(2) as
a requirement for Health IT Modules
certified to § 170.315(a)(5) beginning
January 1, 2026, we propose to enable
health IT developers to specify any
appropriate value from the SNOMED
CT® code set with the standard
specified in § 170.207(n)(2).
Additionally, we propose to replace
the terminology standards specified for
Sexual Orientation in
§ 170.315(a)(5)(i)(D), and Gender
Identity in § 170.315(a)(5)(i)(E). ONC
has received significant feedback
reflecting the need to be more inclusive
in the terminology representing each of
these data elements. As such, ONC
proposes to revise the fixed list of terms
for Sexual Orientation in
§ 170.315(a)(5)(i)(D), and Gender
Identity in § 170.315(a)(5)(i)(E), which
are represented by SNOMED CT and
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
HL7® Value Set for NullFlavor in
§ 170.207(o)(1) and (2), and ultimately
replace it with the SNOMED CT code
set specified in § 170.207(o)(3). We refer
the readers to section III.C.1 (USCDI) of
the rule for additional information about
the proposed change to the terminology
standard.
We further propose to set an
expiration date of January 1, 2026, for
the adoption of the values sets
referenced in § 170.207(o)(1) and (o)(2).
This will allow the use of either the
value sets in § 170.207(o)(1) and (o)(2)
or the standard proposed in
§ 170.207(o)(3) beginning on the
effective date of a final rule and
transitioning to allow only the use of the
proposed standard in § 170.207(o)(3)
after December 31, 2025. Consistent
with our proposals in sections III.A and
III.C.11, developers of certified health IT
with Health IT Modules certified to
criteria that reference § 170.207(o)(1) or
(o)(2) would have to update those
Health IT Modules to § 170.207(o)(3)
and provide them to customers by
January 1, 2026.
We also propose to add Sex for
Clinical Use (SFCU) as a new data
element in § 170.315(a)(5)(i)(F). SFCU is
a category based upon clinical
observations typically associated with
the designation of male and female. It
supports context specificity, is derived
from observable information, and is
preferably directly linked to the
information this element summarizes.
SFCU represents a patient’s sex relevant
to a specific clinical setting. This is
valuable when providing care for a
patient whose condition or treatment is
dependent on their sex as determined
by observing and evaluating, for
example, a patient’s hormonal values,
organ inventory, genetic observations, or
external genital morphology. SFCU may
differ from a patient’s sex as recorded
on a birth certificate or driver’s license.
We further clarify, that while there may
be multiple values of Sex for Clinical
Use tied to different events, such as
requesting a laboratory test or imaging
study, we propose to require health IT
developer be able to record at least one
value of SFCU. Additionally, in order to
align with current industry practice and
to provide flexibility to health IT
developers, we propose that health IT be
capable of recording SFCU using the
LOINC® terminology code set standard
specified in proposed § 170.207(n)(3).
We propose to add new data elements
Name to Use in § 170.315(a)(5)(i)(G) and
Pronouns in § 170.315(a)(5)(i)(H),
respectively, to advance the culturally
competent care for lesbian, gay,
bisexual, transgender, queer, intersex,
asexual, and all sexual and gender
PO 00000
Frm 00076
Fmt 4701
Sfmt 4702
minority (LGBTQIA+) people. Multiple
values for a given patient may be valid
over time. For the purposes of this
proposal, we require at least one value
for Pronouns and Name to Use be
recorded. Additionally, in order to align
with current industry practice and to
provide flexibility to health IT
developers, we propose that health IT be
capable of recording Pronouns using the
LOINC® terminology code set standard
specified in proposed § 170.207(o)(4).
In addition to the other data elements
proposed in this section, the HL7
Gender Harmony Project created an
element named Recorded Sex or Gender
(RSG). RSG documents a specific
instance of sex and/or gender
information. RSG is considered a
complex data element that includes
provision for a sex or gender value, as
well as reference to the source
document where the value was found,
whereas Sex is a simple data element.
RSG provides an opportunity for health
IT developers to differentiate between
sex or gender information that exists in
a document or record, from Sex for
Clinical Use (SFCU) which is designed
to be used for clinical decision-making.
Given the work undertaken by the
Gender Harmony Project to develop an
implementation guide that would work
with all HL7 product families, we
request comment on the following
options we could pursue for a final rule.
Option 1 (proposed in regulation
text): Require health IT developers to
record Sex as proposed in
§ 170.315(a)(5)(i)(C). This would enable
Sex to be recorded in accordance with
the SNOMED CT standard, specified in
§ 170.207(n)(2), as well as the standard
specified in § 170.207(n)(1) for the time
period up to and including December
31, 2025. It would mean, however, that
health IT developers would not be
required to differentiate between sex
and/or gender information when
recording the information.
Option 2: Replace Sex with Recorded
Sex or Gender in § 170.315(a)(5)(i)(C).
Adopt the data element Recorded Sex or
Gender as specified in the HL7 Gender
Harmony Project. This would require
health IT developers to capture the
source documents while recording sex
and/or gender information. Recorded
Sex or Gender would further provide an
opportunity for health IT developers to
differentiate between sex or gender
information that exists in a document or
record, from Sex for Clinical Use
(SFCU), which is designed to be used
for clinical decision-making.
In preparing comments, we encourage
commenters to fully review our
proposed certification criterion in
§ 170.315(a)(5) and USCDI v3. Notably,
E:\FR\FM\18APP2.SGM
18APP2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
if we were to adopt RSoG in a final rule
as an alternative to Sex for the proposed
certification criterion in § 170.315(a)(5),
then health IT developers would be
required to ensure that they perform the
necessary transformations to meet the
requirements associated with USCDI v3
and associated certification criteria. We
highly encourage commenters to express
their perspectives and explicitly note
their preferred option in comments.
ddrumheller on DSK120RN23PROD with PROPOSALS2
Base EHR Definition
We propose to revise and update the
‘‘demographics’’ certification criterion
(§ 170.315(a)(5)), which we propose to
rename ‘‘patient demographics and
observations,’’ and which is included in
the Base EHR definition in § 170.102.
This means Health IT Modules would
need to be updated to accommodate the
additional requirements in the ‘‘Patient
Demographics and Observations’’
certification criterion in order to meet
the Base EHR definition.
In addition, because December 31,
2022, has passed, we propose to revise
the Base EHR definition by removing
the reference to § 170.315(g)(8) in
§ 170.102(3)(ii) and replacing the
references to § 170.315(g)(10) in
§ 170.102(3)(ii) and (iii) with a single
reference to § 170.315(g)(10) in
§ 170.102(3)(i).
9. Updates to Transitions of Care
Certification Criterion in § 170.315(b)(1)
In this section, we outline our
proposals to update the Transitions of
Care certification criterion
(§ 170.315(b)(1)) to align it with changes
made in USCDI v3, which we propose
to adopt in § 170.213(b).
We propose to replace the fixed value
set for the USCDI data element ‘‘Sex’’
and instead enable health IT developers
to specify any appropriate value from
the SNOMED CT code set with the
standard specified in § 170.207(n)(2).
Health IT developers can continue using
the specific codes for Sex represented in
§ 170.207(n)(1) for the time period up to
and including December 31, 2025. We
note that these dates are proposed for
the adoption of the associated standards
in § 170.207(n), including the expiration
of the adoption of the standard in
§ 170.207(n)(1) on January 1, 2026.
Consistent with our proposals in
sections III.A and III.C.11, developers of
certified health IT with Health IT
Modules certified to criteria that
reference § 170.207(n)(1) would have to
update those Health IT Modules to
§ 170.207(n)(2) and provide them to
customers by January 1, 2026.
Finally, we propose a conforming
update to § 170.315(b)(1) to update the
listed minimum standard code sets for
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
Problems in § 170.315(b)(1)(iii)(B)(2).
We propose that Health IT Modules
certified to § 170.315(b)(1) use, at a
minimum, the version of the standard
specified in § 170.207(a)(1). We invite
comment on these proposals.
10. Patient Requested Restrictions
Certification Criterion
Through our efforts to advance
interoperability across a nationwide
health IT infrastructure, ONC has
specifically focused on how health IT
can support efforts to reduce healthcare
disparities and provide both insights
and tools for the purposes of measuring
and advancing health equity. This
includes specific steps to expand the
capabilities of health IT to capture and
exchange data that is essential to
supporting patient-centered clinical care
that is targeted to supporting a patient’s
unique needs. However, as ONC
pursues policies intended to improve
the interoperability and sharing of data
through adoption of standards-based
certification criteria and
implementation specifications, we are
aware of the imperative to protect health
data privacy. This need is compounded
by the inclusion of new data elements
in the USCDI that are intended to
support advancement in health equity,
but which also may increase data
sensitivity because of the potential for
bias or stigmatized care. We believe the
need to protect sensitive health
information is foundational to a health
equity by design principle not only to
protect patient privacy, but also to
mitigate the risk of any unintended
negative impact on an individual
resulting from the disclosure of
sensitive health information.
We are also cognizant that identifying
which health data are defined as
‘‘sensitive’’ may vary across federal or
state laws, and may further vary based
on an individual patient’s perspective.
Thus, the concept of ‘‘sensitive data’’ is
dynamic and specific to the individual.
Patient populations that have
historically been subject to
discrimination may identify a wide
range of demographic information as
sensitive, including race, ethnicity,
preferred language, sex, sexual
orientation, gender identity, and
disability status. Efforts to support
whole patient care and expand the
capture of social, psychological, and
behavioral health information have led
to advancements in standards for
representation of social determinants of
health (SDOH). We must also keep in
mind that the capture and exchange of
SDOH data includes the potential risk
for discrimination or misuse.
PO 00000
Frm 00077
Fmt 4701
Sfmt 4702
23821
Advances in genetic testing and
genomic research offer opportunities for
early intervention and preventative care,
but again, they represent a potential risk
that may not be fully addressed by
current privacy laws. Finally, there are
types of clinical information that could
impact the patient if disclosed, such as
reproductive health, behavioral health,
and substance abuse information.
The HIPAA Privacy Rule provides
individuals with several rights intended
to empower them to be more active
participants in managing their health
information. These include the right to
access certain health information
maintained about the individual; the
right to have certain health information
amended; the right to receive an
accounting of certain disclosures; the
right to receive adequate notice of a
covered entity’s privacy practices; the
right to agree or object to, or authorize,
certain disclosures; the right to request
restrictions of certain uses and
disclosures; and provisions allowing a
covered entity to obtain consent for
certain uses and disclosures.314
Under the HIPAA Privacy Rule,
covered entities as defined in 45 CFR
164.530(i) are required to allow
individuals to request a restriction on
the use or disclosure of their PHI for
treatment, payment, or health care
operations and to have policies in place
by which to accept or deny such
requests (See 45 CFR
164.522(a)(1)(i)(A)). The HIPAA Privacy
Rule does not specify a particular
process to be used by individuals to
make such requests or for the entity to
accept or deny the request. However, we
believe that certified health IT should—
to the extent feasible—support covered
entities so they can execute these
processes to protect individuals’ privacy
and to provide patients an opportunity
to exercise this right.
Patient-directed privacy of data the
patient deems sensitive requires
attention to specific challenges from
both a technology and a policy
perspective, which we recognize cannot
be easily solved. However, as we
intended with the ONC Cures Act Final
Rule, we believe there may be
approaches that could, at a minimum,
support the advancement of health IT
tools to support discrete parts of these
privacy workflows.
We are therefore proposing a new
certification criterion, an addition to
ONC’s Privacy and Security Framework
under the Program, and a revision to an
existing certification criterion to support
314 See 45 CFR 164.524, 164.526, 164.528,
164.520, 164.510, 164.508, 164.522, and 164.506(b),
respectively.
E:\FR\FM\18APP2.SGM
18APP2
23822
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
additional tools for implementing
patient requested privacy restrictions.
a. Patient Right To Request a Restriction
New Criterion—Primary Proposal
We propose to adopt a new
certification criterion specifically in
support of the HIPAA Privacy Rule’s
‘‘right to request a restriction’’ on
certain uses and disclosures (See also 45
CFR 164.522(a)). We propose to add the
new certification criterion ‘‘patient
requested restrictions’’ in
§ 170.315(d)(14) to enable a user to
implement a process to restrict uses or
disclosures of data in response to a
patient request when such restriction is
agreed to by the covered entity. We
propose that this new criterion in
§ 170.315(d)(14) would be standardsagnostic, allowing health IT developers
seeking to certify a Health IT Module to
the criterion flexibility in how they
design these capabilities so long as they
meet the functional requirements
described for certification. We
specifically intend the proposed
§ 170.315(d)(14) to advance the
technological means to support
clinicians and other covered entities
when honoring patient requests for the
restriction of uses or disclosure of PHI
through certified health IT.
We propose to add the following in
§ 170.315(d)(14) for this new criterion
‘‘patient requested restrictions’’:
• For any data expressed in the
standards in § 170.213, enable a user to
flag whether such data needs to be
restricted from being subsequently used
or disclosed; as set forth in 45 CFR
164.522; and
• prevent any data flagged pursuant
to paragraph (d)(14)(i) of this section
from being included in a subsequent use
or disclosure for the restricted purpose.
We propose that ‘‘enabl[ing] a user to
flag’’ means enabling the user of the
Health IT Module to indicate that a
request for restriction was made by the
patient and that the user intends to
honor the request. In the case of
integration with a Health IT Module
certified to the revised criterion in
§ 170.315(e)(1) discussed in this section,
that request made by the patient could
be in part automated for requests made
through an internet-based method.
However, the functionality under the
proposed new criterion in
§ 170.315(d)(14) must include the ability
for the user to indicate a request made
via other means. We note that such
‘‘flags’’ may leverage use of security
labels like those included in the HL7
data segmentation for privacy (DS4P)
implementation guides discussed in
section III.C.10.b, or other data
standards such as provenance or digital
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
signature specifications.315 The use of
such standards or specifications would
be at the discretion of the health IT
developer. The health IT developer
would have the flexibility to implement
the ‘‘enable a user to flag’’ functionality
in the manner that works best for their
users and systems integration
expectations.
We propose that the developer of a
certified Health IT Module, under this
standards-agnostic approach, would
have the flexibility to implement the
restriction on the inclusion in a
subsequent use or disclosure via a wide
range of potential means dependent on
their specific development and
implementation constraints (e.g., flagged
data would not be included as part of a
summary care record, not be displayed
in a patient portal, or not be shared via
an API).
We welcome public comment on this
proposal. We also direct readers to
section III.C.10.b of this section in
which we propose and seek comment
on an alternative to leverage security
label standards as a source taxonomy for
the ‘‘flag’’ applied to the data for the
new criterion in § 170.315(d)(14).
We also propose to modify the
Privacy and Security Framework in
§ 170.550(h) to add the proposed new
criterion. Specifically, we propose to
modify § 170.550(h)(iii) in reference to
the certain of ‘‘care coordination’’
certification criteria in § 170.315(b);
§ 170.550(h)(v) in reference to the
‘‘view, download, and transmit to 3rd
party’’ certification criterion in
§ 170.315(e)(1); and to § 170.550(h)(viii)
in reference to the § ‘‘application
access’’ certification criteria at
§ 170.315(g)(7) through (g)(9) and the
‘‘standardized API for patient and
population services’’ certification
criterion at § 170.315(g)(10).
We propose that the new ‘‘patient
requested restrictions’’ certification
criterion in § 170.315(d)(14) would be
required for the Privacy and Security
Framework by January 1, 2026.
We welcome public comment on this
proposal.
Finally, we propose a modification to
the ‘‘view, download, and transmit to
3rd party’’ certification criterion in
§ 170.315(e)(1) in order to support
patients’ ability to leverage technology
315 For example, the USCDI v3 includes a
provenance data class (https://www.healthit.gov/
isa/uscdi-data-class/provenance#uscdi-v3) and
submissions in ISA include digital signature as a
potential addition to provenance within the USCDI:
https://www.healthit.gov/isa/uscdi-data/signature.
Further specifications for provenance data and
digital signatures in the context of FHIR-based
transactions are also referenced in ISA: https://
www.healthit.gov/isa/representing-dataprovenance.
PO 00000
Frm 00078
Fmt 4701
Sfmt 4702
to exercise their right to request a
restriction under the HIPAA Privacy
Rule. We propose that a Health IT
Module certified to the criterion in
§ 170.315(e)(1) must also enable an
internet-based approach for patients to
request a restriction of use or disclosure
of their EHI for any data expressed in
the USCDI standards in § 170.213.
Specifically, we propose to modify
§ 170.315(e)(1) to add a paragraph (iii)
stating patients (and their authorized
representatives) must be able to use an
internet-based method to request a
restriction to be applied for any data
expressed in the standards in § 170.213.
The current version of the
§ 170.315(e)(1) ‘‘view, download, and
transmit to 3rd party’’ certification
criterion uses the concept of ‘‘internetbased’’ to convey, at § 170.315(e)(1)(i),
that ‘‘[p]atients (and their authorized
representatives) must be able to use
internet-based technology to view,
download, and transmit. . . .’’
(emphasis added). In the ONC Cures Act
Final Rule (85 FR 25886), we described
how we chose to use the term ‘‘internetbased method’’ in lieu of other options
such as ‘‘web-based delivery’’ because it
more technically aligns with the
concept we were attempting to support.
Such methods would be accessed via an
API, patient portal, or other internetbased means. We believe a similar
approach is appropriate for the
additional functionality supporting a
patient request.
We propose that conformance with
this update to the ‘‘view, download, and
transmit to 3rd party’’ certification
criterion in § 170.315(e)(1)(iii) would be
required by January 1, 2026, for Health
IT Modules certified to § 170.315(e)(1).
Consistent with our proposals in
sections III.A and III.C.11, developers of
certified health IT with Health IT
Modules certified to § 170.315(e)(1)
would have to update those Health IT
Modules to § 170.315(e)(1)(iii) and
provide them to customers by January 1,
2026.
We welcome public comment on this
proposal.
We do not propose any changes to the
current certification criteria for
‘‘security tags—summary of care—send’’
and ‘‘security tags—summary of care—
receive’’ in § 170.315(b)(7) and
§ 170.315(b)(8) respectively; however,
we note that the inclusion of the
proposed new certification criterion in
§ 170.315(d)(14) into the Privacy and
Security Framework in § 170.550(h)
would mean that the proposed new
certification criterion would be
applicable for Health IT Modules
certified to the security tags—send and
security tags—receive certification
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
criteria as well. We seek comment on
whether those certification criteria
should also be directly modified in
alignment with the proposals described
in this section.
We seek comment on the capabilities
we have proposed for the new criterion
in relation to the HIPAA Privacy Rule
right to request a restriction. We
specifically seek comment on whether
the proposed new criterion should
include additional functions to better
support compliance with the HIPAA
Privacy Rule right to request a
restriction. We also seek comment on
whether the proposed new criterion
should, for example, include
capabilities to support HIPAA Privacy
Rule provisions for emergency
disclosures in § 164.522(a)(1)(iii) and
(iv) or termination of a restriction under
§ 164.522(a)(2). We direct readers to
section III.C.10.c for further discussion
and specific questions for consideration.
Finally, we seek public comment on
each part of this proposal—the new
criterion in § 170.315(d)(14), the
inclusion of the request capability for
patients in § 170.315(e)(1), and the
requirements with the Privacy and
Security Framework in § 170.550(h)—
both separately and as a whole. We
specifically seek comment on the
feasibility of each part in terms of
technical implementation and
usefulness for patients and covered
entities using these capabilities. We also
seek comment on the health IT
development burden associated with
implementation of the capabilities
including for the individual certification
criterion referenced in the Privacy and
Security Framework in § 170.550(h).
In addition, we seek comment on any
unintended consequences that the new
criterion in § 170.315(d)(14) or the
addition to the Privacy and Security
Framework in § 170.550(h) might place
on patients, clinicians, or other covered
entities using certified health IT. We
seek comment on whether, and by how
much, the use of this criterion as part of
broader privacy workflows might
represent a reduction in manual effort
for covered entities, a positive impact
on uptake by patients, or other benefits
such as supporting documentation of
restrictions as required under the
HIPAA Privacy Rule in § 164.522(a)(3).
Finally, we seek comment on methods
by which we might quantify the
development burden and costs as well
as the potential benefits or future cost
savings for the new criterion in
§ 170.315(d)(14), the new functionality
in the existing criterion in
§ 170.315(e)(1), and the addition to the
Privacy and Security Framework in
§ 170.550(h).
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
b. Alignment With Adopted
Standards—Alternate Proposals and
Request for Information
In addition to the primary proposal
above, we also propose a set of
alternatives for the new certification
criterion proposed in § 170.315(d)(14),
and we seek comment on various
options related to the potential use of
standards and the scope of both the
applicable data and the use cases. Our
primary proposal described in section
III.C.10.a above for the new criterion in
§ 170.315(d)(14) does not specify any
required standard or implementation
specification for the criterion; rather, it
describes the desired functionality
absent standards.
In the alternative proposals below, we
seek comment on the potential use of
data segmentation for privacy standards
and implementation specifications, the
number and types of applicable use
cases supported by the implementation
specifications that should be certified,
and the data elements that could be
tagged with security labels that must be
supported for each criterion. This set of
alternatives contrasts with our primary
proposal by naming specific standards
and implementation specifications for
the new criterion in § 170.315(d)(14) to
achieve patient-requested restrictions.
In the 2015 Edition Final Rule, we
adopted and incorporated by reference
the HL7 Implementation Guide: Data
Segmentation for Privacy (DS4P),
Release 1 (HL7 CDA DS4P IG) in
§ 170.205(o)(1) and § 170.299
respectively. In the ONC Cures Act
Final Rule, we updated certification
criteria supporting the application of
security labels at a granular level for
sending in (in § 170.315(b)(7)) and
receiving (in § 170.315(b)(8)), which
reference the HL7 CDA DS4P IG (85 FR
25707). The HL7 CDA DS4P IG was
balloted in 2014 and reaffirmed by HL7
in 2019.316 Subsequent to the
publication of the ONC Cures Act Final
Rule, HL7 balloted the HL7 FHIR Data
Segmentation for Privacy Version 1.0.0
(HL7 FHIR DS4P IG),317 which includes
an API specific functionality supporting
similar concepts as the document-based
HL7 CDA DS4P IG. While the HL7 FHIR
DS4P IG may employ different
descriptive terms for the application of
meta-data specifications (e.g., resource
rather than document/section), it is
otherwise aligned to the underlying
constructs of the C–CDA IG.
The HL7 CDA DS4P IG establishes
four types of reusable and platform
316 https://www.hl7.org/implement/standards/
product_brief.cfm?product_id=354.
317 https://build.fhir.org/ig/HL7/fhir-securitylabel-ds4p/.
PO 00000
Frm 00079
Fmt 4701
Sfmt 4702
23823
neutral structures referred to as ‘‘Privacy
Annotation Building Blocks.’’ These
include Confidentiality Level, Purpose
of Use, Obligation Policy, and Refrain
Policy. In the HL7 FHIR DS4P IG, these
categories are described as ‘‘Tag Sets’’
and expanded slightly to include a
‘‘General Purpose of Use,’’ category and
associated value set. Each of these
building blocks provide metadata
regarding sensitivity levels, handling
instructions, and permitted uses of data,
and they are represented as a security
label. Both of these IGs (collectively
referred to hereafter as the HL7 DS4P
IGs) leverage the HL7 Privacy and
Security Healthcare Classification
System (HCS) Security Label
Vocabulary, which provides a common
syntax and semantics for interoperable
security labels in health care. The HCS
Security Label Vocabulary and HL7
DS4P IGs’ Privacy Annotation Building
Blocks and Tag Sets are meant to
support several computable ‘‘actions,’’
to segment data in different contexts.
We understand that the combination of
different actions in different contexts
creates significant optionality and may
be difficult to implement, even with the
assistance of HL7 DS4P IGs. As such, we
propose and seek comment on a
standards agnostic approach and several
alternative approaches that would
reference a standard and constrain
optionality of these standards in specific
ways.
As described in section III.C.10.a, we
propose a new criterion ‘‘patient
requested restrictions’’ in
§ 170.315(d)(14) that is standards
agnostic, rather than require use of a
specific standard for the Security Label
vocabulary or application of security
labels. We believe this approach would
provide flexibility for developers of
certified health IT to provide this
functionality in ways that are
convenient for their underlying system
structures and in support of existing
workflows for patient requested
restrictions under the HIPAA Privacy
Rule. However, we seek comment on a
set of alternate proposals which would
instead reference the HL7 CDA DS4P IG
and the HL7 FHIR DS4P IG and which
consider the potential to adopt these
standards with constraints.
This alternative approach—proposing
that § 170.314(d)(14) reference specific
standards rather than proposing it be
standards agnostic—would remove
ambiguities inherent in the standards
agnostic proposal by establishing a basis
for the ‘‘flag’’ on the data using
consensus standards for security
labeling. The use of these standards may
also facilitate implementation of
capabilities to support patient requested
E:\FR\FM\18APP2.SGM
18APP2
23824
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
restrictions on certain uses or
disclosures by providing taxonomy for
the scope of such restrictions and the
purpose or use to which such
restrictions apply. We believe the
alternative proposals, which rely on
HL7 standards, may be preferrable for
developers of certified health IT that
seek standards-based implementation
guidance over flexibility. However, we
specifically seek comment on whether
that assumption is correct and whether
a standards agnostic approach would be
more technically feasible.
Specifically, the alternative proposals
are as follows:
• In section III.C.10.b.i, we seek
comment on a set of alternate proposals
adopting each of the HL7 DS4P IGs, the
HCS Security Label Vocabulary, or both
for the new criterion in § 170.315(d)(14).
• In section III.C.10.b.ii, we seek
comment on alternate proposals
adopting the HL7 DS4P IGs and/or the
HCS Security Label Vocabularies with
constraints beyond those described in
the IGs, that, if finalized, would
constrain the requirements within the
IGs to only certain use cases.
• In section III.C.10.b.iii, we seek
comment on an additional alternate
proposal that, if finalized, would limit
the specified scope of USCDI data that
the proposed new criterion in
§ 170.315(d)(14) and the proposed
revised criterion in § 170.315(e)(1)
would be required to support.
We additionally seek comment on the
technical feasibility of each alternative,
including the potential development
burden and any associated burden on
patients, clinicians, or other covered
entity using certified health IT, as well
as the positive impact on uptake by
patients, or other benefits such as
supporting documentation of
restrictions as required under the
HIPAA Privacy Rule in § 164.522(a)(3).
i. Alternate Proposals Adopting
Standards in Full
We propose and seek comment on
three alternatives that would adopt and
apply standards and implementation
specifications to the proposed new
criterion in § 170.315(d)(14).
• First Alternative: In this alternative
proposal, we propose and seek comment
on the use of the HL7 CDA DS4P IG,
which is already incorporated by
reference in § 170.299, as a basis for the
application of a ‘‘flag’’ and the
terminology for instructions on use or
disclosure. This alternative proposal
would require the use of the HL7 CDA
DS4P IG for security labels and
applicable actions described by the
Privacy Annotation Building Blocks for
the proposed new certification criterion
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
in § 170.315(d)(14). This alternative
proposal would also modify the
proposed reference within the Privacy
and Security Framework in
§ 170.550(h)(3) so that the new criterion
in § 170.315(d)(14) would only be
applicable in § 170.550(h)(3)(iii) for
Health IT Modules certified to the
criteria in § 170.315(b)(1) and
§ 170.315(g)(9). The purpose of this
would be that if the new criterion in
§ 170.315(d)(14) referenced the HL7
CDA DS4P IG, that IG would only be
applicable under the Privacy and
Security framework to those
certification criteria that also reference
the HL7 C–CDA standard in
§ 170.205(a)(5).
• Second Alternative: In this
alternative proposal, we propose and
seek comment on the use of the HL7
FHIR DS4P IG, which would be adopted
and incorporated by reference in
§ 170.299, as a basis for the application
of a ‘‘flag’’ and the terminology for
instructions on use or disclosure. In this
proposal, the HL7 FHIR DS4P IG 318
would be adopted and incorporated by
reference in § 170.299 for security labels
and applicable actions described by Tag
Sets for the proposed new certification
criterion in § 170.315(d)(14). This
alternative proposal would also modify
the proposed reference within the
Privacy and Security Framework in
§ 170.550(h)(3) so that the new criterion
in § 170.315(d)(14) would only be
applicable in § 170.550(h)(3)(viii) for
Health IT Modules certified to the
criterion in § 170.315(g)(10) The
purpose of this would be that if the new
criterion in § 170.315(d)(14) referenced
the HL7 FHIR DS4P IG, that IG would
only be applicable under the Privacy
and Security framework to those
certification criteria that also reference
the HL7 FHIR standard in § 170.215(a).
• Third Alternative: We propose and
seek comment on a third alternative that
would require only the HCS Security
Label Vocabulary as a basis for the
application of a ‘‘flag’’ and the
terminology for instructions on use or
disclosure. The HCS Security Label
Vocabulary is referenced in both the
HL7 CDA and FHIR DS4P IGs. Use of
the HCS Security Label Vocabulary
would, in this alternative proposal,
serve as the basis for a format-agnostic
and transport-mechanism-agnostic
standard for the application of security
labels and to define the general
instructions for each label. Under this
third alternative, we would propose to
318 The HL7 FHIR DS4P IG is proposed for
incorporation by reference and further described in
section v. of this proposed rule. See also https://
build.fhir.org/ig/HL7/fhir-security-label-ds4p/
index.html.
PO 00000
Frm 00080
Fmt 4701
Sfmt 4702
reference the HCS Security Label
Vocabulary for security labels and
applicable actions for the proposed new
criterion in § 170.315(d)(14) as follows:
For any data expressed in the standards
in § 170.213, enable a user to apply
security labels based on the HCS
Security Label Vocabulary to identify
whether such data needs to be restricted
from being subsequently used or
disclosed as set forth in 45 CFR 164.522;
and for any data with such security
label pursuant to paragraph (d)(14)(i)
enable the correlated action for
subsequent use or disclosure for the
restricted purpose defined in the HCS
Security Label Vocabulary. This
alternative would not require full
implementation of either HL7 DS4P IG.
The HCS Security Label Vocabulary is a
part of the HL7 CDA DS4P IG standard
already adopted in § 170.205(o)(1) and
incorporated by reference in § 170.299,
and it could be used across Health IT
Modules referenced in the Privacy and
Security Framework in § 170.550(h)
whether the applicable certification
criterion is a C–CDA or FHIR-based
functionality.
We welcome public comment on
these three alternate proposals,
including which approach would be
most effective or feasible in terms of
implementation of the standards options
described for the proposed criterion in
§ 170.315(d)(14). We direct readers to
section V of this proposed rule for more
detail and request for comment on the
HL7 FHIR DS4P IG proposed for
incorporation by reference for the
purposes of the alternate proposal for
the criterion in § 170.315(d)(14).
We also specifically seek public
comment on whether these alternate
proposals for the proposed criterion in
§ 170.315(d)(14) would help to define
the requirements for the criterion in a
manner that would be more beneficial
or more burdensome than a standards
agnostic approach, and if so, which
alternate proposal would be most
beneficial. We seek comment on the
health IT development burden and cost
associated with implementation of the
IGs described. We seek comment on any
unintended consequences that the use
of these standards might place on health
IT developers, patients, clinicians, or
other covered entities using certified
heath IT. We seek comment on whether,
and by how much, the use of these
standards might represent a reduction in
the burden of manual privacy
workflows otherwise still necessary
under a standards agnostic approach.
We seek comment on the potential
benefits to patients, or other benefits
such as supporting documentation of
restrictions as required under the
E:\FR\FM\18APP2.SGM
18APP2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
HIPAA Privacy Rule in § 164.522(a)(3).
Finally, we seek comment on clear
methods by which we might quantify
the development burden and costs as
well as the potential benefits or future
cost savings that could be associated
with a standards-based approach as
compared to adopting only a functional
requirement.
ii. Alternate Proposal Adopting
Standards With Constraints
We note that the HL7 DS4P IGs
specify security labels for a wide range
of use cases, privacy policies, applicable
actions and segmentation of data
beyond the scope of the patient right to
request a restriction under the HIPAA
Privacy Rule. We, therefore, also
propose and seek comment on an
alternative that would reference these
standards as described in section
III.C.10.b.i, but would specify the scope
of use to only require support for the
privacy workflows associated with the
HIPAA Privacy Rule patient right to
request a restriction on disclosure or use
rather than on the full range of privacy
and security workflows that the
standards may support. This alternative
proposal for the proposed criterion in
§ 170.315(d)(14) would reference the
HL7 DS4P IGs or the HCS Security Label
Vocabulary but would not require the
implementation of all applicable
security labels or actions described in
these specifications. We seek comment
on whether, for the purposes of
certification, we should adopt the HL7
DS4P IGs or reference the HCS Security
Label Vocabulary as described in the
alternate proposals in sub-section i. but
with additional constraints to narrow
the scope. We seek comment on
whether we should adopt specific
constraints to allow health IT
developers to demonstrate the capability
to filter, redact, or implement another
defined action only for certain use cases
supported by the security labels in the
HCS Security Label Vocabulary, Privacy
Annotation Building Blocks, and Tag
Sets. For example:
• Should we constrain the
requirements to apply the IGs for only
certain general purposes or purposes of
use? Specifically, should we limit
requirements described in the
applicable IGs for actions defined by
PurposeofUse and GeneralPurposeofUse
values associated with purposes
allowed for patient requested restriction
under the HIPAA Privacy Rule? These
value sets include a range of references
that could be used to limit the scope.
For example, one value describes a label
based on a patient choice to participate,
or not, in clinical trials (CLINTRCH). In
addition, which values in the
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
PurposeofUse and GeneralPurposeofUse
value sets would be most appropriate
for the purpose of the patient requested
restriction under the HIPAA Privacy
Rule?
• Should we constrain the
requirements to apply the IGs for only
certain actions described for the
restrictions? Specifically, should we
limit requirements described in the
applicable IGs for actions described
under the RefrainPolicy ValueSet to
only those defined actions relating to
the patient request for restriction use
case? Which values would be most
appropriate for that purpose? For
example, should we focus on actions to
support the value NOATH,
NOCOLLECT, NOINTEGRATE, or
NOLIST? What other values in the
RefrainPolicy ValueSet define actions
that would also be appropriate for the
use case?
• Should we limit requirements
described in the applicable IGs for
actions defined under the
ObligationPolicy ValueSet that are
necessary to implement the patient
request for restriction or individual
choice use case? For example, should
we focus on support for the value
REDACT? What other values would also
be appropriate for the use case? Would
either or both of these proposed
alternatives to constrain the scope of the
HL7 DS4P IGs reduce complexity and
support feasibility for implementation
of the new criterion in § 170.315(d)(14)?
• Are there health IT development
burden considerations associated with
implementation of these alternatives,
including for the certification criteria in
§ 170.315(b) and (g) referenced in the
Privacy and Security Framework in
§ 170.550(h)(3)(iii) and (viii)? Are there
unintended consequences that these
constraints on the proposed criterion in
§ 170.315(d)(14) might place on health
IT developers, patients, clinicians, or
other covered entities using certified
health IT? Are there clear methods by
which we might quantify the
development burden and costs as well
as the potential benefits or future cost
savings for this proposed alternative
constrained version of the proposed
criterion in § 170.315(d)(14)?
iii. Alternate Proposal for Adoption of
Full and Constrained Data Elements
Within the USCDI
We propose and seek comment on an
additional alternative beyond those
referenced above in sections III.C.10.b.i
and III.C.10.b.ii. This additional
alternative would limit the total scope
of data required for certification to the
proposed new criterion in
§ 170.315(d)(14) and the proposed
PO 00000
Frm 00081
Fmt 4701
Sfmt 4702
23825
revisions to the existing criterion in
§ 170.315(e)(1). Under this alternate
proposal, instead of the full scope of
data expressed in the USCDI standards
in § 170.213, as referenced in proposed
§ 170.315(d)(14)(i) and the proposed
revisions to the existing criterion in
§ 170.315(e)(1), certification for these
criteria would apply for only the Patient
Demographics/Information, Clinical
Notes, Medications, and Health Status
Assessments data classes within the
USCDI. We additionally seek comment
on whether some other scope of certain
data classes or data elements would be
most appropriate.
We welcome public comment on
these alternate proposals both
individually and in combination. We
seek comment on whether these
proposed constraints on the scope of the
applicable data would reduce
complexity and support feasibility for
implementation of the new proposed
criterion in § 170.315(d)(14) and the
proposed revisions to the existing
criterion in § 170.315(e)(1). We seek
comment on the health IT development
burden associated with implementation
of the constrained capabilities in
relation to the individual certification
criteria in § 170.315(b) and (g)
referenced in the Privacy and Security
Framework in § 170.550(h)(3)(iii) and
(viii).
We also seek comment on any
unintended consequences that these
constraints on the data in the new
criterion in § 170.315(d)(14) and the
proposed revisions to the existing
criterion in § 170.315(e)(1) might place
on health IT developers, patients,
clinicians, or other covered entities
using certified health IT.
Finally, we seek comment on clear
methods by which we might quantify
the development burden and costs as
well as the potential benefits or future
cost savings for this proposed
alternative to constrain the USCDI
referenced in the proposed criterion in
§ 170.315(d)(14) and the proposed
revisions to the existing criterion in
§ 170.315(e)(1).
c. Alignment With Applicable Law—
Request for Information
ONC certifies capabilities of Health IT
Modules to perform specific functions,
in many circumstances using specific
standards. These are generally restricted
to technical standards and capabilities.
The user of the technology may also
need to comply with certain
requirements established by federal,
state, territory, local or tribal law. Our
intent for proposing a technical means
for patients to request a restriction on
their data is to advance tools that
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
23826
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
support privacy laws, including the
HIPAA Privacy Rule right to request a
restriction of certain uses and
disclosures.319 We emphasize that use
of any future Health IT Module certified
to these proposed requirements would
not, by itself, fully discharge the
obligations under the HIPAA Privacy
Rule of a covered entity to allow an
individual to request a restriction on the
use or disclosure of their PHI for
treatment, payment, or health care
operations or to have policies in place
by which to accept or deny such
requests. Further, use of any such
certified Health Module would not
discharge the obligations of a covered
entity to meet any other requirements
under 45 CFR 164.522. In addition,
there may be other applicable laws that
affect the exchange of particular
information, and those laws should be
considered when developing individual
choice policies.
We seek comment on whether there
are modifications, adjustments,
additions, or restrictions we should
consider for our proposal to better
support privacy workflows under the
HIPAA Privacy Rule:
• Are there modifications,
adjustments, additions, or restrictions
that could support the termination of a
restriction request as described under
§ 164.522(a)(2)? Should such a
capability be a requirement for the
proposed new criterion in
§ 170.315(d)(14)?
• Are there modifications,
adjustments, additions, or restrictions
that could support emergency use or
disclosure of otherwise restricted
information as described under
§ 164.522(a)(1)? Should such a
capability be a requirement for the
proposed new criterion in
§ 170.315(d)(14)? In such instances, how
would the original restriction request be
documented and persisted to prevent
redisclosure or use subsequent to
emergency use or disclosure as
described under § 164.522(a)(1)(iv)?
• Are there modifications that would
better support the documentation of
restrictions as described under
§ 164.522(a)(3)? Are there modifications,
adjustments, additions, or restrictions
we should consider for our proposal to
better support privacy workflows under
other HIPAA Privacy Rule provisions?
For example, are there modifications
that would specifically support covered
entities in implementing protections
based on patient preferences for the
319 HHS Office for Civil Rights. HIPAA ‘‘Right to
Request a Restriction’’: https://www.hhs.gov/hipaa/
for-professionals/faq/right-to-request-a-restriction/
index.html.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
prevention of harm for patients as
allowable under § 164.524(a)(3)? Are
there modifications, adjustments,
additions, or restrictions we should
consider for our proposal to better
support privacy workflows under other
applicable law? For example, are there
modifications that would specifically
support patient preferences for the
privacy of EHI under state laws
restricting disclosure of health
information of minors? Are there
modifications, adjustments, additions,
or restrictions that would specifically
support patient preferences for
applicable laws related to disclosure
and use of EHI related behavioral health
or substance abuse? Are there
modifications, adjustments, additions,
or restrictions that would specifically
support patient preferences for
restrictions on disclosure or use related
to stigmatized care under other state
laws?
In section IV.C.3 of this proposed
rule, we outline a range of questions for
public comment and request
information to specifically consider the
policy implications related to
supporting health IT users’ ability to
segment and selectively display, delay,
or withhold EHI consistent with patient
preferences for information sharing,
applicable law, and other considerations
such as when a delay or other
interference with particular EHI access,
exchange, or use may be reasonable and
necessary under the conditions of an
information blocking exception. We
direct readers to section IV.C.3 for
discussion and questions related to an
illustrative sampling of use cases for
data segmentation and user/patient
access management functionalities. We
also welcome public comment on this
proposal to support patients’ right to
request a restriction of disclosure in the
context of information sharing
requirements under the ONC Cures Act
Final Rule.
11. Requirement for Health IT
Developers To Update Their Previously
Certified Health IT
Section 3001(b) of the PHSA directs
the National Coordinator to conduct the
duties defined in section 3001(c),
including the implementation of a
certification program in section
3001(c)(5) of the PHSA, ‘‘in a manner
consistent with the development of a
nationwide health information
technology infrastructure that allows for
the electronic use and exchange of
information.’’ This includes
considerations for health IT to reduce
costs resulting from inefficiency and
incomplete information, to provide
appropriate information to help guide
PO 00000
Frm 00082
Fmt 4701
Sfmt 4702
medical decisions at the time and place
of care, to improve the coordination of
care, to facilitate a rapid response to
public health threats and emergencies,
and to promote greater efficiencies in
the marketplace. As ONC administers
the Program and adopts new or updated
standards, implementation
specifications, and certification criteria
on behalf of the Secretary under section
3004 of the PHSA, we must also seek to
address these requirements. When the
healthcare industry and healthcare
standards community update or develop
new clinical guidelines, address
emerging public health challenges,
implement new state or local laws
targeting high priority health issues, or
develop new interoperability standards
for enhanced care coordination, ONC
often must also adopt aligned updates to
the standards, implementation
specifications, and certification criteria
applicable in the Program. This is
essential to ensure that certified
capabilities of health IT continue to
support the development of a
nationwide health IT infrastructure.
