You are on page 1of 28

Information Governance

The Foundation for Effective e-Health


Introduction:
e-Health and information governance

e-health • Electronic prescribing systems, To achieve this level of integration,


which enable clinicians to create and some organizations have invested
Around the world, health care
transmit electronic prescriptions to heavily in integrated health
providers and public health
dispensing organizations information solutions. These
organizations are making
solutions are becoming increasingly
unprecedented investments in • Health information systems, which common and are known by various
e-health. The aim: to improve patient store and provide clinicians with monikers: Patient Care Records (PCR),
and public health outcomes by access to information related to Computer-based Medical Records
improving the accessibility and quality patients’ health, diagnosis and care (CMR), Electronic Patient Records
of health care services, while driving provisions (EPR), Summary Care Records (SCR),
down costs.
Electronic Medical Records (EMR) or
To achieve these strategic imperatives, Integrated e-health solutions Electronic Health Records (EHR).
organizations are implementing a Standalone e-health systems deliver
Accenture has identified three core
range of e-health solutions, including: clinical and administrative benefits
types of integrated health information
but do not enable organizations to
• Health care management systems, system:
realize the full potential of e-health.
which use reporting, analytics and To deliver the greatest possible Intra-enterprise EMR
process optimization solutions to value in terms of cost reduction and These solutions enable clinical and
improve the performance of back- improved health outcomes, disparate administrative systems within a public
office, business and clinical processes health care management systems, or private health care provider to
telemedicine solutions and health share patient-identifiable information
• Patient-centric e-health solutions, information platforms must be able
which empower patients to manage in support of clinical processes. A
to securely and effectively share data. defining characteristic of this solution
their health more effectively Doing so requires health networks type is that data is not electronically
that connect public health agencies, shared outside organizational
• Telemedicine systems, which support
provider organizations, hospitals, boundaries.
the remote delivery of health care
clinics, diagnostic laboratories, health
services
service commissioners and individual
clinicians.

1
Inter-enterprise EMR • Connecting health care providers Information governance—the
These solutions enable multiple health through health networks. Such processes, functions, standards
care enterprises to share patient- integration improves the accessibility and technologies that enable high
identifiable clinical and administrative of specialist care by enabling quality information to be created,
information in support of clinical clinical data and images to be sent stored, communicated, valued and
processes. Examples include Health electronically to specialists and used effectively and securely in
Information Exchanges (HIE) and diagnostic laboratories for assessment. support of an organization’s strategic
Regional Health Information Networks This enhances care quality by goals—is the key to ensuring effective
(RHIN). A defining characteristic of an encouraging provider-to-provider and secure e-Health. e-Health
inter-enterprise EMR is that limited consultations to support diagnosis practitioners must be aware of
data is electronically shared outside and clinical decision making. Health critical information governance
organizational boundaries. networks also reduce the cost of challenges when planning, designing
care because fewer providers require and implementing systems. Such
Full EHR dedicated diagnostic laboratories and awareness is crucial to maximizing
These solutions contain all relevant specialists. the clinical and administrative
health information for an individual— value of EHR and reducing
including clinical, administrative, • Enabling decision makers and implementation and delivery risk.
claims, wellness, demographic and researchers to access large amounts
treatment data, from diverse providers, of patient non-identifiable clinical By embracing the breadth of
public health organizations and data. Information discovery or data information governance, e-health
payers (where relevant). A defining mining solutions and clinical and practitioners can develop effective
characteristic of a full EHR is that business analytics platforms can policies, processes and tools
all data is routinely shared outside use this information to generate that support the enterprise-wide
organizational boundaries—including, insight to drive improvements in adoption of common information
in some cases, with organizations not process efficiency, care quality and principles. This consolidated
participating in the EHR. care management. Anonymized approach to information governance
or pseudonymized EHR data can enables health care organizations
For the purposes of this paper, we use also improve the efficiency and to effectively manage, maintain
“EHR” as an umbrella term referring effectiveness of clinical research and control patient information in
to all types of integrated health (for example, if used in clinical support of robust patient care.
information systems. trials). Moreover, EHR data can be
used for epidemiological analysis
The benefits of EHR and biosurveillance, thereby helping
As health systems around the world improve the effectiveness of disease
grapple with burgeoning costs, management, public health campaigns
increasing demand and growing and preventative health strategies.
patient expectations for high-quality,
personalized care, organizations The case for information
are turning to EHR to improve the governance
quality and accessibility of health care
While the importance and benefits
services, while also reducing the cost.
of sharing health information are
EHR deliver these benefits by:
widely recognized, organizations have
• Providing clinicians with electronic struggled to implement effective
access to comprehensive medical EHR solutions. Complex technical,
records that include clinical data from organizational, regulatory and
multiple providers and episodes of cultural challenges have increased
care. This access enables personalized implementation risks and led to
treatment plans, supports evidence- relatively high solution failure rates.
based clinical decision making, reduces
Ultimately, many of these challenges
the risk of medical and prescription
are related to information governance.
errors, supports seamless care across
care settings and reduces the cost
of sharing medical records among
providers.

