Confidentiality codes refactored
This presentation is the property of its rightful owner.
Sponsored Links
1 / 21

Confidentiality Codes Refactored PowerPoint PPT Presentation

  • Uploaded on
  • Presentation posted in: General

Confidentiality Codes Refactored. Serafina Versaggi and Kathleen Connor Eversolve. Problem Statement. The current HL7 Confidentiality Code System is overloading the coded attributes of confidentiality Current Confidentiality Codes mix:

Download Presentation

Confidentiality Codes Refactored

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript

Confidentiality codes refactored

Confidentiality Codes Refactored

Serafina Versaggi and Kathleen Connor


Problem statement

Problem Statement

  • The current HL7 Confidentiality Code System is overloading the coded attributes of confidentiality

  • Current Confidentiality Codes mix:

    • Privacy Policy Codes about how Sensitive Information must be handled with

    • Metadata tags (data about data content) used to convey Information Sender and Receiver responsibilities to prevent unauthorized use or disclosure

  • Without guidance on the intended use of these metadata tags, implementers may mistakenly applying Privacy Policy and Sensitive Information Codes as metadata on protected information

    • On external wrappers used as transport information in exchange

    • On document headers for use by records management systems/repositories

  • As a result, they may be breaching protected information by disclosing the sensitive nature of that information to unauthorized Receivers

Happy news

Happy News

  • Refactored Confidentiality Codes fit seamlessly into the Composite Security and Privacy DAM with minimal changes

  • This should be considered validation of that good work

  • Proposed changes specify

    • Sender responsibility to ensure that protected information is handled in accordance with Privacy Policies

    • Receiver responsibility for handling protected information the Sender is authorized to disclose

    • Interoperable and policy driven Confidentiality Codes that reduce the need for point to point negotiation when exchanging information

Proposed changes to the dam

Proposed Changes to the DAM

  • Refactors current Confidentiality Code System

    • Reason: Multiple Axes that blend internal Privacy Policies with Role and User base Access and interoperable Confidentiality Codes

  • Defines new interoperable Confidentiality Codes

    • Specifies Receiver responsibilities for information being exchanged

    • Limited set of codes that convey general information handling rules

    • Convey sensitivity levels without disclosing why the information is or is not sensitive

  • Relocates Sensitive Information Codes to ActPrivacyPolicyType value set

    • Sensitive Information Codes represent a type of Organizational Privacy Policy

    • Like Jurisdictional Privacy Policies, these are implemented in a Policy Information Point to inform the Policy Decision Point

  • Adds Information Subject Authorization to Disclose

    • Consent Directives - specify disclosures that are more restrictive than generally applicable Jurisdictional Health Privacy Policies

    • Disclosure Authorizations - specify disclosures less restrictive than generally applicable Jurisdictional Health Privacy Policies

Current hl7 confidentiality code concept domains

Current HL7 Confidentiality Code Concept Domains

Current Confidentiality Codes


Disambiguating confidentiality and sensitivity

Disambiguating Confidentiality and Sensitivity

  • Definition of these concepts are often intertwined, and usage is not clearly orthogonal in many contexts

  • Healthcare differentiate these because of heightened Privacy concerns

  • Confidentiality is a security concept

    • How information is treated

    • Who can know and what they can do with it

    • Has no necessary bearing on social values

      • ISO 7498-2:1989 - Confidentiality is the property that information is not made available or disclosed to unauthorized individuals, entities, or processes

  • Sensitivity is a social perception concept

    • How information is regarded socially

    • What others will think about and act on the information

    • How that “social” perception and resulting reaction will impact the information subject and/or owner

      • ISO7498-2:1989 - Sensitivity is the characteristic of a resource which implies its value or importance and may include its vulnerability

Confidentiality sensitivity matrix

Confidentiality – Sensitivity Matrix

Sender assigns confidentiality codes

Sender Assigns Confidentiality Codes



Vocabulary changes to support use cases

Vocabulary Changes to Support Use Cases

  • Added attribute to Privacy Policy that designates which Privacy Policy

    • May leverage existing HL7 vocabulary Act.code concept domain “ActPrivacyPolicyType”

    • Proposed Vocabulary includes:

      • ActPrivacyLaw – with example codes e.g., 42 CFR Part 2 and HIPAA

      • Sensitivity -

        • Defined as policies shared by a policy domain relating to sensitivity of information

        • Leverages ISO7498-2:1989 definitions for Confidentiality and Sensitivity

        • Example codes from the ConfidentialityModifiers and ConfidentialityByInfoType and proposed codes for Use Case discovered gaps such as Sensitive Service Provider and Employee

Relocated sensitive information codes

Relocated Sensitive Information Codes

Relocates Sensitive Information Codes from AccessByInfoType and Confidentiality Modifiers to the ActPrivacyPolicyType value set

No impact on earlier models which will reference current Confidentiality Code System

No impact on CDA which only uses Normal, Restricted, and Very Restricted

Future models that use ActPrivacyPolicyCodes can target classes with a Comply relationship to an ActClassPolicy

Refactored confidentiality codes

Refactored Confidentiality Codes

Refactored confidentiality codes1

Refactored Confidentiality Codes

Proposed refactoring

Proposed Refactoring

Next steps prepare harmonization proposal

Next Steps – Prepare Harmonization Proposal


  • Harmonization Conference Call

  • Nov 15, 2011 to Nov 18, 2011Add to Outlook Calendar

  • Templates and Examples

  • Download Harmonization Proposal Template/Example

  • Initial Proposals

  • Submissions due 10/16/2011, midnight Eastern

Final Proposals

Submissions due 11/06/2011, midnight Eastern

View/Upload Proposals

View/Upload Proposals

Policy and Procedural Excerpts

Harmonization Process Overview




Compares Current and Proposed Vocabulary

Provides Glossary of Terms

Confidentiality code system definition

Confidentiality Code System Definition

Current Definition of Confidentiality

New Definition of



Values that control disclosure of information.

Example: Normal, restricted, substance abuse related.

Definition: The property that information is not made available or disclosed to unauthorized individuals, entities, or processes [ISO 7498-2:1989]

Description: The codes in the Confidentiality code system are values that prevent the unauthorized use of a resource, including the prevention of use of a resource in an unauthorized manner.

The confidentiality code assigned by an information sender (per policies intended by the custodian) that convey receiver obligation to ensure that the information is not made available or redisclosed to unauthorized individuals, entities, or processes (security principals).

The receiver may only grant authorized principals access to the minimum necessary information for the purpose of use intended by the sender. The receiver must grant principals permission to perform approved operations on the information object.

Proposed current confidentiality code definitions

Proposed & Current Confidentiality Code Definitions





  • Login