Previously, such updates were
implemented via an entirely new
‘‘edition’’ of certification criteria. As
described in section III.A of this
proposed rule, while this approach
supported clarity for Program
requirements at a given time, we believe
the burden and rigidity of the ‘‘edition’’
approach render it unsustainable over
the long term. A more modular
approach that can accommodate
changes for specific use cases without
disrupting the entirety of the
marketplace through a wholesale
‘‘edition’’ update is more appropriate to
support an interoperable health IT
infrastructure across a wide range of use
cases (see section III.A of this proposed
rule for a discussion on maintaining a
single set of ‘‘ONC Certification Criteria
for Health IT’’ and discontinuing yearthemed editions). When a health IT
developer voluntarily participates in the
Program, if they intend for their health
IT to be certified and maintain its
certification, then they are committing
to the policies and terms of the Program
as expressed through regulatory
provisions, including the
implementation of any updates to the
criterion or standards as applicable for
each criterion to which they certify a
Health IT Module. Further, the process
of implementing updates for certified
health IT systems must include
providing necessary updates for use in
real world settings as required by the
Real World Testing Condition of
Certification at 45 CFR 170.405.
In the 2015 Edition Proposed Rule, we
clarified our expectation that ONC–
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ACBs render a Health IT Module nonconformant to the certification criteria
in instances where the developer of
certified health IT does not make the
capability available; substantially
restricts or limits its use; or has not
disclosed known material information
about the implementation or use of the
capability (80 FR 16878). Likewise, in
the 2015 Edition Final Rule, we
provided different scenarios and
examples of non-conformities in the
field where certified capabilities are not
functioning properly, including when
due to the failure by the developer of
certified health IT to support the
implementation of appropriate updates
(80 FR 62710).
Subsequently, the Cures Act added to
section 3000 of the PHSA a definition of
‘‘interoperability’’ (at 42 U.S.C. 300jj(9))
with respect to health information
technology (also defined in the PHSA
(42 U.S.C. 300jj(5)) as such health
information technology that: (1) enables
the secure exchange of electronic health
information with, and use of electronic
health information from, other health
information technology without special
effort on the part of the user; and (2)
allows for complete access, exchange,
and use of all electronically accessible
health information for authorized use
under applicable State or Federal
law.320 The Cures Act incorporated the
term ‘‘interoperability’’ into provisions
establishing the Conditions of
Certification under the Program, the
EHR Reporting Program, and
requirements for the HITAC to
recommend a policy framework and
address priority target areas. The Cures
Act also requires that ONC establish
benchmarks for advancing the priority
target areas defined and that the HITAC
develop annual progress reports on
advancing interoperability. The
definitions of interoperability and
health information technology were also
codified by ONC in 45 CFR 170.102.
In this proposed rule, as we move
away from the use of editions to define
timeframes for updating to new and
revised certification criteria (see also
section III.A and specifically Table 1),
we believe it is important to continue to
provide clarity regarding the obligations
of developers who are seeking to certify
health IT and maintain a Health IT
Module’s certification, including, as
applicable, certification to revised
certification criteria and the timely
provision of such technology to their
customers. We are therefore proposing
320 The term ‘‘interoperability,’’ with respect to
health information technology, also means such
health information technology that does not
constitute information blocking as defined in
section 300jj–52(a) (42 U.S.C. 300jj(9)(C)).
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
to incorporate applicable timelines and
expiration dates that will apply for
capabilities and standards updates
within each individual criterion or
standard as appropriate to the criterion
and include specific requirements under
the ‘‘Assurances’’ Condition of
Certification, discussed in detail in the
next section (section III.D of this
proposed rule).
We propose to make explicit in the
introductory text in § 170.315 that
health IT developers voluntarily
participating in the Program must
update their certified Health IT
Modules—including when new
standards and functionality are
adopted—and provide that updated
certified health IT to customers in
accordance with the timelines defined
for a specific criterion or standard
where included, such as via crossreference, in § 170.315. We propose that
health IT developers with health IT
certified to any of the certification
criteria in § 170.315 would need to
update their previously certified Health
IT Modules to be compliant with any
revised certification criterion adopted in
§ 170.315 (please see section III.A of this
proposed rule for the proposed
definition of revised certification
criterion (or criteria)), including any
certification criteria to which their
Health IT Modules are certified that
reference new standards adopted in 45
CFR part 170 subpart B, and capabilities
included in the revised certification
criterion. Health IT developers would
also need to provide the updated heath
IT to customers of the previously
certified health IT according to the
timelines established for that criterion
and any applicable standards. In
addition to supporting the goals of the
Program, we believe this approach will
help to advance interoperability.
Requiring health IT developers who
voluntarily participate in the Program to
update Health IT Modules to revised
certification criteria (including new and
revised standards) can help to advance
capabilities for access, exchange, and
use of EHI for authorized use under
applicable State or Federal law. In
addition, ensuring health IT developers
voluntarily participating in the Program
provide such updates to customers will
help to enable the secure exchange of
EHI with, and use of EHI from, other
health information technology without
special effort on the part of the user. We
believe these proposed timelines also
serve to support clear and transparent
benchmarks for furthering
interoperability throughout the health
IT infrastructure.
As noted previously, the updates to
criteria may include technical
PO 00000
Frm 00083
Fmt 4701
Sfmt 4702
23827
capabilities such as security
enhancements or additional transactions
not previously supported for a criterion.
These updates may also include an
expansion of the data supported by
content, vocabulary, and format
standards to increase the scope of
interoperable EHI. For example, as new
data elements are standardized, updates
to criteria may help to incorporate these
data elements into clinical systems in an
interoperable manner. Such
advancement could be in response to an
emergent need such as a public health
response, but it may also be for
commonly used information that is
essential to care but for which
representation via standard vocabularies
has lagged behind. One such example is
the inclusion of functional status,
disability status, and mental or
cognitive status in the USCDI v3.321
These data elements are essential for
long term and post-acute care, but
without consistent standards for
representation of this information, they
were often included in non-computable
formats or excluded from health
information exchange. The adoption of
USCDI v3 and its incorporation into
certification criteria through updates to
those criteria, as proposed in this rule,
means that certified health IT systems
would be able to support representation
of this health information in a
standardized computable format, if
those proposals are finalized. Updating
current systems to incorporate these
data elements and providing updated
certified health IT to customers would
allow users of certified health IT to
begin to access, exchange, and use such
data without special effort. Over the
long term, this advancement of
interoperability for certified health IT
systems may also have a positive impact
on the availability of this essential data
and the capability to access, exchange,
and use this data across a nationwide
health IT infrastructure—including for
purposes not yet specifically supported
by certified health IT such as clinical
research.
In the ONC Cures Act Final Rule, we
discussed how we expected developers
to make technology updates available to
their customers (see, for example, 85 FR
25665) in relation to the 2015 Edition
Cures Update. We stated that health IT
developers would have until the
applicable deadline to make technology
certified to these updated criteria
available to their customers, and during
this time developers may continue
supporting technology certified to the
321 USCDI version 3 Health Status Assessments
Data Class: https://www.healthit.gov/isa/uscdi-dataclass/health-status-assessments#uscdi-v3.
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
23828
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
prior version of certification criteria for
use by their customers. We further
noted that customers may continue to
use the certified health IT they had
available to them and can work with
their developers to implement any
updates in a manner that best meets
their needs (85 FR 25665).
We also included a requirement to
‘‘provide’’ customers with updated
Health IT Modules as a Maintenance of
Certification requirement (e.g.,
§ 170.405(b)(3)) for the Real World
Testing Condition of Certification
requirement (§ 170.405(a)) for certain
criteria updated in the 2015 Edition
Cure Update and the EHI Export
certification criterion in the Assurances
Condition of Certification
(§ 170.402(b)(2)). Subsequent to the
ONC Cures Act Final Rule, through
correspondence and public forums,
health IT developers and the healthcare
community described differences of
opinion regarding whether there is a
meaningful difference between ‘‘make
available’’ and ‘‘provide’’ in practical
application and requested that ONC
specify only one of these terms. In the
introductory text in § 170.315 we
propose in this rule, we propose to use
only the term ‘‘provide’’ without the
inclusion of ‘‘make available.’’ We also
propose that ‘‘provide’’ does not imply
that the Health IT Module must be in
production use across all customers.
Instead, we propose that to ‘‘provide’’
the product means the developer must
do more than make the product
available and there must be
demonstrable progress toward
implementation in real world settings.
We propose to maintain the prior
approach where a Health IT Module
may be certified to either the existing
criterion or the revised certification
criterion until the end of the deadline,
so that during the interim period
existing customers may continue to use
the certified technology they have
available to them and can work with
their developers to implement updates
in a manner that best meets their needs.
Finally, as with the 2015 Edition Cures
Update, in order to support effective
communication of the updates, we
would implement a practical approach
to facilitate transparency using the
Certified Health IT Product List
(CHPL),322 which is the tool that health
care providers and the general public
may use to identify the specific
certification status of a certified health
IT product at any given time, to explore
any certification actions for a product,
and to obtain a CMS Certification ID for
322 ONC Certified Health IT Product List: https://
chpl.healthit.gov.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
a product, which is used when
participating in some CMS programs.
We note that historically, CMS has
included additional guidance for such
program participants within CMS
proposed or final rules (see, for
example, 85 FR 84818–84828).
Consistent with section 3006 of the
PHSA, we note that under this proposed
rule, a developer of certified health IT
would not be required to provide
updated technology to any customer
that elected to decline the update for
any reason. Such reasons might include
a customer choosing to discontinue use
of a specific Health IT Module or
product, or to no longer participate in
HHS programs that require the use of
certified health IT. We note that in such
cases, while the Health IT Module may
still operate, it would no longer be
certified and may no longer meet
program requirements for HHS
programs requiring the use of certified
health IT. Specifically, we propose that
for all revised certification criteria in
§ 170.315, a developer of certified health
IT shall update their certified health IT
to such criteria and provide these
updates to their customers in
accordance with the dates identified for
each revised certification criterion,
including for standards referenced by
the criteria in accordance with the dates
identified for each applicable standard
in 45 CFR part 170 subpart B.
As mentioned above, in section III.D
of this proposed rule, we describe our
proposal for Condition and Maintenance
of Certification requirements under the
Assurances Condition of Certification
for health IT developers of certified
health IT. By doing so, we propose both
the technical requirements for
conformance to the certification
criterion and the behavioral
requirements for conformance to the
condition in the Program. As described
in section III.D, this Condition of
Certification provides specified periods
of time to ‘‘update and provide’’
certified health IT. We note that in some
cases the timelines and expiration dates
for applicable capabilities and standards
defined for a certification criterion in
§ 170.315 may be longer or shorter than
the standard period of time defined in
the proposed condition of certification.
This difference is due to our analysis of
the urgency of the use case, the
readiness for the capability or standard,
and the current use of such capability or
standard by the healthcare industry,
including consideration of dependent
requirements across HHS programs.
We welcome comments on this
proposal.
PO 00000
Frm 00084
Fmt 4701
Sfmt 4702
D. Assurances Condition and
Maintenance of Certification
Requirements
Section 4002(a) of the Cures Act
requires that a health IT developer, as a
Condition and Maintenance of
Certification under the Program, provide
assurances satisfactory to the Secretary
that such developer, unless for
legitimate purpose(s) as specified by the
Secretary, will not take any action that
constitutes information blocking as
defined in section 3022(a) of the PHSA
or any other action that may inhibit the
appropriate exchange, access, and use of
EHI. In the ONC Cures Act Final Rule,
we adopted specific Conditions and
Maintenance of Certification
requirements for health IT developers of
certified health IT consistent with this
authority (see also ONC’s
implementation approach for section
4002 as discussed in the Cures Act Final
Rule at 85 FR 25718).
The Conditions of Certification that
were codified focused on health IT
developers providing assurances that:
their health IT certified under the
Program conforms to the full scope of
the certification criteria; they would not
take any action that could interfere with
a user’s ability to access or use certified
capabilities for any purpose within the
full scope of the technology’s
certification; and, for those with a
certified Health IT Module that is part
of a health IT product that electronically
stores EHI, they would certify to the EHI
Export certification criterion. These
Conditions of Certification, and in some
instances accompanying Maintenance of
Certification requirements, provide
assurances to the Secretary, and by
default to customers and users of
certified health IT, that health IT
developers are not taking actions that
could potentially constitute information
blocking, or at the least, inhibit the
appropriate exchange, access, and use of
EHI.
In this proposed rule, we propose to
establish a new Condition of
Certification and accompanying
Maintenance of Certification
requirements under the Assurances
Condition of Certification. These new
requirements would serve to provide the
assurances to the Secretary that
Congress sought and further clarify
Program requirements that are
established under the authority
provided in section 3001(c)(5) of the
PHSA and discussed in detail above in
section III.C.11 (‘‘Requirement for
Health IT Developers to Update their
Previously Certified Health IT’’).
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
1. Condition of Certification
We propose in § 170.402(a)(5), that, as
a Condition of Certification, a health IT
developer must provide an assurance
that it will not inhibit a customer’s
timely access to interoperable health IT
certified under the Program. To support
this assurance, we propose
accompanying Maintenance of
Certification requirements, which are
discussed in detail below. The
Maintenance of Certification
requirements define the scope of this
proposed Condition of Certification and
provide clarity in terms of what it
would mean to take the action of
‘‘inhibiting,’’ what constitutes ‘‘timely
access,’’ and what is ‘‘interoperable
health IT certified under the Program.’’
Interoperable health IT is an
underpinning of the Program and
particularly the conditions of
certification found in the Cures Act and
implemented in 45 CFR part 170
subpart D. Congress established support
for health IT interoperability beginning
with the authority provided in the
HITECH Act to adopt standards
(including implementation
specifications and certification criteria)
and establish the Program. It continued
to emphasize health IT interoperability
through requiring the establishment of
metrics to determine the extent of
‘‘widespread interoperability’’ in the
Medicare Access and CHIP
Reauthorization Act (MACRA) (section
106(b)(1)). Ultimately, Congress went on
to define interoperability with respect to
health IT in the Cures Act, including
incorporating the information blocking
definition within the interoperability
definition. Congress further
incorporated or specifically referenced
the interoperability definition where it
required, in 42 U.S.C. 300jj–11(c)(5)(D),
the Secretary to establish certain
Conditions of Certification, including
the ‘‘Communications,’’ ‘‘Real World
Testing,’’ and ‘‘Insights’’ Conditions of
Certification.
With this proposed rule, we propose
that, for purposes of certification and
the maintenance of such certification
under the Program, a health IT
developer would need to provide an
assurance that its health IT is certified
to the most recently adopted
certification criteria and such certified
health IT is made available to its
customers in a timely manner (see
below and section III.C.11). These
actions are essential because
certification criteria, and in particular
revised certification criteria (as defined
in this proposed rule), include
standards, implementation
specifications, and capabilities that
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
support and improve interoperability as
that term is defined by the Cures Act
and incorporated in 45 CFR part 170.
Since the inception of the Program,
ONC has updated certification criteria to
include the most recent versions of
standards and implementation
specifications that most appropriately
support and improve interoperability at
the time of adoption. This is because as
standards and implementation
specifications evolve, they, by their very
nature, improve interoperability by
allowing for more complete access,
exchange, and use of all electronically
accessible health information. Further,
the interoperability definition also
focuses, in part, on the secure exchange
and use of EHI from other health IT
without special effort on the part of the
user. The Assurances Condition is an
important piece to supporting and
achieving these goals because it seeks
assurances from health IT developers
that they will not take any actions to
inhibit the appropriate access,
exchange, and use of EHI.
As a more practical and concrete
implementation of the Assurances
Condition and of supporting
interoperability, it is important for
users, particularly customers of
developers of certified health IT, to have
health IT certified to the most recent
standards and capabilities. Otherwise, a
health IT developer voluntarily
participating in the Program would be
undermining interoperability and
making it more difficult for customers of
health IT developers of certified health
IT to access, exchange, and use EHI as
updated standards (e.g., USCDI, C–CDA,
and FHIR) make more EHI readily
accessible for electronic access,
exchange, and use. Similarly,
capabilities such as those found in the
EHI Export and Electronic Case
Reporting certification criteria improve
the ability for health IT to allow
complete access, exchange, and use of
all electronically accessible health
information.
2. Maintenance of Certification
Requirements
We first propose, in § 170.402(b)(3)(i),
that a health IT developer must update
a Health IT Module, once certified to a
certification criterion adopted in
§ 170.315, to all applicable revised
certification criteria, including the most
recently adopted capabilities and
standards included in the revised
certification criterion. For clarity,
‘applicable revised certification criteria’
would be those certification criteria to
which the Health IT Module was
previously certified that meet the
definition of a revised certification
PO 00000
Frm 00085
Fmt 4701
Sfmt 4702
23829
criterion as proposed in this rule (please
see section III.A of the preamble and
‘‘revised certification criterion
(criteria)’’ under § 170.102 of the
regulation text for the proposed
definition of revised certification
criterion/criteria). Equally important,
and, as stated above, to meet the
proposed requirement, the Health IT
Module would need to be updated to
the most recently adopted capabilities
and standards included in the revised
certification criterion. For example, if
the adopted revised certification
criterion referenced new standards that
will eventually replace the current
standards referenced in the criterion,
then the Health IT Module would need
to be updated to the new standards
before the end of the established
timeframe for updating the Health IT
Module. Second, we propose, in
§ 170.402(b)(3)(ii), that a health IT
developer must provide all Health IT
Modules certified to a revised
certification criterion to its customers of
such certified health IT. A customer, for
this purpose, would be any individual
or entity that has an agreement to
purchase or license the developer’s
certified health IT. This proposed
requirement would be more broadly
applicable than for ‘‘updated’’ Health IT
Modules alone, as discussed via
illustration of the proposed timeliness
requirements below.
We propose separate ‘‘timely access’’
or ‘‘timeliness’’ Maintenance of
Certification requirements for each of
the two proposed Maintenance of
Certification requirements above that
would dictate by when a Health IT
Module must be updated to revised
certification criteria, including the most
recently adopted capabilities and
standards; and by when a Health IT
Module certified to a revised
certification criterion, including the
most recently adopted capabilities and
standard, must be provided to the health
IT developer’s customers. We propose,
in § 170.402(b)(3)(iii), that unless
expressly stated otherwise in 45 CFR
part 170, a health IT developer must
complete the proposed ‘‘update’’ and
‘‘provide’’ requirements according to the
following proposals. First, we propose,
in § 170.402(b)(3)(iii)(A), that a health IT
developer must update and provide a
Health IT Module by no later than
December 31 of the calendar year that
falls 24 months after the effective date
of the final rule adopting the revised
certification criterion or criteria. This
would mean that, depending on the day
when the final rule effective date fell, a
health IT developer would have
between two years and potentially up to
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
23830
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
almost three years (e.g., where a final
rule is effective in January or February)
to update a Health IT Module. Second,
we propose that the ‘‘provide’’
requirement would need to be
completed within this same timeframe
for customers of the previous certified
health IT that must be updated under
the ‘‘update’’ proposal. However, we
propose deviations to this timeframe
because the ‘‘provide’’ requirement
applies to all Health IT Modules that are
certified to a criterion that meets the
revised certification criterion definition
(i.e., not just health IT previously
certified to a ‘prior version’ of a revised
certification criterion) and to new
customers of health IT certified to
revised certification criteria.
To illustrate when and how the
‘‘provide’’ and ‘‘timeliness’’
requirements would be applicable to a
health IT developer beyond the
‘‘update’’ scenario recited above, we
offer the following explanations. If a
developer ‘‘expanded the scope’’ of a
certified Health IT Module to include
certification to a revised certification
criterion, then the ‘‘provide’’ condition
would be applicable. In such cases, all
of the health IT developer’s customers
would be considered ‘‘new’’ customers
for purposes of the Health IT Module
certified to the revised certification
criteria criterion as the capabilities are
new to them. If a health IT developer
new to the Program, presumably with
all ‘‘new’’ customers (again, any
certified capability would be new to
them), certified a Health IT Module to
a revised certification criterion after the
effective date of the final rule adopting
the revised certification criterion, but
during the period when both the ‘‘new’’
and ‘‘old’’ standards or capabilities, or
both, are referenced within a revised
certification criterion, the ‘‘provide’’
condition would be applicable.
Similarly, if any health IT developer
certified a Health IT Module to a revised
certification criterion at a time when
only the most recently adopted
capabilities and standards are available
for certification to the revised
certification criterion, then the
‘‘provide’’ requirement must be met.
In all the above circumstances, we
propose that health IT certified to
revised certification criteria must be
provided to all customers, including
new customers (i.e., new to the
capabilities), of health IT developers
under the Program within reasonable
timeframes. In this regard, we propose
precisely the following timeframes:
Unless expressly stated otherwise in
45 CFR part 170, a health IT developer
must complete the ‘‘update’’ and
‘‘provide’’ requirements:
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
• By no later than December 31 of the
calendar year that falls 24 months after
the effective date of the final rule
adopting the revised certification
criterion or criteria; or
• If the developer obtains new
customers of health IT certified to the
revised certification criterion after the
effective date of the final rule adopting
the revised certification criterion or
criteria, then the health IT developer
must provide the health IT certified to
the revised certification criterion to
such customers within whichever of the
following timeframe that expires last:
Æ By no later than December 31 of the
calendar year that falls 24 months after
the effective date of the final rule
adopting the revised certification
criterion or criteria; or
Æ No later than 12 months after the
purchasing or licensing relationship has
been established between the health IT
developer and the new customer for the
health IT certified to the revised
certification criterion.
The proposed above timeframes
would offer health IT developers, at a
minimum, no less than 12 months to
provide health IT certified to revised
certification criteria to new customers
(i.e., customers new to the capability).
Based on the proposed timeframes, a
health IT developer has the ability to
plan both the certification to revised
certification criteria and the execution
of contracts and agreements with new
customers to ensure that it can meet the
above timelines for new customers.
However, by way of example via a
proposal in this proposed rule, the
‘‘Unless expressly stated otherwise in
this part’’ proposed in
§ 170.402(b)(3)(iii) would override the
proposed timelines (e.g., 24 months or
more in some cases) for updating and
providing health IT certified to USCDI
v3. We have proposed (see section
III.C.1) to add the newly released USCDI
v3 to the USCDI standard in
§ 170.213(b) and that the adoption of the
current USCDI v1 standard would
expire on January 1, 2025.
This USCDI v3 proposal not only
would override the ‘‘24 month or more’’
timelines, but it also illustrates the
importance of the ‘‘update and provide’’
proposals in this rule that support
interoperability. The adoption of USCDI
v3 would expand the data required to be
accessible through certified health IT
beyond the data elements included in
USCDI v1 and thus would increase the
amount of data available to be accessed,
exchanged, and used for patient care.
However, if a health IT developer with
certified health IT inhibited its
customers’ timely access to health IT
certified to USCDI v3 (i.e., by January 1,
PO 00000
Frm 00086
Fmt 4701
Sfmt 4702
2025), then the more than 40 additional
data elements included in USCDI v3
would not be among the data available
to be accessed, exchanged, and used by
the health IT developer’s customers; and
a significant amount of EHI may not be
shared. We welcome comments on the
proposed approach and timelines.
If a health IT developer did not meet
the proposed update or provide
requirements, including the timeliness
requirements, then they would not only
violate these requirements but also the
proposed new condition by inhibiting a
customer’s timely access to
interoperable health IT certified under
the Program. As such, the developer
would have committed nonconformities under the Program, unless
the health IT developer did so for a
permissible reason as described in
section III.C.11 (see, for example, a
developer of certified health IT would
not be required to provide updated
certified health IT to any customer that
elected to decline the update for any
reason; or a health IT developer’s
exercising their ability to reduce the
scope of a certification while not under
ONC–ACB surveillance or ONC direct
review).
To note, we propose a conforming
revision to the Real World Testing
Maintenance of Certification
requirements in § 170.405(b) in that we
propose to remove most of the ‘‘update
and provide’’ requirements currently
found in this section because they are
moot based on the publication date of
this proposed rule and the subsequent
publication of a final rule for this
proposed rule (e.g., many timelines
expired on December 31, 2022).
E. Real World Testing—Inherited
Certified Status
In the ONC Cures Act Final Rule, we
finalized requirements in § 170.405(a)
that a health IT developer with Health
IT Module(s) certified to § 170.315(b),
(c)(1) through (3), (e)(1), (f), (g)(7)
through (10), and (h) must: successfully
test the real world use of the technology
for interoperability in the type(s) of
setting(s) in which such technology
would be marketed. We established in
§ 170.405(b) that each developer’s
annual real world testing plan is
required to be published by December
15 of a given year and would need to
address all of the developer’s Health IT
Modules certified to criteria listed in
§ 170.405(a) as of August 31 of that year
(85 FR 25769). We also finalized that
this annual real world testing plan
would pertain to real world testing
activities to be conducted in the year
following the December 15 plan
publication due date, with an annual
E:\FR\FM\18APP2.SGM
18APP2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
real world testing results report to be
published by March 15
(§ 170.405(b)(2)(ii) of the year following
the year in which the real world testing
is conducted) (85 FR 25774).
However, many health IT developers
update their Health IT Module(s) on a
regular basis, leveraging the flexibility
provided through ONC’s Inherited
Certified Status (ICS).323 Because of the
way that ONC issues certification
identifiers, this updating can cause an
existing certified Health IT Module to be
recognized as new within the Program.
Regular updating, especially on a
frequent basis such as quarterly or semiannually, creates an anomaly that could
result in existing certified Health IT
Modules being inadvertently excluded
from the real world testing reporting
requirements.
In order to ensure that all developers
test the real world use of their
technology as required, we propose to
eliminate this anomaly by requiring
health IT developers to include in their
real world testing results report the most
recent version of those Health IT
Module(s) that are updated using
Inherited Certified Status after August
31 of the year in which the plan is
submitted. This will ensure that health
IT developers fully test all applicable
Health IT Modules as part of their real
world testing requirements. Please note,
this proposal would prevent a developer
from avoiding, or delaying conducting
or reporting real world testing
specifically on the updated versions of
Modules certified through Inherited
Certification Status after August 31 of a
given year. This proposal would not
change the underlying requirement that
a developer with one or more Health IT
Modules certified to any criterion listed
in § 170.405(a) must plan, conduct, and
report on real world testing of each of
those Health IT Modules on an annual
basis. We seek comment on this
proposal.
ddrumheller on DSK120RN23PROD with PROPOSALS2
F. Insights Condition and Maintenance
of Certification
1. Background and Purpose
The Cures Act specified requirements
in section 4002(c) to establish an
Electronic Health Record (EHR)
Reporting Program to provide
transparent reporting on certified health
IT in the categories of interoperability,
usability and user-centered design,
security, conformance to certification
testing, and other categories, as
appropriate to measure the performance
of EHR technology. Data collected and
323 https://www.healthit.gov/sites/default/files/
policy/public_applicability_of_gap_certification_
and_inherited_certified_status.pdf.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
reported would address information
gaps in the health IT marketplace and
provide insights on the use of certified
health IT.
To develop the EHR Reporting
Program, ONC contracted with the
Urban Institute and its subcontractor,
HealthTech Solutions, to engage the
health IT community for the purpose of
identifying measures that developers of
certified health IT would be required to
report on as a Condition and
Maintenance of Certification under the
Program. The Urban Institute published
a final report in February 2022, which
included a recommended set of
measures for the EHR Reporting
Program. ONC conducted additional
research and expert consultations to
refine the recommended set of measures
in the Urban Institute’s final report.
Based on the additional research and
expert consultations, we propose in this
proposed rule, to modify the measures
that the Urban Institute developed,
consistent with section 3009A(a)(4) of
the PHSA. We propose our modified
versions of the measures in this
proposed rule and solicit comment on
both the underlying measures and our
proposed modifications to them. In
other words, our proposals with respect
to each measure reflect how we propose
to modify the set of measures in the
Urban Institute’s final report.
For clarity purposes, we intend to
refer to the Condition and Maintenance
of Certification associated with the
‘‘EHR Reporting Program’’ as the
‘‘Insights’’ Condition and Maintenance
of Certification (also referred to as the
‘‘Insights Condition’’) throughout this
proposed rule. We believe this
descriptive name captures a primary
policy outcome of this requirement.
2. Insights Condition—Proposed
Measures
The proposed measures associated
with the Insights Condition described in
this proposed rule relate to and reflect
the interoperability category in section
3009A(a)(3)(A)(iii) of the PHSA. They
relate to four aspects or areas of
interoperability, which we refer to as
‘‘areas’’ throughout this proposed rule:
individuals’ access to EHI, public health
information exchange, clinical care
information exchange, and standards
adoption and conformance, as discussed
in further detail below. The majority of
our proposed measures are data points
derived from certified health IT systems.
The proposed measures generally
consist of numerators and denominators
that will help generate metrics (e.g.,
percent across a population), which are
further detailed in each proposed
measure, but measures can also serve as
PO 00000
Frm 00087
Fmt 4701
Sfmt 4702
23831
standalone values. Note that in some
cases ONC plans to generate multiple
metrics by using different denominators
for the same numerator or using
different numerators with the same
denominator. This approach would
allow ONC to generate a variety of
metrics. In one case, the measure is a
simple attestation. For each measure, we
have included information on the
rationale for proposing the measure,
proposed numerators and denominators,
and key topics for comment.
As mentioned above, ONC contracted
with the Urban Institute and its
subcontractor, HealthTech Solutions, to
engage the health IT community for the
purpose of identifying measures that
developers of certified health IT would
be required to report on as a Condition
and Maintenance of Certification under
the Program. Identification of developer
measures began with a broad literature
and market scan, including market
research discussions with subject matter
experts, to identify potential measures
for the categories specified in the Cures
Act. The approach for identifying
measures included several
considerations, such as priority
interoperability functions, relevance to
ONC policy priorities and broader
interests, measures reflecting
information that ONC cannot obtain
without regulation, and efforts that are
not duplicative of other data collection.
The Urban Institute published draft
measures for public feedback. ONC
charged the HITAC to review the draft
measures and provide recommendations
to the National Coordinator on the draft
measures. Both the HITAC and public
were asked to provide feedback on
topics such as frequency of reporting;
data granularity; appropriateness of
look-back periods; clarity of definitions
and measurement; benefit of measures
relative to burden of collecting data;
how to address potential interpretation
challenges; potential burden on users of
certified health IT; potential burden on
small or start up developers of certified
health IT; and value of measures to
provide insights on interoperability. The
HITAC transmitted recommendations to
the National Coordinator on September
9, 2021. The Urban Institute’s public
feedback period ended on September
14, 2021.
After the public feedback period
ended, the Urban Institute conducted
feasibility testing with targeted
respondents to assess the extent to
which developers of certified health IT
could produce and report on
prospective measures. Specifically, the
feasibility testing focused on
understanding developers’ ability to
produce data required to calculate the
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
23832
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
measures from existing technology;
understanding anticipated costs of
preparing to produce data required to
calculate the measures; relative burden
of individual measures; and potential
barriers to measure reporting.
The Urban Institute published a final
report in February 2022, which
included a recommended set of
measures. The Urban Institute
considered public feedback, HITAC
recommendations, and feasibility testing
with developers in determining the
recommended set of measures included
in the Urban Institute’s final report.
ONC conducted additional research to
modify the recommended set of
measures in the Urban Institute’s final
report. The proposed measures included
in this proposed rule were modified to
reduce ambiguities and to address
potential costs and burdens. Consistent
with section 3009A(a)(3)(C) of the
PHSA, we propose to modify the
measures the Urban Institute developed,
as well as implement minimum
reporting qualifications designed to
ensure that small and startup developers
are not unduly disadvantaged by the
proposed measures.
We note that the following proposed
measures are for the initial Insights
Condition requirements. In future
rulemaking, we anticipate proposing
additional measures for future iterations
of the Insights Conditions and
Maintenance of Certification
requirements under the Program.
Through this first set of proposed
measures, ONC intends to provide
insights on the interoperability category
specified in the Cures Act (as codified
at section 3009A(a)(3)(A)(iii) of the
PHSA). We intend to explore the other
Cures Act categories (security, usability
and user-centered design, conformance
to certification testing, and other
categories to measure the performance
of EHR technology) in future
requirements.
We seek feedback on how we may
further refine the proposed measures to
improve feasibility, clarity, and
potential insights gained. We welcome
comments from the public on the
proposed measures and overall Program
processes related to the Insights
Conditions and Maintenance of
Certification. As stated above, the
following describes our rationale for
proposing the measure, proposed
numerators and denominators, and key
topics for comment.
We also have explored various
pathways on how to make it easier for
the public to view and comment on the
detailed technical specifications
supporting the proposed measures.
While the substantive requirements for
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
each measure are defined in this
proposed regulation, we have
determined that measure specification
sheets would be a logical and accessible
method for the public to also review and
provide comment on the technical
specifications supporting those
requirements. This is consistent with
the approach used by other HHS
programs to solicit public feedback
related to measure technical
specifications (e.g., CMS Electronic
Clinical Quality Measures (CMS
eCQMs)). These methods allow for more
effective review of the technical detail
including supporting public comment
on those specifications in a transparent
manner. For more details and to provide
comment on the technical specifications
for measure calculation for the proposed
measures, please consult the measure
specification sheets available at
www.healthIT.gov/NPRM. We welcome
comments on the measure specifications
sheets and note that such public
comment will be used to further refine
the technical specifications should we
finalize our proposals. We intend to
keep these measure specification sheets
up-to-date based on public feedback
through a predictable and transparent
process.
Insights Condition Cross-Cutting
Requirements
While the following proposed
measures, as detailed below, require
unique and specified data points, there
are certain requirements that we
propose to apply across multiple
measures, including but not limited to:
(1) data submitted by health IT
developers would be provided and
aggregated at the product level (across
versions); (2) health IT developers
would provide documentation related to
the data sources and methodology used
to generate these measures; and (3)
health IT developers may also submit
descriptive or qualitative information to
provide context as applicable. The
Cures Act specifies, per section
3009A(b) of the PHSA, that as a
Condition of Maintenance of
Certification, a health IT developer shall
submit responses to the criteria
developed with respect to all certified
technology offered by such developer.
Due to the specified requirements of the
proposed measures, we believe it is
reasonable to expect health IT
developers, as part of their responses, to
provide documentation used to generate
the proposed measures for more
accurate and complete data calculation.
Overall, the documentation should help
ensure the data is interpreted correctly.
Thus, the documentation related to the
data sources and methodology would
PO 00000
Frm 00088
Fmt 4701
Sfmt 4702
include the types of data sources used,
how the measure was operationalized
(e.g., any specific definitions), any
assumptions about the data collected,
information on the providers or
products that are included/excluded
from the numerators and denominators,
and a description about how the data
was collected. ONC would use the
measure data submitted by health IT
developers to calculate the metrics (e.g.,
percentages and other related statistics).
We intend that developers of certified
health IT would submit this information
to an independent entity, per statutory
requirements in section 3009A(c) of the
PHSA, as part of the implementation of
the Insights Condition, which we
discuss later in this section of the
preamble.
For measures where patient
encounters are relevant, we propose the
definition of an encounter should be
based on the National Committee for
Quality Assurance (NCQA) outpatient
value set and SNOMED CT inpatient
encounter codes. For outpatient codes,
developers should use NCQA’s
Outpatient Value Set.324 325 For inpatient
codes, developers should use SNOMED
CT codes 4525004, 183452005,
32485007, 8715000, and
448951000124107.326 Listed below is a
description of each SNOMED CT code:
• Emergency department patient visit
(procedure)—4525004
• Emergency hospital admission
(procedure)—183452005
• Hospital admission (procedure)—
32485007
• Hospital admission, elective
(procedure)—8715000
• Admission to observation unit
(procedure)—448951000124107
We selected these value sets because
they were recommended by HITAC 327
and were also recommended as part of
Urban Institute’s final report.328 We
seek comment on whether to define
encounters in this manner, or include
any type of visit (e.g., all encounters) in
324 See: 2022 Quality Rating System Measure
Technical Specifications. Published October 2021.
https://www.cms.gov/files/document/2022-qrsmeasure-technical-specifications.pdf.
325 NCQA’s Outpatient Value Set is available with
a user ID and login at https://store.ncqa.org/my2021-quality-rating-system-qrs-hedis-value-setdirectory.html; or https://vsac.nlm.nih.gov/
valueset/expansions?pr=all OID:
2.16.840.1.113883.3.464.1003.101.12.1087.
326 Available for search at https://www.findacode.
com/.
327 https://www.healthit.gov/sites/default/files/
page/2021-10/2021-09-09_EHRRP_TF_2021__
HITAC%20Recommendations_Report_signed_
508.pdf.
328 https://www.urban.org/sites/default/files/
publication/105427/electronic-health-record-ehrreporting-program-developer-reportedmeasures.pdf.
E:\FR\FM\18APP2.SGM
18APP2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
the measure denominator. Additionally,
we seek comment on alternative
approaches to measuring encounters.
Other shared requirements relate to
similar sets of denominators across
some of the measures. This should
reduce burden associated with the
measures. For example, the number of
encounters during a reporting period is
used as a denominator for the
individual access to electronic health
information measure, the immunization
measures, and the clinical exchange
measures.
We refer readers to section III.F.4 of
this preamble below for a discussion of
the reporting period, reporting
submission process, and other reporting
requirements, that apply across
measures associated with the Insights
Condition’s requirements.
ddrumheller on DSK120RN23PROD with PROPOSALS2
Measurement Area: Individual Access to
Electronic Health Information
A number of federal policies have
sought to increase individuals’ access to
their EHI. In 2014, CMS’ EHR Incentive
Programs, supported by the Program,
required participating hospitals and
eligible health care providers to adopt
certified EHR technology with
capabilities that enable individuals to
electronically view, download, and
transmit their health information, which
was largely implemented via a patient
portal.329 330 The ONC Cures Act Final
Rule (85 FR 25642) set forth policies to
make EHI more easily available by
providing a way for certified health IT
to include secure, standards-based APIs
that enable individuals to access and
better manage their health information
using health applications (apps).
Currently, individuals primarily view
their EHI through a smartphone health
app that is directly associated with their
patient portal.331 Patient portals and
their associated apps can be offered by
a health care provider (e.g., the
clinician’s office or a hospital) or
through the developer of the certified
health IT the health care provider uses.
A number of studies have shown that
patient engagement with EHI—such as
through the use of patient portals—can
help patients make informed decisions
329 U.S. Department of Health and Human
Services. Medicare and Medicaid Programs:
Electronic Health Record Incentive Program—Stage
2. 2012 Sep. Available from: https://
www.govinfo.gov/content/pkg/FR-2012-09-04/pdf/
2012-21050.pdf.
330 Office of the National Coordinator for Health
Information Technology. Certification of Health IT.
View, download, and transmit to 3rd party.
Available from: https://www.healthit.gov/testmethod/view-download-and-transmit-3rd-party.
331 https://www.healthit.gov/data/data-briefs/
individuals-access-and-use-patient-portals-andsmartphone-health-apps-2020.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
about their healthcare, facilitate
communication with health care
providers, improve adherence to
medications, and lead to better health
outcomes.332 333 334
Given the national efforts made to
advance the use of EHI with the goal of
enhancing patient engagement and
improving health outcomes, it is
important to monitor the uptake and
usage of EHI by individuals. ONC has
largely relied on national surveys 335 to
track progress in individuals’ ability to
access their health information using
portals and apps. These surveys have
provided insights into hospitals’ ability
to provide individuals with the
capability to use portals and apps to
manage their EHI, and subsequently
individuals’ self-reported use of these
tools. However, these surveys have
several limitations in the insights that
they provide. Surveys of hospitals only
provide insights on the capabilities to
support individuals’ access to EHI
through portals and apps, rather than
provide data on whether patients use
those capabilities, which is critical to
monitoring the success of ONC’s and
other efforts to increase patient
engagement with EHI. Further, national
surveys of physicians may not provide
a complete picture of capabilities to
support individuals’ access to their EHI,
as some physicians may not be
knowledgeable about such capabilities.
For example, in the 2019 National
Electronic Health Records Survey,336 a
sizable percentage of office-based
physicians indicated they do not know
whether their health IT system enables
their patients to view, download, or
transmit their online medical records.
These surveys also rely on self-reporting
rather than using administrative data on
the actual use of these functionalities.
Lastly, patient surveys have largely
examined the use of patient portals and
apps directly associated with these
portals but have had difficulty
developing questions that provide
332 Dendere R, Slade C, Burton-Jones A, Sullivan
C, Staib A, Janda M. Patient portals facilitating
engagement with inpatient electronic medical
records: a systematic review. Journal of Medical
Internet Research. 2019 Apr 11;21(4):e12779.
333 Shorter Hospital Stays Associated with Patient
Portal Use. Epic Research. (November 17, 2021).
Retrieved from: https://epicresearch.org/articles/
shorter-hospital-stays-associated-with-patientportal-use.
334 James J. Patient engagement. Health Affairs
Health Policy Brief. 2013 Feb 14;14(10.1377).
335 https://www.healthit.gov/data/data-briefs/
hospital-capabilities-enable-patient-electronicaccess-health-information-2019.
336 https://www.cdc.gov/nchs/data/nehrs/
2019NEHRS-PUF-weighted-estimates-508.pdf.
PO 00000
Frm 00089
Fmt 4701
Sfmt 4702
23833
insights into the access and use of thirdparty apps by individuals.337
Recently, third-party apps have
emerged as an alternative method for
individuals to view and manage their
EHI. These apps are considered ‘‘thirdparty’’ because they are not directly
associated with a health care provider or
the developer of the provider’s certified
health IT, but instead are developed and
marketed by an outside software
developer. Some third-party apps
permit patients to view their EHI using
certified API technology (as defined in
§ 170.404(c)) that integrates the app
with information in the health care
provider’s certified health IT using the
Health Level Seven (HL7®) Fast
Healthcare Interoperability Resources
(FHIR®) standard, HL7 SMART
Application Launch Framework and
other associated standards and
implementation specifications.
Given the different access methods
that now exist, we propose an
individuals’ access to their EHI measure
(as further discussed below) to require
developers of certified health IT to
report on the different methods
individuals use to access their health
information. This proposed measure
would provide more detailed insights
into the implementation and use of this
capability by individuals, including
whether and to what extent individuals
are using third-party apps to access their
EHI. We also seek to differentiate
between individuals who access their
EHI using these methods who had an
encounter during the reporting period
from those that did not have an
encounter during the reporting period,
as this differentiation would provide
insights into usage for other
convenience-oriented reasons (e.g.,
travel) that are not necessarily driven by
a healthcare encounter.