2
Information governance defined
Information governance encompasses
the processes, functions, standards and
technologies that enable high quality
information to be created, stored,
communicated, valued and used effectively
and securely in support of an organization’s
strategic goals.

Critical Information Governance Challenges


Interoperability Security Consent
Achieving interoperability without open Preventing unauthorized access to clinical Developing and implementing effective
or common national or international data, ensuring the availability of services consent models to meet patients’ and
standards is proving to be a major and maintaining network integrity clinicians’ expectations have proved
challenge. Increasingly, organizations are particularly difficult in distributed difficult. Patients and regulators reasonably
are focusing on standards development, multisystem environments. expect consent models to focus on
standards-driven architectures, translation protecting data privacy and confidentiality
or terminology services, and certification Data handling by restricting the use and dissemination
services to achieve partial interoperability. Health regulators, watchdogs and self- of information. Such restrictions can limit
Full semantic interoperability remains implemented best practices require the clinical value of EHR; clinicians may
uncommon. providers to implement stringent be unable to access medical information
data handling policies. In many cases, relevant to diagnosis or treatment. Finding
Data integrity compliance requires organizations to and articulating the consent basis for
Maintaining the meaning, structure and invest in mandatory data handling training, data sharing is critically important to EHR
other characteristics of clinical data when establish enterprise-wide data risk and success.
it is stored, modified, processed and monitoring functions, and develop and
communicated between systems is a major enforce certified data handling policies. Compliance
challenge, particularly in highly distributed Although legal and regulatory requirements
environments. Data quality vary across countries, compliance with
privacy, confidentiality, data security, data
Ensuring that data in an EHR is accurate,
Access control loss, data protection, data handling and
meaningful and internally consistent is
audit regulations remains an important
Controlling access to clinical data and extremely important. Poor quality data
issue for all health care organizations.
enabling patients and providers to affects patient safety, limits the clinical and
Organizations must manage information
determine who can access data are administrative value of EHR and undermines
risks effectively in accordance with
important technical challenges. Legal process and care quality improvements
their legal and regulatory obligations.
and regulatory restrictions on access to based on clinical analytics. Ensuring data
Addressing compliance requires a
clinical data mean that EHR require robust quality is a major challenge in complex
coordinated approach across organizations.
access control solutions and permissioning multisystem environments—particularly
Enabling IT organizations to collaborate
regimes. when subsystems use noninteroperable
effectively with legal departments,
standards and clinical terminologies.
clinicians and administrators to design and
implement systems and processes that
ensure compliance is a common issue for
healthcare organizations.

