10.08.2013 Views

ehr onc final certification - Department of Health Care Services

ehr onc final certification - Department of Health Care Services

ehr onc final certification - Department of Health Care Services

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

it has not been altered when it has been electronically exchanged. We recognize that<br />

certain situations may not be conducive to the use <strong>of</strong> hashes, which is why, as we noted<br />

above, we do not specify the instances in which hashing must be used, just that Certified<br />

EHR Technology include these capabilities.<br />

Comment. One commenter stated that secure transmission requirements are<br />

“inappropriate” because they do not support any meaningful use requirements.<br />

Response. We disagree. Meaningful use requires the electronic exchange <strong>of</strong><br />

health information and the protection <strong>of</strong> such information. We believe that the only<br />

practical and effective way that electronic health information can be exchanged in a<br />

meaningful manner is if the integrity <strong>of</strong> the information can be maintained. Information<br />

“integrity” is also one <strong>of</strong> the three pillars <strong>of</strong> securing or “protecting” electronic<br />

information.<br />

§170.302(t) - Authentication<br />

Meaningful Use<br />

Stage 1<br />

Objective<br />

Protect electronic<br />

health information<br />

created or<br />

maintained by the<br />

certified EHR<br />

technology through<br />

the implementation<br />

<strong>of</strong> appropriate<br />

technical<br />

capabilities<br />

Meaningful Use<br />

Stage 1 Measure<br />

Conduct or review<br />

a security risk<br />

analysis per 45<br />

CFR 164.308 (a)(1)<br />

and implement<br />

security updates as<br />

necessary and<br />

correct identified<br />

security<br />

deficiencies as part<br />

<strong>of</strong> its risk<br />

management<br />

process<br />

Page 114 <strong>of</strong> 228<br />

Certification Criterion<br />

Interim Final Rule Text:<br />

(1)Local. Verify that a person or entity seeking access to<br />

electronic health information is the one claimed and is<br />

authorized to access such information.<br />

(2)Cross network. Verify that a person or entity seeking<br />

access to electronic health information across a network is the<br />

one claimed and is authorized to access such information in<br />

accordance with the standard specified in §170.210(d).<br />

Final Rule Text:<br />

§170.302(t)<br />

Authentication. Verify that a person or entity seeking access<br />

to electronic health information is the one claimed and is<br />

authorized to access such information.<br />

Comments. One commenter expressly supported this <strong>certification</strong> criterion. A<br />

majority <strong>of</strong> commenters expressed c<strong>onc</strong>erns related to §170.302(t) and the cross-<br />

enterprise authentication standard specified at §170.210(d). Some commenters

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!