Individuals’ Access to Electronic Health
Information Supported by Certified API
Technology Measure
We propose to adopt the ‘‘Individuals’
Access to Electronic Health Information
Supported by Certified API
Technology’’ measure within the
‘‘Individuals’ Access to Electronic
Health Information’’ area in
§ 170.407(a)(1). We propose to require
that any developer of certified health IT
with Health IT Modules certified to
either the ‘‘view, download, and
transmit to a 3rd party’’ certification
criterion (§ 170.315(e)(1)), or the
337 Johnson C, Richwine C, & Patel V. (September
2021). Individuals’ Access and Use of Patient
Portals and Smartphone Health Apps, 2020. ONC
Data Brief, no.57. Office of the National Coordinator
for Health Information Technology: Washington,
DC.
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
23834
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
‘‘standardized API for patient and
population services’’ certification
criterion (§ 170.315(g)(10)), report the
numbers of unique patients that used
each of the specified methods to access
their EHI, unless eligible for subset
reporting requirements discussed later
in this section.
We propose two distinct numerators
and three denominators as part of the
measure in § 170.407(a)(1). As noted
earlier in this section, we plan to
generate multiple metrics from a
combination of different numerators and
denominators. We propose the first
numerator to be the number of unique
individuals who had an encounter and
accessed their EHI at least once during
the reporting period via at least one of
three types of methods: (1) third-party
app using technology certified to
‘‘standardized API for patient
population services’’ certification
criterion under § 170.315(g)(10); (2)
patient portal using technology certified
to the ‘‘view, download, and transmit to
3rd party’’ certification criterion under
§ 170.315(e)(1) only; or (3) app offered
by the health IT developer or health care
provider using technology certified to
the API criterion under § 170.315(g)(10)
(if applicable). We propose a second
numerator to be the number of unique
individuals who accessed their EHI
regardless of an encounter during the
reporting period using at least one of the
same three types of methods identified
above. Each of these numerators would
be stratified or reported by type of
method.
These proposed numerators differ
from those developed by the Urban
Institute by separating the numerators
by individual encounter and EHI access
status instead of by method. As
explained above, this differentiation
would provide insights into usage for
other convenience-oriented reasons
(e.g., travel) that are not necessarily
driven by a healthcare encounter. In
addition, we have replaced the third
method proposed by the Urban Institute
(Combination of third-party app desktop
patient portal, and/or health care
provider app) with apps offered by the
health IT developer or health care
provider. With both the numerators
stratified by access method and the
denominators separated by both
encounter and access status, we believe
that a combination measure is no longer
needed. Our proposed third method will
allow for distinction between thirdparty apps and those offered by health
IT developers and health care providers.
Overall, these proposed measures would
still collect the data that the Urban
Institute designed measures would
obtain and give further interpretive
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
strength, providing greater insights into
how individuals are accessing their EHI.
We propose the first denominator for
this measure to be the total number of
unique individuals who had an
encounter (as defined earlier in this
preamble) during the reporting period.
We propose the second denominator to
be the total number of unique
individuals who used at least one of the
types of methods referenced above to
access their EHI who had an encounter
during the reporting period. We propose
the third denominator to be the total
number of unique individuals who used
at least one of the three types of
methods referenced above to access
their EHI during the reporting period
(regardless of whether the individual
had an encounter or not).
The data collected for this
specification would enable ONC to
calculate the following metrics:
• Percent of individuals with an
encounter who access EHI by the type
of method
• Percent of individuals with an
encounter who access EHI by at least
one type of method
• Percent of all individuals who access
EHI by at least one type of method
Our proposed measure would provide
insight into the methods patients use to
access their EHI through certified health
IT. We believe this measure is important
because as noted earlier in this section,
increasing patients’ access to their data
can increase patient engagement and
improve health outcomes.338 The
proposed measure seeks to measure
patients’ access to patient portals in a
more refined manner than that proposed
by the Urban Institute, which will
provide insights on the shifts in
methods used by individuals over time
by differentiating apps that are directly
associated with the health care provider
or the developer of the provider’s
certified health IT from those that are
not directly associated with the health
care provider or health IT developer. We
also seek to measure patients’ access to
patient portals in a manner that aligns
with ONC’s certification criteria
regarding patient access to their EHI and
differentiate between apps provided by
the health IT developer from those that
are not provided by the health IT
developer. We note that the proposed
individuals’ access measure does not
distinguish between third-party apps
selected by individuals versus thirdparty apps offered by health care
338 Health Affairs. (2013). Health Policy Brief:
Patient Engagement. Accessed March 16, 2023, at:
https://healthaffairs.org/healthpolicybriefs/brief_
pdfs/healthpolicybrief_86.pdf.
PO 00000
Frm 00090
Fmt 4701
Sfmt 4702
providers, as these may be difficult to
differentiate from each other.
We believe this proposed individuals’
access measure will provide a national
view into how individuals access their
EHI and will inform ONC and health IT
community efforts to empower
individuals with access to their EHI. We
welcome comments on our proposed
measure.
Measurement Area: Clinical Care
Information Exchange
We propose two measures under the
‘‘Clinical Care Information Exchange’’
area in §§ 170.407(a)(2) and (3). The
proposed measures are titled,
‘‘Consolidated Clinical Document
Architecture (C–CDA) Documents
Obtained Using Certified Health IT by
Exchange Mechanism’’ and ‘‘C–CDA
Problems, Allergies and Medications
Reconciliation and Incorporation Using
Certified Health IT.’’ These measures are
primarily focused on characterizing the
state of information exchange between
health care providers who are customers
of health IT developers with certified
health IT, in contrast to other measures
that capture exchange with individuals,
public health agencies, and other
entities.
Consolidated Clinical Document
Architecture (C–CDA) Documents
Obtained Using Certified Health IT by
Exchange Mechanism Measure
There are numerous mechanisms by
which information can be exchanged
between organizations using certified
health IT, such as point-to-point,
developer network-facilitated, or
through state health information
exchange. Neither the current level of
exchange by particular mechanisms nor
trends of exchange by mechanism is
clear. For example, the use of surveys to
gather this information is limited. Based
on a national survey analysis of
hospitals,339 on average hospitals
reported using 3.6 methods to
electronically send, 2.9 methods to
receive and 2.4 methods to query data
from external sources. While this
information is useful in that it provides
some visibility into the number and
types of mechanisms used, it does not
provide insight into the volume of
exchange by varied mechanisms at a
national level as such information is not
feasible to collect from end users. In
contrast to measures of adoption which
might not reflect intensive or beneficial
use, data on the volume of information
exchanged would provide the means to
339 https://www.healthit.gov/data/data-briefs/usecertified-health-it-and-methods-enableinteroperability-us-non-federal-acute.
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
assess the extent that patient
information is moving between
providers to facilitate high value care.
National surveys of physicians on
health IT have not measured the types
of methods used because physicians are
not always aware of the specific
mechanisms underlying the exchange of
information, and hospitals do not
always capture the volume of exchange
being facilitated through various
mechanisms.
Some health information networks do
publish the volume of exchange they
facilitate. For instance, DirectTrust 340
indicates that it facilitated exchange of
254 million messages in the fourth
quarter of 2021 and Carequality 341
announced that it supported exchange
of over 90 million documents in 2020.
However, these headline numbers are
difficult to interpret without also
knowing the number of encounters
occurring at sites using these methods,
the number of patients being treated,
and other measures of volume. Further,
it is not clear whether these methods are
exchanging unique information from
different sources or prior encounters
and thus should be added together or
are largely exchanging duplicate
information.
Therefore, we propose to adopt the
‘‘Consolidated Clinical Document
Architecture (C–CDA) Documents
Obtained Using Certified Health IT by
Exchange Mechanism’’ measure, which
would report on the volume of C–CDA
documents obtained using certified
health IT by exchange mechanism
relative to patient volume. A developer
of certified health IT with Health IT
Modules certified to the ‘‘clinical
information reconciliation and
incorporation’’ certification criterion in
§ 170.315(b)(2) would be required to
report the proposed numerators and
denominators for this measure.
There are four numerators and four
denominators for this proposed
measure. As noted earlier in this
section, we plan to generate multiple
metrics from different combinations of
these numerators and denominators. For
example, a single numerator can be used
with two different denominators to
produce two different metrics. We
propose to adopt the following
numerators for this measure: (1) number
of unique C–CDA documents obtained
(which we define for the purpose of this
proposal as either C–CDAs that are
received—that is, C–CDAs that have
been sent or ‘pushed’ by others and
340 https://directtrust.org/.
341 https://carequality.org/carequality-reachesnew-milestone-of-one-billion-clinical-documentsexchanged/.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
23835
received using certified health IT or C–
CDAs that are queried—that is, C–CDAs
that were found or ‘pulled’ from a
network or central repository using
certified health IT) using certified health
IT and Direct Messaging 342 during the
reporting period; (2) number of unique
C–CDA documents obtained (received
or queried) using certified health IT and
a local/regional health information
exchange (HIE) or national HIN during
the reporting period; (3) number of
unique C–CDA documents obtained
(received or queried) using certified
health IT and a developer-specific HIN
(i.e., a network that facilitates exchange
between entities using the same health
IT developer’s products) during the
reporting period; and (4) number of
unique C–CDA documents obtained
(received or queried) using certified
health IT and a method not listed above
and not including electronic fax during
the reporting period.
We propose to adopt the following
denominators for this measure: (1)
number of encounters during the
reporting period; (2) number of unique
patients with an encounter during the
reporting period; (3) number of unique
patients with an associated C–CDA
document during the reporting period;
and (4) number of unique C–CDA
documents obtained (received or
queried) using certified health IT during
the reporting period. We propose to
include denominators for the number of
encounters during the reporting period
and the number of unique patients seen
(i.e., with an encounter) during the
reporting period to provide a sense of
the volume of C–CDA documents
exchanged relative to the number of
instances when a C–CDA document
might be useful. We believe these data
points will provide complementary
information against which to measure
the volume of exchange. In contrast, an
existing CMS measure, ‘‘Support
Electronic Referral Loops by Receiving
and Reconciling Health Information,’’
originally finalized for clinicians in the
Promoting Interoperability performance
category of the MIPS in their CY2019
Physician Fee Schedule 343 ‘‘Revisions
to Payment Policies under the Physician
Fee Schedule’’ final rule (83 FR 59811)
and for eligible hospitals and CAHs in
the Promoting Interoperability Program
in the FY2019 IPPS final rule 344 (83 FR
41661), is tied to notions of referral or
transitions of care, which we are not
proposing to reference in our proposed
denominator. We believe that defining
the scope of clinical scenarios in which
a C–CDA document might be helpful is
challenging, and effectively defining
and identifying transitions of care and
referrals in a consistent way across
developers (as opposed to by clinicians
or hospitals in the case of the CMS
measures) may not be feasible. We
instead use more general measures of
unique patients or encounters. Again,
we welcome comments on the proposed
approach for reporting on encounters
and alternatives to the proposed
approach.
The data collected for this proposed
measure would enable ONC to calculate
the following metrics:
• The number of unique C–CDA
documents obtained using a local/
regional HIE or national HIN divided by
the number of unique C–CDA
documents obtained using certified
health IT within the reporting period.
• The number of unique C–CDA
documents obtained using developerspecific networks divided by the
number of unique C–CDA documents
obtained using certified health IT within
the reporting period.
• The number of unique C–CDA
documents obtained using Direct
Messaging divided by the number of
unique C–CDA documents obtained
using certified health IT within the
reporting period.
• The number of unique C–CDA
documents obtained using other means
divided by the number of unique C–
CDA documents obtained using certified
health IT within the reporting period.
• The number of unique patients with
associated C–CDA documents obtained
within the reporting period divided by
the number of unique patients with an
encounter within the reporting period.
• The number of unique C–CDA
documents obtained using certified
342 https://wiki.directproject.org/w/images/e/e6/
Applicability_Statement_for_Secure_Health_
Transport_v1.2.pdf.
343 ‘‘Medicare Program; Revisions to Payment
Policies Under the Physician Fee Schedule and
Other Revisions to Part B for CY 2019; Medicare
Shared Savings Program Requirements; Quality
Payment Program; Medicaid Promoting
Interoperability Program; Quality Payment ProgramExtreme and Uncontrollable Circumstance Policy
for the 2019 MIPS Payment Year; Provisions From
the Medicare Shared Savings Program-Accountable
Care Organizations-Pathways to Success; and
Expanding the Use of Telehealth Services for the
Treatment of Opioid Use Disorder Under the
Substance Use-Disorder Prevention That Promotes
Opioid Recovery and Treatment (SUPPORT) for
Patients and Communities Act.’’
344 ‘‘Medicare Program; Hospital Inpatient
Prospective Payment Systems for Acute Care
Hospitals and the Long-Term Care Hospital
Prospective Payment System and Policy Changes
and Fiscal Year 2019 Rates; Quality Reporting
Requirements for Specific Providers; Medicare and
Medicaid Electronic Health Record (EHR) Incentive
Programs (Promoting Interoperability Programs)
Requirements for Eligible Hospitals, Critical Access
Hospitals, and Eligible Professionals; Medicare Cost
Reporting Requirements; and Physician
Certification and Recertification of Claims.’’
PO 00000
Frm 00091
Fmt 4701
Sfmt 4702
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
23836
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
health IT within the reporting period
divided by the number of unique
patients with an encounter during the
reporting period.
• The number of unique C–CDA
documents obtained using certified
health IT within the reporting period
divided by the number of unique
patients with an associated C–CDA
documents obtained within the
reporting period.
• The number of unique C–CDA
documents obtained using certified
health IT within the reporting period
divided by the number of encounters
during the reporting period.
This proposed measure would capture
C–CDA documents obtained by
electronic transport mechanisms,
including national HINs (e.g.,
Carequality, CommonWell), state/
regional HIEs, Direct Messaging, and
developer-specific networks (e.g., Epic
Care Everywhere; athenahealth
network). Additionally, we propose to
measure the extent to which different
exchange mechanisms are being used by
volume of patients. In combination, this
measure would result in a patientcentered approach relative to existing
measures of clinician or hospital
adoption because it would provide
insights into the degree to which
electronic exchange of C–CDA
documents is occurring relative to the
volume of encounters and the number of
patients whose data is exchanged by
type of mechanism. This measure,
together with the proposed measure
related to C–CDA Problems, Allergies
and Medications Reconciliation and
Incorporation Using Certified Health IT,
would provide a foundation for
understanding how often external
information is exchanged and used in
certified health IT.
Using data gathered under this
measure, we would also be able to
examine trends in the use of various
mechanisms for exchange of health
information over time. Monitoring the
volume of exchange by various
mechanisms is critical to monitoring the
implementation of key ONC policies
that support exchange and
interoperability, including most recently
TEFCA (87 FR 2800). ONC seeks to
facilitate exchange so that
interoperability is best supported.
Understanding varying usage of
different mechanisms could better
inform ONC policies because not all
exchange mechanisms may adequately
support true interoperability.
Understanding where the market is with
regards to the usage of exchange
mechanisms that support
interoperability (versus those that do
not) is critical to informing ONC policy.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
Furthermore, examining variation in
usage of exchange mechanisms can
provide insights into what mechanisms
may be limited to certain use cases, and
whether some mechanisms implicitly or
explicitly favor some parties (e.g.,
developer exchanges). Thus,
information on exchange by mechanism
will allow ONC to better target its
support for interoperable exchange.
Furthermore, these data can be used by
ONC to assess the impacts of these
various efforts, including the role
certified health IT plays in supporting
exchange through various mechanisms.
The Program supports a number of
different exchange mechanisms;
understanding their uptake and use is
important for informing future
development and improvements.
We seek comment on whether it
would be meaningful to further reduce
the mechanisms of exchange measure
into fewer categories, by combining
regional HIE and/or national HIN and
developer-specific HINs into one
category (network-mediated exchange)
and combining Direct Messaging and
‘‘other methods’’ into a second category
(exchange directly between two
entities). Thus, an alternative proposal
would be to reduce the exchange
mechanisms from three categories to
two categories. We also seek comment
on whether the expected burden
associated with this measure would, in
practice, be reduced if the number of
categories were reduced.
C–CDA Medications, Allergies, and
Problems Reconciliation and
Incorporation Using Certified Health IT
Measure
We propose to adopt the ‘‘C–CDA
Medications, Allergies, and Problems
Reconciliation and Incorporation Using
Certified Health IT’’ measure, which
would capture the number of C–CDA
documents that are reconciled and
incorporated (as defined in
§ 170.315(b)(2)(iii)) as part of a patient’s
record by clinicians or their delegates. A
developer of certified health IT with
Health IT Modules certified to the
‘‘clinical information reconciliation and
incorporation’’ certification criterion in
§ 170.315(b)(2) would be required to
provide information on how data in C–
CDA documents are used, focusing on
the reconciliation and incorporation of
medications, allergies and intolerances,
and problems.
We propose the numerator to be the
total number of C–CDA documents of
the Continuity of Care Document (CCD),
Referral Note, Discharge Summary
document types that are obtained and
incorporated across all exchange
mechanisms supported by the certified
PO 00000
Frm 00092
Fmt 4701
Sfmt 4702
health IT during the reporting period.
The numerator would increment, or
increase in number, upon completion of
clinical information reconciliation of
the C–CDA documents for medications,
allergies and intolerances, and
problems, as described in the
certification criterion in § 170.315(b)(2).
We propose the denominators for this
measure to match the denominators for
the ‘‘C–CDA Documents Obtained Using
Certified Health IT by Exchange
Mechanism’’ proposed measure, using
the definition of ‘‘encounter’’ described
previously in this proposal. The data
collected for this proposed measure
would enable ONC to calculate the
following metrics:
• The total number of C–CDA
documents (CCD, Referral Note,
Discharge Summary) obtained and
incorporated divided by the number of
encounters during the reporting period.
• The total number of C–CDA
documents (CCD, Referral Note,
Discharge Summary) obtained and
incorporated divided by the number of
unique patients with an encounter
during the reporting period.
• The total number of C–CDA
documents (CCD, Referral Note,
Discharge Summary) obtained and
incorporated divided by the number of
unique patients with an associated C–
CDA document during the reporting
period.
• The total number of C–CDA
documents (CCD, Referral Note,
Discharge Summary) obtained and
incorporated divided by the number of
unique C–CDA documents obtained
(received or queried) using certified
health IT during the reporting period.
This proposed measure can be used to
inform the extent to which information
is being incorporated into a patient’s
record as discrete data that is trackable
over time. Our proposed measure
includes several metrics intended to
directly measure the success of certified
health IT in supporting reconciliation
and incorporation of C–CDA
documents. Our specifications are
intended to ensure the measure captures
several key dimensions of information
reconciliation. First, we intend the
measure to capture the success of
certified health IT at facilitating
maintenance of a patient’s record
composed of discrete data that is
trackable over time through the
incorporation of medications, allergies
and intolerances, and problems into the
medical record as appropriate. This
would help us understand the degree to
which information received from C–
CDA documents is subsequently
available for use after receipt and
incorporation. Second, the measure is
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
intended to provide a national view of
information reconciliation by users of
certified health IT. Third, the measure is
intended to capture the incorporation of
all available C–CDA documents and is
not tied to specific events such as
transitions of care. We believe that
developers may vary in their approach
to defining transitions of care (and other
events like referrals), which may make
it more difficult to comprehensively
capture the reconciliation of
medications, allergies intolerance, and
problems. Fourth, we intend the
measure to capture the extent to which
unique C–CDA documents are
reconciled, as we are aware that in the
current landscape, some clinicians and
hospitals are able to receive C–CDA
documents through multiple methods
and it is possible to receive multiple
copies of the same C–CDA (i.e., via
Direct Messaging and an HIE). We
believe that by only including unique
C–CDA documents in both the
numerator and denominator, we will
avoid undercounting reconciliation. If
duplicates were not excluded,
undercounting would be likely because
relevant denominators (e.g., the number
of C–CDAs obtained) would be larger
due to the inclusion of duplicate
documents for which reconciliation and
incorporation (i.e., the numerator)
would not offer clinical value and be
infrequent. Lastly, we intend the
measure to capture the rate of C–CDA
documents reconciled relative to several
alternative denominators, including the
number of C–CDA documents received
and the number of unique patients
treated. We believe that these alternative
denominators provide important
complementary information on the
extent of information exchange.
This measure is closely related to a
measure used by CMS in the Promoting
Interoperability performance category of
MIPS and the Medicare Promoting
Interoperability Program. CMS generally
describes their measure ‘‘Support
Electronic Referral Loops by Receiving
and Incorporating Health Information’’
(originally finalized in 83 FR 59811 and
83 FR 41661, respectively) as capturing
the rate at which problems, medication
allergies, and medications were
reconciled and incorporated out of all
transitions of care or referrals for which
a health care provider received an
electronic summary of care record. In
contrast to the CMS measure, our
proposed measure would provide a
more nationally representative view of
the use of certified health IT since many
clinicians, including those in small
practices, do not report for the
Promoting Interoperability performance
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
category of MIPS. Among those that do
report for the Promoting Interoperability
performance category of MIPS, many do
not report this information, either
because they claim an exclusion from
reporting the measure or they report on
the optional Health Information
Exchange (HIE) Bi-Directional measure
in lieu of reporting performance on the
Support Electronic Referral Loops by
Receiving and Incorporating Health
Information measure.345 As a result, the
Promoting Interoperability performance
category of MIPS and the Medicare
Promoting Interoperability Program data
alone provides an incomplete view of
the degree to which health care
providers successfully incorporate C–
CDA documents. Our measure would
provide a broader measure of
incorporation of information in C–CDAs
that, unlike the CMS measure, is not
tied to transitions of care, referrals, or
new patient encounters.
We note that a majority of developers
of certified health IT should already be
capable of supporting some components
of our proposed measure because of the
existing requirements for the Promoting
Interoperability performance category of
MIPS and the Medicare Promoting
Interoperability Program and ONC
certification criteria related to
measuring exchange under ‘‘automated
numerator recording’’ (§ 170.315(g)(1))
and ‘‘automated measure calculation’’
(§ 170.315(g)(2)). We note that
approximately 68% (517 of 818) of
Health IT Modules listed on CHPL are
certified to one or both of these criterion
as of the second quarter of the 2022
calendar year. Therefore, we believe our
proposed measure should impose a low
burden on a majority of developers of
certified health IT to fully implement as
part of this Insights Condition. We
request comment on the anticipated
burden associated with this measure.
We request comment on whether
focusing on the three types of C–CDA
documents described above in the
proposed numerator (CCD, Referral
Note, Discharge Summary) would
impose a substantial burden beyond
summary of care records. We request
comment on the value of focusing on
these three document types relative to
all types of summary of care records. We
also request comment on whether
meaningful measures could be
generated without de-duplication of C–
CDAs, how often duplicate C–CDA
documents may be obtained by
345 Analysis of the publicly available 2020
Quality Payment Program Experience Data available
here Quality Payment Program Experience—Centers
for Medicare & Medicaid Services Data (cms.gov)
indicates that 172,786 of 921,517 clinicians
reported on this measure.
PO 00000
Frm 00093
Fmt 4701
Sfmt 4702
23837
customers of certified health IT, and
how much of a burden it will impose on
developers of certified health IT to
ensure that C–CDA documents are not
duplicates.
Measurement Area: Standards Adoption
and Conformance
We propose to adopt four measures in
the ‘‘Standards Adoption and
Conformance’’ area in §§ 170.407(a)(4)
through (7) to provide insight into the
role that standards play in enabling
access, exchange, and use of EHI. We
propose to measure the following
aspects within this area: (1) availability
of apps to support access to EHI for a
variety of purposes; (2) the usage of
FHIR-based APIs to support apps; (3)
the use of bulk FHIR to support the
access to EHI for groups of individuals;
and (4) the use of EHI export
functionality. Together, these measures
would provide a foundation for
understanding whether and to what
extent ONC’s policies to promote
standards are supporting users of health
IT, including patients, clinicians,
researchers, and others, to access and
use EHI via certified health IT for a
variety of purposes. These measures
would also provide visibility into
industry adoption of standards required
by the Program and provide data to
inform future standards development
work.
Applications Supported Through
Certified Health IT Measure
We propose to adopt an ‘‘Applications
Supported Through Certified Health IT’’
measure, which would provide
information on how certified health IT
is supporting the health app ecosystem
by asking certain health IT developers
under the Program to report app names
and app developer names, intended app
purposes, intended app users, and
whether a registered app is in ‘‘active’’
use across a developer’s client base (as
further detailed below). This measure
would result in a listing of apps that
could be used to generate a variety of
metrics. Only developers of certified
health IT with Health IT Modules
certified to the ‘‘standardized API for
patient and population services’’
(§ 170.315(g)(10)) certification criterion
would be required to report data for this
proposed measure.
As there is currently no
comprehensive source of this type of
information, we believe that data
reported through this measure would
provide greater transparency regarding
the apps that are connected to certified
health IT. This measure will provide
information on most apps connected to
developers of certified health IT with
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
23838
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
Health IT Modules certified to
§ 170.315(g)(10), including the types of
intended users of these apps and the
number of apps available that are in
‘‘active use.’’ Some health IT developers
of certified health IT currently have
public app galleries; 346 however, the
apps in public app galleries only
represent a subset of apps connected to
their APIs, and only a small subset of
health IT developers have public app
galleries. The information captured
under this measure would go beyond
the data currently publicly available in
these app galleries and must include all
apps connecting to certified health IT
certified to § 170.315(g)(10), regardless
of whether an app is currently publicly
available in an app gallery or not. We
note that this measure would also be
required for health IT developers of
certified health IT that do not currently
maintain an app gallery.
Therefore, we propose that developers
of certified health IT with Health IT
Modules certified to § 170.315(g)(10)
provide the following information about
the apps that are connected to their
certified technology. We propose that
the app name and the developer
(company/organization or individual)
responsible for the app shall be reported
for each app registered to a developer of
certified health IT whose Health IT
Module is certified to the
§ 170.315(g)(10) criterion. We note that
the app registration process required
under § 170.315(g)(10)(iii) may provide
an opportunity for developers of
certified health IT to gather standard
information for apps connecting to their
certified API technology as part of
existing workflows. There may be other
mechanisms besides the app registration
process by which developers of certified
health IT wish to obtain this
information.
This measure would enable ONC and
the public to understand to what degree
apps are able to connect across different
certified health IT products. The ONC
Cures Act Final Rule (85 FR 25750)
emphasized the importance of
standardization, transparency, and procompetitive business practices through
the API Condition and Maintenance of
Certification requirements that would
make it easier for third-party apps to
connect to certified health IT, and
subsequently facilitate individuals’
access to their EHI. By collecting the
names of apps and developers
connecting to developers of certified
health IT whose Health IT Module is
346 The ecosystem of apps and software integrated
with certified health information technology:
https://academic.oup.com/jamia/article/28/11/
2379/6364773?login=false.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
certified to § 170.315(g)(10), ONC and
the public will be better able to identify
whether certain apps are only
connecting to one certified health IT
product versus other apps that may be
connecting to multiple different
certified health IT products. This
information provides insights into
whether apps are able to connect to a
variety of certified health IT products,
which is important for enabling
individuals’ access to their EHI.
We propose that developers of
certified health IT with Health IT
Modules certified to § 170.315(g)(10)
obtain and report the intended
purpose(s) for each app connected to
their certified API technology using the
following categories:
• Administrative Tasks (e.g., scheduling
& check-in, billing & payment)
• Clinical Tools (e.g., clinical decision
support, risk calculators, remote
patient monitoring)
• Individuals’ Access to their EHI (e.g.,
enables patients to access their health
information, medications, test results,
vaccine records)
• Research (e.g., used to perform
clinical research)
• Population Data (e.g., bulk transfer of
data, population analytics &
reporting)
• Public Health (e.g., electronic case
reporting)
• Patient-Provider Communication (e.g.,
secure messaging, telehealth)
• Educational Resources (e.g., patient
and provider educational resources)
• Other Intended Purpose
• Unknown (e.g., missing)
Developers of certified health IT to
whom the measure applies would report
the intended purpose(s) of the app for
each app registered to their Health IT
Module(s) certified to the
§ 170.315(g)(10) criterion. The categories
we propose under this measure were
informed by app category taxonomies in
published literature from Barker &
Johnson (2021),347 Ritchie and Welch
(2020) 348 and Gordon and Rudin
(2022).349 While we recognize this
taxonomy may need to evolve over time,
we believe the proposed categories
347 The ecosystem of apps and software integrated
with certified health information technology:
https://academic.oup.com/jamia/article/28/11/
2379/6364773?login=false.
348 Categorization of Third-Party Apps in
Electronic Health Record App Marketplaces:
Systematic Search and Analysis: https://
www.ncbi.nlm.nih.gov/pmc/articles/PMC7293052/.
349 Gordon WJ, Rudin RS. Why APIs? Anticipated
value, barriers, and opportunities for standardsbased application programming interfaces in
healthcare: perspectives of US thought leaders.
JAMIA Open. 2022 Apr 6;5(2):ooac023. doi:
10.1093/jamiaopen/ooac023. PMID: 35474716;
PMCID: PMC9030107.
PO 00000
Frm 00094
Fmt 4701
Sfmt 4702
represent a large majority of the current
market. Understanding apps’ intended
purpose sheds light on the types of apps
that are available. For example, based
upon the prior analyses of these public
app galleries, about one-fifth of apps in
public app galleries supported patient
engagement, whereas about four in ten
were for administrative purposes.
Although, as noted previously, the data
source underlying these analyses are
incomplete. The types of information, if
reported on a complete set of apps,
would provide insightful information to
guide ONC’s future efforts to support
individuals’ access to their EHI via
apps, along with other priority uses,
such as for research and clinical care.
We welcome feedback on what
alternative or additional functionalities
should be included in the taxonomy to
characterize the intended purpose of
health apps.
We propose that developers of
certified health IT with Health IT
Modules certified to § 170.315(g)(10)
obtain the following intended user(s)
categories for each app connected to
their certified API technology:
• Individual/Caregiver
• Clinician
• Healthcare Organization
• Payer
• Researcher
• Other Intended User
• Unknown (e.g., missing)
These proposed categories include a
variety of users and would provide a
better understanding of the extent to
which apps are available and in use for
different types of users, since the
intended purpose alone may not shed
light on the types of users for which the
app is intended. For example, some
apps intended for research purposes
may have both patients and researchers
as users, whereas others may be
intended for research alone. It is
important to understand the breadth of
intended users of apps to provide
insights into the impacts of ONC’s
efforts on users’ ability to access EHI via
certified API technology through apps.
We propose that developers of
certified health IT with Health IT
Modules certified to § 170.315(g)(10)
obtain the status for each app connected
to their certified API technology using
the following categories:
• Actively Used—An app is defined
as ‘‘Actively Used’’ if EHI has been
transferred to the app using certified
API technology for 10 or more unique
patients during the reporting period.
• Not Actively Used—An app is
defined as ‘‘Not Actively Used’’ if EHI
has been transferred to the app using
certified API technology for fewer than
E:\FR\FM\18APP2.SGM
18APP2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
10 unique patients during the reporting
period.
We recognize that apps registered to
certified API technology may not
necessarily be in production nor have
any users, and thus an indicator of
active use would be important to
differentiate those apps in use, versus
those not ready for use (or that may
never make it to that stage). This will
provide an accurate indicator of the
availability of apps based upon the
usage activity. Without this indicator of
active use, we would not know if an app
was registered but never in production,
and thus the value of the overall data
would be limited. We welcome
comments on our proposed ‘‘active use’’
status categories, including their
definitions, and welcome comment on
whether these categories reflect how
app status is currently monitored by
developers of certified health IT.
We believe our proposed measure
would provide information that would
be useful to guide future policy and
assess ongoing efforts to support app
connectivity to certified health IT. This
data would also provide insight into
whether and how impactful ONC
standards and policies are to expanding
the availability of apps, including the
‘‘standardized API for patient and
population services’’ (§ 170.315(g)(10))
certification criterion. Additionally, this
measure would produce a list of apps
that would provide information on the
degree to which apps are able to connect
to multiple different certified health IT
systems in a seamless manner. We
believe capturing this information over
time would provide insights into the
evolution of the types of apps that are
available for meeting the needs of
various end users of app technology to
support a variety of critical purposes.
We welcome comments on our
proposed measure.
Use of FHIR in Apps Supported by
Certified API Technology Measure
We propose to adopt a ‘‘Use of FHIR
in Apps Supported by Certified API
Technology’’ measure, which would
capture the volume of FHIR resources
transferred in response to API calls from
apps connected to certified API
technology by FHIR resource type. We
also propose that the volume of FHIR
resources transferred be reported by
FHIR version used and by U.S. Core
Implementation Guide version
deployed. This measure would also
require developers to report FHIR
resources transferred in response to
calls from two different endpoint types:
patient-facing and non-patient-facing,
the latter of which would include
endpoints that do not facilitate
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
individuals’ access (e.g., clinician,
payer, or public health endpoints).
Finally, this measure would require
developers of certified health IT with
Health IT Modules certified to the
‘‘standardized API for patient and
population services’’ (§ 170.315(g)(10))
certification criterion to report on the
number of deployments they support
across their customer base. Together,
these data points would provide
insights into the usage of certified APIs
by collecting data on the volume of
FHIR resources transferred to apps in
response to API calls by FHIR resource
type, type of endpoint, and U.S. Core
Implementation Guide used. We believe
this information could provide useful
information in understanding the
adoption of FHIR and the utility of
specific FHIR resources. This
information could also be informative to
industry-based standards development
efforts in the future. We also believe it
is possible to collect these kinds of data,
based on some of the real world testing
plans submitted by developers of
certified health IT in December 2021.350
Similar to other measures, we propose
a number of numerators and
denominators that would be used to
generate a variety of metrics. We
propose the first numerator to be the
number of FHIR resources returned/
transferred in response to a call to a
certified API technology by resource
type. We propose the second numerator
to be the number of distinct certified
API technology deployments (across
clients) associated with at least one
FHIR resource returned/transferred in
response to a call. We note that each of
the numerators would be stratified (e.g.,
divide into subsets) by type of endpoint
(patient-facing vs. non-patient-facing),
by FHIR version, and by U.S. Core
Implementation Guide.
We propose the denominator to be the
total number of distinct certified API
technology deployments (across clients).
In addition, we propose this
denominator to be stratified by type of
endpoint (patient-facing vs. non-patient
facing), FHIR version, and U.S. Core
Implementation Guide. We note that
non-FHIR APIs, such as those
represented with proprietary standards,
are excluded from this measure,
including numerators and
denominators.
The data collected for this proposed
measure would enable ONC to calculate
the following metrics:
• Percent of data transferred by type of
FHIR resource for non-patient-facing
23839
APIs overall, by FHIR resource
version and by U.S. Core
Implementation Guide
• Percent of data transferred by type of
FHIR resource for patient-facing APIs
overall, by FHIR resource version and
by U.S. Core Implementation Guide
• Percent of certified API technology
deployments where data was
transferred for non-patient-facing
APIs overall and by FHIR resource
version and by U.S. Core
Implementation Guide
• Percent of certified API technology
deployments where data was
transferred for patient-facing APIs
overall and by FHIR resource version
and by U.S. Core Implementation
Guide
• Percent of certified API technology
deployments by FHIR resource
version and by U.S. Core
Implementation Guide
This proposed measure could be used
to monitor progress related to ONC’s
efforts to make EHI accessible through
standardized APIs. The implementation
of the ‘‘standardized API for patient and
population services’’ certification
criterion in § 170.315(g)(10) plays an
important role in our approach to
nationwide access, exchange, and use of
EHI without special effort. As industry
implements standard APIs for patient
and population services, it is important
to understand (1) the extent to which
health IT capabilities are in place to
support access to EHI via FHIR-based
APIs; (2) the degree to which those
capabilities are available to be used; and
(3) the use of those capabilities in
practice.
We are currently using multiple data
sources to measure the use of FHIR in
apps supported by certified API
technology. By using data from the
CHPL, CMS program data, and national
survey data of hospitals, ONC has
conducted analyses that provide
insights into the capabilities of certified
health IT to support FHIR APIs.
Through the Lantern Project,351 we will
eventually have the means to analyze
Capability Statements 352 made available
through health IT developers’ published
service-based URLs for patient-facing
endpoints that could provide insights
on whether these available capabilities
were actually ‘‘turned on’’ so that they
can be used.
The proposed measure would build
on these other data sources and add to
our collective understanding by
assessing to what degree these
351 https://lantern.healthit.gov/?tab=dashboard_
350 See
Real World Testing plans available at:
https://chpl.healthit.gov/#/collections/real-worldtesting.
PO 00000
Frm 00095
Fmt 4701
Sfmt 4702
tab.
352 https://www.hl7.org/fhir/capability
statement.html.
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
23840
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
capabilities are used in practice, as well
as provide ONC and the public with
data on the usage of certified API
technology by capturing the number and
types of FHIR resources that are
transferred in response to an API call or
request. We chose to propose the
number of FHIR resources transferred
instead of API calls because we believe
data transfers will be an auditable event
captured by health IT developers of
certified health IT. We also believe that
the number of FHIR resources
transferred is a better reflection of use
as this data would provide insights into
the types of data elements or resources
that are most frequently (and least
frequently) used by end users of
certified API technology. We believe
this measure would have the potential
to guide ONC’s standards development
efforts in the future. For example, the
resource data would help SDOs and
ONC prioritize resources that may need
refinement. Although we have
previously researched and tracked the
total number of apps connecting to APIs
managed by health IT developers of
certified health IT using publicly
available data from health IT app
galleries, very little information has
been reported on the volume of data
transferred using certified API
technology by end-users. This data is
not easily measured using other data
collection methods; however, it is our
understanding that many health IT
developers of certified health IT are
already collecting this information using
system-generated data (e.g., log audit
data).
Requiring health IT developers of
certified health IT to report FHIR
resources transferred in response to
calls from two different endpoint types,
patient-facing endpoints and nonpatient-facing (e.g., clinician, payer, or
public health endpoints), would provide
insights into the types of data elements
used by patients as compared to other
types of users. This information would
allow ONC to develop more targeted
efforts that address patient needs for
different types of data as compared to
other users.
As stated above, this proposed
measure would also require that
developers report the volume of FHIR
resources transferred in response to
calls by FHIR version and by U.S. Core
Implementation Guide. While Health IT
Modules certified to § 170.315(g)(10) are
required to respond to requests
according to FHIR version Release 4, we
are aware that in the future there will be
newer versions of FHIR supported by
newer versions of the U.S. Core
Implementation Guide. Gaining insights
into the frequency in use of U.S. Core
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
Implementation Guides would help
inform ONC regarding variability in the
implementation of FHIR across
developers. Having these measures
stratified by FHIR resource version, in
addition to the U.S. Core
Implementation Guide, could help ONC
advance the use of FHIR APIs. Knowing
which FHIR and U.S. Core
Implementation Guides are in use
would provide insights into where the
industry is currently, and where it may
be headed with regards to the
implementation of specific versions of
FHIR.
We request feedback on whether
information on both aspects of the
measure, FHIR version and U.S. Core
Implementation Guide, are necessary as
each provides unique insights or
whether focusing on just one of these
(either FHIR version or U.S. Core
Implementation Guide) would be
feasible and sufficient for understanding
where the industry is with regards to the
implementation of FHIR. We also seek
comment on the feasibility of reporting
the use of different HL7 FHIR
implementation guides and FHIR
versions overall, versus stratified by
type of endpoint, type of FHIR
resources, and by the number of
certified API technology deployments.
Finally, as this proposed measure
would require developers to report on
the number of certified API technology
deployments they support across their
customer base, we believe it is
important to examine usage not only at
the product level of a health IT
developer with certified health IT, but
also across the organizations that are
using those products. Therefore, we
propose to require health IT developers
of certified health IT to whom the
proposed measure would be applicable
to report the number of certified API
technology deployments (as a proxy for
organizations that have installed
certified API technology) where FHIR
resources were transferred in response
to a call (relative to the total number of
certified API technology deployments).
This information can shed light on
whether usage is concentrated versus
dispersed, indicating the breadth of
usage across end users and
organizations. However, given that API
deployments may vary across
developers, we seek feedback on
whether this measure would be a good
proxy for understanding usage across
their client bases. Overall, data on the
usage of FHIR resources by type of
resource, endpoint, version, and U.S.
Core Implementation Guide, would
provide greater transparency and
insights on the availability and use of
different data elements available
PO 00000
Frm 00096
Fmt 4701
Sfmt 4702
through certified API technology. In
addition, we would also be able to
monitor trends as data is reported over
time and gain a sense of whether and
how useful standards required by the
‘‘standardized API for patient and
population services’’ certification
criterion are to understanding the state
of health data interoperability. We
welcome comments on our proposed
measure.
Use of FHIR Bulk Data Access Through
Certified Health IT Measure
We propose to adopt the ‘‘Use of FHIR
Bulk Data Access through Certified
Health IT’’ measure, which would
measure the number of bulk data
downloads completed through certified
health IT relative to the number of
certified health IT deployments or
installations. Specifically, this measure
would provide information on how
certified health IT is being used to
perform ‘‘read’’ services for a specified
patient population using the HL7®
FHIR® Bulk Data Access (Flat FHIR)
V1.0.1 standard. A developer of certified
health IT with Health IT Modules
certified to the ‘‘standardized API for
patient and population services’’
(§ 170.315(g)(10)) certification criterion
would be required to report under this
proposed measure.
We propose the first numerator to be
the number of data/download requests
completed during the reporting period
using certified health IT certified to the
‘‘standardized API for patient and
population services’’ (§ 170.315(g)(10))
in response to a bulk data download
request to export all data for patients
within a specified group. We propose
the second numerator to be the number
of distinct certified health IT
deployments or installations certified to
the ‘‘standardized API for patient and
population services’’ (§ 170.315(g)(10))
(across clients) that successfully
completed at least one bulk data
download request during the reporting
period.
We propose the denominator to be the
total number of distinct certified health
IT deployments or installations (across
clients).
The data collected for this proposed
measure would enable ONC to calculate
the following metrics:
• Percent of certified health IT
deployments or installations with at
least one successfully completed bulk
data download request.
• Rate of bulk data download requests
successfully completed per certified
health IT deployments or installations.