3
The Accenture Information Governance
Framework for Health

To address these critical The key to successful information • Data privacy


governance is building an
challenges, high- effective information governance • Data confidentiality
performance health care architecture—a layer of processes,
• Data security
organizations are developing functions, policies and solutions
information governance that ensure the effective and secure
• Data quality
creation, storage, communication,
functions as part of their valuation and use of information. • Data integrity
overall IT governance Effective information governance
framework. architectures integrate disparate Each discipline has multiple solution
information, security, access components—that is, the most
control and content management important processes, functions and
architectures and include legal, technologies within an information
clinical, administrative and IT work governance architecture that enable
streams. organizations to overcome the critical
challenges they face.
The Accenture Information Governance
Framework for Health provides Using the Accenture Information
a holistic model of information Governance Framework we are
governance—helping practitioners working with organizations to develop
assess and overcome key challenges by specific tools tailored to their needs.
designing more effective information These toolkits consist of direct
governance architectures. Developed controls, risk assessment frameworks
by Accenture professionals and and other components to make
drawing on what we have learned information governance a tangible part
through e-health implementations of their organization. These toolkits
around the world, the framework enable organizations to focus on
disaggregates information governance providing patient care while enabling
into five highly interrelated disciplines: compliance with patient, regulatory
and legislative requirements.

4
Figure 1: Information Governance

Information Governance Information Governance Solution


Disciplines Components

Data Privacy Patient consent models and mechanisms

Patient-provider relationship-based access controls

Patient access controls

Effective data security and data handling policies

Data Confidentiality Role-based access control models

Patient and provider record sealing

Identification and authentication

Anonymization and pseudonymization

Data Security Message integrity and communications security

Event audit and alerting

IT security audit

Network integrity

Data Quality Error correction

Data validation

System and interface certification

Standards driven architecture

Data Integrity Code integrity

System hardening

Interoperability governance

Standards-driven architecture and standards management

5
Data privacy Data confidentiality Data security
For regulators, watchdogs, legislative Ensuring the confidentiality of data Data privacy, confidentiality, quality
bodies, patients, patient advocates in e-health systems by preventing and integrity depend on the ability
and the public, data privacy—that is, unauthorized access to and improper of e-health systems to maintain data
ensuring patients’ medical data can be use of information is an important security. Moreover, the security of
accessed only with their consent—is part of information governance. clinical data is a major compliance
the most important issue associated The goal: to minimize information challenge for organizations as
with e-health and EHR. Failure to security risks (such as data loss and legislative and regulatory bodies
convince these stakeholders that unauthorized or inappropriate use and continue to develop increasingly
data in e-health systems is private dissemination of information), thereby stringent guidelines and certification
increases implementation, compliance reducing compliance and reputational processes. Ensuring the security of
and reputational risk. To ensure risks and protecting data privacy. data in e-health systems requires
data privacy, effective information Ensuring that data in e-health systems health care enterprises to develop
governance architectures must include is confidential requires a range of security architectures that proactively
four components: security solutions that monitor, restrict manage security risks, effectively
and prevent unauthorized access identify and prioritize threats, and
Patient consent models and to information. Moreover, solutions rapidly address vulnerabilities. To
mechanisms should be able to obscure patients’ help ensure data security, effective
High-level frameworks that outline identity when data from their medical information governance architectures
how and in what circumstances record is used for purposes other than must have four components:
organizations will seek patient delivery of care. To help ensure data
consent for their medical data to be confidentiality, effective information Message integrity and
stored, disseminated, accessed and governance architectures must include communications security
used. Patient consent mechanisms four components: Solutions that maintain the integrity
are authorization or permissioning of data transferred between systems
regimes that are part of EHR access Role-based access control models in messages and prevent unauthorized
control models. These mechanisms Access levels, permissioning and access to and/or modification of
allow patients to specify which parts authorization regimes, and access messages.
of their medical records they do not controls that are based on complex
wish particular user groups to have full real-world job functions (roles) and Event audit and alerting
access to. patient-provider relationships. Functionality that enables systems
to monitor, log and report security-
Patient-provider relationship-based Patient and provider record sealing relevant events.
access controls Solutions that enable patients and
Solutions that restrict access to a providers to restrict or prevent access IT security audit
specified patient’s medical data based to information compartments in Manual and automatic processes that
on an existing relationship between medical records. test and evaluate the effectiveness
the patient and the clinician or care of solutions’ information security
provider requesting access to that Identification and authentication measures.
patient’s data. These solutions enable the robust
authentication of health care Network integrity
Patient access controls professionals to health care systems, Solutions that enable networks to
Solutions that provide patients as well as the linking of real-world maintain expected functionality,
with secure access to their medical identity to system identity, to ensure performance and service availability
data. Access control solutions have that only authorized users can access despite unexpected events, such as
three key elements: registration, patient data. security threats and spikes in demand.
authentication and authorization.
Anonymization and pseudonymization
Effective data security and data Solutions that obscure patients'
handling policies identities by modifying patient-
Policies that minimize information identifiable clinical data while
security risk and prevent unauthorized maintaining data quality. Thus, the
access to information by placing data can be used for secondary
patient interest at the center of purposes without compromising
information governance policy and confidentiality.
by encouraging desirable behaviors
among users.