Our current ability to measure the
Bulk FHIR access is limited to using
national survey data through which
E:\FR\FM\18APP2.SGM
18APP2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
hospitals self-report on their
capabilities. Such survey data does not
provide insight into use of this
capability across other settings, nor do
we have insights into the frequency of
use and for what type of requests. We
believe this measure would address
these gaps in measurement and provide
transparency on the use of certified
health IT to export all data for a
specified patient population. The trends
that this measure would allow us to
determine the extent to which the HL7®
FHIR® Bulk Data Access (Flat FHIR)
V1.0.1 standard has been adopted over
time. Additionally, this proposed
measure would provide insights on the
extent to which the ‘‘standardized API
for patient and population services’’
(§ 170.315(g)(10)) certification criterion
supports use of API-enabled ‘‘read’’
services for a specified patient
population. For future measure
development, in order to track and
better understand the use of APIenabled ‘‘read’’ services for multiple
patients, we seek comment on whether
additional stratifications would provide
valuable insights, what additional data
are developers of certified health IT
collecting; and what effort developers of
certified health IT are devoting to
collecting additional data such as: (1)
intended use case (e.g., population
analytics, reporting, research); (2) entity
calling the API (e.g., healthcare
organization, payer, public health
agency); and (3) automated queries
(refreshing the data at certain intervals)
vs. ad hoc queries. For future measure
development, we also seek comment on
whether it is possible to collect
information on the number of
authorized users calling a bulk FHIR
API, the level of effort required to
collect this information, and whether it
would provide valuable insights.
We also note and clarify that nonstandard or proprietary resources (e.g.,
non-FHIR based) transferred would be
excluded from this measure, and that
we propose data for this measure would
not include patient-facing applications,
as individual patients only have the
right to access their own records or
records of patients to whom they are a
personal representative. We welcome
comment on our proposed measure.
Electronic Health Information Export
Through Certified Health IT Measure
We propose to adopt the ‘‘Use of
Electronic Health Information Export
through Certified Health IT’’ measure
which would capture the use of certified
health IT to export single patient and
patient population EHI. A developer of
certified health IT with Health IT
Modules certified to the ‘‘electronic
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
health information (EHI) export’’
(§ 170.315(b)(10)) certification criterion
would be required to report data under
this proposed measure.
We propose a count for this measure
(rather than a numerator and
denominator) that includes the number
of full data EHI exports requests
processed during the reporting period
and reported by the following
subgroups: (1) by a single patient EHI
export; and (2) by patient population
EHI export. While this stratification
differs from what the Urban Institute
reported, we believe that it will give
more precise insights into how the EHI
export certification criterion is used. We
also propose reports should include a
‘‘yes’’ or ‘‘no’’ attestation for enabling
direct-to-individual EHI exports.
The data collected for this proposed
measure would enable ONC to calculate
the following metrics:
• Count of full data EHI export
requests processed by single patient and
patient populations requests.
• Whether or not the certified Health
IT Module supports direct-to-individual
EHI exports.
The EHI export certification criterion
in § 170.315(b)(10) requires that
certified health IT have the capability to
export single patient and populationlevel data. This function provides a
means for patients to obtain copies of
their EHI and equips health care
providers with better tools to transition
patient EHI from one health IT system
to another. The proposed measure
would report on the number of EHI
export requests processed by a health IT
developer and provide insights on the
implementation of the EHI export
capability. Current data sources to
provide insights on the use of the EHI
export function are limited, and our
experiences with surveys of health care
providers indicate that many health care
providers, particularly office-based
clinicians, may not be familiar with the
technical terminology, and thus survey
data would not serve as a useful data
source for the use of this functionality.
Therefore, by requiring data to be
reported under this measure, we would
be able to understand if the capability
is functioning in the market as intended.
We welcome comments on our
proposed measure.
We noted in the ONC Cures Act Final
Rule (85 FR 25695) that the EHI Export
certification criterion in § 170.315(b)(10)
does not require ‘‘direct-to-patient’’
functionality in order for a developer to
demonstrate conformance to the
criterion. However, we did not preclude
this functionality, and we seek comment
as part of this proposed rule on whether
any products support direct-to-patient
PO 00000
Frm 00097
Fmt 4701
Sfmt 4702
23841
EHI Export functionality to inform
future policy decisions. We also seek
comment on whether it would be
valuable for this measure to be reported
by ‘‘use case’’ for why the data was
exported (e.g., moving to another
certified health IT system, use for a
population health tool), and how
feasible would it be for impacted
developers to report in this manner.
Lastly, we seek comment on whether it
would be valuable, and if so, how
valuable, for this measure to include
reports regarding the types of recipients
(e.g., patients, organizations) of the
exported data, and how feasible would
it be for impacted developers to report
this data in this manner.
Measurement Area: Public Health
Information Exchange
The COVID–19 pandemic has exposed
many gaps and challenges in the
nation’s public health infrastructure,
including a need for more accurate and
timely data, increased electronic
exchange of patient health information
between health care providers and
public health agencies, and greater
support for vulnerable individuals and
communities disproportionally affected
by the pandemic.353 Therefore, we
propose two measures within the
‘‘Public Health Information Exchange’’
area in proposed §§ 170.407(a)(8) and
(9) for reporting health care providers’
use of certified health IT to exchange
data with an immunization information
system (IIS). The insights from these
measures could help ONC (and HHS
more broadly) assess the public health
capabilities of certified health IT. While
ONC has attempted to capture similar
data via surveys, sample size and health
care providers’ level of knowledge
regarding their health IT systems’
capabilities have limited the ability to
generate insights. For example, a
national survey of office-based
physicians’ use of health IT in 2019
found that twenty-five percent of
physicians who participated in the
survey responded ‘‘Don’t Know’’ to
questions about electronic public health
data exchange.354 Furthermore, the
353 Dixon BE, Rahurkar S, Apathy NC.
Interoperability and health information exchange
for public health. In Public health Informatics and
information systems 2020 (pp. 307–324). Springer,
Cham. https://doiorg.ezproxyhhs.nihlibrary.nih.gov/10.1007/978-3030-41215-9_18.
354 Richwine C., Dustin, C., & Patel, V. (August
2022). Electronic Public Health Reporting &
Recording of Social & Behavioral Determinants of
Health Among Office-Based Physicians, 2019. ONC
Data Brief, no. 60. Office of the National
Coordinator for Health Information Technology:
Washington, DC. https://www.healthit.gov/data/
E:\FR\FM\18APP2.SGM
Continued
18APP2
23842
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
proposed measures go beyond the
Promoting Interoperability performance
category of MIPS and the Medicare
Promoting Interoperability Program’s
measurement of ‘‘active engagement’’
with public health agencies, which does
not indicate the volume of data
successfully transmitted to public
health agencies or address
immunization queries made by heath
care providers.
Our proposed public health
information exchange measures would
address these gaps by measuring
whether and to what extent providers
are using their certified health IT to
electronically send and receive public
health information to and from public
health agencies. We believe that more
detailed measurement of health care
providers’ ability to use certified health
IT to successfully exchange health
information with public health agencies
would provide critical data for
pandemic response and other public
health emergencies.
Immunization Administrations
Electronically Submitted to an
Immunization Information System
Through Certified Health IT Measure
In furtherance of our efforts to assess
public health exchange, we propose to
adopt a public health exchange measure
that would report on the volume of
immunization administrations
electronically submitted to an
immunization information system
through certified health IT. This
measure would capture the use of
certified health IT to send information
on vaccination and immunization
administrations to an IIS. Specifically,
this measure would require health IT
developers of certified health IT with
Health IT Modules certified to the
‘‘transmission to immunization
registries’’ (§ 170.315(f)(1)) criterion to
report on the number of records of
immunizations administered that were
sent electronically to an IIS during the
reporting period. We propose that
developers of certified health IT with
Health IT Modules certified to
§ 170.315(f)(1) that do not have users
that administered immunizations during
the reporting period would attest that
they are unable to report on this
measure.
The intent of the proposed
‘‘Immunization Administrations
Electronically Submitted to an
Immunization Information System
through Certified Health IT’’ measure is
to ensure that ONC has the information
necessary to assess whether Health IT
data-briefs/electronic-public-health-reportingrecording-social-behavioral-determinants-health.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
Modules certified to § 170.315(f)(1) are
being used to support electronically
sending vaccination information data to
IIS, which has proven to be critical to
public health preparedness and
response. While ONC has attempted to
capture similar data via surveys, the
data is limited by sample size and may
not fully reflect certified health IT usage
for exchanging data with an IIS since
survey-based data does not provide
information on actual usage. Thus, our
proposed measure would give a more
complete view of sending data to an IIS.
In addition, this proposed measure goes
beyond the Promoting Interoperability
performance category of MIPS and the
Medicare Promoting Interoperability
Program’s measurement of ‘‘active
engagement,’’ which does not indicate
the volume of data successfully
transmitted to public health agencies.
Our proposed measure would address
these information gaps by measuring
transactions whereby health care
providers use their certified health IT to
electronically send public health
information on vaccines administered to
public health agencies.
For the numerator, we propose
developers of certified health IT with
Health IT Modules certified to
§ 170.315(f)(1) report the number of
immunization administrations from
which the information was
electronically submitted to an IIS
successfully during the reporting period
by IIS and age group. We propose that
the numerator and denominator counts
would be reported overall (across IIS
and age subgroups) and by the following
subgroups: (1) number of
administrations by IIS; and (2) number
of administrations by IIS and age group
(adults (18 years and over) and
children/infants (17 years and under)).
The definition of a successful
submission to an IIS would be the total
number of messages submitted minus
acknowledgments with errors (2.5.1,
severity level of E). We believe this
definition will avoid limitations from
IIS jurisdictions that do not send HL7
Acknowledgment messages (ACKs) for
this measure. Given that we propose
that ACKs with an error (severity level
of E) 355 would not be counted, we seek
comment on whether ACKs with a
warning (severity level W) should still
be counted in the numerator. We also
seek comment on whether the number
of immunizations administered can be
linked to immunizations submitted to
355 HL7 Version 2.5.1. Implementation Guide for
Immunization Messaging. Release 1.5. October 1,
2014. https://www.cdc.gov/vaccines/programs/iis/
technical-guidance/downloads/hl7guide-1-5-201411.pdf.
PO 00000
Frm 00098
Fmt 4701
Sfmt 4702
the IIS, effectively creating a subset of
the numerator (immunizations
administered). Additionally, we seek
comment on whether a successful
submission should be counted if a
health care provider is able to
successfully submit to at least one
registry, as opposed to all the registries
they submitted to (e.g., health care
providers who operate in multiple states
sending data for the same
administration to multiple IISs).
We are also considering whether
‘‘replays,’’ which involve resubmitting
administrations until they are
successfully submitted, qualify as a
successful submission. In other words,
we seek comment on whether successful
submissions should be limited to the
first attempt to submit. We believe
‘‘replays’’ should qualify as a successful
submission since the purpose of this
proposed measure is to identify
administrations successfully submitted,
not necessarily those submitted on the
initial try, and welcome public
comment on this.
We propose the denominator for this
measure to be the number of
immunizations administered during the
reporting period. We propose this
denominator be stratified by the
following subgroups: (1) number of
administrations reported to each IIS;
and (2) number of administrations
reported to each IIS, by age group
(adults (18 years and over) and
children/infants (17 years and under)).
This measure differs from that
developed by the Urban Institute by the
inclusion of stratifications by IIS and
age group. Given the variation in
immunization reporting requirements
and patient consent by state or
jurisdiction, reporting of
administrations by IIS is critical to
interpreting the data correctly, therefore
we propose this measure to be stratified
by IIS. In addition, given that
immunization requirements are
different for children and adults, we
propose stratifying by age group as well.
Reporting by these subgroups will assist
in interpreting the data and in creating
public awareness that could inform IISs
and others in the public health
community about the progress being
made in immunization data exchange.
To further inform public health
exchange efforts, we also seek comment
on whether adolescents/infants should
be further stratified by age, and by what
age limits. For providers who operate in
multiple states, and thus would be
sending data for the same
administration to multiple IISs, we seek
comment on whether a successful
submission should be counted if a
provider is able to successfully submit
E:\FR\FM\18APP2.SGM
18APP2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
to at least one registry versus all the
registries to which the provider
submitted.
The data collected for this proposed
measure would enable ONC to calculate
the percent of immunizations
administered where the information was
electronically submitted to an IIS.
We believe this measure would
inform public health information
exchange efforts about how frequently
and effectively health care providers are
using their certified health IT to send
immunization data to an IIS. In
addition, we believe that more detailed
measurements of health care providers’
engagement in public health exchange
would provide critical data in response
to a pandemic or other public health
emergencies. We welcome feedback on
the proposed ‘‘Immunization
Administrations Electronically
Submitted to an Immunization
Information System through Certified
Health IT’’ measure.
Immunization History and Forecasts
Measure
We propose to adopt a public health
information exchange measure to
require reporting on the number and
percentage of IIS queries made per
individual with an encounter.356 The
‘‘Immunization History and Forecasts’’
measure would capture the use of
certified health IT to query information
from an IIS under the ‘‘transmission to
immunization registries’’ certification
criterion (§ 170.315(f)(1)). Therefore,
developers of certified health IT with
Health IT Modules certified to
§ 170.315(f)(1) would be required to
report for this proposed measure. We
believe understanding whether health
care providers are engaging in
electronically querying immunization
information from IIS is critical to public
health preparedness.
For the numerator, we propose
developers of certified health IT with
Health IT Modules certified to
§ 170.315(f)(1) report the number of
query responses received successfully
from an IIS overall and by subgroup, by
IIS and age group (adults (18 years and
over) and children/infants (17 years and
younger)) during the reporting period.
The definition of a successful response
from an IIS should be the total number
of messages submitted minus
acknowledgments with errors (2.5.1,
severity level of E). However, since HL7
356 For purposes of this measure, the definition of
an encounter would be based on NCQA and
SNOMED encounter codes. For outpatient codes,
developers should use NCQA’s Outpatient Value
Set. For inpatient codes, developers should use
SNOMED codes 4525004, 183452005, 32485007,
8715000, and 448951000124107.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
Z42 messages contain both
immunization history and forecast,
whereas Z32 messages exclusively
contain history, we seek comment on
whether both message types should be
included in the measure numerator.
The first denominator we propose for
this measure would be the total number
of immunization queries overall and by
subgroup, by IIS and age group (adults
(18 years and over) and children/infants
(17 years and younger)) during the
reporting period. We propose to add this
denominator to the measure proposed
by the Urban Institute to provide data
on the total number of query responses
that are and are not successfully
received from an IIS. This will give
further insights into any potential
technical challenges that may be
occurring during query exchange. The
second denominator we propose for this
measure would be the total number of
encounters overall and by subgroup
during the reporting period. However,
since it is unlikely that queries happen
for every patient encounter, we seek
comment on whether the second
denominator should capture to total
number of applicable patient encounters
during the reporting period regardless of
whether a query was sent to an IIS. The
numerator and denominator counts
would be reported overall (across IIS
and age subgroups) during the reporting
period and by the number of IIS queries
made by IIS and age group (adults (18
years and over) and children/infants (17
years and younger) during the reporting
period. We believe reporting by these
subgroups would be necessary to
interpret the data and create public
awareness that could inform IISs and
other public health participants about
the progress being made in
immunization data exchange. We seek
comment on whether children/infants
should be furthered divided and by
what age limits.
The data collected for this proposed
measure would enable ONC to calculate
the following metrics:
• Percent of immunization forecast
queries responses from an IIS
electronically received among all
queries sent.
• Percent of immunization forecast
queries responses from an IIS
electronically received among all
patient encounters.
We propose developers of certified
health IT with Health IT Modules
certified to § 170.315(f)(1) would attest
that they are unable to report on this
measure if they have no users that
administered immunizations during the
reporting period. There may also be
providers who do not administer
immunizations but would want to query
PO 00000
Frm 00099
Fmt 4701
Sfmt 4702
23843
an IIS to determine whether their
patient has received a vaccination. We
seek comments on whether we should
include this exclusion or suggestions on
how we could better refine it.
We believe the measures under this
area will inform public health
information exchange efforts related to
how frequently health care providers are
using their certified health IT to send
and query immunization data to an IIS,
providing critical data for a response to
a pandemic or other public health
emergency. We welcome feedback on
the proposed Public Health Information
Exchange measures.
3. Insights Condition and Maintenance
of Certification Requirements
The Cures Act specifies that a health
IT developer be required, as a Condition
and Maintenance of Certification
requirement under the Program, to
submit responses to reporting criteria in
accordance with the ‘‘Electronic Health
Record Reporting Program’’ established
under section 3009A of the PHSA, as
added by the Cures Act, with respect to
all certified technology offered by such
developer. We propose to implement
the Cures Act ‘‘Electronic Health
Reporting Program’’ Condition and
Maintenance of Certification
requirements as the ‘‘Insights Condition
and Maintenance of Certification’’
(Insights Condition) requirements in
§ 170.407. As a Condition of
Certification, we propose that health IT
developers of certified health IT would
submit responses to comply with the
Insights Condition’s requirements,
described in this section of the preamble
in relation to the Insights Condition’s
measures and associated certification
criteria.
As stated earlier in the preamble, the
intent of the Insights Condition is to
address information gaps in the health
IT marketplace, as well as provide
insights on how certified health IT is
being used, consistent with Program
certification criteria and associated
conformance to identified technical
standards. As required by section
3009A(a)(3)(C) of the PHSA, ONC
worked with an independent entity, the
Urban Institute, to develop measure
concepts for the Insights Condition that
would not unduly disadvantage small
and startup developers. We propose
modifications to the measures the Urban
Institute developed to further ensure
measures would not unduly
disadvantage small and startup
developers. The measures we propose
reflect the functions of certified health
IT and the ability of users to
successfully use those functions, rather
than reflect the resources and market
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
23844
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
share of any single developer. We
initially designed and selected the
Insights Condition measures to provide
ONC and the public with information
that would aid our collective
understanding of how certified health IT
is contributing to interoperability
nationally, rather than provide a
comparative view of individual (large
and small) developers. This means that
large and small developers would have
equal opportunity to contribute to
understanding how well interoperability
is progressing based on their products’
performance of the functions and
certification criteria to which the
measures apply. As stated previously in
section III.F.1, we anticipate evolving
and adding to the measures over time to
cover additional dimensions identified
in the Cures Act, including usability,
security, and other topic areas, which
may include additional applicable
certification criteria and would likely
expand the number of certified Health
IT Modules impacted.
Therefore, we propose to implement
the Insights Condition requirements in a
way that does not unduly disadvantage
small and startup health IT developers
of certified health IT. We understand
that developers of certified health IT
would need to invest resources to
capture and report on these proposed
measures. We generally understand
these resources to be relatively
consistent across developers, regardless
of the developer’s organizational size.
Given this understanding and with the
objective to avoid unduly
disadvantaging small and startup health
IT developers of certified health IT, we
propose to establish minimum reporting
qualifications that a developer of
certified health IT must meet to report
on the measure. Developers of certified
health IT who do not meet the
minimum reporting qualifications (as
specified under each measure), would
submit a response to specify that they
do not meet the minimum reporting
qualifications under the Insights
Condition measure. In this way, all
developers of certified health IT would
report on all measures, even if some
report that they do not meet the
minimum reporting qualifications.
The minimum reporting qualifications
include whether a health IT developer
has any applicable Health IT Modules
certified to criteria associated with the
measure, and whether the developer has
at least 50 hospital users or 500
clinician users across its certified health
IT products, which serves as a proxy for
its size or maturation status (e.g.,
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
whether it is a startup). If a developer
of certified health IT does not meet
these minimum reporting qualifications,
it would be required to submit a
response that it does not meet the
minimum reporting qualifications on
specific measures for a given Health IT
Module(s) subject to the Insights
Condition requirements. In addition, if
a health IT developer does not have at
least one product that meets the
applicable certification criteria specified
in the measure requirements, or a
developer of certified health IT that is
certified to the criterion or criteria
specified in the applicable measure
during the reporting period but does not
have any users using the functionality,
the developer would still be required to
submit a response that it does not meet
the applicable certification criteria or
the number of users required to report
on the measure.
In sum, a developer of certified health
IT would be expected to report as
required by each measure under the
following circumstances:
• If the developer has at least 50
hospital users or 500 clinician users
across their certified health IT products;
• Applicable criterion/criteria
associated with the measure; and
• If the developer has any users of the
applicable criterion/criteria associated
with the measure.
Otherwise, the health IT developer
would report that it does not meet the
minimum reporting qualifications.
Additionally, a developer of certified
health IT who meets the minimum
reporting qualifications, has an
applicable criterion or criteria
associated with the measure, and has
users of that criterion or criteria would
be expected to report the following for
each measure:
• Measure results;
• Required documentation used to
generate the measure; and
• Optional documentation used to
generate the measure.
We also propose that health IT
developers of certified health IT report
measures aggregated at the product
level, across product versions. We
believe that product level data would
provide insights on how performance on
the measures vary by market (e.g.,
inpatient, outpatients, specialty) and by
capabilities of products, whereas this
type of insight would not be available at
the developer level. A product-level
focus is also aligned with other Program
reporting requirements that allow for
product level reporting, such as the
Real-World Testing Condition and
PO 00000
Frm 00100
Fmt 4701
Sfmt 4702
Maintenance of Certification (85 FR
25765). In considering alternatives, such
as proposing to require developers to
report measures at the health IT
developer level or at the most granular
level of product version/CHPL ID, we
concluded that proposing to require
data to be reported at the health IT
developer level is unlikely to reduce
burden given that data would still need
to be obtained from each applicable
product and then aggregated. We also
concluded that proposing to require
reporting at the product version/CHPL
ID level could significantly increase
burden because health IT developers of
certified health IT would need separate
reports for each version of their
products.
As stated above, we propose to
require all health IT developers of
certified health IT to comply with the
initial Insights Condition’s
requirements. Developers who do not
meet the minimum reporting
qualifications specified under each
measure must still comply with the
Insights Condition’s requirements by
submitting a response that they do not
meet the minimum reporting
qualifications. The certification criteria
to which the initial Insights Condition
requirements apply include the
following (as listed in Table 2):
• Clinical information reconciliation
and incorporation found in
§ 170.315(b)(2)
• Electronic health information export
found in § 170.315(b)(10)
• View, download, and transmit to 3rd
party, found in § 170.315(e)(1)
• Transmission to immunization
registries, found in § 170.315(f)(1)
• Standardized API for patient and
population services, found in
§ 170.315(g)(10)
Health IT developers of certified
health IT that have less than 50
hospitals users or 500 clinician users
across their certified health IT products
would be required to submit a response
that they do not meet the minimum
reporting qualifications for each
applicable measure. We believe this
approach would allow us to collect
nationally representative data, while
allowing small and startup health IT
developers of certified health IT to
participate within their means. We seek
comment on the effectiveness of this
approach in ensuring that small and
startup developers are not unduly
disadvantaged.
E:\FR\FM\18APP2.SGM
18APP2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
23845
TABLE 2—LIST OF PROPOSED MEASURES ASSOCIATED WITH THE INSIGHTS CONDITION AND APPLICABLE CERTIFICATION
CRITERIA
Measure
Individual Access to EHI .....................................
Individuals’ Access to Electronic Health Information Supported by Certified API Technology.
C–CDA Documents Obtained Using Certified Health IT by Exchange
Mechanism.
C–CDA Medications, Allergies, and Problems Reconciliation and Incorporation Using Certified Health IT.
Applications Supported Through Certified Health IT ................................
Use of FHIR in Apps Supported by Certified API Technology .................
Use of FHIR Bulk Data Access through Certified Health IT .....................
Electronic Health Information Export through Certified Health IT ............
Immunization Administrations Electronically Submitted to an Immunization Information System through Certified Health IT.
Immunization History and Forecasts .........................................................
Clinical Care Information Exchange ....................
Clinical Care Information Exchange ....................
Standards Adoption & Conformance
Standards Adoption & Conformance
Standards Adoption & Conformance
Standards Adoption & Conformance
Public Health Information Exchange
..................
..................
..................
..................
...................
Public Health Information Exchange ...................
Associated Thresholds for Health IT
Developers
ddrumheller on DSK120RN23PROD with PROPOSALS2
Related criterion/
criteria
Area
As stated above, we propose the
Insights Condition threshold for small
and startup developers would only
apply if a developer of certified health
IT has no more than 50 non-federal
acute care hospitals that participated
(reported measure data and use of
certified EHR technology) in the
Medicare Promoting Interoperability
Program and no more than 500 clinician
users who participated in MIPS across
all of the developer of certified health
IT’s products. The specific proposed
threshold of no more than 50 hospital
users or 500 clinician users across their
products is based upon the goals of
maximizing the number of certified
health IT users represented through the
program while not unduly
disadvantaging small and startup health
IT developers. The specific threshold of
users is based upon the number of
hospital users that participate in the
Medicare Promoting Interoperability
Program across a developer’s products
and the number of clinicians who
participated in MIPS. The advantage of
this approach is that the focus on
clinicians and hospitals that participate
in the Promoting Interoperability
performance category of MIPS and the
Medicare Promoting Interoperability
Program aligns with past policy efforts
to increase adoption and use of certified
EHR technology (CEHRT). Additionally,
Promoting Interoperability performance
category of MIPS and the Medicare
Promoting Interoperability Program data
represent a consistent data source that
can be used to set thresholds, though
this approach may need to evolve over
time as the market evolves. While most
hospitals participate in the Medicare
Promoting Interoperability Program,
many clinicians do not participate in
the Promoting Interoperability
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
performance category of MIPS.357 In
addition, other types of settings which
may use certified health IT are not
included in either of these programs.
However, this approach does represent
the best available data source for us to
set thresholds with some degree of
confidence. We note that although the
proposed thresholds were developed
based on analysis of the Promoting
Interoperability performance category of
MIPS and the Medicare Promoting
Interoperability Program data, we intend
to implement these threshold
requirements based on a developer’s
overall number of users and not just
those users who participate in the
Promoting Interoperability performance
category of MIPS and the Medicare
Promoting Interoperability Program, as
some developers may have few or no
users who participate in these programs.
We explored several alternatives to
determining the number of hospital and
clinician users of a developer’s products
based upon Promoting Interoperability
performance category of MIPS and the
Medicare Promoting Interoperability
Program data but were limited by the
availability of other data sources. Other
options we considered included
expanding from Promoting
Interoperability performance category of
MIPS and the Medicare Promoting
Interoperability Program participants to
all types of users, including skilled
nursing facilities, behavioral health
providers and other settings; however,
each of these would require a tailored
threshold as the markets differ across
settings and we do not have recent,
ongoing data sources to capture users
across these settings to develop
357 CDC, National Center for Health Statistics.
National Electronic Health Record Survey. 2019
NEHRS public use file national weighed estimates.
https://www.cdc.gov/nchs/data/nehrs/2019NEHRSPUF-weighted-estimates-508.pdf.
PO 00000
Frm 00101
Fmt 4701
Sfmt 4702
§§ 170.315(e)(1);
170.315(g)(10).
§ 170.315(b)(2).
§ 170.315(b)(2).
§ 170.315(g)(10).
§ 170.315(g)(10).
§ 170.315(g)(10).
§ 170.315(b)(10).
§ 170.315(f)(1).
§ 170.315(f)(1).
thresholds. Financial measures such as
gross revenue of the developer was
another alternative we considered;
however, accessing these data would be
difficult.
We have proposed thresholds based
upon the goal of maximizing the
number of end users on whose usage of
certified health IT we receive data rather
than the number of developers of
certified health IT. We seek to receive
data on a broad array of end users to
ensure the measures are broadly
representative; however, we also do not
want to disadvantage small or startup
health IT developers of certified health
IT. Thus, we developed criteria
designed to balance these goals. We
propose thresholds so that we cover
approximately 99% of the inpatient and
outpatient certified health IT market
share, consisting of hospital users and
clinician users as measured by
Promoting Interoperability performance
category of MIPS and the Medicare
Promoting Interoperability Program
participation data (see analysis below).
Setting this high bar would allow us to
ensure that ONC and the public receive
insights from a large share of certified
health IT end users We used data from
2019 for the Promoting Interoperability
performance category of MIPS and the
Medicare Promoting Interoperability
Program to develop the proposed
thresholds for number of hospital and
clinician users. The data included 4,209
non-federal care acute hospitals and
691,381 clinicians who participated in
the CMS program. After limiting
hospitals and clinicians to those using
existing 2015 Edition certification
criteria, the 2015 Edition Cures Update
criteria, or a combination of the two;
and to those products of developers who
had certified to at least one of the
criteria associated with the measures
proposed as described above (see Table
2), we ended up with 3,863 hospitals
E:\FR\FM\18APP2.SGM
18APP2
23846
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
and 689,801 clinicians. Interested
parties should note, given that
§ 170.315(g)(8) will be transitioned to
§ 170.315(g)(10),358 for the purposes of
determining the threshold and related
calculations, we assume developers who
have certified to § 170.315(g)(8) will also
certify to § 170.315(g)(10). We then
examined the various alternatives for
setting user thresholds by determining
the percentages of users of certified
health IT with developers that would be
represented or not in the Program (see
Table 3 below). The thresholds we
decided to propose maximize coverage
and still permit small or start up
developers to not be required to report
on the specific measures.
Based upon a threshold of 50
hospitals, we would be able to include
approximately 99% of all hospital users
and the top 18 developers (based upon
market share) while excluding the
bottom 33 developers (based upon
market share). This 99% value is based
upon the percentage of users who are
not exclusively using products from
small developers based upon the
threshold. Therefore, in the case of a 50hospital threshold, only 1.4% of
hospital users are exclusively using
products from small developers, and
thus about 99% of the inpatient market
would be covered.
TABLE 3—THRESHOLDS OPTIONS AT THE DEVELOPER LEVEL
Est. number
of users only
using small
developers
Hospitals:
Option
Option
Clinicians:
Option
Option
Option
Est. % of
users only
using small
developers
Est. number
of small
developers
Est. number
of remaining
developers
(a) 100 Threshold .........................................................................
(b) 50 Threshold ...........................................................................
142
56
3.7
1.4
39
33
12
18
(a) 2,000 Threshold ......................................................................
(b) 1,000 Threshold ......................................................................
(b) 500 Threshold .........................................................................
21,075
11,251
7,828
3.1
1.6
1.1
176
160
146
31
47
61
Data Source: ONC analysis of 2019 CMS Promoting Interoperability Program Data & CHPL.
ddrumheller on DSK120RN23PROD with PROPOSALS2
If we implement the Insights
Condition, including the proposed
thresholds, as proposed, and if we
subsequently determine that the market
differs from 2019 (the year upon which
these proposed thresholds are based)
and the goal of covering approximately
99% of the inpatient and outpatient
market share cannot be met with the
proposed thresholds, we will intend to
revisit the proposed thresholds to
ensure coverage goals are being met. We
request comment on this approach for
setting thresholds.
4. Insights Condition and Maintenance
of Certification’s Process for Reporting
We propose in § 170.407(b)(1) that, as
a Maintenance of Certification
requirement for the Insights Condition,
health IT developers of certified health
IT must submit responses every six
months (i.e., two times per year). We
believe overall that semiannual
reporting would provide more
actionable and valuable data, including
enabling us to recognize trends and
provide more timely information to the
health IT marketplace on the use of
certified health IT. We also believe that
this would provide an appropriate and
balanced reporting period to review
developer of certified health IT
responses to the criteria, as well as base
any enforcement actions as necessary
under the Program. Therefore, we
358 https://www.federalregister.gov/d/2020-07419/
p-724.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
propose in § 170.407(b)(1) to require
response submissions to be due
semiannually, that is, twice a year, for
any applicable certified Health IT
Module(s) that have or have had an
active certification at any time under the
Program during the prior six months.
We intend to align reporting
requirements for the Insights Condition
with our Program’s ‘‘Attestations’’
Condition and Maintenance of
Certification requirement (85 FR 25781)
to reduce reporting burden for health IT
developers of certified health IT.
The HITAC recommended that ONC
begin and end the reporting periods
mid-year, ensuring that certain public
health data (e.g., influenza
immunizations) coincide with the
reporting period.359 Our proposal aligns
with the HITAC’s recommendation
while also reducing burden for health IT
developers of certified health IT by
proposing to align with the calendar
year identical to other Program
requirements (i.e., Attestations),360 as
well as aiming for overall alignment
among other programs with reporting
requirements (i.e., Promoting
Interoperability performance category of
MIPS and the Medicare Promoting
Interoperability Program).
To further minimize burden, we
propose to provide developers of
certified health IT with ample time to
collect, assemble, and submit their data.
We propose that developers of certified
health IT would be able to provide their
submissions within a designated 30-day
window, twice a year. Under this
proposal, health IT developers of
certified health IT would begin
collecting their data twelve months
prior to the first 30-day submission
window. The first six months of this
period would be the period that health
IT developers of certified health IT
would report on for the first 30-day
submission window. Health IT
developers of certified health IT would
then have the next six months to
assemble this data for reporting. During
the second six months of this period,
health IT developers of certified health
IT would begin collecting data for the
next 30-day submission window and so
on.
For example, if we establish the first
30-day submission window as April 1,
2025, we would expect developers of
certified health IT to begin gathering
data for the first six-month submission
beginning April 1, 2024 (this reporting
period would cover April 2024 through
October 2024) and spend from October
2024 to April 2025 assembling their data
for submission. Meanwhile, we would
expect, under this example, developers
of certified health IT would also be
collecting data for the October 2025
submission during this same period,
from October 2024 to April 2025. This
359 https://www.healthit.gov/sites/default/files/
page/2021-10/2021-09-09_EHRRP_TF_2021__
HITAC%20Recommendations_Report_signed_
508.pdf.
360 https://www.federalregister.gov/d/2020-07419/
p-1580.
PO 00000
Frm 00102
Fmt 4701
Sfmt 4702
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
would allow six months to collect data,
and an additional six months to
assemble and assess that initial data
while simultaneously collecting data for
the following reporting period. With
this approach, we understand that data
is less timely due to a six-month delay,
however we believe it is important to
give health IT developers of certified
health IT reasonable time to assemble
and report their data. Semiannual
reporting will also help mitigate the sixmonth delay of data and may also
reduce data storage burden for health IT
developers of certified health IT.
As stated above, we propose in
§ 170.407(b)(1) to require a developer of
certified health IT with any applicable
Health IT Module(s) that have or have
had an active certification at any time
under the Program during the prior six
months to provide responses to the
Insights Condition of Certification
specified in paragraph (a) of this section
semiannually (i.e., every six months).
We propose in § 170.407(b)(1)(i) that a
developer of certified health IT must
provide responses beginning April 2025
for the following measures: (1)
Individuals’ access to electronic health
information; (2) Applications supported
through certified health IT; (3)
Immunization administrations
electronically submitted to an
immunization information system
through certified health IT; and (4)
Immunization history and forecasts. We
propose in § 170.407(b)(1)(ii) that a
developer of certified health IT must
provide responses beginning April 2026
for the remaining measures: (1) C–CDA
documents obtained using certified
health IT by exchange mechanism; (2)
C–CDA medications, allergies, and
problems reconciliation and
incorporation using certified health IT;
(3) Use of FHIR in apps supported by
certified API technology; (4) Use of
FHIR bulk data access through certified
health IT; and (5) Electronic health
information export through certified
health IT.
We believe that initiating developer
submission of responses for certain
measures (as identified above) in April
2025 would allow us to both calculate
and prioritize data relevant to ONC
policy priorities and broader public
interests. Monitoring patients’ access to
their electronic health information was
identified as priority of the Cures Act,
and ONC has taken major initiatives to
enable that access, including improving
patient access to their EHI through
standard-based APIs. It is critical to
assess the availability and ability for
applications to integrate with EHRs in
order to make that data accessible to
individuals. The COVID–19 pandemic
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
has enhanced the need for electronic
exchange between health care providers
and public health agencies. Therefore,
we are also prioritizing the proposed
measures related to immunization
exchange. We believe the submission of
responses for the remaining specified
measures in April 2026 provides
adequate time for developers of certified
health IT to make necessary changes to
their systems to collect data as
described above—effectively giving
developers from the time this rule is
finalized to April 2025 to modify their
systems to begin collecting data for
submission in April 2026.
We welcome comments on our
proposed approach, as well as the
proposed frequency of reporting, other
frequencies of reporting such as more or
less frequent, and any additional
burdens that should be considered for
health IT developers of certified health
IT to meet the proposed Insights
Condition and Maintenance of
Certification requirements.
We also note that there may be other
factors that could impact a developer of
certified health IT’s ability to easily
collect data to comply with the Insights
Condition’s requirements. For example,
a developer of certified health IT may
have contracts or business agreements
that inhibit the health IT developer’s
ability to collect data from its
customers. We note that in such
scenarios, developers of certified health
IT would need to renegotiate their
contracts if we finalize our proposals.
We expect developers of certified health
IT would work to mitigate any issues
and provisions affecting their ability to
comply with this Condition and
Maintenance of Certification
requirement. Therefore, a developer of
certified health IT that is required to
meet the Insights Condition’s
requirements must submit responses or
may be subject to ONC direct review of
the Conditions and Maintenance of
Certification requirements, corrective
action, and enforcement procedures
under the Program. We believe this is
consistent with the enforcement for any
noncompliance with the Conditions and
Maintenance of Certification
requirements and note that our goal is
to work with health IT developers of
certified health IT to remedy any
noncompliance in a timely manner. We
welcome comments on our approach, as
well as any specific hardships health IT
developers of certified health IT may
encounter with the Insights Condition of
Certification.
We propose that responses to the
Insights Condition would occur via
web-based form and method, consistent
with the requirements in § 3009A(c) of
PO 00000
Frm 00103
Fmt 4701
Sfmt 4702
23847
the PHSA. We note that under the
statute, developers of certified health IT
must report to an ‘‘independent
entit[y]’’ to ‘‘collect the information
required to be reported in accordance
with the criteria established.’’ We
intend to award a grant, contract, or
other agreement to an independent
entity as part of the implementation of
the Insights Condition and will provide
additional details through subsequent
information. We intend to make
responses publicly available via an ONC
website, and we intend to provide
developers of certified health IT the
opportunity to submit qualitative notes
that would enable them to explain
findings and provide additional context
and feedback regarding their
submissions.
Further, we propose a new Principle
of Proper Conduct for ONC-Authorized
Certification Bodies (ONC–ACBs) in
§ 170.523(u) that would require ONC–
ACBs to confirm that applicable health
IT developers of certified health IT have
submitted their responses for the
Insights Condition of Certification
requirements in accordance with our
proposals. We expect that the ONC–
ACBs would confirm whether or not the
applicable health IT developers
submitted responses for the Insights
Condition of Certification requirements
within the compliance schedule. The
intent of this responsibility is not to
duplicate the work of the independent
entity in collecting and reviewing the
response submissions. Rather, it is
instead meant to support the ONC–
ACBs’ other responsibility in
§ 170.550(l) to ensure that health IT
developers of certified health IT are
meeting their responsibilities under the
Conditions and Maintenance of
Certification requirements before
issuing a certification.
We welcome comments on the
proposed Insights Condition and
Maintenance of Certification
requirements.
G. Requests for Information
1. Laboratory Data Interoperability
Request for Information
We seek public feedback that may be
used to inform a study and report
required by Division FF, Title II,
Subtitle B, Ch. 2, Section 2213(b) of the
Consolidated Appropriations Act, 2023
(Pub. L. 117–328, Dec. 29, 2022), or
future rulemaking regarding the
adoption of standards and certification
criteria to advance laboratory data
interoperability and exchange.
E:\FR\FM\18APP2.SGM
18APP2
23848
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
a. Background
ONC has long recognized the
importance of enabling the electronic
exchange of laboratory data and has
addressed laboratory interoperability
through a variety of activities. These
include adoption of multiple
certification criteria and standards
related to laboratory data and
interoperability as part of the Program.
For example, the current certification
criterion ‘‘Transmission to public health
agencies—reportable laboratory tests
and values/results’’ in § 170.315(f)(3)
relates to Electronic Lab Reporting (ELR)
to public health agencies and references
the ‘‘Electronic transmission of lab
results to public health agencies’’
standard in § 170.205(g). Other current
Program criteria and standards
associated with laboratory data
interoperability include:
• ‘‘Computerized provider order
entry—laboratory,’’ certification
criterion (§ 170.315(a)(2));
• ‘‘View, download, and transmit to
3rd party,’’ certification criterion
(includes laboratory test report(s) in
§ 170.315(e)(1)(i)(A)(6));
• ‘‘Transmission to public health
agencies—reportable laboratory tests
and values/results,’’ certification
criterion (§ 170.315(f)(3));
• Laboratory tests, vocabulary
standard (§ 170.207(c));
• Electronic transmission of lab
results to public health agencies,
content standard (§ 170.205(g));
In the proposed rule titled ‘‘2015
Edition Health Information Technology
(Health IT) Certification Criteria, 2015
Edition Base Electronic Health Record
(EHR) Definition, and ONC Health IT
Certification Program Modifications’’
(80 FR 16804), ONC proposed to adopt
certification criteria specific to
laboratory ordering that included HL7
version 2.5.1 Laboratory Order Interface
(LOI) Release 2, Electronic Directory of
Services (eDOS), and Laboratory Results
Interface (LRI) Release 2
Implementation Guides (IGs). However,
with consideration of public comments
on the proposal, ONC did not adopt
these IGs in the 2015 Edition Final Rule
based on a number of factors that
included insufficient readiness of the
best versions of the IGs for the
associated certification criterion (80 FR
62617 and 62685).
The COVID–19 pandemic has
highlighted gaps in laboratory data
exchange, particularly in reporting test
results. Advancing standards-based
exchange of data from the health IT
used by ordering clinicians to
laboratories’ in vitro diagnostics systems
and laboratory information systems, and
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
from laboratories’ systems to public
health agencies and the EHR systems
and other health IT used by health care
providers or patients would be
beneficial to laboratories, other types of
health care providers, patients, and
public health authorities. Over the past
decade, new standards for health data
exchange have emerged and gained
acceptance, such as HL7® Fast
Healthcare Interoperability Resources
(FHIR®), and existing IGs for
transmission of laboratory data using
HL7 v2.5.1 have gained maturity and
could be leveraged to improve
laboratory interoperability.
Section 2213(b) of the Consolidated
Appropriations Act, 2023 includes a
provision directing ONC to conduct a
study (and issue a report to Congress) on
the use of standards for electronic
ordering and reporting of laboratory test
results.361 The provision specifies that
in conducting the study, ONC shall
determine the extent to which clinical
laboratories are using standards for
electronic ordering and reporting of lab
test results, assess trends in laboratory
compliance with such standards and
their effect on the interoperability of
laboratory data with public health data
systems, identify challenges related to
collecting and reporting demographic
and other data with respect to laboratory
test results, identify challenges using or
complying with standards and reporting
laboratory test results with data
elements identified in standards, and
review other relevant areas determined
appropriate by ONC.362
b. Request for Information
We seek public comment generally on
any topics identified above for the
Consolidated Appropriations Act, 2023,
Section 2213(b) study on the use of
standards for electronic ordering and
reporting of laboratory test results, such
as the use of health IT standards by
clinical laboratories, use of such
standards by labs and their effect on the
interoperability of laboratory data with
public health systems, including any
challenges of the types identified above.
We also seek comment on whether ONC
should adopt additional standards and
laboratory-related certification criteria
as part of the ONC Health IT
Certification Program. ONC specifically
seeks comments from the public on the
following:
1. Which implementation guides or
other standards should ONC adopt in
361 H.R.2617—117th Congress (2021–2022):
Consolidated Appropriations Act, 2023, H.R.2617,
117th Cong. (2022), https://www.congress.gov/bill/
117th-congress/house-bill/2617.
362 https://www.congress.gov/bill/117th-congress/
house-bill/2617/text.
PO 00000
Frm 00104
Fmt 4701
Sfmt 4702
certification criteria for health IT
supporting transmittal and receipt of
laboratory orders, laboratory results and
directory of services?
2. The utility and maturity of existing
HL7 v2 and C–CDA standards
supporting laboratory interoperability
and the impact of moving to FHIR-based
laboratory data exchange.
3. What barriers would additional
health IT certification criteria for
laboratory interoperability create for
developers and other interested parties,
and how might this affect adoption and
use of such technology?
4. Would developers of laboratory
information systems or in vitro
diagnostics systems that have not
traditionally submitted products for
certification under the Program seek out
and benefit from certification to criteria
relevant to such developers’ products?
5. Are there any other steps that ONC
and HHS should consider taking to
advance laboratory interoperability?
2. Request for Information on Pharmacy
Interoperability Functionality Within
the ONC Health IT Certification Program
Including Real-Time Prescription
Benefit Capabilities
a. Background
Section 119 of Title I, Division CC of
the Consolidated Appropriations Act,
2021, (Pub. L. 116–260) (CAA), requires
PDP sponsors of prescription drug plans
to implement one or more real-time
benefit tools (RTBTs) after the Secretary
has adopted a standard for RTBTs and
at a time determined appropriate by the
Secretary. The law specified that a
qualifying RTBT must meet technical
standards named by the Secretary, in
consultation with ONC. Section
119(b)(3) also amended the definition of
a ‘‘qualified electronic health record’’ in
section 3000(13) of the PHSA to specify
that a qualified electronic health record
must include or be capable of including
an RTBT. In the 2014 Edition Final
Rule, ONC established the term ‘‘Base
EHR,’’ based on the ‘‘Qualified EHR’’
definition, for use within the ONC
Health IT Certification Program
(Program) (77 FR 54262).
We intend to propose in future
rulemaking the establishment of a realtime prescription benefit health IT
certification criterion within the
Program and include this criterion in
the base EHR definition in § 170.102.
We intend to propose a criterion that
would certify health IT to enable a
provider to view within the electronic
prescribing workflow at the point of
care patient-specific benefit, estimated
cost information, and viable
alternatives. We are also considering a
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
proposal to adopt and reference the
National Council for Prescription Drug
Programs (NCPDP) Real-Time
Prescription Benefit (RTPB) standard
version 12 as part of the potential
certification criterion.363 This standard
would enable the exchange of patient
eligibility, product coverage, and benefit
financials for a chosen product and
pharmacy, and identify coverage
restrictions and alternatives when they
exist.
While we believe that implementing
RTBT functionality required for
inclusion in the Program under the CAA
would be an important step towards
improving prescribing experiences for
providers and patients, we recognize
that it is only one of a series of
capabilities that are part of a
comprehensive workflow for evaluating
and prescribing medications. Other key
processes working in concert with realtime prescription benefit capabilities
may include:
• Drug Interaction Checks.
• Medication History.
• Formulary and Benefit
Management.
• Eligibility Checks.
• Electronic Prior Authorization.
• Electronic Prescribing.
For example, if a prescriber initiates
the real-time prescription benefit
process when the prescriber launches an
electronic prescribing application and
chooses a clinically appropriate
medication, the prescriber may have the
ability to discuss prescription costs and
other options with a patient at the point
of care, and during this same process,
receive notification that a prior
authorization is needed for the
prescription. Within the same workflow,
prescribers could initiate electronic
prior authorization processes, answer
any questions, and complete any other
requirements before transmitting the
electronic prescription to the patient’s
preferred pharmacy. When the patient
arrives at the pharmacy, the medication
could be filled and dispensed
immediately, and the patient would
already be aware of price and copay
responsibility information. This
scenario is only one of many
possibilities.
Today, the Program addresses these
additional capabilities in a limited
manner. For instance, in the ONC Cures
Act Final Rule, ONC adopted NCPDP
SCRIPT standard version 2017071 and
updated the ‘‘electronic prescribing’’
certification criterion in
363 For further information about implementing
the NCPDP RTPB standard version 12, see resources
at https://standards.ncpdp.org/Access-toStandards.aspx.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
§ 170.315(b)(3)(ii) to reflect this
standard, including specifying
electronic prior authorization
transactions supported by the standard
as optional transactions, which health
IT developers can elect to have
explicitly tested, or not, as part of
certification of a product to
§ 170.315(b)(3) (85 FR 25680).
A ‘‘drug-formulary and preferred drug
list checks’’ certification criterion had
been established for the 2015 Edition in
§ 170.315(a)(10) but was later removed
from the Program by the ONC Cures Act
Final Rule (85 FR 25660). ONC removed
the criterion due to the lack of
associated interoperability standards
and to reduce certification burden on
developers as this functionality had
been widely adopted across industry.
We request comment from the public
about specific issues related to
establishing a certification criterion
using NCPDP RTPB standard version 12
and other potential actions that could
support complementary and
interoperable workflows. Given the
statutory definition in PHSA § 3000(13)
of ‘‘qualified electronic health record’’
as an electronic record of health-related
information on an individual that
includes, or is capable of including,
RTBT functionality, we seek to
understand whether ONC should offer
or require certification of other
capabilities to optimize the value of
real-time prescription benefit
capabilities to clinicians and patients.
First, we present in section III.G.2.c
(below) a series of scenarios and specific
questions regarding the real-time
prescription benefit criterion we intend
to establish through future rulemaking.
Areas for input include: the specific
transactions that should be included in
the criterion; amendments to
conformance requirements related to the
NCPDP RTPB standard version 12 that
we believe may help to improve
interoperability; and whether to propose
a certification criterion, or propose
revisions to an existing criterion, that
would require for certification certain
segments and vocabularies that are
optional or situational within the
NCPDP RTPB standard.
We then turn in section III.G.2.d
(below) to the broader electronic
prescribing ecosystem for pharmacy
interoperability. Specific areas for input
include: whether ONC should adopt
additional standards and certification
criteria that support real world
electronic prescribing workflows;
whether ONC should explore
developing certification criteria bundles
that mimic real world workflows; and
how ONC should approach structuring
certification criteria for Health IT
PO 00000
Frm 00105
Fmt 4701
Sfmt 4702
23849
Modules that must interact as part of
these workflows.
Reviewers who may be interested in
commenting on this RFI are encouraged
while reviewing it to consider identified
data, standards and specifications, and
technical capabilities from an ecosystem
perspective. Commenters are also
encouraged to consider interoperability
between certified Health IT Modules
and other relevant systems, including
third-party applications, electronic
prescribing networks and
intermediaries, drug knowledge
databases and content provider systems,
pharmacy information systems,
prescription benefit manager systems,
and payer systems. Further, we are
interested in commenters’ views on how
developers of certified health IT may be
able to support drug price transparency,
patient choice, and meet other market
demands while ensuring reliable and
trusted performance.
c. Real-Time Prescription Benefit
Certification Criterion
i. Potential Transactions and
Capabilities To Test
ONC is currently considering
certification testing scenarios that
would assess the capacity of the Health
IT Module under test to: capture data
specified in the NCPDP RTPB standard
version 12; format a RTPB Request
transaction; and deliver a RTPB Request
transaction to a processor, prescription
benefit manager, or adjudicator either
directly or via an intermediary or
switch. As part of these potential testing
scenarios, Health IT Modules would
also need to demonstrate the capacity
to: receive a RTPB Response transaction;
display RTPB Response information for
the health care provider to review
within their electronic prescribing
workflow; and (potentially) to display
RTPB Response information for a
patient.
Specifically, we are considering a set
of scenarios in which the Health IT
Module under test would need to
demonstrate capacity:
• That allows end users to choose a
specific patient, product, and pharmacy,
then successfully transmit a request for
patient and product specific benefit
information directly to a Pharmacy
Benefit Manager (PBM), or optionally to
a PBM through an intermediary;
• To receive a response correctly
displaying price and coverage details of
the submitted and covered products,
including alternative pharmacies or
medications;
• To receive a response correctly
displaying that a component of the
request (e.g., quantity) is not covered;
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
23850
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
• To receive a response correctly
displaying a message indicating ‘‘Patient
not found’’ or ‘‘Patient not eligible;’’
• To receive a response correctly
displaying the identified product is
considered a benefit exclusion;
• To receive a response correctly
displaying the identified product is not
on the patient’s formulary;
• To receive a response correctly
displaying Step Therapy is required;
• To receive a response correctly
displaying a Drug Utilization Evaluation
(DUE) Alert;
• To receive a response correctly
displaying Out-of-Network pharmacy;
• To receive a response correctly
displaying Out-of-Network provider;
• To receive a response correctly
displaying the submitted provider is not
an allowed provider;
• To receive a response correctly
displaying Prior Authorization is
required;
• To receive a response correctly
displaying not an allowed pharmacy (a
pharmacy, mail order pharmacy,
specialty pharmacy, or other restricted
pharmacy where the product may not be
covered); and
• To receive status and error
messages such as ‘‘Transmission
accepted and transaction processed,’’
‘‘Transmission accepted and transaction
not processed,’’ and ‘‘Transmission
rejected, and transaction not processed’’
for different scenarios.
ONC requests comment on whether
inclusion of these testing scenarios
under a real-time prescription benefit
certification criterion would effectively
test a certified Health IT Module’s
capacity to successfully send and
receive RTPB transactions in accordance
with the NCPDP RTPB standard version
12, specifically:
• Is the set of testing scenarios
described above appropriate for a realtime prescription benefit certification
criterion?
• Should ONC consider other testing
scenarios as part of a real-time
prescription benefit certification
criterion?
• Are there other testing
considerations ONC should take into
account in structuring a real-time
prescription benefit certification
criterion?
ONC is also considering ways to
support the standardized capture and
exchange of negotiated price, as
required in Section 119 of the CAA.
Section 119(a)(2) of the CAA specifies
‘‘[c]ost-sharing information and the
negotiated price for such drug and such
alternatives at multiple pharmacy
options, including the individual’s
preferred pharmacy and, as applicable,
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
other retail pharmacies and a mail order
pharmacy,’’ as information that
technology meeting the definition of
‘‘qualified electronic health record’’ in
PHSA § 3000(13)(C), as added by section
119(b)(3) of the CAA, must be capable
of incorporating. In the 2019
‘‘Modernizing Part D and Medicare
Advantage to Lower Drug Prices and
Reduce Out-of-Pocket Expenses’’
proposed rule, CMS encouraged, but did
not propose to require, plans to use
RTBTs to promote full drug cost
transparency by showing each drug’s
negotiated price in addition to the
beneficiary’s out-of-pocket cost (83 FR
62166). CMS has also encouraged plans
to provide additional cost data
comparing the beneficiary and plan cost
comparisons for each drug and its
alternatives.
The NCPDP RTPB standard version 12
does not include fields to support the
exchange of negotiated price. We
understand that this information was
not included because of concerns
regarding the confidentiality of drug
pricing agreements as well as the
inherent challenges in determining the
negotiated price in real time—for
example, rebates calculated later, the
definition of negotiated price under
revision, and exclusion of Usual and
Customary price information. We seek
comment on the value of negotiated
price to patients and prescribers to aid
in their discussions and decisionmaking during prescribing. Patient costsharing responsibilities are often driven
by their plan design, deductible, copay
requirements, and other related factors,
thus it is unclear whether including
such information will improve the
utility or usability of technology
certified to a real-time prescription
benefit certification criterion.
ii. Requirements for Use of XML or EDI
Format
The NCPDP RTPB standard version 12
supports the exchange of RTPB
transactions in both extensible markup
language (XML) and electronic data
interchange (EDI) formats. We
understand that the pharmacy industry
is currently moving away from EDI for
reasons that include its lack of
flexibility and human readability as
well as EDI’s higher overall
development and maintenance costs.
XML defines a set of rules for encoding
documents in a format that is both
human and machine readable and
allows developers to create and manage
their own XML files, but this high level
of customizability may pose challenges
during exchange. The NCPDP RTPB
standard version 12 Implementation
Guide contains guidance intended to
PO 00000
Frm 00106
Fmt 4701
Sfmt 4702
assist alignment across exchange
partners. XML also facilitates
compliance with the FDA’s
requirements for prescription drug
labeling submissions,364 improves
patient safety and enhances
manufacturing efficiencies.
The NCPDP SCRIPT standard version
10.6 adopted in § 170.205(b)(2) and
referenced by the electronic prescribing
criterion in § 170.315(b)(3)(i) supports
both EDI and XML format. However, the
ONC Cures Act Final Rule adopted the
NCPDP SCRIPT standard version
2017071 in § 170.205(b)(1) and finalized
an updated version of the ‘‘Electronic
prescribing’’ criterion in
§ 170.315(b)(3)(ii) to reference this
standard, which only supports the use
of XML (85 FR 25678). Certification to
the § 170.205(b)(2) criterion has not
been available since June 30, 2020. The
real world testing provisions in
§ 170.405(b)(5) required developers with
health IT certified to § 170.315(b)(3)
prior to June 30, 2020, to update the
technology to provide customers of that
health IT to be compliant with
§ 170.315(b)(3)(ii) and provide the
updated technology to their customers
by December 31, 2022. However, a
variety of health IT products that
support the older NCPDP SCRIPT
standard version 10.6 may remain in
use—including by entities who do not
use certified health IT and do not need
to meet Medicare Part D requirements
for electronic prescribing transactions.
We are concerned that legacy or other
health IT may not be prepared to adopt
XML at this time and that there may be
challenges exchanging data between
systems conformant only with EDI and
those conformant only with XML. We
are seeking comment on whether the
real-time prescription benefit
certification criterion under
consideration should only require and
test XML format or both XML and EDI
formats.
iii. Requirements for Use of NDC or
RxNorm Codes
The NCPDP RTPB standard version 12
supports the exchange of RTPB
transactions containing both NDC and
RxNorm code sets. National Drug Codes
(NDC) provide a unique identifier for
products such as vaccines or
medications. Each product is assigned a
unique 10- or 11-digit, 3-segment
number that identifies the labeler,
product, and trade package size.
RxNorm is a drug terminology providing
a set of normalized medication names
364 https://www.fda.gov/industry/fda-datastandards-advisory-board/structured-productlabeling-resources.
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
and codes based on a collection of
commonly used public and commercial
vocabularies of drug names and their
ingredients. The National Library of
Medicine provides an RxNorm unique
identifier of drug substance and dose
form to identify all the products that
contain the same substance. Each of
these coding systems serves an
important role in supporting medication
matching, medication reconciliation,
formulary checks, drug allergy checks,
clinical decision support, and other
clinical and operational applications.
However, because these coding systems
were created by different contributors at
different times and for different
purposes, their content coverage varies,
as does their use in health IT.
The NCPDP RTPB standard version 12
supports the exchange of representative
NDCs in transactions originating from
prescribing providers, which may be
any NDC belonging to the same product
concept that is nationally available, not
repackaged, not obsolete, not private
label, and not unit dose (unless it is the
only NDC available). A product concept
describes a medication or nonmedication product that has the same
active ingredient, strength, route, dosage
form, drug delivery system or
packaging, or therapeutic use/
indication. Product concepts also have
brand and generic distinctions. The
Centers for Disease Control (CDC) has
also developed NDC and CVX crosswalk
resources to facilitate the use of NDCs
for vaccines.365
RxNorm (currently adopted in
§ 170.207(d)(3) and proposed in
§ 170.207(d)(1), see section III.C.3 of this
preamble) is required in the electronic
prescribing certification criterion in
§ 170.315(b)(3)(ii)(A) and (B) as a
minimum standard code set for a drug.
Where no RxNorm code exists, nothing
prohibits another allowable code from
being used; however, where
corresponding RxNorm codes exist,
certified health IT must be able to use
those codes. Under the NCPDP RTPB
standard version 12, NDC is required
and RxNorm is situational, where
RxNorm is required only when
populated in the RTPB Product
Segment. The Product Segment is
mandatory for an RTPB request. We are
concerned that ‘‘situational’’ may be
viewed as optional by health IT
developers seeking certification, leading
to a lack of coded values. Missing codes
may limit the utility of this data for
clinical decision support and pharmacy
interoperability and have negative
365 https://www2a.cdc.gov/vaccines/iis/
iisstandards/ndc_crosswalk.asp.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
downstream effects on claims and
billing.
ONC has received comments and
feedback from the HITAC and other
industry participants stressing the need
to reconcile the use of NDC and RxNorm
codes, and to support accurate NDCRxNorm mapping.366 The
Interoperability Standards Priorities
Task Force 2021 Recommendations
Report included a recommendation that
‘‘ONC work with FDA, NLM and CMS
to continue to harmonize NDC to
RxNorm, treating RxNorm as the source
terminology set, and to harmonize
administrative and electronic
prescribing standards to use RxNorm as
the single source of clinical data for
clinical care, research and
administrative workflows, replacing
NDC for such purposes.’’ 367
We believe that requiring RxNorm in
addition to NDC for a real-time
prescription benefit criterion could
facilitate the adoption, maintenance,
and harmonization between NDC and
RxNorm. However, we understand that
adoption alone will not support concept
and code mapping between NDC and
RxNorm. We are requesting comment on
whether a potential real-time
prescription benefit certification
criterion should require demonstration
of compliance with both NDC and
RxNorm, specifically:
• Would requiring demonstration of
compliance with both NDC and RxNorm
in a real-time prescription benefit
criterion support improved adoption,
maintenance, and harmonization
between code sets?
• How would requiring Health IT
Modules to demonstrate compliance to
both code sets for certification to a realtime prescription benefit criterion affect
implementation of this capability? What
benefits would this have for health care
providers and other participants that
support real-time prescription benefit
transactions?
• What burden would demonstration
of compliance with both code sets
impose on developers of seeking or
maintaining certification of Health IT
Modules to this criterion?
• Would either NDC or RxNorm alone
provide sufficient information for
applications to provide reliable,
accurate clinical decision support, such
as dosing guidance, drug-drug
interaction or drug allergy checks?
• What would be the consequences
(positive or negative, intended or
366 See https://www.healthit.gov/sites/default/
files/facas/2019-09-17_ISP_TF_Draft_Final_Report_
508.pdf.
367 See https://www.healthit.gov/hitac/
committees/interoperability-standards-prioritiestask-force-2021.
PO 00000
Frm 00107
Fmt 4701
Sfmt 4702
23851
unintended) of establishing ‘‘RxNorm as
the single source of clinical data for
clinical care, research and
administrative workflows, replacing
NDC for such purposes,’’ as
recommended by the HITAC? 368
iv. ICD–10–CM and SNOMED–CT in the
Clinical Segment
The Clinical Segment in the NCPDP
RTPB standard version 12 is used to
specify diagnosis information associated
with the prescription. Under this
version of the standard, the segment is
situational, meaning if it is used, it
should be included in a RTPB Request
transaction. It is required when needed
for coverage determinations and assists
with claims submissions and
processing. However, if the Clinical
Segment is not sent, diagnosis codes
may not be transmitted to PBMs, which
provide oversight for (and are
sometimes delegated the responsibility
of) coverage determinations and
redeterminations. Given the importance
of this information, ONC is strongly
considering specifying mandatory use of
the Clinical Segment (rather than
situational use) in RTPB Request
transactions as part of a future proposal
for a real-time prescribing benefit
certification criterion.
The Clinical Segment specified in the
NCPDP RTPB standard version 12
supports a DiagnosisCodeQualifierCode
element that qualifies the external code
list used for medication-associated
diagnosis, supporting both the
International Statistical Classification of
Diseases and Related Health Problems
(ICD) and SNOMED CT. SNOMED CT is
a clinical healthcare terminology and
infrastructure that provides a common
language that enables a consistent way
of capturing, sharing and aggregating
health data across specialties and sites
of care. SNOMED CT can serve as a
common language between ICD–10–CM
and ICD–11 and may help developers
and providers during the transition
between ICD versions should ICD–11 be
adopted.
ONC seeks comments that may help
inform our consideration of whether to
require the Clinical Segment in the
NCPDP RTPB standard version 12 as
part of any future real-time prescription
benefit certification criterion, and
whether to require that Health IT
Modules under pre-certification testing,
real world testing after certification, and
(as applicable) ONC–ACBs’ in-the-field
surveillance for such criterion
368 See https://www.healthit.gov/sites/default/
files/page/2021-07/2021-06-09_ISP_TF_2021_
HITAC%20Recommendations_Report_Signed_
508.pdf.
E:\FR\FM\18APP2.SGM
18APP2
23852
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
demonstrate use of both ICD–10–CM
and SNOMED CT within the Clinical
Segment. Such requirements could
specify that the technology must be able
to transmit diagnosis codes for the
patient in the RTPB Clinical Segment
and be consistent with ICD–10–CM and
SNOMED CT. Further, the RTPB
Clinical Segment must be able to
support up to two diagnosis codes to be
fully conformant with the NCPDP RTPB
Standard Implementation Guide,
Version 12. Specifically, we are
requesting comment on the following:
• Would a requirement to
demonstrate use of both ICD–10–CM
and SNOMED CT within the Clinical
Segment as part of an RTPB certification
criterion support a more seamless
transition between ICD–10–CM and
ICD–11, in the event ICD–11 is adopted?
Are there other benefits to requiring
certified Health IT Modules demonstrate
compliance with both terminologies?
• What additional burden would
demonstration of compliance with both
ICD–10–CM and SNOMED CT impose
on health IT developers seeking or
maintaining certification of Health IT
Modules to a real-time prescription
benefit criterion?
v. Patient Specific Benefit Information
One of the most challenging areas of
real-time prescription benefit
functionality is the need to match
patient records to their medical and
pharmacy benefit records in order to
facilitate the exchange of patient
specific benefit information between
pharmacies, EHRs, and PBMs/
adjudicators. We are currently
considering requiring real-time
prescription benefit implementation
within the electronic prescribing
workflow and requiring health IT
certified for electronic prescribing
capabilities be capable of ingestion and
integration of this information. In
addition, we expect health care
providers will typically send a NewRx
soon after receiving an RTPB Response
transaction. In order to better support
these transactions and support
improved patient matching we are
considering a more comprehensive
Patient Segment than that which is
required in the NCPDP RTPB standard
version 12.
After reviewing and comparing
Patient Segments across NCPDP SCRIPT
standard version 2022011, NCPDP RTPB
standard version 12, and the NCPDP
Formulary and Benefit standard version
54, we are considering requiring support
for the patient identity segment as
outlined in NCPDP SCRIPT standard
version 2022011 as part of a real-time
prescription benefit certification
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
criterion. We acknowledge that both
NCPDP SCRIPT standard version
2022011 and NCPDP RTPB standard
version 12 support the exchange of
unique, but not universal, identifiers
produced by vendors, but because not
all providers have access to these
services, and patients lack access to
these types of unique identifiers,
demographics-based patient matching
must also be enabled to support most
health care providers and patients
across the country.
We are requesting comment on
whether a real-time prescription benefit
certification criterion should require
conformance to the Patient Segment
specified in NCPDP SCRIPT standard
version 2022011 (replacing the NCPDP
RTPB standard version 12 Patient
(Demographic) Segment) to support the
identification and linkage of records
needed to support the successful
exchange of patient-specific benefit
information, specifically:
• Would requiring the Patient
Segment identified in NCPDP SCRIPT
standard version 2022011 as part of a
real-time prescription benefit
certification criterion support improved
patient matching?
• What additional burden would
requiring the Patient Segment identified
in NCPDP SCRIPT standard version
2022011 as part of a real-time
prescription benefit certification
criterion impose on health IT
developers seeking to certify Health IT
Modules to this criterion?
• Should ONC consider requiring
alternative or additional demographic
data elements or sets of demographic
data elements as part of a real-time
prescription benefit certification
criterion to further improve patient
matching? For instance, should ONC
consider requiring the Patient
Demographics/Information data class
identified in USCDI Version 3? What
additional benefit would this offer to
health IT developers, health care
providers, patients, and the healthcare
industry in general? What additional
burden would these or other alternatives
impose on health IT developers?
vi. System and Workflow Integration
As added by Section 119 of the CAA,
section 3000(13)(C) of the PHSA
specifies that a qualified electronic
health record: ‘‘includes, or is capable of
including, a real-time benefit tool that
conveys patient-specific real-time cost
and coverage information with respect
to prescription drugs that, with respect
to any health information technology
certified for electronic prescribing, the
technology shall be capable of
incorporating the information described
PO 00000
Frm 00108
Fmt 4701
Sfmt 4702
in clauses (i) through (iii) of paragraph
(2)(B) of section 1860D–4(o) of the
Social Security Act.’’ We believe that
PHSA § 3000(13)(C) as a whole requires
that a real-time prescription benefit
certification criterion must require a
Health IT Module certified to the
criterion to demonstrate capabilities
both to convey real-time prescription
benefit information and ingest and
integrate real-time prescription benefit
information for use by other health IT
services, components, or combinations
thereof that are part of the electronic
prescribing workflow. While we expect
some health IT developers may plan to
develop real-time prescription benefit
functionality as part of a suite of
electronic prescribing capabilities
contained within one health IT product,
we also expect that some health IT
developers who participate in the ONC
Health IT Certification Program may
prefer to obtain certification to a
criterion that allows them to leverage a
third-party real-time prescription
benefit tool. Under such a certification
approach, we would seek to ensure
through requirements and testing for
conformance to those requirements that
integration between systems is
conducted effectively.
Workflow integration refers to the
capacity of health IT to launch and
perform all functions within the
electronic prescribing workflow without
the need for the user to sign into a
separate web-based platform or
otherwise leave the electronic health
record system, or prescribing
application, user interface to send and
receive RTPB transactions. Data
integration refers to the capacity of a
receiving system to receive, ingest, and
reuse all data elements received in
accordance with the standards and other
requirements as stated in a certification
criterion. For instance, for electronic
prescribing, data integration is
necessary for health IT to conduct drug
interaction checks and alerts. In realtime prescription benefit processes, data
integration embeds patient-specific
benefit, estimated cost information, and
viable alternatives into the electronic
prescribing workflow at the point of
care.
We believe that a real-time
prescription benefit certification
criterion should address concepts of
both workflow and data integration in
order to facilitate, where lawful and
appropriate, the free flow of and reuse
of EHI and other prescription benefits
data across the healthcare landscape
and reduce burden and high potential
for error associated with manual data
entry, translation across disparate
formats and standards, and other
E:\FR\FM\18APP2.SGM
18APP2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
challenges related to limited
interoperability. For instance, as part of
a certification criterion, we could
require systems under test to
demonstrate the capacity to integrate
and reuse data received through
transactions sent by PBMs or through
intermediaries. We are seeking comment
on how to address the statutory
requirements and policy goals for the
criterion with respect to workflow and
data integration:
• How can ONC most effectively
address the definition of ‘‘qualified
electronic health record’’ in PHSA
§ 3000(13)(C) as added by the CAA to
achieve the benefits of workflow and
data integration while minimizing
potential burden on health IT
developers seeking to certify health IT
to the real-time prescription benefit tool
criterion?
• Should ONC consider alternative
paths to certification to a real-time
prescription benefit criterion based on
whether a Health IT Module relies on a
third-party application or other
intermediary to successfully
demonstrate full integration and
capacity to reuse the data that received
from other systems involved in real-time
prescription benefit information
exchange?
• How should ONC address
alignment of a real-time prescription
benefit criterion to the electronic
prescribing criterion in § 170.315(b)(3)?
ddrumheller on DSK120RN23PROD with PROPOSALS2
vii. Real Time Prescription Benefit
Certification Scope
Medications are likely to be the
primary product type chosen by health
care providers when initiating real-time
prescription benefit processes at this
time. However, the COVID–19
pandemic highlighted the need to
ensure vaccine availability in various
care settings including pharmacies, as
well as needs to collect, aggregate, and
report information to immunization
registries and submit reimbursement
claims for administering vaccines to
patients. Requiring health IT certified to
a real-time prescription benefit criterion
to support RTPB transactions that
include vaccines could lead to higher
levels of benefit coverage for vaccines
obtained from contracted pharmacies,
improved eligibility checks, and lower
out of pocket costs for routine
preventive care that is covered by most
plans. In addition, technology certified
to a real-time prescription benefit
criterion could also support RTPB
transactions for medical devices or
supplies and exchange this data using
device identifiers supported by the
NCPDP Formulary and Benefit standard.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
The NCPDP RTPB standard version 12
will continue to mature and evolve over
time in response to new or unidentified
challenges and as needs emerge. We
believe that one area of the standard in
need of advancement and alignment is
how the standard supports the exchange
of unique identifiers for devices. The
FDA has discontinued use of legacy
FDA identification numbers assigned to
devices (21 CFR 801.57) where National
Health-Related Item Codes (NHRIC) or
NDCs assigned to devices are rescinded,
and manufacturers may no longer
provide an NHRIC or NDC on the label
of their devices or on any device
package. The FDA has since released
guidance 369 stating that it would not
object to the use of NDCs on device
labels and device packages for finished
devices that are manufactured and
labeled prior to September 24, 2023.
We are requesting comments on
whether a real-time prescription benefit
criterion should also require
demonstration of support for products
that are not defined as medications but
may also be included in a RTPB
transaction, namely vaccines and
medical devices or supplies,
specifically:
• What benefits would come from
supporting the exchange of prescription
benefit information for vaccines,
medical devices, or supplies?
• What challenges would be involved
in supporting the exchange of
prescription benefit information for
vaccines, medical devices, or supplies?
• What additional burden would
exchange of information on vaccines,
medical devices, or supplies as part of
a certification criterion impose on
health IT developers?
• To what extent should ONC require
as part of certification to a real-time
prescription benefit criterion support for
devices or supplies as defined within
the NCPDP RTPB standard version 12?
• Alternatively, should ONC require
conformance to the NCPDP Formulary
and Benefit Standard for devices? The
NCPDP Formulary and Benefit Standard
supports the exchange of UDIs for
devices, and adoption of this standard
may support other critical RTPB
processes. What are effective ways to
support accurate device identification
within and beyond the real-time
prescription benefit workflow, while
aligning with FDA regulations and
related requirements?
• What additional opportunities
might arise from requiring conformance
to the NCPDP Formulary and Benefit
Standard?
369 https://www.fda.gov/media/95794/download.
PO 00000
Frm 00109
Fmt 4701
Sfmt 4702
23853
d. Health IT Ecosystem for Pharmacy
Interoperability
We seek information on formulary
and benefit management and electronic
prior authorization capabilities that
work in tandem with real-time
prescription benefit functionality in the
context of electronic prescribing
workflows.
i. Formulary and Benefit Management
When used appropriately, formularies
can help manage drug costs without
negatively impacting patient health. For
example, tiered formularies allow
providers and patients to choose lower
cost medications for the same clinical
indication. With more accurate and
timely formulary and benefits data,
providers can demonstrate better
management of care for their high-risk
patients, reducing time-to-therapy with
less administrative overhead. Providers
who have access to a formulary can use
this information to determine
appropriate medications consistent with
a patient’s pharmacy benefit prior to
submitting a benefit check.
ONC previously finalized a ‘‘drugformulary and preferred drug list
checks’’ certification criterion for the
2015 Edition of health IT certification
criterion in § 170.315(a)(10); however,
ONC did not adopt the NCPDP
Formulary and Benefit standard to
support this criterion. In the 2015
Edition Proposed Rule, ONC proposed
to require a Health IT Module to receive
and incorporate a formulary and benefit
file using the NCPDP Formulary and
Benefit standard version 3.0 370 (80 FR
16821). However, in the 2015 Edition
Final Rule, ONC noted responses from
commenters that the static, group-level
formularies supported by the proposed
standard did not provide desired
information about individual patient
benefits and cost sharing. Commenters
also suggested that it was not necessary
for ONC to offer certification to this
functionality because most health IT
systems already supported NCPDP’s
Formulary and Benefit standard version
3.0 due to the Medicare Part D
electronic prescribing requirements. For
these reasons, ONC did not finalize use
of the standard as a requirement under
the ‘‘Drug-formulary and preferred drug
list checks’’ certification criterion in
§ 170.315(a)(10) (80 FR 62623).
The ONC Cures Act Final Rule
removed the ‘‘drug-formulary and
preferred drug list checks’’ criterion
from the Program as of January 1, 2022
(85 FR 25660). We stated that we were
retiring the criterion because it was a
370 https://standards.ncpdp.org/Access-toStandards.aspx.
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
23854
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
functional criterion that did not require
the use of any specific interoperability
standards, and therefore did not provide
sufficient value to health care providers
or patients to justify the criterionspecific Program compliance burden on
developers and health care providers.
We also stated that we did not believe
it was necessary to continue to require
certification of the functionality under
the Program in order to ensure it
remained widely available (85 FR
25661).
We note that formulary validation is
now ubiquitous across the healthcare
industry, using distributed formulary
and benefit files. Multiple parties are
involved in creating, processing, and
disseminating these files, and any
variation in timing, scope, processing
burden, and accessibility introduces
additional complexity and delays.
Because each health IT developer
follows different schedules, for
example, information may be out-ofdate by the time the health care provider
views it in the electronic health record
or electronic prescribing application. In
addition, the increasing size of these
formulary files have led to an increase
in the time and resources it takes for a
health IT developer to process this data
to be available for health care providers
when they need it. All these factors may
call into question the timeliness and
accuracy of the formulary data available
to health care providers at any given
time, and any discrepancy between the
medication prescribed and its formulary
data may impede the success of realtime prescription benefit processes, and
slow claims and billing workflows.
Simply checking whether a formulary
exists for a given medication is no
longer sufficient to support the
interoperability of formulary and
benefits data, especially as real-time
prescription benefit and other
capabilities emerge that more heavily
rely on the real-time availability of
accurate formulary data.
While ONC previously declined to
finalize the NCPDP Formulary and
Benefit standard version 3.0 371 in the
retired ‘‘Drug-formulary and preferred
drug list checks’’ criterion, we note that
the Standard continues to evolve to
provide pharmacy benefits managers
and payers ways to communicate
formulary and benefits information to
providers via health IT. The NCPDP
Formulary and Benefit standard version
53 includes significant changes and
updates since NCPDP Formulary and
Benefit standard version 3.0, and many
of these changes address some of the
371 https://standards.ncpdp.org/Access-to-
Standards.aspx.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
issues identified in NCPDP Formulary
and Benefit standard version 3.0 that
prevented ONC from finalizing it
previously. For example, formulary and
benefit files have been normalized,
made smaller, reusable, and valid only
during specified time periods. The
alternative and step medication file size
has also been reduced and further
developed to support diagnostic codes.
The step medication files support a
more complex step medication program,
and coverage files have been updated to
include support for electronic prior
authorization and specialty
medications. The copay files have been
updated to allow a minimum and
maximum copay range without a
percent copay and support for benefit
stage copay/deductibles, pharmacy
network support, Medicare Part D
support and approximate drug cost.
Use of technology conformant to the
NCPDP Formulary and Benefit standard
can support real-time prescription
benefit processes by helping clinicians
avoid prescriptions that are not covered
by a patient’s pharmacy benefit or are
more expensive than other prescriptions
clinically appropriate for the indication.
The standard also improves efficiency
in several ways, helping providers avoid
callbacks and the need for additional
clarifications on prescriptions or prior
authorizations, reducing provider
reliance on fax and prescribing burden
overall.
We seek comment on whether we
should further explore capabilities for
Health IT Modules to support access to
formulary and benefits information,
specifically:
• Should ONC propose a new
certification criterion that would enable
a user to use a Health IT Module to
obtain formulary and benefits
information using a more recent NCPDP
Formulary and Benefit standard?
• What current challenges do health
care providers face in obtaining
formulary and benefit information and
would a standards-based criterion help
to address these challenges?
• Should ONC consider incorporating
functionality using the NCPDP
Formulary and Benefit standard within
the potential real-time prescription
benefit criterion discussed above, rather
than creating an independent criterion
for formulary and benefits functionality?
• What are the key benefits health
care providers would likely experience
from availability of functionality within
certified health IT utilizing the most
recent NCPDP Formulary and Benefit
standard? If formulary check
capabilities have already been widely
adopted, how would certification of
these capabilities benefit providers?
PO 00000
Frm 00110
Fmt 4701
Sfmt 4702
ii. Electronic Prior Authorization
After receiving a RTPB Request
transaction, a processor, PBM, or
adjudicator will determine eligibility for
the identified patient and determine if
the product requires prior authorization.
In the RTPB Response, a health care
provider may receive notification that a
prior authorization is needed for the
prescription. Health care providers may
benefit from being able to initiate an
electronic prior authorization process
within the same workflow. For example,
within the same interface, health care
providers should be able to quickly
switch from real-time prescription
benefit functionality to electronic
prescribing functionality, and send
electronic prior authorization
transactions (e.g., PAInitiationRequest,
PARequest) in accordance with the
‘‘Electronic prescribing’’ criterion in
§ 170.315(b)(3), then return to real-time
prescription benefit functionality to
complete those processes before the
prescription is electronically
transmitted to the patient’s preferred
pharmacy.
As noted above, the ONC Cures Act
Final Rule adopted the NCPDP SCRIPT
standard version 2017071 and updated
the ‘‘Electronic prescribing’’
certification criterion in
§ 170.315(b)(3)(ii) to reflect this
standard, including four transactions for
electronic prior authorization specified
as optional (85 FR 25678). We stated
that we adopted these transactions to
support alignment with the ‘‘Secure
Electronic Prior Authorization for
Medicare Part D’’ proposed rule (84 FR
28450), in which CMS proposed to
require Part D plan sponsors to support
version 2017071 of the NCPDP SCRIPT
standard for four electronic Prior
Authorization (ePA) transactions, and
that prescribers would be required to
use that standard when performing ePA
transactions for Part D covered drugs
they wish to prescribe to Part D eligible
individuals (85 FR 25685). CMS
subsequently finalized this policy in the
‘‘Secure Electronic Prior Authorization
for Medicare Part D’’ final rule with a
compliance date of January 1, 2022 (85
FR 86824).
We invite comments on the potential
incorporation of these transactions into
the ‘‘Electronic prescribing’’
certification criterion and whether we
should consider requiring certification
to these transactions in a future
rulemaking.
iii. Certification Approaches
The formulary and benefit
maintenance, real-time prescription
benefit, electronic prior authorization,
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
and electronic prescribing capabilities
discussed in this RFI are intended to
comprise the elements of a unified
electronic prescribing workflow. The
capabilities and supporting standards
noted in this RFI reflect shared data and
code sets designed to facilitate re-use of
data across the workflow and
interoperability across systems. While
the Program only includes one
pharmacy interoperability criterion at
this time (electronic prescribing), we
believe that the addition of capabilities
contemplated in this RFI may require a
different approach to the Program’s
design, policy, and testing infrastructure
in order to reduce testing burden on
health IT developers of certified health
IT and better represent real world
pharmacy interoperability workflows.
For instance, we are considering
approaches in the Program that would
allow a Health IT Module (or a health
IT product incorporating multiple
Health IT Modules to support multiple
aspects of electronic prescribing
workflow) to undergo testing for more
than one pharmacy interoperability
criterion during a single, streamlined
testing event, while maintaining a
modular approach to certification that
allows health IT developers to certify to
only those criteria relevant to their
products. We are seeking public
comment on the potential benefits or
challenges of such an approach,
including:
• If ONC were to propose and finalize
additional pharmacy interoperability
certification criteria similar to those
discussed in this RFI, what would be
the challenges of testing each criterion
individually?
• Could a bundled approach to
testing more than one pharmacy
interoperability criterion in a single
testing event address these challenges?
What other principles or parameters
should be applied to such an approach?
• If ONC were to propose an alternate
approach to bundled testing for related
certification criteria, should such an
approach be required for any product a
health IT developer seeks to certify to
multiple criteria within the bundle, or
should it be optional?
• Might there be additional
opportunities to reuse testing resources
and streamline the testing experience
for health IT developers while taking
additional steps to ensure that certified
health IT is optimized for prescribing
safety, efficiency, and usability?
3. FHIR Standard
This request for information focuses
on the FHIR standard for APIs
(including FHIR Subscriptions, CDS
Hooks, FHIR standards for scheduling,
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
and SMART Health Links) and aligns
with our aims of advancing
interoperability through the use of APIs
for treatment, payment and operations
use cases. We welcome technical and
policy comments as we consider the
potentially applicability of these
standards and specifications for
potential future rulemaking.
a. FHIR Subscriptions Request for
Information
A FHIR API is a ‘‘RESTful’’ 372 API,
which requires clients to query for
information that is served by a FHIR
server. The client application has no
way of knowing if there has been any
addition of new information or an
update to existing information. So, in
lieu of having that knowledge, the client
application would ‘‘poll’’ 373 a FHIR
server at regular intervals for new
information. As the usage of FHIR APIs
increases, so does the demand placed on
FHIR servers to be able to provide
responses to the clients in a performant
manner.
FHIR Subscriptions 374 is a capability
supported in the FHIR standard that
provides the ability for a FHIR server to
proactively notify a client when new
information has been added or existing
information has been updated. Once the
client has received the notification, it
can take appropriate action, including
querying for the desired information.
FHIR Subscriptions also includes the
capability to transmit a payload with the
‘‘notification,’’ greatly simplifying some
interorganizational transactions. This
‘‘push-based’’ 375 subscription method
has the advantage of reducing server
load by eliminating expensive queries
and generally promoting more efficient
network behavior. Additionally, pushbased subscription can be more easily
used to automate system-based
workflows using the FHIR standard,
such as Admission, Discharge and
Transfer (ADT) events.