6
Data quality Data integrity We describe the Accenture
Information Governance
High-quality data is meaningful, Data integrity refers to the validity,
accurate and internally consistent; accuracy and reliability of data after it Framework for Health in
it can be used for its intended has been stored, transferred, retrieved more detail in separate
purpose. Poor-quality clinical data or processed. Failure to ensure the papers—each discussing
in e-health systems affects patient integrity of clinical data has an adverse
safety, quality of care and user affect on data quality, system flexibility
one of the disciplines
adoption. It also increases compliance and performance. To maintain data and associated solution
and implementation risks. However, integrity, the infrastructure underlying components and outlining a
ensuring data quality is a major e-health systems must maintain data number of e-health planning
challenge—particularly in complex, quality and characteristics (format,
multisystem environments in which meaning, rules, relationships and and implementation
subsystems do not share common latency, for example) during such recommendations for health
technical, data, communication operations as storage, retrieval, care organizations.
or terminology standards. The key communication and transfer. Data
to ensuring data quality in these integrity can be affected by a range
environments is to develop solutions of factors. Among them: unauthorized
with intelligent data handling modification of data, poor-quality
functionality and to implement source code and noninteroperable
standardized interfaces and data subsystems. To address these issues,
models that enable subsystems to effective information governance
share information more effectively. architectures must include four
With that in mind, effective components:
information governance architectures
must include four components: Code integrity
Processes that test source code to
Error correction eliminate bugs that may result in data
Manual and automatic processes loss or data corruption during data
that detect and correct errors in storage or transfer.
information efficiently and effectively.
System hardening
Data validation Periodic or ongoing processes that
Validation rules that verify that data reduce security risks by evaluating the
conforms to a set of specifications effectiveness of security architectures,
regarding format, quality, integrity, identifying security risks and
accuracy and structure. undertaking security improvements.

System and interface certification Interoperability governance


Roles, processes and solutions that A function that works across
verify that systems and interfaces organizational and information silos
conform to specifications defined by to develop and enforce common
regulators and Standards Development standards, protocols and processes
Organizations (SDOs). to enable syntactic, semantic and/or
process interoperability.
Standards-driven architecture
System architectures that leverage Standards-driven architecture and
open standards for the recording and standards management
coding of data, thereby promoting A standards-driven system
a high level of data quality through architecture conforms to open or
similar data processing across multiple common messaging, infrastructure,
component systems. communication, application, data
and clinical terminology standards.
Standards management includes the
roles, processes and solutions that
develop, manage and enforce common
technical, communication, messaging
and data standards that enable
subsystems to share information more
effectively.