FHIR Subscriptions are enabled by the
following resources: Subscription,376
SubscriptionTopic 377 and
SubscriptionStatus.378 We seek input on
the maturity of these resources in the
FHIR Release 4 standard that is
incorporated in 45 CFR 170.315(g)(10)
372 ‘‘Representational
State Transfer’’.
373 https://hl7.org/fhir/4.3.0-snapshot1/
pushpull.html.
374 https://build.fhir.org/subscriptions.
375 https://hl7.org/fhir/4.3.0-snapshot1/
pushpull.html.
376 https://hl7.org/fhir/4.3.0-snapshot1/
subscription.html.
377 https://hl7.org/fhir/4.3.0-snapshot1/subscrip
tiontopic.html.
378 https://hl7.org/fhir/4.3.0-snapshot1/subscrip
tionstatus.html.
PO 00000
Frm 00111
Fmt 4701
Sfmt 4702
23855
(see section III.C.7 of this proposed
rule). Additionally, we seek comment
on whether the FHIR Subscriptions
capability aligns with the adoption of
the FHIR Release 5 standard, and
whether alignment with FHIR Release 5
would avoid any costly refactoring of
the resources and give more time for
industry to test the various features and
capabilities under development.
Furthermore, we request comment on
whether there is a need to define a
minimum set of Subscription Topics
that can be consistently implemented by
all health IT developers of certified
health IT to provide a base level
expectation for clients using the
services. We also invite comments on
appropriate industry led activities to
maintain and keep the artifacts up to
date.
Additionally, we welcome comments
on security, channels, payloads, and any
other areas that would need to be
further specified to achieve our goal of
providing subscription capabilities
across certified Health IT Modules in a
consistent and standardized manner
using an already adopted standard.
b. Clinical Decision Support Hooks
Request for Information
We are including in this proposed
rule a RFI seeking input from the public
on whether to require certified health IT
systems to adopt the CDS Hooks FHIR
Implementation Guide v1.0 as part of
the requirements in the Program.
i. Background
Clinical decision-making is an
important part of the foundation of care
delivery. Each patient presents a unique
combination of facts and circumstances
that require ongoing assessment,
planning, intervention, and evaluation.
Each decision in the course of a
patient’s care involves gathering,
analyzing, and acting on information
that may be complex, unclear, or
incomplete. Clinical decision makers
must account not only for information
provided by the patient, but also the
continuously evolving and growing
body of medical and scientific
knowledge.
Health IT has the potential to help
address the complexities of clinical
decision-making for providers and as
part of shared decision-making with
patients and care team members. CDS
provides clinicians, staff, patients, and
other individuals with knowledge and
person-specific information,
intelligently filtered and/or presented at
appropriate times to enhance decisionmaking. CDS encompasses a variety of
tools, including computerized alerts and
reminders, clinical guidelines,
E:\FR\FM\18APP2.SGM
18APP2
23856
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
condition-specific order sets, focused
patient data reports and summaries,
documentation templates, diagnostic
support, and contextually relevant
reference information.379 Currently, the
Program includes the certification
criterion ‘‘clinical decision support
(CDS)’’ in § 170.315(a)(9). If certified to
that criterion, a Health IT Module must
implement HL7 Version 3 and HL7
Clinical Document Architecture (CDA)
standards to meet specific requirements
outlined in the criterion. Sections
III.C.5.a–c of this proposed rule provide
additional discussion of the history of
CDS-related certification criteria as well
as proposed changes to these criteria,
including proposed new requirements
for some forms of decision support.
CDS is a common capability provided
by EHR systems today. Computerized
physician order entry (CPOE), for
example, is often paired with CDS to
help clinicians select the appropriate
medications for their patients and
provide alerts if a patient is allergic to
a particular medication.380 Likewise,
federal agencies such as the Agency for
Healthcare Research and Quality
(AHRQ) have funded programs aimed at
helping health care providers move
patient-centered outcomes research
(PCOR) evidence into practice through
CDS.381 AHRQ’s CDS Connect is an
online platform including a repository
of CDS artifacts and tools for creating,
testing, and sharing CDS.382
Although there have been numerous
studies demonstrating the value and
efficacy of CDS, available evidence
suggests the CDS must be carefully
implemented and managed to achieve
its potential.383 One of the challenges
associated with CDS involves
interoperability. For example, a CDS
system may exist as a standalone system
or lack the ability to communicate
effectively with other systems.384
Disparate EHRs and health IT systems
may use different data models and CDS
integration methods, which limits the
widespread dissemination of effective
CDS content.385
Standards development organizations
like HL7 provide standards that aim to
address some of the CDS
interoperability challenges. The FHIR
379 https://www.healthit.gov/topic/safety/clinicaldecision-support.
380 https://www.ncbi.nlm.nih.gov/books/
NBK543516/.
381 https://cds.ahrq.gov/.
382 https://cds.ahrq.gov/cdsconnect.
383 https://nam.edu/optimizing-strategies-clinicaldecision-support/.
384 https://www.nature.com/articles/s41746-0200221-y.
385 https://nam.edu/optimizing-strategies-clinicaldecision-support/.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
CDS Hooks specification, for example,
describes the RESTful APIs and
interactions using JSON over HTTPS to
integrate CDS between CDS Clients (e.g.,
EHRs or other health information
systems) and CDS Services.386 CDS
Hooks enable users to invoke CDS
services within a workflow.387 By
standardizing an approach for calling
CDS services from within a workflow,
the CDS Hooks specification provides a
consistent set of capabilities around
which CDS developers can design CDS
services.
ii. Request for Information
Given the growing use of CDS and
potential for CDS to improve clinical
decision-making, we request comment
on the scope and maturity of the FHIR
CDS Hooks specification v1.0, which we
are considering for future inclusion as
part of the Program. Recognizing that
CDS Hooks does not prescribe a default
or required set of hooks for
implementers, we further request
comment on specific hooks that we
might include in future certification
criteria (the CDS Hooks specification,
for example, defines a small set of
hooks), as well as input on use of CDS
Hooks for supporting workflow
improvement and reducing health care
provider burden. To the extent
commenters have specific CDS Hook
use cases for supporting the latter, we
welcome input on this including
comment on the readiness and
feasibility of such use cases including,
as an example, for the screening and
assessing of social risk and health
related social needs or history.388
c. FHIR Standard for Scheduling
Request for Information
Based on public engagement and
published analysis,389 we have
identified that the use of standardsbased APIs for access to and booking of
appointments for patients would result
in significant long-term improvements
in reducing health disparity and
improving public health. One such
example relates to the recent immediate
need for making vaccine appointments
for COVID–19 more widely available.
During the launch of COVID–19
vaccination in U.S., many individuals
experienced difficulties in obtaining
386 https://cds-hooks.org/specification/current/.
387 https://www.healthit.gov/sites/default/files/
page/2023-02/SDOH-CDS-Feasibility-Brief.pdf.
388 ONC Social Determinants of Health Clinical
Decision Support Feasibility Brief, February 2023:
https://www.healthit.gov/sites/default/files/page/
2023-02/SDOH-CDS-Feasibility-Brief.pdf.
389 https://medium.com/u-s-digital-response/
what-vaccine-appointment-data-tells-us-threemajor-takeaways-from-covid-19-cb6adcaa8acf.
PO 00000
Frm 00112
Fmt 4701
Sfmt 4702
timely vaccination appointments,
including signing up for waitlists at
multiple clinics, constantly refreshing
different websites that advertised
vaccine availability, and repeatedly
calling busy phone lines.390 One of the
key takeaways from the analysis
reported by U.S. Digital Response was
that while vaccine providers reported
their vaccine inventory data to public
health authorities, the inventory data
did not directly or accurately reflect
appointment availability. Indeed, their
finding indicated that inventory-based
vaccine finders were a root cause of
frustration for eligible U.S. residents in
states across the nation.391
Once these issues within vaccine
appointment scheduling became known,
the health IT industry came together to
address the situation in a rapid manner.
One such industry-led solution that was
developed during the time, and has
since gained widespread support, is
SMART Scheduling Links.392 SMART
Scheduling Links is a FHIR standardbased specification that enables
providers to advertise their available
vaccine appointments using a
lightweight, scalable API that is based
on the same FHIR Release 4 standard
that is widely implemented by the
health IT industry as part of the Program
criterion in § 170.315(g)(10).
In this RFI, we seek input on the
maturity and scope of the SMART
Scheduling Links Implementation
Guide that is aligned with FHIR Release
4, to be considered for future
certification as part of the Program.
Furthermore, we request comment on
the guidance specified in the SMART
Scheduling Links Implementation
Guide for publishers to advertise the
API endpoints and whether there are
other approaches that ONC could take to
ensure that the APIs are easily
discoverable by users of the API.
We also invite comments on any other
appropriate industry led activities that
we should consider for potential models
and approaches, such as the Argonaut
Scheduling Implementation Guide.393
Additionally, we welcome any other
comments on how to ensure accuracy
and timeliness of appointment
information. Finally, we welcome
comments on how to support the
390 https://medium.com/u-s-digital-response/
usdrs-appointment-finder-tools-and-services-forfaster-easier-access-to-covid-19-vaccines92e87a722efa.
391 https://medium.com/u-s-digital-response/
usdrs-appointment-finder-tools-and-services-forfaster-easier-access-to-covid-19-vaccines92e87a722efa.
392 https://github.com/smart-on-fhir/smartscheduling-links.
393 https://fhir.org/guides/argonaut/scheduling/
index.html#introduction.
E:\FR\FM\18APP2.SGM
18APP2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
possible in a SMART Health Card. We
are also aware that the SMART Health
Links Protocol is in a very early
conceptual stage and may not be ready
for implementation in the next several
years.
In this RFI, we seek input on the
value and feasibility of the SMART
d. SMART Health Links Request for
Health Links Protocol, as well as
Information
concerns regarding its implementation.
The SMART Health Cards 394 standard Furthermore, we invite comment from
has seen rapid adoption in the past few
the public on approaches ONC could
years as a reliable and easy way for
take, within our authorities, to
consumers to receive verifiable clinical
encourage rapid advancement of the
information, such as COVID–19
technology.
vaccination history or test results. It has
We also request information on any
been widely supported across the U.S.
other promising industry-led innovative
by public health departments in several activities that we should consider that
states, nationwide pharmacies,
are aligned with the FHIR standard, and
developers of certified health IT and test which would help us advance towards
providers.395
achieving our goal of improving
While the COVID–19 pandemic
interoperability using health
certainly played a major role in rapid
information technology.
response by industry, we have heard
IV. Information Blocking
from industry that some of the key
Enhancements
reasons for the implementation success
of SMART Health Cards included the
A. Defined Terms
focus on a limited data set, which could
1. Offer Health Information Technology
be provided by health care providers in
or Offer Health IT
a verifiable and secure manner using
Health IT developer of certified health
existing FHIR API technologies
IT is defined for purposes of the
available in their health IT, and
information blocking regulations as: ‘‘an
packaged using QR 396 format that
individual or entity, other than a health
allows individuals to easily share this
care provider that self-develops health
information with others.
IT for its own use, that develops or
ONC is generally supportive of such
offers health information technology (as
innovative efforts to advance API
capabilities for targeted needs. We have that term is defined in 42 U.S.C.
300jj(5)) and which has, at the time it
been tracking industry advances in not
only the SMART Health Cards standard, engages in a practice that is the subject
of an information blocking claim, one or
but also a more recent effort, called
more Health IT Modules certified under
SMART Health Links Protocol.397
Our understanding is that,
a program for the voluntary certification
conceptually, the SMART Health Links
of health information technology that is
Protocol 398 takes some of the same
kept or recognized by the National
approach used for SMART Health Cards Coordinator pursuant to 42 U.S.C. 300jjfor sharing data. This includes the use
11(c)(5) (ONC Health IT Certification
of a structured and cryptographically
Program)’’ (emphasis added, 45 CFR
signed set of clinical data provided in
171.102). Preamble discussion in both
the FHIR standard and made available
the ONC Cures Act Proposed Rule (84
to the individual in a QR format, which
FR 7511) and Final Rule (85 FR 25798
is intended to allow individuals explicit through 25799) addressed that the
control over with whom they share their definition includes offerors of certified
health information. At the same time,
health IT who do not themselves
SMART Health Links aims to overcome
develop certified health IT or take
some of the known limitations of the
responsibility for the health IT’s
SMART Health Cards technology,
certification status under the Program.
Specifically, we explained that ‘‘an
including the small amount of data that
individual or entity that offers certified
can be fit in a QR, and the ability to
health IT’’ would include ‘‘any
share data that could be changing over
individual or entity that under any
time, rather than a static data set that is
arrangement makes certified health IT
394 https://smarthealth.cards/en/.
available for purchase or license’’ (85 FR
395 https://smarthealth.cards/en/issuers.html.
25798). Both individuals or entities that
396 https://spec.smarthealth.cards/#creating-a-qrotherwise fall into at least one category
code-or-a-set-of-qr-codes-from-a-health-card-jws.
of actor as defined in 45 CFR 171.102—
397 https://hackmd.io/@VCI/smart-health-linkssuch as health care providers—and
protocol.
individuals or entities who otherwise
398 https://hackmd.io/kvyVFD5cQK2Bg1_vnXSh_
Q.
would not fit the definition of any
ddrumheller on DSK120RN23PROD with PROPOSALS2
scalability of the standard for use in a
variety of healthcare settings, in order to
achieve our goal of providing this
capability across all certified Health IT
Modules in a consistent and
standardized manner using an already
adopted standard.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
PO 00000
Frm 00113
Fmt 4701
Sfmt 4702
23857
category of actor could offer certified
health IT that they did not themselves
develop or present for certification. As
offerors of certified health IT, these
individuals or entities could engage in
conduct that constitutes information
blocking as defined in § 171.103, such
as through contractual terms or
practices undertaken in operating and
maintaining health IT used by another
individual or entity.
In the ONC Cures Act Final Rule (85
FR 25642), we noted that PHSA section
3022(b)(1)(A) expressly references both
‘‘a health information technology
developer of certified health
information technology’’ and ‘‘other
entity offering certified health
information technology’’ in the context
of authority to investigate claims of
information blocking (85 FR 25798). We
further explained that including both
developers and other offerors in the
definition of ‘‘health IT developer of
certified health IT’’ is consistent with
the policy goal of holding all entities
who could, as a developer or offeror,
engage in information blocking
accountable for their practices that are
within the definition of information
blocking in § 171.103 (85 FR 25799).
We received comments on the ONC
Cures Act Proposed Rule (84 FR 7424)
expressing concern about holding
offerors who do not themselves develop
the health IT accountable for design
features or other things done by the
developer of the health IT. We did not
receive public comments on the ONC
Cures Act Proposed Rule (84 FR 7424)
questioning or expressing concerns
specifically about our interpretation that
‘‘individual or entity that offers certified
health IT’’ would include an individual
or entity that under any arrangement
makes certified health IT available for
purchase or license (emphasis added,
84 FR 7511). The policy we finalized (85
FR 25642) makes no distinction between
making certified health IT available for
sale, resale, license, re-license, or
sublicense under other types of
arrangements and making certified
health IT available under arrangements
designed to benefit the recipient of free
or below-cost certified health IT. We did
not, in the ONC Cures Act Final Rule,
specifically define what it means to
offer health information technology or
offer health IT.
Following the publication of the ONC
Cures Act Final Rule, public feedback
has been received through our Health IT
Feedback and Inquiry Portal and
through real-time interactions with
interested parties in various venues on
many points of information blocking
policy. Specific to the definition of
health IT developer of certified health
E:\FR\FM\18APP2.SGM
18APP2
23858
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
IT (as defined in § 171.102) and what
makes an individual or entity one that
offers certified health IT for purposes of
this definition, interested parties posed
questions and expressed concerns that
health care providers and entities not
otherwise information blocking
actors 399 might stop funding subsidies
to providers who cannot otherwise
afford certified health IT. A key source
of concern identified was a lack of
certainty as to whether such subsidies
could be considered to be offering
health IT, resulting in the donor/
benefactor entities making available
funding subsidies becoming subject to
the definition of health IT developer of
certified health IT across all of their
technology, business lines, and
activities. This is of significance to
current and potential donors who are
either not otherwise information
blocking actors of any type or otherwise
would be considered health care
providers 400 for purposes of the
information blocking regulations. For
(potential) donors who are not
otherwise information blocking actors,
such as philanthropic organizations or
health plans,401 a key concern
reportedly affecting their willingness to
subsidize certified health IT to
providers in need under current policy
is presumably that their choice to offer
certified health IT is also a choice to
subject all of their technology and
business practices potentially affecting
access, exchange, or use of EHI across
their entire business to the information
blocking regulations in 45 CFR part 171
as well as up to $1 million per violation
civil monetary penalties authorized in
399 Although not specifically excluded from the
actor definition, a wide variety of entities, including
charitable organizations, philanthropic foundations,
and health plan issuers are not specifically
included in the definition of ‘‘actor’’ in § 171.102
and thus will be subject to the information blocking
regulations only to the extent they engage in
activities that cause them to meet the definition of
health care provider, HIN/HIE or health IT
developer of certified health IT. (For more
information, see IB.FAQ13.1.2020NOV and 85 FR
25803.)
400 As defined in § 171.102, health care provider
has the same meaning as ‘‘health care provider’’ in
42 U.S.C. 300jj. For more information about this
definition in a convenient format, please consider
viewing the Health Care Provider Definition (PDF—
361 KB) fact sheet.
401 A health plan, or health plan issuer, could also
meet the definition of one or more types of
information blocking actor regardless of whether
they donate or otherwise supply certified health IT
to individuals or entities other than their own
employees and contractors. However, a health plan
that does not meet the § 171.102 definition of any
type of information blocking actor is not considered
an information blocking actor for purposes of the
information blocking regulations in 45 CFR part
171.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
the Cures Act’s information blocking
provision (42 U.S.C. 300jj–52(b)(2)(A)).
Although health care providers are
already information blocking actors,
those who might be in a position to offer
cost subsidies to other providers may be
hesitant to do so because of the
differences in the information blocking
definition and consequences for a
health IT developer of certified health
IT compared with those for a health care
provider. First, it is significant that
information blocking, when conducted
by a health care provider, is defined in
part by whether the health care provider
‘‘knows that such practice is
unreasonable and is likely to interfere,’’
which is for the actor, a less exacting
knowledge standard than that applied to
conduct of a health IT developer of
certified health IT: whether the
developer ‘‘knew or should have known
that such practice is likely to interfere’’
(§ 171.103, see also 42 U.S.C. 300jj–
52(a)(1)). Second, while health care
providers who are found to have
engaged in information blocking will be
subject to appropriate disincentives set
forth by the Secretary,402 health IT
developers of certified health IT who are
found to have engaged in information
blocking are subject to the 42 U.S.C.
300jj–52(b)(2)(A) civil monetary penalty
of up to $1 million per violation. This
concern has been raised since the
publication of the ONC Cures Act Final
Rule in both written informal
correspondence and real-time
interactions by third parties concerned
about small, safety net and other lowerresource providers’ ability to afford
certified health IT.
We have also received, through public
interaction in various venues, several
requests that we clarify, in a manner
providing certainty, that a provider
using certified health IT acquired from
a developer or other offeror will not
come to be considered a health IT
developer of certified health IT if the
provider implements features and
functionalities in their EHR systems,
such as APIs for patients and clinicians
to use third-party apps 403 of their
402 Health care provider disincentives specific to
information blocking are expected to be set forth in
a separate rulemaking action.
403 In this discussion, for ease of discussion, we
use ‘‘third party’’ to reference any and all entities
other than the actor from whom EHI access (as
‘‘access’’ is defined in § 171.102) is sought or the
entity by or on whose behalf the EHI that would be
modified is maintained. We use ‘‘third-party app’’
to reference any and all sorts of software products
or applications developed and/or offered by a third
party, regardless of the types of hardware on which
such app might run (e.g., mobile device versus
server). We also use ‘‘third-party app’’ in this
context to include the full variety of purposes and
users such apps might support (e.g., licensed
healthcare professionals, patients) and without
PO 00000
Frm 00114
Fmt 4701
Sfmt 4702
choosing. We had discussed, in the ONC
Cures Act Final Rule preamble specific
to health care providers that selfdevelop certified health IT ‘‘for their
own use,’’ that several of these activities
would not be considered offering or
supplying health IT to other entities.404
Feedback we received indicated that
providers who do not self-develop the
certified health IT they implement
would experience less uncertainty if we
were to provide definitive assurance
that we do not consider activities such
as a hospital issuing login credentials
allowing licensed healthcare
professionals who are in independent
practice to use the hospital’s EHR to
furnish and document care to patients
in the hospital to be ‘‘offering’’ certified
health IT to other entities when the
hospital in question uses health IT they
obtained from a developer or offeror
(such as a reseller).
To give clarity about the definitional
implications under information
blocking regulations of making available
funding subsidies and certain features
or uses of certified health IT, we now
propose to codify a definition of what it
means to offer certified health IT. The
definition we propose generally
includes providing, supplying, or
otherwise making available certified
health IT under any arrangement or
terms, but explicitly excludes certain
activities for one of two purposes:
(1) to encourage beneficial
arrangements under which providers in
need can receive subsidies for the cost
of obtaining, maintaining, or upgrading
certified health IT; or
(2) to give health care providers (and
others) who use certified health IT
concrete certainty that implementing
certain health IT features and
functionalities, as well as engaging in
certain practices that are common and
beneficial in an EHR-enabled healthcare
environment, will not be considered an
offering of certified health IT (regardless
of who developed that health IT).
We further propose potential
exclusions we are considering that
would provide that an individual or
entity is not considered to be offering
health IT under the proposed definition
while furnishing certain legal, health IT
expert consulting, or management
consulting services to health care
providers or others who obtain and use
health IT.
regard to whether such ‘‘third party’’ is or is not a
HIPAA covered entity or business associate of any
HIPAA covered entity, as such terms are defined in
45 CFR 160.103.
404 85 FR 25799.
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
a. Exclusion of Certain Funding Subsidy
Arrangements From Offer Definition
As finalized in the ONC Cures Act
Final Rule and consistent with the
Cures Act’s information blocking
provision (42 U.S.C. 300jj–52), an
individual or entity that offers any
certified health IT currently stands on
exactly the same footing as an
individual or entity that develops
certified health IT. The ‘‘health IT
developer of certified health IT’’
definition finalized in the ONC Cures
Act Final Rule applies to an individual
or entity that develops or offers at least
one certified Health IT Module across
any and all of their conduct meeting the
definition of information blocking in
§ 171.103 (85 FR 25797). For reasons
discussed in the ONC Cures Act Final
Rule, we believe this is the most
appropriate approach to the health IT
developer of certified health IT
regulatory definition in the context of
the plain language of the information
blocking provision in the Cures Act
itself.405
As stated in the ONC Cures Act
Proposed (84 FR 7511) and Final (85 FR
25798) Rules, under current information
blocking regulations (45 CFR part 171)
‘‘an ‘individual or entity that offers
certified health IT’ would include an
individual or entity that under any
arrangement makes certified health IT
available for purchase or license.’’
We have believed since long before
we issued the ONC Cures Act Proposed
Rule, and we continue to believe today,
that arrangements that help small or
safety net providers afford certified
health IT items and services are
generally beneficial to the recipient
providers and their patients. We further
believe policy goals for interoperability,
information sharing, and equity
throughout the U.S. healthcare system
are supported by encouraging the
provision of grants or funding subsidies,
consistent with other applicable laws, to
health care providers who may
otherwise struggle to afford modern,
interoperable health IT.
Now that we have been made aware
of concerns regarding the potential
inclination of some health care
providers and other donors to stop
making available funding subsidies
toward the cost of certified health IT for
providers who may not otherwise be
able to afford it, we believe it is
appropriate to consider ways to modify
our policy. Specifically, in the proposed
definition of what it means to offer
405 21st Century Cures Act, Public Law 114–255.
The Cures Act information blocking provision
(§ 4004 of the law) is codified at 42 U.S.C. 300jj–
52.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
health IT in § 171.102, we propose to
explicitly exclude certain beneficial
arrangements providing funding
subsidies for providers to obtain,
maintain, and/or upgrade certified
health IT.
Exclusion (1) would remove from the
definition of offer health information
technology or offer health IT the
provision of subsidies, in the form of
funding or cost coverage subsidy
arrangements for certified health IT. The
exclusion depends, however, on the
subsidy being made without any
conditions limiting the interoperability
or use of the technology to access,
exchange, or use electronic health
information for any lawful purpose. We
would interpret conditions broadly, to
include not only the explicit terms of
any written agreement but also oral
statements and patterns of conduct on
the part of the subsidy’s source(s)
toward, in the presence of, or made
known by the source(s) to the subsidy’s
recipient. For an illustrative example, a
health system offers to give any
independent safety net provider in its
multi-state service area a code that
enables the safety net provider to
contract with a developer for a
(developer hosted and fully supported)
EHR product suite that includes all
certified functionality needed to
participate successfully in Medicare’s
Quality Payment Program (QPP) and
have the cost of that EHR subscription
charged to and paid by the health
system. In this illustrative example, the
health system clarifies that it is willing
to cover the costs of what is minimally
necessary for QPP, and a particular level
of service from the EHR developer. The
safety net provider in this example may,
without discouragement, interference,
or inducement on the part of the health
system choose at its own expense to
contract with the developer for
additional functionalities or levels of
service, or contract with other
developers for other applications to
interface with and use in complement to
the EHR suite supported by the health
system. So long as the health system
does not, in writing or through oral
statements or courses of conduct,
condition any initial or continued
payment of the safety net provider’s
subscription costs on the safety net
provider limiting its use of health IT or
its access, use, or exchange of EHI in
ways specified or signaled by the health
system, the health system’s cost
coverage subsidy of the safety net
provider’s EHR suite subscription
would not be considered an offer of
certified health IT under the proposed
definition.
PO 00000
Frm 00115
Fmt 4701
Sfmt 4702
23859
We note that we do not believe it is
necessary to assess, for purposes of
determining whether a funding subsidy
should be considered an offer of
certified health IT, whether the
source(s) of the subsidy conditions the
subsidy on a recipient health care
provider referring patients to or away
from the source. Other law—not limited
to but notably including 42 U.S.C.
1320a–7b(b) where payment for any
item, service, or good may be made in
whole or part under a ‘‘Federal health
care program’’ (as defined in 42 U.S.C.
1320a–7b(f))—is implicated by
solicitation or receipt of any
remuneration in return for referral
steering and similar conduct. The
proposed tailoring of the funding
subsidies exclusions from the offer
health information technology or offer
health IT definition are thus not
intended to address referral steering or
similar conduct focused on healthcare
services volume, demand, or market
share. Rather, these exclusions are
conditioned on the source(s), donor(s),
or giver(s) of any such subsidy or
supplier of such subsidized technology
not limiting uses of the technology or
access, exchange, or use of EHI
specifically as a safeguard against
inappropriate exploitation of this
exclusion by entities seeking to distort
the health IT items and services
market—including through limiting
recipients’ options to use additional
technology—or otherwise impede
innovations and advancements in health
information access, exchange, and use.
If an individual or entity engages in
conduct that meets the offer health IT
definition, it would be considered a
health IT developer of certified health
IT under the definition, even if it
engages in other conduct that meets an
exclusion. We are not proposing to
create any categorical exclusions of
particular classes of individuals or
entities. None of the proposed
exclusions from the offer health IT
definition are designed or intended to
function as loopholes through which
individuals or entities who engage in
separate conduct that would otherwise
meet the definition of offering health IT
would no longer be considered health IT
developers of certified health IT.
Similarly, an individual or entity that
otherwise meets the definition of an
information blocking actor in § 171.102
(such as a health care provider, health
information network or exchange, or
individual or entity who develops
certified health IT) would not be able to
claim that they are excluded from any
definition of actor by meeting an
exclusion from the definition of offer
health IT. An individual or entity that
E:\FR\FM\18APP2.SGM
18APP2
23860
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
meets an exclusion from the definition
of offer health IT, but otherwise meets
one of the definitions of information
blocking actors continues to meet that
definition of an actor.
b. Implementation and Use Activities
That Are Not an Offering
In the ONC Cures Act Final Rule
preamble, we noted that there are
certain actions taken by health care
providers who self-develop health IT for
their own use that we do not interpret
as them offering or supplying certified
health IT to others. Specifically, we
noted that ‘‘some use of a selfdeveloper’s health IT may be made
accessible to individuals or entities
other than the self-developer and its
employees without that availability
being interpreted as offering or
supplying the health IT to other entities
in a manner inconsistent with the
concept of ‘self-developer,’ ’’ and we
provided examples of activities that we
do not consider offers (85 FR 25799).
Some of the examples we noted were
discussed in context of customary
practices amongst hospitals that
purchase commercially marketed health
IT as well as self-developer hospitals.
We do not, and do not believe anyone
else should, consider the examples
discussed at 85 FR 25799 to be offerings
of health IT in any sense relevant to the
health IT developer of certified health
IT definition, regardless of who
developed the certified health IT that
may be needed, used, or otherwise
involved in these examples. We also
believe there may be examples of
activities we did not discuss at 85 FR
25799 that should not be considered
offers of health IT, as described below.
We therefore propose to explicitly
exclude from the offer health
information technology or offer health
IT definition in paragraph (2) of the
definition the implementation,
operation, or maintenance, by any
health care provider or other entity
(such as a HIN/HIE or public health
authority) of any and all of the
following:
• Issuing login credentials to
employees (whether ‘‘W2’’/traditional or
‘‘1099’’/contracted or ‘‘gig’’ employee)
of the individual or organization for
purposes of accessing, using, or
exchanging EHI within the scope/duties
of their employment or contract. This
would include, though it is not limited
to, in-house counsel while acting within
scope of their engagement as in-house
counsel.
• Production instances of API
technology supporting patient (also
known as ‘‘individual’’) access or other
legally permissible access, exchange, or
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
use of EHI that the individual or entity
has in its possession, custody, control,
or ability to query from/across a HIN/
HIE.
• Production instances of online
portals for patients, clinicians, or other
health care providers (including
employed, affiliated, non-affiliated, or
independent providers), or public
health entities to access, exchange, or
use EHI that the that the individual or
entity has in its possession, custody,
control, or ability to query from/across
a HIN/HIE.
• Issuing login credentials or user
accounts to production or development/
testing environments to public health
authorities or such authorities’
employees as a means of accomplishing
or facilitating access, exchange, and use
of EHI for public health purposes
including but not limited to syndromic
surveillance.
We also propose to explicitly exclude
from the offer health information
technology or offer health IT definition
the issuance of login credentials such as
EHR login credentials, by the operator of
a healthcare facility—such as a hospital,
nursing facility, clinic, or dialysis
center—for non-employed/independent
healthcare professionals who furnish
care in the facility to use the facility’s
EHR in connection to furnishing and
documenting that care.
We reference production instances in
proposed paragraph (2) but do not
propose to establish a formal definition
of ‘‘production instance’’ specific to this
purpose. We do not believe that is
necessary because we observe health IT
developers, resellers, and customer
organizations communities generally
using and understanding a production
instance as a particular implementation
of a given health IT product that has
‘‘gone live’’ in a production
environment. Production environments,
in turn, we observe are generally
understood as being the setting where
health IT is implemented, run, and
relied on by end users in day-to-day
conduct of their profession (such as
medicine, nursing, or pharmacy) or
other business (such as a payer
processing healthcare reimbursement
claims or a patient managing their
health and care). Many health care
provider organizations, such as small
clinician office practices, may only
obtain use of a production instance of
whatever health IT they use (such as a
patient portal). However, other health
care provider organizations’ enterprise
IT setups do include test, staging, or
other pre-production environments
where new or updated software or other
health IT can be configured and
confirmed to operate well in the overall
PO 00000
Frm 00116
Fmt 4701
Sfmt 4702
environment before it ‘‘goes live’’ to end
users in the production environment.
The reference to production instances
in the proposed paragraph (2) explicitly
does not mean that simply having any
pre-production instance(s) of health IT
would, of itself, constitute offering
health IT. It also explicitly does not
mean that using non-employee
volunteers, such as patient volunteers or
independent clinician volunteers, in
user experience testing and
improvement activities with preproduction instances of any health IT
would, of itself, constitute offering
health IT. These types of testing
activities, again by nature and purpose,
do not make the technology available for
use and reliance by end users in
practice of their profession or conduct
of their other business. We have focused
the proposed exclusion on production
instances of things like portals simply
because that is where the question has
arisen: does making a portal that is part
of a certified health IT product available
for use by someone who is not a
provider’s (contracted or W2) employee
mean the provider is offering certified
health IT to others? The question has
not arisen for pre-production instances
of health IT. We infer this is because
development, test, staging or other preproduction instances of health IT are, by
nature, not used or relied upon by end
users of the health IT in day-to-day
conduct of their profession or
business.406 We seek comment on this
proposal, including whether we should
consider revising or refining any of the
descriptions or wording of the
functionalities, features, actions, or
activities listed in the draft regulation
text or whether we should consider
explicitly excluding additional
activities, actions, or health IT
functionalities from what it means to
offer certified health IT.
c. Consulting and Legal Services
Exclusion From Offer Definition
In defining what it means to offer
health information technology or offer
health IT, we are also considering
whether it would be beneficial to
explicitly establish an exclusion of
certain management consulting services
406 To note, ‘‘end users of the health IT’’ means,
for example, the patients who use a patient portal
or clinicians who use an e-prescribing Health IT
Module. ‘‘End users’’ do not in this context include
health IT professionals whose day-to-day
professional practice or other business is
developing, testing, and/or maintaining health IT
products. Some IT professionals might conduct a
majority, if not the entirety, of their day-to-day
work in technology development, testing,
maintenance, and support of health IT intended for
using the pre-production environments and
instances alongside other tools.
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
that play important roles in some
providers’ approaches to operational
management of their practice, clinic, or
facility. Therefore, we have chosen to
propose an exclusion to the offer health
IT definition so that we could take
binding action more quickly than would
otherwise be possible in the event we
conclude, in consideration of comments
and information we receive in response
to this proposal, that finalizing this
exclusion—in whole or in part, and
with or without modifications—would
better support important policy goals
such as advancing interoperability and
information sharing or reducing
clinician burden.
The bundled exclusions we propose
in paragraph (3) of the definition would
address specific legal and consulting
services related to obtaining and
maintaining health IT or involving
health IT in certain ways. The services
addressed by the subparagraphs of the
paragraph (3) ‘‘consulting and legal
services’’ exclusion would include:
• legal services furnished by
attorneys that are not in-house
counsel 407 of the provider (commonly
referred to as ‘‘outside counsel’’);
• health IT expert consultants’
services engaged to help a health IT
customer/user (such as a health care
provider) define their business needs
and/or evaluate, select, negotiate for or
oversee configuration, implementation,
and/or operation of a health IT product
that the consultant does not sell/resell,
license/relicense, or otherwise supply to
the customer; and
• clinician practice or other health
care provider administrative or
operational management consultant
services where the clinician practice or
other health care provider
administrative or operational
management consulting firm effectively
stands in the shoes of the provider in
dealings with the health IT developer or
commercial vendor and manages the
day-to-day operations and
administrative duties for health IT and
its use alongside other administrative
and operational functions that would
otherwise fall on the clinician practice
or other health care provider’s partners,
owner(s), or staff.
Questions have arisen for us regarding
if or when a health care provider’s
outside counsel risks becoming an
individual or entity that offers certified
health IT by virtue of various
407 As noted above, in-house counsel would for
purposes of the offer definition be considered
‘‘employees’’ of the provider. Furnishing use of the
provider’s health IT to in-house counsel would no
more be an offer of that health IT than would be
furnishing use of that same health IT to members
of the provider’s nursing or medical records staff.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
representational activities. At (3)(a) in
the proposed offer health information
technology or offer health IT definition’s
proposed regulatory text, we propose to
explicitly exclude legal services
furnished by outside counsel in any
matter or matters pertaining to the
client’s seeking, assessing, selecting, or
resolving disputes over contracts or
other arrangements by which the
client(s) obtain use of certified health
IT. We can also foresee a potential for
the question to arise among attorneys
and litigation support experts as to
whether special care might need to be
taken if considering granting an
opposing party or their own
independent expert witnesses limited
use (e.g. view-only access) to a health
care provider’s EHR or to a test/
litigation-only instance of the same
software, in order to expedite discovery
in negligence, malpractice, or other
matters, or if this option must be
entirely outside the realm of
consideration specifically to avoid the
law firm or its client health care
provider becoming an offeror of health
IT for information blocking purposes.
To be clear, no one has yet brought to
our attention a fact pattern in which a
law firm’s provision of advice, counsel,
or other legal services supporting the
negotiation, drafting, or execution of
agreements by which the provider
obtains use of health IT crosses into the
realm of activities we would interpret as
equivalent to the law firm itself offering
the health IT. We have yet to hear a
single report of a health care provider or
other prospective health IT customer
being unable to obtain assistance of
competent counsel for their dealings
with health IT developers and vendors
due to law firms being concerned by any
aspect of the health IT developer of
certified health IT definition having
implications for the law firm. We have
also neither seen nor heard of an actual
instance where counsel would have
made different, potentially more
mutually efficient, use of the client’s
certified health IT in the discovery
process but for concerns about the
health IT developer of certified health
IT definition in § 171.102.
However, as we are proposing the
exclusion from the offer health IT
definition of management and other
consulting services, we think it is worth
considering potential explicit exclusion
of legal services rendered to a client in
any matter or matters pertaining to the
client’s seeking, assessing, selecting, or
resolving disputes over contracts or
other arrangements by which the
client(s) obtain use of certified health
IT. We would not consider a licensed
attorney, law firm, or law firm staff
PO 00000
Frm 00117
Fmt 4701
Sfmt 4702
23861
acting under supervision of one or more
licensed attorneys, engaged as outside
counsel to offer certified health IT when
the attorney, attorneys, or law firm staff
are furnishing legal services to a client
that is a customer or user of certified
health IT. Under this proposal, legal
services of outside counsel (law firms of
any size or individual attorneys not
employed by the health IT customer/
attorney’s client) would remain outside
the definition of offer health
information technology or offer health
IT even when the services include
representing or acting on behalf of the
client health IT customer in seeking or
assessing certified health IT or in the
course of negotiations or disputes with
a developer, vendor, or other supplier of
certified health IT.
This proposed exclusion would:
codify how we already view, in the
context of the definitions currently
codified in § 171.102, legal services
furnished by outside counsel in certain
matters; and remove an ambiguity that
could, at least in theory, otherwise have
unintended effects on how parties may
in the future assess the best available
options and mechanisms for efficient,
cooperative discovery. The proposed
exclusion for legal services furnished by
outside counsel, like the proposed
exclusion of health IT expert consulting
services, would focus on the services
provided and not on the type of
organization providing them. The
exclusion’s provision for facilitating
appropriately limited access or use of
the client’s health IT for specific
purposes of legal discovery 408 is no
exception: it would remain focused on
the services provided and not on the
type of organization providing them.
Thus, neither an attorney nor a law firm
would be categorically excluded from
ever being considered an individual or
entity that offers health IT. For example,
a law firm that chose, directly or
through an entity it owns or controls, to
provide or supply certified health IT for
use of one or more other, independent
individuals or entities under any
arrangement would under current
regulations be considered to be offering
health IT and thus a health IT developer
of certified health IT for purposes of the
information blocking regulations. Under
408 To learn more about what legal discovery is,
information presented for general audiences is
available at:
• https://www.americanbar.org/groups/public_
education/resources/law_related_education_
network/how_courts_work/discovery/ (last accessed
March 16, 2023).
• https://www.peoples-law.org/maryland-circuitcourt-discovery#:∼:text=%22Discovery%22%20is
%20a%20process%20you,claims%20being%20
made%20against%20you. (last accessed March 16,
2023).
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
23862
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
the proposal, an attorney or law firm
that engaged in any activities that are
within the proposed definition of offer
health IT would thus be considered an
individual or entity that offers health IT
and thus a health IT developer of
certified health IT for purposes of the
information blocking regulations.
We focus this proposed exclusion
from the offer health IT definition on
outside counsel (law firms of any size or
individual attorneys not employed by
the health IT customer/attorney’s client)
because we consider attorneys who are
employees of the provider to be a part
of the provider’s organization and
operations when acting within the scope
of their employment. Outside the scope
of their employment by the health care
provider, such attorneys’ conduct would
be assessed like that of any other
individual: based on the facts and
circumstances to determine whether
they were in those outside activities
offering health IT as we propose to
define offer health IT.
We solicit comment on this proposal.
At (3)(b) in the proposed offer health
information technology or offer health
IT definition’s proposed regulatory text,
we propose to explicitly exclude health
IT expert consultants’ selection,
implementation, and use services
engaged to help a health IT customer/
user (such as a health care provider,
health plan, or HIN/HIE) do any or all
of the following with respect to any
health IT product that the consultant
does not sell or resell, license or
relicense, or otherwise supply to the
customer under any arrangement on a
commercial basis or otherwise: define
their business needs; evaluate, or select
health IT product(s); negotiate for the
purchase, lease, license, or other
arrangement under which the health IT
product(s) will be used; or oversee
configuration, implementation, or
operation of a health IT product(s). This
proposal would codify an exclusion
from the definition of offer health
information technology or offer health
IT, with explicit parameters, activities
for which a health IT customer/user
may need or want assistance of
individuals or firms with specialized
health IT expertise in selecting new or
additional health IT product(s) or in
complement to the support services
available from the developer or
commercial vendor once product(s) are
selected or implemented. In parallel to
the proposed exclusion for legal services
furnished by outside counsel, the
proposed exclusion of health IT expert
consulting services from the offer health
IT definition would focus on the
services provided and not on the type of
organization providing them. In the
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
health IT context, the practical
implication of the focus and contours of
this exclusion mean that any given
individual or entity could in its
relationship with one of its clients, not
be offering health IT but in its
relationship with another client be
functioning as a commercial vendor of
particular products. In this example,
where one individual or entity engages
in activities that are not considered
offering health IT and also, in separate
dealings, also offers health IT, such
individual or entity would be
considered a health IT developer of
certified health IT across all their health
IT items and services like any other
individual or entity that offers any
health information technology that
includes one or more certified Health IT
Modules. By contrast, so long as an
individual, firm, or company only
furnishes health IT expert consultant
services consistent with the proposed
exclusion, and does not choose to also
offer health IT, then such consultant
firm would remain excluded from the
definition as proposed.
We solicit comment on this proposal.
At (3)(c) in the proposed offer health
information technology or offer health
IT definition’s proposed regulatory text,
we propose to exclude comprehensive
clinician practice or other health care
provider administrative or operational
management consultant services where
the administrative or operational
management consulting firm effectively
stands in the shoes of the provider in
dealings with the health IT developer or
commercial vendor and manages the
day-to-day operations and
administrative duties for health IT and
its use alongside a comprehensive array
of other administrative and operational
functions that would otherwise fall on
the clinician practice or other health
care provider’s partners, owner(s), or
staff.
Alone among the three proposed
exclusions of consulting and legal
services arrangements, the exclusion of
clinician practice or other health care
provider administrative or operational
management consulting services would
be likely to include, on a regular basis,
arrangements where the health IT the
health care provider uses is directly
provided to them by the consultant—for
example, as part of a comprehensive
(‘‘turn key’’) package of practice
management or other provider
administrative or operations
management services. In proposing this
specific exclusion ((3)(c)), we call
potential commenters’ attention first
and foremost to its implication for
health care providers’ accountability for
acts or omissions of their consultants
PO 00000
Frm 00118
Fmt 4701
Sfmt 4702
operating under the exception—
particularly health care providers’
administrative or operational
management services consultants—that
implicate the definition of information
blocking in § 171.103: where a an
administrative or operations
management services firm would not be
considered to be making an offer of
certified health IT for which they
contract on behalf of one or more
practices (or facilities or sites of care)
because they are acting as the provider’s
agent or otherwise standing in the shoes
of the provider in selecting and
contracting for a variety of services and
supplies—including but not limited to
the health IT that includes at least one
certified Health IT Module—we would
view the provider as retaining
accountability for any information
blocking conduct that the management
services company perpetrates while
thus acting on the provider’s behalf. We
recognize this may have implications for
how providers may wish to structure
administrative and operational services
contracts in the future, potentially
including a provider seeking
representations and warranties giving
the provider assurance that the
administrative or operations
management services company will not
without the provider’s direction,
knowledge, or approval, engage in
practices 409 not required by law or
covered by an information blocking
exception that is likely to interfere with
access, exchange, or use of EHI and
could be unreasonable. However, this
exclusion is not intended to have—and
we do not believe it would have—the
effect of regulating or otherwise
interfering with contracting
relationships between health care
providers and companies that do or
might furnish them with practice,
facility, location, or site management
consulting and operational services
packages. To the contrary, we propose it
in part because we believe it would help
some health care provider
administrative and operational
management services arrangements
continue in a form more closely
resembling the one they might have
taken in the absence of the information
blocking regulations, as the proposed
exclusion would remove an incentive to
carve out health IT items and services
for separate handling from other items
and services an administrative or
409 ‘‘Practice’’ used here as defined in § 171.102:
an act or omission. This definition includes ‘‘by an
actor’’ but applies in this context because the
proposed exclusion would turn on the practice
management consultant being able to be considered
an agent or extension of the provider’s own
operations.
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
operational management consultant
obtains and manages on behalf of a
client health care provider (e.g. an office
or clinic’s physical space, utilities,
payroll processing, medical supplies).
Whether styled as ‘‘practice
management’’ or ‘‘administrative
management’’ or ‘‘operations
management’’ or ‘‘administration and
operations management’’ services, we
believe business arrangements whereby
providers obtain these services from
consultants or other service firm are
meant to allow licensed healthcare
professionals to focus more time
engaging with patients and delivering
patient care that requires their training
and license, and less time focusing on
business administration and operational
management considerations. This would
include, where a management
consultant offers a comprehensive
(sometimes called ‘‘turnkey’’) package of
management services, routine
administrative oversight and dealings
with health IT developers and other
health IT offerors on behalf of the client
provider.
If practice management consultants
become unwilling to include amongst
their services those whereby they stand
in the shoes of the provider to deal with
health IT developers and other health IT
offerors, the burden would shift to the
provider’s staff. Healthcare
professionals in small office practices,
safety-net clinics, or other lowerresource situations may be unable to
afford to keep on staff persons with the
necessary skills to ensure their
operational items and services are
managed effectively. Thus, if dealings
with health IT developers were no
longer available as part of practice
management consulting services
packages due to the consultants’
concern over being considered ‘‘health
IT developers of certified health IT,’’ the
provider’s dealings with IT developers
and other health IT offerors would in a
variety of small and low-resource
provider circumstances tend to shift to
the licensed healthcare professional(s).
It is not our intent that information
blocking regulations increase the need
for clinicians and other licensed
healthcare professionals in small
practices, safety net clinics, or lowresource settings of any type, to directly
negotiate with health IT developers or
other purveyors of health IT items and
services if or when such licensed
healthcare professionals would prefer to
engage a practice management firm to
deal with health IT vendors along with
vendors of all the other goods and
services needed to operate an office
practice, clinic, or other type of health
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
care provider. Furthermore, we believe
tailoring this exclusion to health IT
items and services bundled with other
items and services mitigates what could
otherwise be a risk of non-developer
purveyors of health IT items and
services attempting simple, pretextual
rebranding of their offerings of health IT
items and services with the aim of
evading accountability while engaging
in conduct constituting information
blocking as defined in § 171.103.
The key factors that would
differentiate excluded clinician practice
or other health care provider
administrative or operational
management consultant services from IT
managed service provider (MSP)
services and arrangements, as the
proposed exclusion is drafted (see
(3)(c)), would be:
• The individual or entity furnishing
the administrative or operational
management consulting services acts as
the agent of the provider or otherwise
stands in the shoes of the provider in
dealings with the health IT developer(s)
or commercial vendor(s) from which the
health IT the client health care
providers ultimately use is obtained.
• The administrative or operational
management consulting services must
be a package or bundle of services
provided by the same individual or
entity and under the same contract or
other binding instrument, and the
package or bundle of services must
include a comprehensive array of
business administration functions,
operations management functions, or a
combination of these functions, that
would otherwise fall on the clinician
practice’s or other health care provider’s
partners, owner(s), or in-house staff.
To be considered ‘‘[c]omprehensive
and predominantly non-health IT’’
services, the array of operations and
functions the consultant administers 410
as a part of the bundle of business
administrative and operational
management consulting services must
include multiple items and services that
are not health information technology as
defined in 42 U.S.C. 300jj(5).
Additionally, non-health IT services
must represent more than half of each
of the following:
• the person hours per year the
consultant bills or otherwise applies to
the services bundle (including cost
allocations consistent with Generally
Accepted Accounting Principles), and
• the total cost to the client for, or
billing from, the consultant per year
410 In context of this discussion, we use
‘‘administer’’ in a broad sense that includes
managing, supervising, or managing and
supervising.
PO 00000
Frm 00119
Fmt 4701
Sfmt 4702
23863
(including pass-through costs for the
health IT items and services).
Non-health IT services we have
observed practice/operations
management consultants offering to
administer on behalf of health care
providers include credentialing or
contracting, medical supplies &
equipment purchasing and leasing,
staffing (also called human resources)
management, and location or facility
services. An arrangement where the
health IT items and services that are
passed through the consultant to the
end-user health care provider 411
represent more than half of consultant
person hours billed or otherwise
attributed to services bundle, total
dollar cost, or billing, from consultant to
client for the bundle per year, or any
combination thereof, would not be
considered to be ‘‘comprehensive and
composed predominantly of non-health
IT items and services.’’
Similar to the other two potential
exclusions proposed for legal and
consulting services, this exclusion
focuses on specific services that would
be construed as outside the proposed
definition of what it means to offer
health IT. However, if the entity
otherwise met the definition of health IT
developer of certified health IT, then it
would be considered a health IT
developer of certified health IT
regardless of whether it met this
exclusion from the definition of offers
health IT.
Thus, for one example, an individual
or entity that enables client individuals
or entities to obtain use of health IT
exclusively through arrangements fitting
this exclusion would avoid being
considered a health IT developer of
certified health IT. However, we offer
the following example to illustrate a
situation where the entity would be
considered a health IT developer of
certified health IT. A single entity has
multiple lines of business. Under one
business line, the entity furnishes
management consulting services to
some customers that are predominantly
non-health IT services and include the
management of health IT. Under another
business line, the same entity also
licenses certified health IT but does not
provide management consulting
services, or provides only limited or
incidental management consulting
services in complement to the health IT
offered. We assume for purposes of this
example that the business line that
furnishes management consulting
services falls within our proposed
exclusion under (3)(c). However, the
411 For example, but not limited to, a clinician
office practice.
E:\FR\FM\18APP2.SGM
18APP2
23864
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
business line that licenses certified
health IT would meet the definition of
‘‘offers health IT’’ and would not meet
any exclusions from the definition.
Since the business line meets the
licensing of certified health IT
definition of ‘‘offers health IT,’’ the
entity would be considered a health IT
developer of certified health IT. And
since we have previously stated that
once an entity meets the definition of
health IT developer of certified health
IT that definition will apply to all
practices of the entity, the entity will be
considered a health IT developer of
certified health IT for all practices,
including the management consulting
services. If an entity engages in conduct
that meets the definition of ‘‘offers
health IT,’’ and some but not all of the
conduct is excluded from the definition
of ‘‘offers health IT,’’ the entity will
meet the definition of ‘‘offers health IT’’
and, therefore, meet the definition of
health IT developer of certified health
IT across all of its health IT and all of
its business lines. Thus, any exclusion
would have effect only for those
individuals and entities that do not at
any time engage in any activities that
meet the offer health IT definition or
develop certified health IT. Thus,
developers who participate in the
Program and for commercial vendors of
health IT, any exclusions from the
definition of offer would be
inapplicable.
We solicit comment on this proposal,
specifically including comment on
whether:
• this exclusion is more beneficial
than harmful or confusing to the public,
including the regulated community
(health care providers, other
information blocking ‘‘actors,’’ and
those who may be more likely to be
considered a ‘‘health IT developer of
certified health IT’’ in the absence of
this exclusion); and
• different or additional criteria
should factor into differentiating
whether a particular arrangement is a
practice/operational management
services arrangement that happens to
include health IT as one of many
necessities to operate as a health care
provider rather than an arrangement for
supply of health IT that happens to
include additional services.
2. Health IT Developer of Certified
Health IT: Self-Developer Health Care
Providers
Currently, for reasons discussed in the
ONC Cures Act Proposed (84 FR 7511 to
7512) and Final (85 FR 25799 to 25800)
Rules, health care providers who selfdevelop certified health IT for their own
use are excluded from the ‘‘health IT
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
developer of certified health IT’’
definition. However, if a health care
provider responsible for the certification
status of any Health IT Module(s) were
to offer or supply those Health IT
Module(s), separately or integrated into
a larger product or software suite, to
other entities for those entities’ use in
their own independent operations, that
would be inconsistent with the concept
of the health care provider selfdeveloping health IT for its own use.
In our experience, self-developers
continue to comprise a very tiny
segment of the health IT developer of
certified health IT population. However,
we do not have optimal visibility of the
extent to which self-developer health
care providers may be providing their
self-developed certified health IT to
other health care providers—
particularly those who, like skilled
nursing facilities and other long term/
post-acute care (LTPAC) providers, are
not eligible to participate in any CMS
programs that specifically track use of
Certified EHR Technology (CEHRT)—on
any terms.
To date, we have received no
questions, concerns, or other feedback
specific to treating, for purposes of
information blocking, self-developer
health care providers who offer or
supply to others their self-developed
certified health IT the same as we would
any developer of certified health IT.
However, we believe it is appropriate
to revisit the health IT developer of
certified health IT definition in
§ 171.102 in light of the proposed new
definition of what it means to offer
certified health IT, to ensure it remains
clear on the face of the definition when
health care providers who self-develop
certified health IT remain outside the
definition of health IT developer of
certified health IT and when they would
fall within that definition.
Should we finalize the offer health
information technology or offer health
IT definition to include the exclusion in
(1) of certain donation and subsidized
supply arrangements, a self-developer
health care provider that makes funding
or cost coverage subsidies available to
others consistent with the finalized (1)
exclusion would stand on the same
footing as any other health care
providers who supply funding or cost
coverage subsidies for certified health
IT. We have not proposed to except selfdeveloper health care providers from
this exclusion. The provision of funding
or cost coverage subsidies consistent
with the (1) exclusion from the offer
health information technology or offer
health IT definition would not cause the
self-developer health care provider to be
considered a health IT developer of
PO 00000
Frm 00120
Fmt 4701
Sfmt 4702
certified health IT under our proposed
revision to the definition in § 171.102.
To ensure it is immediately clear from
the face of the regulations’ text that we
had put all health care providers that
engage in other activities consistent
with exclusions (1) through (3) from the
offer health information technology or
offer health IT definition on the same
footing regardless of who develops the
health IT involved in these activities,
we would revise the health IT developer
of certified health IT definition in
§ 171.102. Specifically, we propose to
replace ‘‘other than a health care
provider that self-develops health IT for
its own use’’ with ‘‘other than a health
care provider that self-develops health
IT not offered to others.’’ We have
proposed this updated definition in the
draft regulation text section of this rule
to reflect this proposed change.
We note that regardless of whether we
finalize this proposed change to the
health IT developer of certified health
IT definition, a health care provider that
self-develops certified health IT and that
offers health IT to others under any
arrangements would continue to be
considered a health IT developer of
certified health IT (as such developers
have been since the ONC Cures Act
Final Rule became effective in 2020).
3. Information Blocking Definition
As finalized in the ONC Cures Act
Final Rule (85 FR 25642) and the Cures
Act Interim Final Rule (85 FR 70085),
the definition of information blocking
(§ 171.103) and the Content and Manner
Exception (§ 171.301(a)) were limited to
a subset of EHI that was narrower than
the EHI definition ONC finalized in the
ONC Cures Act Final Rule in § 171.102.
The narrower subset included only the
EHI identified by the data elements
represented in the United States Core
Data for Interoperability (USCDI) for the
first 18 months after the applicability
date for 45 CFR part 171 (85 FR 25792).
The interim final rule extended the date
to October 6, 2022 (85 FR 70069).
Because October 6, 2022, has passed,
we propose to revise § 171.103
(information blocking definition) to
remove § 171.103(b), which designates
the period of time for which the
information blocking definition is
limited to EHI that consists of the data
elements represented in the USCDI.
Similarly, because we included the
same date in two paragraphs of the
Content and Manner exception
(§ 171.301(a)(1) and (2)), we propose to
revise § 171.301 to remove the existing
§ 171.301(a)(1) and (2) as no longer
necessary. The proposed revised version
of § 171.301 refers simply to EHI as
defined in § 171.102. We further
E:\FR\FM\18APP2.SGM
18APP2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
propose to renumber several of the
existing provisions in § 171.301
accordingly; and rename the exception
as the ‘‘Manner’’ exception.
B. Exceptions
ddrumheller on DSK120RN23PROD with PROPOSALS2
1. Infeasibility
a. Infeasibility Exception—
Uncontrollable Events Condition
In § 171.204, we created an exception
under which an actor’s practice of not
fulfilling a request to access, exchange,
or use EHI ‘‘due to’’ the infeasibility of
the request would not be considered
information blocking. In the preamble of
the ONC Cures Act Final Rule (85 FR
25867), we specified that there may be
situations when complying with a
request for access, exchange, or use of
EHI would be considered infeasible
because an actor is unable to provide
such access, exchange, or use due to
unforeseeable or unavoidable
circumstances outside the actor’s
control. We recited our proposals from
the ONC Cures Act Proposed Rule,
which noted that, as examples, an actor
could seek coverage under the
Infeasibility Exception if it was unable
to provide access, exchange, or use of
EHI due to a natural disaster (such as a
hurricane, tornado, or earthquake) or
war. Importantly, we noted that the
actor would need to produce evidence
and ultimately prove that complying
with the request for access, exchange, or
use of EHI in the manner requested
would have imposed a clearly
unreasonable burden on the actor under
the circumstances (85 FR 25866). As
part of revisions to add clarity to the
Infeasibility Exception in the ONC
Cures Act Final Rule, we established the
‘‘standalone’’ uncontrollable events
condition of the Infeasibility Exception
in § 171.204(a)(1). Under the
uncontrollable events condition, an
actor’s practice of not fulfilling a request
to access, exchange, or use EHI as a
result of a natural or human-made
disaster, public health emergency,
public safety, incident war, terrorist
attack, civil insurrection, strike or other
labor unrest, telecommunication or
internet service interruption, or act of
military, civil or regulatory authority
(§ 171.204(a)(1); 85 FR 25874) will not
be considered information blocking
provided such practice also meets the
condition in § 171.204(b).
The fact that an uncontrollable event
specified in § 171.204(a)(1) occurred is
not a sufficient basis alone for an actor
to meet the uncontrollable events
condition of the Infeasibility Exception.
Rather, the use of the words ‘‘due to’’ in
the condition was intended to convey,
consistent with the ONC Cures Act
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
Proposed Rule, and does convey that the
actor must demonstrate a causal
connection between not providing
access, exchange, or use of EHI and the
uncontrollable event. To illustrate, a
public health emergency is listed as an
uncontrollable event under
§ 171.204(a)(1). If the Federal
Government or a state government were
to declare a public health emergency,
the mere fact of that declaration would
not suffice for an actor to meet the
condition. To meet the condition, the
actor would need to demonstrate that
the public health emergency actually
caused the actor to be unable to provide
access, exchange, or use of EHI for the
facts and circumstances in question.
The emergency need not be the only
cause of a particular incapacity, but the
actor needs to demonstrate that the
public health emergency did in fact
negatively impact the feasibility of that
actor fulfilling access, exchange, or use
in the specific circumstances where the
actor is claiming infeasibility. While
this condition has always required
causal connection between the actor’s
inability to fulfill the request and the
natural or human-made disaster, public
health emergency, public safety
incident, war, terrorist attack, civil
insurrection, strike or other labor unrest,
telecommunication or internet service
interruption, or act of military, civil or
regulatory authority, we propose to
revise the condition by replacing the
words ‘‘due to’’ with ‘‘because of.’’ This
revision may provide additional clarity,
but we welcome comments on this
proposal, including whether alternative
or additional refinements to the wording
of the condition may make the causal
connection requirement more
immediately obvious from the face of
the text in § 171.204(a)(1).
b. Third Party Seeking Modification Use
We propose to renumber the
Infeasibility Exception’s (45 CFR
171.204) ‘‘infeasible under the
circumstances’’ condition from
paragraph (a)(3) to paragraph (a)(5) and
to codify at (a)(3) a new condition ‘‘third
party seeking modification use.’’ We
propose, as discussed in section IV.B.1.c
below, another new condition that
would be codified as paragraph (a)(4) of
§ 171.204.
The proposed § 171.204(a)(3) third
party seeking modification use
condition would apply in certain
situations where the actor is asked to
provide the ability for a third party (or
its technology, such as an application)
to modify EHI that is maintained by or
for an entity that has deployed health
information technology as defined in
§ 170.102 and maintains within or
PO 00000
Frm 00121
Fmt 4701
Sfmt 4702
23865
through use of that technology any
instance(s) of any electronic health
information as defined in § 171.102.
Specifically, we propose that the third
party seeking modification use
condition of the infeasibility exception
would be limited to situations when
‘‘[t]he request is to enable use of EHI in
order to modify EHI (including but not
limited to creation and deletion
functionality), provided the request is
not from a health care provider
requesting such use from an actor that
is its business associate’’ (proposed new
§ 171.204(a)(3), emphasis added).
In § 171.102, we define ‘‘use’’ for
purposes of the information blocking
definition to mean ‘‘the ability for
electronic health information, once
accessed or exchanged, to be understood
and acted upon.’’ We stated in the ONC
Cures Act Final Rule that ‘‘acted upon’’
within the final ‘‘use’’ definition
‘‘encompasses the ability to read, write,
modify, manipulate, or apply the
information. . . .’’ (85 FR 25806).
Therefore, in § 171.204(a)(3), we
propose to use the term ‘‘third party
seeking modification use’’ to describe a
set of requirements that must be
satisfied in order for an actor’s practice
of interfering with another’s use of EHI
to meet the new proposed condition of
the Infeasibility Exception. In particular,
this new proposed condition focuses on
requests to create and delete EHI held
by or for a health care provider.
While the information blocking
definition refers to the ‘‘access,
exchange, or use’’ of electronic health
information, in this portion of the
preamble we will instead use the term
‘‘modify’’ or ‘‘modification use’’ to
describe the particular type of ‘‘use’’
covered by this new condition. We do
so in order to avoid confusion between
this ‘‘modification use’’ and the HIPAA
Rules’ defined term ‘‘use’’ (45 CFR
160.103). The third party seeking
modification use condition does not
imply or indicate any change to any
HIPAA Rules’ definition, nor to the
HIPAA Rules.
We propose this new condition to
reduce actor burden and uncertainty by
creating a condition whereby practices
specific to declining certain requests for
third party modification use of EHI held
by or for a health care provider could be
excepted from information blocking
more efficiently than might be the case
under other conditions in § 171.204(a)
or other exceptions. For example, the
condition could reduce the burden on
actors to document each modification
use request the same way that an actor
would need to document its actions for
the ‘‘infeasible under the
circumstances’’ condition of the
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
23866
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
Infeasibility Exception (§ 171.204(a)(3)).
The condition could also reduce an
actor’s burden to determine if another
exception applies to the request, such as
the Preventing Harm Exception (45 CFR
171.201) or the Security Exception (45
CFR 171.203). Of course, other
exceptions, including other conditions
of the Infeasibility Exception itself, may
still apply under the circumstances of
any particular request and always
remain available for consideration by
the actor. We simply note that it may be
less burdensome for an actor to
determine that this condition applies to
one or more of its practices as compared
to other exceptions. Below, we provide
examples of when this condition could
be used, and also when it would not be
applicable but other conditions or
exceptions might still apply.
To illustrate the purpose of this
proposed condition, an actor may be
concerned about the accuracy or
reliability of data that a third party
would like to add to an individual’s
designated record set maintained by the
actor. Rather than spending resources
determining if the Preventing Harm
(§ 171.201) or Security (§ 171.203)
Exceptions apply, or to consider all of
the factors required to determine that a
request may be infeasible under the
circumstances (currently § 171.204(a)(3),
proposed to be renumbered to
§ 171.204(a)(5)), an actor may be able to
make use of the ‘‘modification use’’
condition, if finalized as proposed.
More specifically for this example, an
actor may be unable to complete a third
party’s request to modify or add EHI in
the specific way that it was requested.
Rather than working through all of the
alternative manners (and then possibly
even ending up using the proposed new
‘‘manner exception exhausted’’
condition of the infeasibility exception),
the actor can use the third party seeking
modification use condition without
needing to engage in information
gathering or analysis that would often
be needed to work through the available
alternative manners. In other cases, an
actor may have concerns that a third
party seeking ‘‘modification use’’ of EHI
could, through that use, pose specific
threats to the confidentiality, integrity,
or availability of data on its system.
Rather than establishing that the
practice meets the Security Exception,
which requires a written policy or caseby-case determinations tailored to the
specific security risk, an actor may find
it more efficient to satisfy the
Infeasibility Exception through the
proposed new third party seeking
modification use condition (in
complement to the Infeasibility
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
Exception’s existing requirements in
§ 171.204(b)).
The third party seeking modification
use condition of the Infeasibility
Exception would be available to most
actors to address situations where a
third party’s request is to modify EHI
(including but not limited to creation
and deletion functionality) stored or
maintained by an actor. For reasons
explained below, this proposed
condition would not be available to an
actor when the actor is a business
associate of the health care provider
who is making the modification use
request (directly, or through another
business associate of the health care
provider). We emphasize that although
this proposed condition of the
Infeasibility Exception would not be
available under these specific
circumstances, other conditions within
§ 171.204(a) and all of the other
exceptions would remain available for
consideration by the actor as to their
applicability to the situation and
request. Moreover, we note that nothing
in the information blocking regulations
requires an actor to permit access,
exchange, or use of EHI when such
access, exchange, or use is prohibited by
law.
We propose to exclude from
applicability of this new condition
requests from health care providers to
their business associates where these
business associates are other actors,
such as health IT developers of certified
health IT or HINs/HIEs, because the
exceptions to the information blocking
definition are intended to only cover
reasonable and necessary practices of
interference that would otherwise
constitute information blocking.
Covered entities (health care providers)
and their business associates (as
permitted by their business associate
agreement) need to access and modify
relevant EHI held by other business
associates of those covered entities on a
regular basis. Ensuring that this
condition does not apply to practices of
one business associate/actor that are
likely to interfere with health care
providers’ and their other business
associates’ ability to access, exchange,
and use (including through modification
use) EHI maintained by or for the health
care provider promotes greater
interoperability, efficient transitions of
care, and protects the use of EHI as
needed to maintain operations. In
addition, there is often a level of trust
and contractual protections between
covered entities and business associates
that removes some of the other
concerns, such as security and data
provenance, that led us to propose this
new condition for the specific
PO 00000
Frm 00122
Fmt 4701
Sfmt 4702
circumstances when it would be
applicable. Further, many concerns
were expressed by health care providers
and their business associates to ONC in
development of the Information
Blocking Report to Congress and the
ONC Cures Act Proposed Rule that
certain business associates that were
also actors under the information
blocking regulations were committing
interferences with access, exchange, and
use of EHI (see examples of likely
interferences by EHR developers at 84
FR 7518–19). We again note and
emphasize that other Federal or State
law may apply, and that other
information blocking exceptions or
conditions of the Infeasibility Exception
are available and may apply to these
relationships and requests for EHI
access, exchange, and use.
Because this new proposed third
party seeking modification use
condition is not available when the
request is from a health care provider
requesting (directly, or through another
business associate of the health care
provider) such modification use from an
actor that is its business associate, we
propose to add the definition of
‘‘business associate’’ to § 171.102, and
propose that the definition of ‘‘business
associate’’ be the same as the definition
of ‘‘business associate’’ found in the
HIPAA regulations at 45 CFR 160.103.
One example where the third party
seeking modification use would not
apply is when the developer of a health
care provider’s clinical support decision
software requests to modify EHI within
the provider’s EHR system, which is
maintained by another business
associate of the health care provider. In
this example, the developer and the
entity that maintains the provider’s EHR
system are both business associates of
the health care provider. Because both
parties are business associates of the
same health care provider, this
condition of the Infeasibility exception
is not available to the business associate
who maintains the EHR system for the
reasons discussed above. Although the
third party modification use condition
is not available, other conditions and
other exceptions are available and may
apply. Whether information blocking
has occurred depends on the specific
facts and circumstances of the situation.
To provide additional clarity
regarding circumstances that would not
fall under this proposed condition but
for which potentially another exception
could apply, we provide the following
example. A health IT developer of
certified health IT (actor) who is a
business associate of a health care
provider who is a covered entity (and
actor) and maintains the EHR on behalf
E:\FR\FM\18APP2.SGM
18APP2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
of the health care provider could receive
a modification use request from a third
party who is also a business associate of
the health care provider. The
modification use request may be nonstandardized or incompatible with the
EHR technology, as well as require
extensive technical and financial
resource allocations by the health IT
developer of certified health IT. At this
point, though the third party
modification use condition would not
be available, the health IT developer of
certified health IT could consider
whether the new proposed ‘‘manner
exception exhausted’’ condition
(proposed § 171.204(a)(4)) or the
‘‘infeasibility under the circumstances’’
condition of the Infeasibility Exception
are applicable to the situation. We
remind all actors that all of the other
relevant conditions of the Infeasibility
Exception must also be met where the
decision is made to rely upon the
Infeasibility Exception. In addition, all
of the other exceptions codified at 45
CFR part 171 remain available for
consideration of their applicability to an
actor’s practices and specific
circumstances.
We request comment generally on this
new proposed condition and, if this
condition were finalized, whether this
condition should be of limited duration.
More specifically, we request comment
on whether ONC should consider
proposing, in the future, that the
condition be eliminated if, at some
point, health information technology is
capable of supporting third-party
modification use of EHI by any party
with a legal right to do so (or no legal
prohibition against it), with no or
minimal infeasibility or other concerns.
As with every other condition in
§ 171.204(a), the proposed
§ 171.204(a)(3) third party modification
use condition would stand alone. This
means an actor’s practice could meet it
without needing to meet any other
§ 171.204(a) condition. It also means an
actor’s practice that fails to meet the
§ 171.204(a)(3) third party modification
use condition could nevertheless satisfy
another of the conditions, such as the
infeasible under the circumstances
condition (currently § 171.204(a)(3),
proposed to be renumbered to
§ 171.204(a)(5)).
c. Manner Exception Exhausted
We propose to renumber the
Infeasibility Exception’s (45 CFR
171.204) ‘‘infeasible under the
circumstances’’ condition from
paragraph (a)(3) to paragraph (a)(5) and
to codify at (a)(4) a new ‘‘manner
exception exhausted’’ condition. The
proposed manner exception exhausted
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
condition would apply where an actor
is unable to fulfill a request for access,
exchange, or use of EHI despite having
exhausted the Content and Manner
Exception in § 171.301 (which we have
proposed elsewhere in this proposed
rule to rename the Manner Exception),
including offering all alternative
manners in accordance with
§ 171.301(b), so long as the actor does
not currently provide to a substantial
number of individuals or entities
similarly situated to the requestor the
same requested access, exchange, or use
of the requested EHI.
In the ONC Cures Act Proposed Rule,
we proposed an exception that would
apply where an actor’s practice of not
fulfilling a request to access, exchange,
or use EHI in a manner that is infeasible
in the particular circumstances would
not be considered information blocking,
subject to a duty to provide a reasonable
alternative (84 FR 7542). We noted that
‘‘in certain circumstances legitimate
practical challenges beyond an actor’s
control may limit its ability to comply
with requests for access, exchange, or
use’’ (84 FR 7542). We explained that
sometimes those challenges may be
related to, for example, technological
capabilities. In other cases, however, we
noted ‘‘the actor may be able to comply
with the request, but only by incurring
costs or other burdens that are clearly
unreasonable under the circumstances’’
(84 FR 7542). Without such an
exception, we noted that inefficiencies
could be introduced such that, for
example, ‘‘the actor may be able, but
reluctant, to offer alternative means that
would meet the requestor’s needs while
reducing the burden on the actor,
leading to more efficient outcomes
overall’’ (84 FR 7542). To safeguard the
exception from inappropriate use, we
proposed a two-step test that an actor
would need to satisfy in order to meet
the exception: first, that complying with
the request would impose a substantial
burden on the actor, and second, that
the burden imposed would be plainly
unreasonable under the circumstances
(84 FR 7542–43).
In the ONC Cures Act Final Rule (85
FR 25642) we finalized a modified
Infeasibility Exception to address
concerns raised by commenters (see 85
FR 25866 through 25870). We
eliminated the two-factor test in favor of
three conditions that more specifically
address situations where the
Infeasibility Exception would be
appropriately used. One of the
conditions we finalized, infeasible
under the circumstances, requires the
actor to demonstrate, through a
contemporaneous written record or
other documentation, its consideration,
PO 00000
Frm 00123
Fmt 4701
Sfmt 4702
23867
in a consistent and non-discriminatory
manner, of certain factors that led to its
determination that complying with the
request would be infeasible under the
circumstances.
As discussed in the ONC Cures Act
Final Rule (at 85 FR 25869 through
25870) rather than finalize the proposed
requirement to provide a reasonable
alternative in order for an actor’s
practice to satisfy the infeasible under
the circumstances condition (45 CFR
171.204(a)(3)) of the Infeasibility
Exception), we finalized at 45 CFR
171.301 the ‘‘Content and Manner
Exception,’’ which we propose in this
current rule to rename and will
therefore reference here as the ‘‘Manner
Exception’’ (discussion of proposed
updates to § 171.301 is in section IV.B.2,
below). Under § 171.301, in order for the
Manner Exception to apply, an actor
must fulfill a request for access,
exchange, or use of EHI in any manner
requested, unless the actor is technically
unable to fulfill the request or cannot
reach agreeable terms with the requestor
to fulfill the request (45
CFR 171.301(b)(1)(i), as originally
codified). If an actor and requestor reach
agreeable terms and the actor fulfills a
request described in the manner
condition in any manner requested: (1)
Any fees charged by the actor in relation
to its response are not required to satisfy
the Fees Exception in § 171.302; and (2)
any license of interoperability elements
granted by the actor in relation to
fulfilling the request is not required to
satisfy the Licensing Exception in
§ 171.303 (45 CFR 171.301(b)(1)(ii)) (85
FR 25877). Section 171.301(b)(2)
(original codification) provides
requirements for fulfilling a request to
access, exchange, or use EHI in a
manner other than the manner
requested. If an actor does not fulfill a
request in any manner requested
because it is technically unable to fulfill
the request or cannot reach agreeable
terms with the requestor to fulfill the
request, the actor must fulfill the request
in an alternative manner agreed upon
with the requestor consistent with
§ 171.301(b)(2) (original codification) in
order to satisfy the exception (85 FR
25877). The Manner Exception,
therefore, offers certainty that an actor’s
practices that fully satisfy the Manner
Exception’s conditions will not be
considered information blocking, which
is meant to incentivize offering an
alternative manner (with priority to
interoperable manners based on HHSadopted and available open standards)
when the actor is unable to fulfill
access, exchange, or use of the requested
EHI in the manner initially requested.
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
23868
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
The Infeasibility Exception, as
finalized in the ONC Cures Act Final
Rule, provides assurance to an actor that
if it meets certain conditions of the
exception at all relevant times, its
practice will not be considered
information blocking. We finalized most
but not all of the factors we proposed in
the ONC Cures Act Proposed Rule for
infeasible under the circumstances
(originally codified in § 171.204(a)(3)).
Two of the factors we did not finalize
for infeasible under the circumstances
were whether the requestor and other
relevant persons can reasonably access,
exchange, or use the EHI from other
sources or through other means; and the
additional cost and burden to the
requestor and other relevant persons of
relying on alternative means of access,
exchange, or use (85 FR 25868). We
explained that we did so because we
moved away from a relative burden
analysis, and also because
‘‘consideration does not have to be
given as to whether other means are
available for access, exchange, or use of
EHI or the cost to the requestor for that
alternative means because of the new
Content and Manner Exception
(§ 171.301) and its relationship to this
exception’’ (85 FR 25868).
We propose to renumber the
infeasible under the circumstances
condition and revise it by adding the
new manner exception exhausted
condition that would align with and
advance the policy goal of fostering the
use of standards-based interoperability
in achieving access, exchange, and use
of EHI. We have received feedback that
actors are uncertain as to whether they
have satisfied the infeasible under the
circumstances condition in instances
where they believe that fulfilling a
request for access, exchange, or use of
EHI is infeasible. Specifically, actors
have expressed concern about
circumstances where the actor’s
inability to satisfy the Manner
Exception’s conditions rests solely on
the requestor refusing to accept access,
exchange, or use in any manner
consistent with § 171.301 and fulfilling
the request in the manner requested
would require substantial technical or
financial resources, or both, in the view
of the actor, including significant
opportunity costs. We have observed
this being more of a concern for actors
with significant skills and other
resources for developing unique
technical solutions or new technological
capabilities (e.g., EHR developers or
HIN/HIEs) than for information blocking
actors with few to no such resources
(e.g., small clinician office practices or
safety net clinics).
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
Amongst those actors with substantial
skills and other resources to develop
new, unique or unusual manners of
supporting access, exchange, or use of
EHI, we see actors who appear to be
experiencing a problematic level of
uncertainty about whether they will be
engaging in information blocking if they
decline demands from requestors for
non-standard, non-scalable, solutions
that they do not currently support even
after they have offered to provide
access, exchange, or use of EHI in the
same manner(s) the actor makes
generally available to its customers or
affiliates, and through other standardsbased manners, consistent with
§ 171.301—including offering terms for
such manners that are consistent with
the Fees (§ 171.302) and Licensing
(§ 171.303) Exceptions. We anticipate
that this uncertainty will lead actors
who, again, have already exhausted the
Manner Exception (§ 171.301), to divert
their development capacity to fulfilling
requested manners of access, exchange,
or use of EHI that they could invent to
meet the demands of a requestor
determined to accept only the original
manner they specified and who are
unwilling or unable to agree to terms
consistent with the Fees (§ 171.302) and
Licensing (§ 171.303) Exceptions for
their requested manner or any
alternative manner consistent with the
Manner Exception (§ 171.301).
Therefore, this new condition is
necessary to ensure actors reasonably
allocate resources toward interoperable,
standards-based manners rather than
allowing requestors who, for whatever
reason, do not build their products for
compatibility with open consensus
standards or other industry standards to
attempt to force use of non-standard,
non-scalable solutions by simply
refusing to accept access, exchange, or
use of EHI in any other manner. This
diversion of resources away from
standards-based, scalable manners of
exchange detracts from, instead of
supporting, achievement of key policy
goals such as increased interoperability
and innovation in use of open
consensus standards to achieve secure,
seamless exchange. Where novel
approaches to system interfaces or other
aspects of access, exchange, or use of
EHI represent improvements over other
available approaches, we anticipate
these approaches will not need to be
forced upon the industry but will
instead find a natural foothold and
diffuse according to a normal
innovation curve.
To illustrate the situation we see and
believe this new condition is necessary
to remediate: an actor that develops or
offers certified health IT may, for
PO 00000
Frm 00124
Fmt 4701
Sfmt 4702
example, be uncertain as to whether an
information blocking exception covers
its practice of denying a requestor’s
demand for access, exchange, or use in
a particular manner that relies on
unique specifications instead of
‘‘interoperable standards’’ (for example,
standards identified in 45 CFR
171.301(b)(2)(i)(B) and also specified
below) because the actor has capabilities
and resources that it could potentially
divert to the requestor’s preferred
manner. In such cases, the actor may
also lose the opportunity to pursue
other innovative endeavors or fulfill
other customer requests. Health care
provider and HIN/HIE actors with
substantial technical and other
resources also face demands from
requestors who are interested only in
their own preferred mechanisms,
however unique and non-scalable. We
are concerned that actors currently
appear to experience such uncertainty
even if, to continue this illustration, the
actor is offering the requestor
interoperable manners of access,
exchange, or use based on open,
consensus-based industry standards and
diverting resources to build the new
manner would mean the actor would
need to delay for months or more
deployment of innovations that will
reduce burden on clinicians using the
software. In these cases, we currently
cannot advise these actors whether or
not the requestor’s demand is infeasible
in the actor’s unique circumstances.
Thus, in this example, the actor
concerned about this uncertainty diverts
resources for innovation and
development to requestors’ unique, nonscalable builds at the expense of the
actor investing in innovations and
upgrades to better meet the needs of its
users.
It is not our intent that the
information blocking regulations drive
actors to prioritize various requestors’
non-standardized, non-scalable
preferences for manners of achieving
access, exchange, or use of EHI over
directing the actors’ development
resources to developing and
implementing scalable, interoperable
solutions to meet patients’ and health
care providers’ needs. Consistent with
policy goals for advancing secure,
interoperable access, exchange, and use
of EHI, we would rather encourage use
of standards-based and other generally
available mechanisms whenever
available to serve the access, exchange,
or use need so that as many
development resources as possible
remain available to actors to focus on
continuously improving generally
available products’ capabilities. The
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
proposed new manner exception
exhausted condition is intended to
ensure information blocking regulations
are not easily used to force actors to
inefficiently allocate resources on nonstandard, non-scaling manners of
access, exchange, and use of EHI due to
uncertainty about whether HHS expects
them to develop any or every access,
exchange, or use mechanism that might
be feasible for an actor.
The proposed § 171.204(a)(4) manner
exception exhausted condition provides
actors the option of satisfying the
Infeasibility Exception without needing
to assess whether they could
theoretically or technically meet the
requestor’s particularized demands
regarding the manner and/or terms in
which they want to achieve access,
exchange, or use of requested EHI. In
other words, the manner exception
exhausted condition covers an actor’s
reasonable and necessary practice of
prioritizing resources in favor of
interoperable technology. To satisfy
§ 171.204(a)(4) manner exception
exhausted, an actor would be
considered ‘‘unable’’ to fulfill a request
for access, exchange, or use of electronic
health information when three factors
are true:
(i) The actor could not reach
agreement with a requestor in
accordance with § 171.301(a) manner
requested condition (as we have
proposed it in this proposed rule) or
was technically unable to fulfill a
request for electronic health information
in the manner requested;
(ii) The actor offered all alternative
manners in accordance with
§ 171.301(b) alternative manner
condition (as we have proposed it in
this proposed rule) for the electronic
health information requested but could
not reach agreement with the requestor;
and
(iii) The actor does not provide the
same access, exchange, or use of the
requested electronic health information
to a substantial number of individuals
or entities that are similarly situated to
the requester.
As is the case for a practice satisfying
any of the conditions codified in
§ 171.204(a), an actor’s practice
satisfying the § 171.204(a)(4) manner
exception exhausted condition would
also need to meet the requirements of
§ 171.204(b) responding to requests in
order for that practice to be covered by
the Infeasibility Exception. However, as
is also the case for each of the other
conditions codified in other
subparagraphs of § 171.204(a), the
Infeasibility Exception could be
satisfied regardless of whether the
actor’s practice also satisfied one or
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
more of the other conditions in
§ 171.204(a). Thus, where an actor’s
practice satisfies § 171.204(a)(4) manner
exception exhausted, the actor does not
need to demonstrate consideration of
the factors specified in the infeasible
under the circumstances condition
(original codified in § 171.204(a)(3),
proposed to be renumbered to
§ 171.204(a)(5)) in order for that practice
to be covered by the Infeasibility
Exception.
By creating an infeasibility condition
that can be met without the actor
needing to demonstrate they considered
the resources available to the actor, we
believe we would accomplish the
objective of assuring actors who do not
want to develop one-off solution(s) that
where the requestor is unwilling to
accept an alternative manner of access,
exchange, or use of the requested EHI
consistent with the § 171.301(b)
alternative manner condition, denying
such requests will not be considered
‘‘information blocking’’ (as defined in
§ 171.103) so long as the actor’s practice
satisfies the § 171.204(a)(4) manner
exhausted and § 171.204(b) responding
to requests conditions of the
Infeasibility Exception, ensuring that
the actor’s practice of ‘‘interfering’’ with
the custom-build requests is both
reasonable and necessary.
The second factor within the
proposed § 171.204(a)(4) manner
exception exhausted condition would
require the actor to offer ‘‘all alternative
manners in accordance with
§ 171.301(b) for the electronic health
information requested.’’ We believe it is
important that the Manner Exception
not be considered exhausted if the actor
offers only one alternative manner, or
only the least-interoperable ‘‘alternative
machine-readable format’’ that would be
codified in proposed § 171.301(b)(1)(iii)
(presently codified in
§ 171.301(b)(2)(i)(C)). We also want to
mitigate the risk of the proposed
manner exception exhausted condition
reducing actors’ incentive to expand
their capabilities to support access,
exchange, or use of EHI. That is why we
have not proposed that an actor need
only have offered the alternative
manners in accordance with
§ 171.301(b) that the actor has
implemented for the electronic health
information requested. However, we
recognize that some actors, notably
including health care providers
ineligible to participate in the Medicare
Promoting Interoperability (PI) Program
or Merit-based Incentive Payment
System (MIPS) Promoting
Interoperability performance category,
may not have technology certified to
standards adopted in 45 CFR part 170.
PO 00000
Frm 00125
Fmt 4701
Sfmt 4702
23869
We are considering, and propose in the
alternative to the factor as detailed
above (and in proposed
§ 171.204(a)(4)(i)), that the second of
three factors that must be true to satisfy
§ 171.204(a)(4) manner exception
exhausted condition would instead be
that the actor offered at least two (or at
least three) alternative manners in
accordance with § 171.301(b), at least
one of which was consistent with
§ 171.301(b)(1)(i) or (ii), for the EHI
requested but could not reach agreement
with the requestor. This alternative
factor would offer actors with certified
health IT the option of offering as few
as two alternative manners that each
make use of content and transport
standards published by the Federal
Government or a standards-developing
organization accredited by the American
National Standards Institute, or one
such manner plus an alternative
machine-readable format consistent
with § 171.301(b)(1)(iii). This alternative
version of the factor would also provide
a clear option for an actor without
certified health IT to satisfy the
§ 171.204(a)(4) manner exception
exhausted condition either:
• by offering to fulfill the request in
two manners that use content and
transport standards published by the
Federal Government or a standardsdeveloping organization accredited by
the American National Standards
Institute; or
• by offering fulfilment in at least one
such manner and an alternative
machine-readable format consistent
with § 171.301(b)(1)(iii).
In seeking comment on the proposed
new § 171.204(a)(4) manner exception
exhausted condition, we seek comment
specifically on whether commenters
expect the needs of patients, health care
providers, and the advancement of
interoperability, EHI exchange, and/or
health IT innovation would be better
served by the factor proposed in
§ 171.204(a)(4)(ii), requiring the actor
have offered all alternative manners
consistent with § 171.301(b)(1), or by
simply requiring that the actors offer
only two or three alternative manners so
long as at least one of those manners
used either certified technology
consistent with § 171.301(b)(1)(i) or
used content and transport standards
consistent with § 171.301(b)(1)(ii) in
order for the request to meet this
condition. We note that an actor whose
practices cannot meet § 171.204(a)(4)
manner exception exhausted condition
could consider aligning their practices
to satisfy the § 171.204(a)(5) infeasible
under the circumstances condition
instead. We also specifically request
comment as to whether this alternative
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
23870
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
approach could lead to less incentive to
adopt certified health IT.
The third factor within the proposed
§ 171.204(a)(4) manner exception
exhausted condition
(§ 171.204(a)(4)(iii)) is that the actor
does not provide the same access,
exchange, or use of the requested
electronic health information to a
substantial number of individuals or
entities that are similarly situated to the
requester. There are several features of
this proposed factor to which we wish
to call attention. First, we note that this
factor as a whole serves a similar
function to the § 171.204(a)(5)
(originally codified in § 171.204(a)(3))
infeasible under the circumstances
condition’s factor considering whether
the actor’s practice is nondiscriminatory, and the actor provides
the same access, exchange, or use of
electronic health information to its
companies or to its customers,
suppliers, partners, and other persons
with whom it has a business
relationship. To note, we discussed the
rationale for and functions of this factor
of the infeasible under the
circumstances condition in the ONC
Cures Act Proposed Rule preamble
beginning at 84 FR 7544 and in the ONC
Cures Act Final Rule preamble
beginning at 85 FR 25888.
The intent of the § 171.204(a)(4)(iii)
factor is to provide a basic assurance
that actors would not be able to misuse
the § 171.204(a)(4) manner exception
exhausted condition to avoid supplying
some particular requestor(s) with
manner(s) of access, exchange, or use of
the requested EHI that would be more
accurately characterized as generally
available than as new, unique, or
unusual. This factor ensures this
condition cannot be satisfied by, for
example, an actor simply choosing not
to offer any requestor a general
availability manner of access, exchange,
or use of the requested EHI. The
proposed regulatory language (a
substantial number of individuals or
entities that are similarly situated to the
requester), while on its face may seem
indefinite and is designed to address
any potential request, is intended to
ensure that the actor offers any
requestor (individual or entity) the same
access the actor provides to a substantial
number of its customers, preferred
customers, owned or affiliated
companies, or other non-competitors.
We choose to structure the factor in this
way to align with the concept of
whether the manner requested
(including involved interoperability
elements) is in a stage of development
or overall lifecycle that would roughly
approximate the ‘‘general availability’’
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
phase of the software release lifecycle,
or a conceptually analogous phase for
non-software interoperability
elements.412 However, we do not
propose to incorporate the terms
‘‘generally available’’ or ‘‘general
availability’’ into the condition because
we intend that this condition of the
§ 171.204 Infeasibility Exception to be
available for all types of information
blocking actors, and not only those who
develop or market software products.
For example, health care providers do
not typically develop software for the
market and in our observation are likely
to characterize components of their
health IT systems in more operational
terms—such as what has ‘‘gone live’’ in
their particular implementation—than
in software release lifecycle terms. We
believe avoiding the specific lifecycle
term also avoids potential for
misunderstandings among actors and
requestors, or for gamesmanship on the
part of actors, around when different
actors consider a particular
interoperability element to enter or to be
withdrawn from ‘‘general availability’’
as the term is widely used in the
software sector. However, we emphasize
that our use of ‘‘provides’’ in the present
tense is both precise and deliberative.
This § 171.204(a)(4)(iii) factor tests for
whether the actor currently provides the
same manner to a substantial number of
individuals or entities who are similarly
situated to any given requestor. Looking
only at what the actor currently
provides excludes manners that are
nearing or have exceeded the end of
their supported life cycles. For example,
using software release lifecycle terms for
ease of discussion,413 an actor would
not currently ‘‘provide’’ a manner of
access, exchange, or use of particular
EHI that may once have been generally
available but has since been withdrawn
from general availability. Limiting the
condition to a particular manner of
access, exchange, or use the actor
currently provides also excludes from
consideration technologies that the actor
may be developing or testing but that
are not yet ready for replication. Again,
using software terms for ease of
discussion, it excludes manners that
may in the future become generally
available but that are not yet ready to
412 Additional information about ‘‘general
availability’’ in the software lifecycle is available
from a variety of online sources such as https://
www.techopedia.com/definition/32284/generalavailability-ga (last accessed March 16, 2023).
413 Use of software lifecycle terms does not, we
reiterate for emphasis, imply and should not be
construed as meaning, that we intend this
§ 171.204(a)(4) condition to be available only to
software developers or only with respect to
manners or interoperability elements fairly
characterized as ‘‘software.’’
PO 00000
Frm 00126
Fmt 4701
Sfmt 4702
enter the general availability phase of
their lifecycle. This factor ensures that
the new condition covers only
reasonable activities that could
otherwise constitute information
blocking.
The § 171.204(a)(4)(iii) factor is
intended to ensure the condition cannot
be satisfied where a manner
(mechanisms, interoperability elements)
is currently supported for a substantial
number of individuals or entities but the
responding actor wants to deny that
mechanism to particular requestor(s) for
inappropriate reasons, such as to
discriminate against competitors,
potential competitors, or those the
responding actor may be concerned
could use the resultant access,
exchange, or use of EHI to furnish,
develop, or facilitate development of
products or services that could compete
with those of the actor. We recognize
that such practices are not reasonable
and necessary, and therefore should not
be covered by an exception to the
definition of information blocking. The
§ 171.204(a)(4)(iii) factor is limited to
actors providing the same manner of
access, exchange, or use of the same EHI
to a ‘‘substantial number’’ rather than a
specific number to recognize variation
in actors’ operational contexts,
including their organizational sizes.
What may be a trivial number to a large
health IT developer of certified health
IT might be an important or
consequential (‘‘substantial’’) number
for a small HIN/HIE. However, we
propose in the alternative that we
would, and thus seek comment on
whether we should, instead construct
the factor with a simple fixed threshold
of ‘‘more than one,’’ or more than
another specific number between 1 and
10. Such fixed threshold would offer
more simplicity to actors and potential
requestors, while still assuring that an
actor’s practice would not fail to meet
this factor on the basis of a single
instance of a particular access,
exchange, or use manner. For example,
a health IT developer of certified health
IT may have a single instance of a
manner deployed that has been custom
developed for a customer with highly
unique needs, or a health care provider
may have a custom interface established
with its local public health authority,
that would be impractical to replicate
for other individuals or entities who
may be legally permitted to access,
exchange, or use the same EHI. These
examples of one-off manners we would
not consider to be consistent with the
broad concept of general availability,
and thus should not cause the actor’s
practice of declining requests for
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
additional instance(s) of these one-off
manners, which might use an
interoperability approach that is not
based on open consensus standards or
be otherwise ill suited to scaling up. In
offering any potential fixed number in
public comment, we remain concerned,
such as for the reasons just described,
that a fixed number could be considered
arbitrary and not necessarily dispositive
under the facts and circumstances.
Therefore, we ask commenters
suggesting a fixed number to also
provide accompanying rationale.
The § 171.204(a)(4)(iii) factor includes
whether the requestor is similarly
situated to others to whom the actor
might provide the same requested
access, exchange, or use of the requested
EHI. The similarly situated concept and
wording should be familiar to
information blocking actors, as we also
used it in the Fees (§ 171.302) and
Licensing (§ 171.303) Exceptions. It
would serve here, as it does there, to
indicate that different specific
individuals or entities within a class of
such individuals or entities who are
similarly situated to one another should
be treated in a consistent and nondiscriminatory manner. For example,
several large hospitals (above a certain
established size threshold) to whom a
technology or service is supplied, or for
whom the technology is supported, may
be similarly situated to one another, but
by contrast a small, independent rural
health clinic might be similarly situated
to other such clinics and in a very
different situation than any hospital
(large or otherwise). Within a class of
similarly situated entities, however, the
intent of this factor is that requestors
would not be treated differently based
on extraneous factors, such as whether
any of them may be competitors of the
responding actor or may obtain more of
their health IT from the actor’s
competitors than from the actor.
We remind readers that the intent of
this condition, as noted above, is for
actors to provide requestors the same
access they provide to a substantial
number of their customers, preferred
customers, owned or affiliated
companies, or other non-competitors. In
this regard, we request comment on
whether we should provide more
textual specificity or clarity as to the
proposed text ‘‘a substantial number of
individuals or entities that are similarly
situated to the requester.’’ To further
illuminate this question, if an actor
provides a certain form of EHI access to
health care providers, then that same
form of EHI access should arguably be
made available to individuals baring
potential other considerations (e.g.,
privacy or security concerns). To be
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
clear, it is not our intent for the
‘‘individuals or entities that are
similarly situated to the requester’’
criteria of this new proposed condition
to be used in a way that differentiates
the same access to EHI simply based on
the requestor’s status, such as
individual (e.g., a patient) or entity (e.g.,
a healthcare system).
We believe this new § 171.204(a)(4)
manner exception exhausted condition
ensures that a reasonable and necessary
practice would not be considered
information blocking and strikes the
proper balance in achieving the
information blocking polices and goals
for removing barriers to the access,
exchange, and use of EHI, advancing
interoperability, and promoting
innovation and competition. We seek
comment on this proposal.
2. Manner Exception—TEFCA
Reasonable and Necessary Activities
a. Background
In the ONC Cures Act Proposed Rule
(84 FR 7552), we requested comments
on whether we should propose, in a
future rulemaking, a narrow exception
to the information blocking definition
for practices that are necessary to
comply with the requirements of the
Common Agreement. We stated that
such an exception may support
adoption of the Common Agreement
and may encourage other entities to
participate in trusted exchange through
HINs that enter into the Common
Agreement. We discussed that it would
do so by providing protection if there
are practices that are expressly required
by the Common Agreement, or that are
necessary to implement Common
Agreement requirements, that might
implicate the information blocking
definition and would not qualify for
another exception. We noted that such
an exception would be consistent with
the complementary roles of the
information blocking provision and
other provisions of the Cures Act that
support interoperability and enhance
the trusted exchange of EHI (including
the interoperable network exchange
provisions (42 U.S.C. 300jj–11(c)(9)), the
definition of interoperability (42 U.S.C.
300jj(9)), and the conditions of
certification in 42 U.S.C. 300jj–
11(c)(5)(D)). We further noted that we
expected that any proposal would be
narrowly framed such that contract
terms, policies, or other practices that
are not strictly necessary to comply with
the Common Agreement would not
qualify for the exception. Similarly, we
expected that any future proposal would
provide that an actor could benefit from
this exception only if the practice or
PO 00000
Frm 00127
Fmt 4701
Sfmt 4702
23871
practices that the actor pursued were no
broader than necessary under the
circumstances. We commented that
these limitations would ensure that the
exception would be narrowly tailored to
practices that are most likely to promote
trusted exchange without unnecessarily
impeding access, exchange, or use of
EHI.
Comments we received in response to
the request for information (RFI) varied.
There were generally two overarching
themes in the comments. The first
theme was that it was premature to
establish an exception until TEFCA was
finalized. The second theme focused on
the need for an exception. A majority of
commenters asserted that there should
be some form of ‘‘safe harbor’’ for
TEFCA participants, while other
commenters contended that such an
approach was unwarranted and that all
actors should be subject to the same
information blocking policies and
requirements. Overall, comments
received in response to the RFI that
were in favor of an exception
outnumbered those that were not in
favor. Some commenters advocating for
an exception covering or incentivizing
TEFCA participation noted that such an
exception would provide certainty and
reduce the compliance burden for the
market. The HITAC’s
recommendation 414 regarding the RFI
urged ONC ‘‘to consider carefully the
enduring demand of the Cures Act to
promote information sharing and
prohibit information blocking amongst
all actors’’ and expressed a view that a
careful balance needed to be struck
between encouraging compliance with
the information blocking regulations,
potentially through the adoption of
TEFCA, and the need to investigate
information blocking practices and not
inadvertently allow ‘‘bad actors’’ to
circumvent compliance with the
information blocking regulations.
During the development of TEFCA
and since the publication of the
Common Agreement on January 19,
2022,415 ONC has continued to receive
requests for clarification regarding the
potential information blocking
implications or interpretations of
practices (actions or omissions) that the
Common Agreement requires of QHINs,
and of Participants or Subparticipants
through the Common Agreement’s
required flow-down provisions in
414 https://www.healthit.gov/sites/default/files/
page/2019-07/2019-06-03_
All%20FINAL%20HITAC%20NPRM%20Recs_508signed.pdf.
415 https://www.federalregister.gov/documents/
2022/01/19/2022-00948/notice-of-publication-ofthe-trusted-exchange-framework-and-commonagreement.
E:\FR\FM\18APP2.SGM
18APP2
23872
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
Participant-QHIN or ParticipantSubparticipant Agreements (also
referred to as Framework
Agreements).416 Interested parties have
continued to request that ONC provide
certainty that such practices would be
considered reasonable and necessary
activities that do not constitute
information blocking.
b. TEFCA Condition for the ‘‘Manner’’
Exception
We propose to add a TEFCA
condition to the proposed revised and
renamed Manner Exception, to be
codified in 45 CFR 171.301. The new
condition, in proposed § 171.301(c),
would read as follows: ‘‘If an actor who
is a QHIN, Participant, or
Subparticipant offers to fulfill a request
for EHI access, exchange, or use for any
permitted purpose under the Common
Agreement and Framework
Agreement(s) from any other QHIN,
Participant, or Subparticipant using
Connectivity Services, QHIN Services,
or the specified technical services in the
applicable Framework Agreement, then:
(i) The actor is not required to offer the
EHI in any alternative manner; (ii) Any
fees charged by the actor in relation to
fulfilling the request are not required to
satisfy the exception in § 171.302; and
(iii) Any license of interoperability
elements granted by the actor in relation
to fulfilling the request is not required
to satisfy the exception in § 171.303.’’
This proposal aligns with a
foundational policy construct
underpinning the Manner Exception in
that it facilitates an actor reaching
agreeable terms with a requestor to
fulfill an EHI request and acknowledges
that certain agreements have been
reached for the access, exchange, and
use of EHI (for example, by using
standards consistent with the Common
Agreement or applicable flow-down
Framework agreements that the actor
and requestor have agreed to abide by).
Such TEFCA agreements could already
fall under the current ‘‘manner
requested’’ condition of the Manner
Exception where the request is for EHI
and is for an exchange purpose for
which the QHIN, Participant, or
Subparticipant is obligated to respond
consistent with the Common Agreement
or any applicable Participant-QHIN or
Participant-Subparticipant
Agreement(s). However, consistent with
the information blocking regulations, we
propose that this condition would apply
416 See
Common Agreement Section 1, Definitions
and Relevant Terminology, available at https://
www.healthit.gov/sites/default/files/page/2022-01/
Common_Agreement_for_Nationwide_Health_
Information_Interoperability_Version_1.pdf
(accessed March 16, 2023).
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
for any and all EHI as defined in 45 CFR
171.102 and for exchange purposes
beyond those required to be supported
in the Common Agreement for
Nationwide Health Information
Interoperability, Version 1, as published
on January 19, 2022, in the Federal
Register.
Our proposal would offer actors
certainty that fulfilling, or even
attempting to fulfill, requests for EHI
using Connectivity Services, QHIN
Services, or the specified technical
services in the applicable Framework
Agreement (together referenced here as
‘‘TEFCA means,’’ solely for ease of
discussion) are covered by the Manner
Exception when requestors are parties to
the Common Agreement or a Framework
Agreement under the Common
Agreement, even when the EHI may
exceed the minimum data classes and
elements required by the Common
Agreement as of the date a particular
request is fulfilled. Through this
proposed condition, the Manner
Exception could be satisfied where the
purpose of the requested access,
exchange, or use is beyond those for
which a response is explicitly required
by the Common Agreement and
applicable Framework Agreements
(together referenced here as ‘‘TEFCA
governing agreements,’’ solely for ease
of discussion)—so long as the use of
TEFCA for the purpose is permitted by
the TEFCA governing agreements. (For
purposes of this discussion, any
‘‘Exchange Purpose,’’ as defined in the
Common Agreement,417 authorized
under the terms of the Common
Agreement and applicable Framework
Agreement(s) may be described as one
that is permitted, allowed, or
‘‘authorized’’ under TEFCA.)
Importantly, this condition of the
Manner Exception could be satisfied
regardless of whether the requesting
QHIN, Participant, or Subparticipant
initially requested access, exchange, or
use via TEFCA means or some other
manner. To illustrate, if an actor fulfills
a request to access, exchange, or use EHI
from a QHIN, Participant, or
Subparticipant through TEFCA means,
then that would be sufficient for
meeting this proposed new TEFCA
condition. In this scenario, the
responding actor would not be required
to conform any fees or any license
agreements to the Fees or Licensing
Exceptions (45 CFR 171.302 and
417 See, Common Agreement for Nationwide
Health Information Interoperability, Version 1,
January 2022, Page 6. Available at: https://
www.healthit.gov/sites/default/files/page/2022-01/
Common_Agreement_for_Nationwide_Health_
Information_Interoperability_Version_1.pdf (Last
accessed March 16, 2023.)
PO 00000
Frm 00128
Fmt 4701
Sfmt 4702
171.303, respectively)—again, regardless
of whether the requesting QHIN,
Participant, or Subparticipant initially
requested access, exchange, or use via
Connectivity Services, QHIN Services,
the specified technical services in the
applicable Framework Agreement, or
some other manner.
Another important feature of the
proposed TEFCA condition is that it can
be satisfied by the responding QHIN,
Participant, or Subparticipant either
fulfilling or offering to fulfill the
requesting QHIN’s, Participant’s, or
Subparticipant’s request for EHI using
Connectivity Services, QHIN Services,
or the specified technical services in the
applicable Framework Agreement. To
illustrate, if a QHIN, Participant, or
Subparticipant actor offers to fulfill a
request to access, exchange, or use EHI
from a QHIN, Participant, or
Subparticipant through TEFCA means
that are available to both the requestor
and responding actor, then that would
be sufficient for meeting this proposed
new TEFCA condition even if the
requesting QHIN, Participant, or
Subparticipant initially requested
access, exchange, or use in some other
manner or refused to accept the
responding actor’s offer to fulfill the
requested EHI access, exchange, or use
through TEFCA means.
As discussed above regarding the
ONC Cures Act Final Rule TEFCA RFI,
this approach aligns with the Cures
Act’s goals for interoperability and the
establishment of TEFCA by
acknowledging the value of TEFCA in
promoting access, exchange, and use of
EHI in a secure and interoperable way.
This approach furthers both of these
goals (TEFCA adoption and
interoperability) by offering actors
subject to the Cures Act’s information
blocking provision that also choose to
become QHINs, Participants, or
Subparticipants certainty that their
practice of declining to fulfill a request
to access, exchange, or use EHI in other
manners that a QHIN, Participant, or
Subparticipant might initially seek will
qualify for the exception so long as the
responding actor fulfills (or at least
offers to fulfill) the request using
available TEFCA means. The proposed
TEFCA condition also incorporates
multiple aspects responsive to public
comments and feedback received on the
ONC Cures Act Proposed Rule (84 FR
7424). It recognizes and supports actors
that choose to adopt and comply with
the Common Agreement by providing
certainty and burden reduction for those
actors when it comes to information
blocking and requests for access,
exchange, or use of EHI by QHINs,
Participants, or Subparticipants. The
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
proposed TEFCA condition
accomplishes these goals by, for
example, limiting the need for an actor
seeking assurance that their practices
would not be considered information
blocking to either satisfy a request in the
non-TEFCA manner initially requested
or by having to meet other conditions of
the Manner Exception or another
exception.
Each QHIN, Participant, or
Subparticipant has chosen to become a
part of the TEFCA ecosystem. Where
mechanisms consistent with TEFCA’s
technical framework and other
requirements relevant to particular
type(s) of EHI and purpose(s) of
exchange can support EHI access,
exchange, use for any purpose permitted
under the Common Agreement and
applicable Framework Agreement(s), we
believe it is reasonable and necessary
for actors who have chosen to become
part of the TEFCA ecosystem to
prioritize use of these mechanisms
rather than other mechanisms—that are
potentially less interoperable, less
secure, or less scalable—for sharing EHI
with requestors who have also chosen to
become part of the TEFCA ecosystem.
To be clear, the proposed TEFCA
manner exception would identify as
reasonable and necessary an
information blocking actor’s practice of
prioritizing using, in lieu of other
feasible manners, the appropriate
TEFCA means:
• for any and all EHI for which
access, exchange, or use can be
supported by TEFCA means for both the
actor and requestor;
• so long as the requestor is a QHIN,
Participant, or Subparticipant and the
purpose of the access, exchange, or use
is permitted under the TEFCA
governing agreements;
• regardless of whether the request is
initially made through TEFCA means or
otherwise; and
• regardless of whether all of the
particular data class(es) or exchange
purpose(s) requested are yet required by
TEFCA’s governing agreements to be
returned in response to a TEFCA
request.
In providing a clear, efficient path to
regulatory certainty that prioritizes
exchange amongst QHINs, Participants,
and Subparticipants in TEFCA using
TEFCA means of sharing any and all
EHI that TEFCA means can support will
not be considered information blocking,
we hope to incentivize (and accelerate)
all QHINs, Participants, and
Subparticipants to embrace and
accelerate their use of the available,
interoperable, and secure TEFCA
technical services to support the access,
exchange, and use of as much EHI as
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
possible for as many purposes as are
permitted under the TEFCA governing
agreements. To provide clarity, we note
that the establishment of this condition
would identify such prioritization on
TEFCA means of responding to other
QHIN, Participant, or Subparticipant
requests for access, exchange, or use of
EHI as reasonable and necessary for
those QHINs, Participants, and
Subparticipants who choose that
approach. The establishment of the
TEFCA condition would not preclude a
QHIN, Participant, or Subparticipant
information blocking actor from making
a different choice with respect to
supporting non-TEFCA means in
complement to TEFCA means of
information sharing with others who
choose to become QHINs, Participants,
and Subparticipants.
In order to satisfy this condition, we
are considering requiring that an actor
would need to check an available
directory of all QHINs, Participants, and
Subparticipants under the TEFCA
governing agreements in order see if the
requestor is listed. As described in the
QHIN Technical Framework, the
‘‘Directory Service will be the primary
location for determining the
HomeCommunityID and Responding
QHIN for QHIN-to-QHIN data exchange.
QHINs will be responsible for updating
the RCE Directory Service with
HomeCommunityIDs of their connected
Participants and Subparticipants.
QHINs are expected to maintain a local
copy of the contents of the RCE
Directory Service to support their
Connectivity Services and facilitate
query and message delivery
transactions.’’ While the listing or nonlisting of a requestor in such a directory
would not be dispositive as to the truth
of the matter, an actor checking the
directory would likely improve the
efficiency of such interactions (i.e., EHI
requests and responses) and would help
inform the assessment of the actor’s
intent under the circumstances. We
welcome comments on this potential
requirement for satisfaction of the new
proposed TEFCA condition. We also
welcome comments on all aspects of the
new proposed TEFCA condition for the
Manner Exception.
C. Information Blocking Requests for
Information
1. Additional Exclusions From Offer
Health IT—Request for Information
We seek comment on whether we
should consider proposing in future
rulemaking any additional exclusions
from the offer health information
technology or offer health IT definition
proposed in § 171.102 of this proposal.
PO 00000
Frm 00129
Fmt 4701
Sfmt 4702
23873
We seek comment in particular on
health IT developers and users’
experience with activities or
arrangements that they believe are
beneficial to patients and/or health care
providers and that they can demonstrate
may be occurring less often specifically
due to prospective participants’
concerns about potential information
blocking liability. We further welcome
observations, evidence, or feedback
specific to how potential additional
exclusions could be structured or
balanced by other measures to mitigate
risks of unintended consequences of
such exclusions—not limited to, but
specifically including potentially
insulating individuals or entities with
shoddy practices or nefarious intent
from accountability for subjecting their
customers, clients, patients, or exchange
partners to information blocking
conduct. We also welcome comments
on other steps that the public would
recommend ONC consider taking to
further encourage lawful donation or
other subsidized provision of certified
health IT to health care providers who
may otherwise struggle to afford
modern, interoperable health IT without
reducing the assurances and other
benefits ONC’s information blocking
and Health IT Certification Program
regulations provide to these recipient
health care providers in comparison to
providers who obtain certified health IT
directly from its developer or under
other non-subsidized arrangements.
2. Possible Additional TEFCA
Reasonable and Necessary Activities—
Request for Information
We seek comment on whether any
other particular practices that are not
otherwise required by law but are
required of an individual person or
entity by virtue of their status as a
QHIN, Participant, or Subparticipant
pursuant to the Common Agreement
pose a substantial concern or
uncertainty regarding whether such
practices could constitute information
blocking as defined in 45 CFR 171.103.
As a reminder, to constitute information
blocking as defined in 45 CFR 171.103,
the practice that is not required by law
would have to be done with the
requisite knowledge on the part of the
actor engaging in the practice, would
have to rise to the level of an
interference, and not be covered by an
existing information blocking
exception—including but not limited to
the Manner Exception as we propose to
modify it. We seek comment on what,
if any, particular practices required of
QHINs, Participants, or Subparticipants
may pose such concerns or uncertainty,
and the specific source of the
E:\FR\FM\18APP2.SGM
18APP2
23874
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS2
requirement, obligation, or commitment
to engage in the practice—such as the
Common Agreement, flow-down
requirements in Framework
Agreements, the QHIN Technical
Framework, or Standard Operating
Procedures published by the ONC
Recognized Coordinating Entity (RCE).
We also request that commenters
identify which practices they believe are
not covered by existing information
blocking exceptions and that
commenters would advocate we assess
for potential identification as reasonable
and necessary activities that do not
constitute information blocking as
defined in 45 CFR 171.103. Recognizing
that not all individuals or entities who
may have a right or be allowed under
applicable law to access, exchange, or
use EHI may be in a position to become
a QHIN, Participant, or Subparticipant,
we also seek comment on whether and
how any such identification of
additional reasonable and necessary
activities might pose concerns about
unintended consequences for EHI
access, exchange, or use by individuals
or entities who are not QHINs,
Participants, or Subparticipants.
For more information on TEFCA,
please visit: https://www.healthit.gov/
topic/interoperability/trusted-exchangeframework-and-common-agreementtefca.
3. Health IT Capabilities for Data
Segmentation and User/Patient
Access—Request for Information
ONC believes that data segmentation
is an integral capability for enabling the
access, exchange, and use of electronic
health information (85 FR 25705). While
initiatives such as security tagging
capabilities represent an initial step
towards enabling appropriate access,
exchange, and use of health information
in accordance with applicable law and
patient preferences, many additional
data segmentation challenges remain,
including the prevalence of
unstructured data, the sharing of image
files, the use of sensitive health
information (see section III.C.10 of this
proposed rule and 85 FR 25702), and
other technical and non-technical (e.g.,
policy and regulatory) challenges.
We have received public feedback
indicating that there is significant
variability in health IT products’
capabilities to segment data, notably
including enabling differing levels of
access to data based on the user and
purpose. There are, as also discussed in
section III.C.10 of this proposed rule,
many situations in which segmentation
of data may be required or requested,
including use cases where special
handling or other restriction of access,
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
exchange, or use of particular portion(s)
of a patient’s EHI is required by law or
consistent with an individual patient’s
expressed preference regarding their
own or others’ access to their EHI. In
section III.C.10 of this proposed rule, we
propose a new certification criterion
specifically focused on supporting
patient preferences related to their right
to request a restriction on certain uses
and disclosures of their PHI under the
HIPAA Privacy Rule (see 45 CFR
164.522). This proposed functionality is
focused specifically on supporting one
health IT enabled mechanism for a
patient to request a restriction on
disclosure and for a covered entity to
honor that restriction using a certified
Health IT Module (See section III.C.10
for further detail).
In addition to the specific right to
request a restriction on disclosure
consistent with 45 CFR 164.522, there
are other use cases related to patient
preferences—and specific nuances
within use cases—which present
challenges from a technical point of
view. Through public forums and
correspondence with ONC, interested
parties in the healthcare community
have conveyed that their certified health
IT lacks capabilities to differentiate the
timing of release of certain EHI based on
patients’ individual preferences. Some
interested parties have also indicated
that their certified health IT may have
little or no ability to restrict a patient’s
personal representative’s access to only
some of the patient’s EHI using
electronic means such as a portal or API
or to easily hold back only some pieces
of the patient’s EHI, in response to or at
the patient’s request, while honoring the
patient’s simultaneous preference for
the rest of their EHI to be shared with
another of their health care providers.
One example of a reason an individual
might request that some of their
information be withheld from (not
disclosed to or shared with) some of
their health care providers while the
rest of their information continued to be
shared would be that the individual
expects certain information could be
associated with conditions or care that
may be stigmatized by health care
providers other than the one to whom
the individual disclosed the information
or who provided the specific care. A
provider who knows a patient requested
restrictions on (or expressed a
preference not to share) specific
information out of concern about
potential stigmatization might want to
honor the patient’s request to as part of
or in support of patient-provider
confidentiality and patient trust,
regardless of whether the health care
PO 00000
Frm 00130
Fmt 4701
Sfmt 4702
provider shared the patient’s concern
about how other providers might react
to the specific information the patient
believes would be potentially
stigmatizing. Out of respect for the
patient’s privacy and autonomy and
fostering trust within patient-provider
relationship, a provider might choose to
honor a patient’s request for restrictions
on sharing of their EHI even if the
provider did not know the patient’s
specific reasons for the request. Neither
the 45 CFR 164.522(a) right to request
restrictions under the HIPAA Privacy
Rule nor the information blocking
regulations’ § 171.202(e)) subexception
respecting an individual’s request not to
share information specify that the
individual requesting restrictions
should have particular reasons, or be
required to share with the provider or
other actor of whom they make the
request their reasoning, for requesting
restrictions.
We seek comment to inform steps we
might consider taking to improve the
availability and accessibility of
solutions supporting health care
providers’ and other information
blocking actors’ efforts to honor
patients’ expressed preferences
regarding their EHI. For example,
patients may express a preference for a
delay in the availability of information
to them (such as in a health care
provider’s patient portal). Or, for
another example, actor could choose to
honor a patient request that to the actor
withhold certain information from
particular access, exchange, or use
consistent with the individual right to
request restrictions under the HIPAA
Privacy Rule and the information
blocking Privacy Exception.418 We seek
to support information blocking actors’
efforts to honor patients’ expressed
preferences that other law allows the
actor to honor as well as actors’ needs
to complying with all applicable tribal,
state, and federal laws restricting or
placing specific preconditions on
permissibility of information access
418 This particular example assumes that the actor
is also required to comply with the HIPAA Privacy
Rule and that their practices in restricting access,
exchange, or use of EHI are consistent with both
§ 164.522(a), the HIPAA Privacy Rule right of an
individual to request restriction of uses and
disclosures of their PHI, and § 171.202(e) subexception—respecting an individual’s request not to
share information under the information blocking
regulations. We emphasize that this example
assumes the restrictions are ones that the HIPAA
Privacy Rule does not require covered entities to
grant at patient request, in order to remind readers
that where an actor is explicitly required by the
HIPAA Privacy Rule to restrict access, exchange, or
use of EHI the actor’s practice of applying those
restrictions is ‘‘required by law’’ and would not be
considered information blocking (no exception
needed, as we discussed in the Cures Act Final Rule
at 85 FR 25794).
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
(release of information) and sharing in
situations (or ‘‘use cases’’) such as those
described in the non-exhaustive
assortment of examples below.
Based on questions and feedback we
have received subsequent to the ONC
Cures Act Final Rule, examples of
situations (or ‘‘use cases’’) include, but
are not limited to:
• A heath care provider needs to
prove or validate consent of the patient
(by electronic or manual means)
regarding EHI subject to the
Confidentiality of Substance Use
Disorder Patient Records regulations, 42
CFR part 2—or other federal law or
applicable state or tribal law with
specific consent requirements—prior to
sharing it with another health care
provider treating the same patient for
other clinical concerns.
• A health care provider needs to
identify and segment from particular
access, exchange, or use by specific
entities for specific purposes data
subject to varying state laws requiring
special handling or access restrictions in
such situations—such as behavioral
health information, HIV diagnosis and
treatment, genetic testing, treatment of
minors, or incidents of sexual violence.
• An actor’s practice meets the
conditions of the Preventing Harm
Exception (§ 171.201) for withholding
EHI for access, exchange, or use—such
as access by the patient or by a
particular personal representative of the
patient—of some, but not all, of the EHI
the actor has for a particular patient.
• A health care provider (or other
actor) chooses to grant a patient’s
request to delay the release of certain
EHI—such as new diagnoses or
particular laboratory or imaging
result(s)—to the patient or the patient’s
personal representative either for a
particular period of time or until a
particular event, such as
communication between the patient and
a clinician or patient educator, has
occurred.419
• A health care provider (or other
information blocking actor) wants to
respect an individual’s request, per the
individual’s privacy preference, not to
share some of the individual’s EHI with
others to whom it could legally be
disclosed–such as the individual’s other
health care providers or their personal
representative.12
• The actor wishes to be certain their
practices for respecting these patient
privacy preferences will not be
considered information blocking, so
they set up their practices in accordance
419 See also, https://www.healthit.gov/curesrule/
faq/can-actor-grant-patients-request-delay-releasepatients-test-results-eg-laboratory-or-image.
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
with § 171.202(e), the sub-exception to
the privacy exception concerning
respecting an individual’s request not to
share information.420 (We direct readers
to section III.C.10 for our health IT
certification proposal specifically
relevant to this example).
• A health care provider needs to
identify and segment data for research
purposes, according to the conditions
outlined in the HIPAA Privacy Rule 421
and the Federal Policy for the Protection
of Human Subjects (‘‘Common Rule’’),
as applicable.422
It is our impression that at least some
health care providers and their patients
sometimes encounter various challenges
as they work to provide patients or their
personal representatives with electronic
access to the information they want
when they want it. These challenges
notably include, though they are not
necessarily limited to, shortfalls in the
technical capability of some health IT to
segment and filter EHI for appropriate
access, exchange, and use consistent
with applicable law and patient
preferences.
Examples of challenges or technical
limitations to EHI segmentation and
filtering to facilitate appropriate EHI
access, exchange, or use that have been
described to ONC include, but are not
necessarily limited to:
• A certified EHR (certified health IT)
currently in use by a health care
provider that is, as implemented,
capable only of ‘‘all or nothing’’ release
of all EHI test results for all patients
immediately to the patient portal,
without offering the ordering clinicians
or other healthcare professionals using
the certified EHR any capability to flag
or withhold individual EHI test results
for an individual patient from the
patient portal.
• A health care provider’s current
certified EHR is designed and
implemented such that any test result
the patient and health care provider
want to have available to the patient in
the portal must be manually pushed to
the portal, result by result, by the
ordering clinician.
• Existing segmentation tools or
modalities (for example,
implementation of segmentation
capabilities only by broad data class
rather than at the level of individual
data point) not providing enough
flexibility to address more complex use
cases, such as honoring a patient’s
420 45
CFR 171.202(e).
CFR 164.512(i). See also, https://
www.hhs.gov/hipaa/for-professionals/specialtopics/research/.
422 See 45 CFR part 46. See also, https://
www.hhs.gov/ohrp/regulations-and-policy/
regulations/common-rule/.
421 45
PO 00000
Frm 00131
Fmt 4701
Sfmt 4702
23875
request to have immediate access to
most of their EHI but to have electronic
access to some EHI, such as test results,
that are complicated to interpret or
indicate a potential of a life-limiting
diagnosis, only after such results have
been explained to them in real time by
an appropriately qualified healthcare
professional.
• An existing certified EHR system
does not have technical capacity to
appropriately segment and share
specific health information according to
applicable laws, such as where a parent
or legal guardian is legally permitted to
obtain portions of a non-emancipated
minor child’s EHI regardless of the
child’s consent but not legally permitted
to obtain other portions of the child’s
EHI without the child’s consent.423
• No health IT that a health care
provider has or could implement
includes the capability to automate the
capture and execution of a patient’s or
patient’s personal representative’s
unique individual preferences for when
new EHI becomes available to them
through electronic access.
In this proposed rule, we seek
comment related to the capabilities of
health IT products to segment data and
support health care providers (and
actors) in sharing information consistent
with patient preferences and all laws
applicable to the creation, collection,
access, exchange, use and disclosure of
EHI.
We also seek comment on experiences
with the availability and utility of
certified health IT products’ capabilities
to segment data in use cases including
but not limited to the illustrative
examples above. We also seek comment
on how greater consistency in provider
documentation practices could enhance
the feasibility of technical segmentation
solutions. Similarly, we seek comment
on barriers to technical feasibility
presented by local, state, and federal
regulations. Further, we note our
proposal in section III.C.10 and request
comment on how else the Program
could better support the other use cases
described above either through
functional or standards-based
certification requirements.
V. Incorporation by Reference
The Office of the Federal Register has
established requirements for materials
(e.g., standards and implementation
specifications) that agencies propose to
423 Examples of such applicable laws would
include state or tribal laws restricting parental
access to specific information within a nonemancipated minor’s medical records. At the
federal level, one example would be 42 CFR 59.10
confidentiality requirements applicable to Title X
recipients, subrecipients, and service sites.
E:\FR\FM\18APP2.SGM
18APP2
ddrumheller on DSK120RN23PROD with PROPOSALS2
23876
Federal Register / Vol. 88, No. 74 / Tuesday, April 18, 2023 / Proposed Rules
incorporate by reference in the Code of
Federal Regulations (79 FR 66267; 1
CFR 51.5(a)). Specifically, § 51.5(a)
requires agencies to discuss, in the
preamble of a proposed rule, the ways
that the materials it proposes to
incorporate by reference are reasonably
available to interested parties or how it
worked to make those materials
reasonably available to interested
parties; and summarize, in the preamble
of the proposed rule, the material it
proposes to incorporate by reference.
To make the materials we intend to
incorporate by reference reasonably
available, we provide a uniform
resource locator (URL) for the standards
and implementation specifications. In
many cases, these standards and
implementation specifications are
directly accessible through the URLs
provided. In most of these instances,
access to the standard or
implementation specification can be
gained through no-cost (monetary)
participation, subscription, or
membership with the applicable
standards developing organization
(SDO) or custodial organization.
Alternatively, a copy of the standards
may be viewed for free at the U.S.
Department of Health and Human
Services, Office of the National
Coordinator for Health Information
Technology, 330 C Street SW,
Washington, DC 20201. Please call (202)
690–7171 in advance to arrange
inspection.
The National Technology Transfer
and Advancement Act (NTTAA) of 1995
(15 U.S.C. 3701 et seq.) and the Office
of Management and Budget (OMB)
Circular A–119 require the use of,
wherever practical, technical standards
that are developed or adopted by
voluntary consensus standards bodies to
carry out policy objectives or activities,
with certain exceptions. The NTTAA
and OMB Circular A–119 provide
exceptions to selecting only standards
developed or adopted by voluntary
consensus standards bodies, namely
when doing so would be inconsistent
with applicable law or otherwise
impractical. As discussed in section
III.B of this preamble, we have followed
the NTTAA and OMB Circular A–119 in
proposing standards and
implementation specifications for
adoption, including describing any
exceptions in the proposed adoption of
standards and implementation
specifications. Over the years of
adopting standards and implementation
specifications for certification, we have
worked with SDOs, such as HL7, to
make the standards we propose to
adopt, and subsequently adopt and
incorporate by reference in the Federal
VerDate Sep<11>2014
18:57 Apr 17, 2023
Jkt 259001
Register, available to interested parties.
As described above, this includes
making the standards and
implementation specifications available
through no-cost memberships and nocost subscriptions.
As required by § 51.5(a), we provide
summaries of the standards we propose
to adopt and subsequently incorporate
by reference in the Code of Federal
Regulations. We also provide relevant
information about these standards and
implementation specifications
throughout the preamble.
We have organized the following
standards and implementation
specifications that we propose to adopt
through this rulemaking according to
the sections of the Code of Federal
Regulations (CFR) in which they