7
Developing Effective Information
Governance: Next Steps
Whether a health care Identify, analyze, evaluate functions—possibly from different
and prioritize information organizations.
organization is considering,
implementing or operating governance challenges
Develop a detailed
advanced e-health solutions, For a health care organization,
implementation plan
the second step toward improved
designing and implementing information governance is developing Developing the right implementation
a successful information detailed insight into the information plan up front is the key to minimizing
governance challenges it faces. This implementation risk, ensuring long-
governance architecture can term stakeholder engagement,
requires a comprehensive program
be a daunting task. involving IT, legal, clinical and reducing the cost of implementation
Information governance challenges administrative functions to: and developing effective information
affect every part of the health care governance. In clinical environments,
enterprise and developing effective • Identify a broad range of current solution implementation can be
solutions requires collaboration and future compliance, security, challenging, especially if programs
across organizational silos, functions data quality and system integration disrupt processes integral to the
and information systems. Based on challenges. delivery of care or impose new ways of
Accenture research and experience working on clinicians. Implementation
• Analyze these challenges to develop plans should include:
from e-health implementations
a detailed understanding of their root
around the world, we believe there
causes. • A high level of detail around
are four initial steps toward effective
targets, benchmarks, critical success
information governance: • Evaluate the impact these factors, timetables, release schedules,
challenges are having or are likely to reporting, coordinating activity and
Conduct a comprehensive have on quality of care, efficiency, implementation management roles for
risk assessment and gap costs, strategic priorities, the specific programs and work streams.
analysis of current information workforce, and administrative and
governance provisions clinical processes. • A long-term clinical change
management plan that includes
Most healthcare organizations have • Prioritize the challenges based on communications strategies and
a range of existing information their likely impact and the ability of programs that support clinical
governance provisions across the organization to address them. transformation, process re-engineering,
information and organizational silos. user acceptance and training to support
This potentially fragmented and Design solutions and develop specific work streams.
disjointed approach to information strategies to address these
governance can make it difficult challenges • A comprehensive systems
for organizations to develop a clear integration plan; from a technical
understanding of how effective and Once a health care organization
perspective, it should define how
efficient their information governance has a detailed understanding of the
information governance solutions
provisions are and the information risks information governance challenges
will be integrated into organizations’
they face. Health care organizations it faces, it should develop high-
systems architectures, how solutions
should conduct a comprehensive level strategies and design solutions
will be procured efficiently and how
risk assessment and gap analysis to to address these challenges. An
integration programs will be managed.
enable a single enterprise-wide view of organization should conceive of
information governance performance these solutions and strategies Realize the benefits of
and information risks. Using a as components of an integrated
information governance architecture.
effective information
structured approach to information governance
governance, such as the Accenture The ultimate goal: creating an
Information Governance Framework for efficient, effective and sustainable A consolidated enterprise-wide
Health, organizations should create a information governance function as information governance architecture
consolidated inventory of information part of a comprehensive IT governance will improve data quality and data
governance provisions, build a model to framework. In most cases, information security. This will enable health care
assess their performance and develop governance challenges cut across organizations to address patients’
strategies to address weaknesses information and organizational silos. concerns over data privacy, ensure
and improve information governance Thus, solution design and strategy compliance with regulatory and
performance. development must be collaborative legislative requirements, maximize the
processes that involve IT, legal, clinical and administrative benefits of
clinical, administrative and strategic EHR and increase physician adoption.

8
Appendix
Data privacy
Data confidentiality
Data security
Data quality
Data integrity

Appendix:11
Data privacy
Overview Data privacy requires sophisticated,
consent-based access control
To help ensure the privacy
of data in e-health systems,
Regulators, watchdogs, legislative models and permissioning regimes. effective information governance
bodies, patients, patient advocates These solutions should enable architectures must include four
and the public expect patient- patients to define fine-grained components:
identifiable data in e-health access controls based on flexible
systems to remain private. In access levels that can be granted • Patient consent models and
practice, data privacy requires to a range of user groups. This mechanisms
organizations to ensure that enables patients to determine • Patient-provider relationship-
patient-identifiable data is who is able to access what based access controls
disseminated and used in data in their medical records.
accordance with patients’ wishes • Patient access controls
and that access is based on
patient consent. To help protect • Effective data security and data
data privacy, organizations must handling policies
implement policies and processes
that enable patients to authorize
and restrict access to identifiable
data in e-health systems.

Patient consent models and Organizations should be aware of the and system complexity, increased
trade-offs involved in choosing one cost, and confusion among clinicians,
mechanisms consent model over another. Opt-in models administrators, patients and the public.
Due to the sensitive nature of clinical usually give patients more control over the
data and the prevalence of stringent use of their medical data. Consequently, Patients may wish to restrict access to
data privacy guidelines, patient consent opt-in models tend to strengthen parts of their medical record to limit
should be the prime access control in data privacy and reduce opposition to the dissemination of very sensitive
e-health systems. Electronic patient- EHR from patients, regulators and the information or if they are concerned that
identifiable data should be created, public. However, opt-out models often their medical data may be compromised.
accessed and used only with patient increase the number of patients whose As a result, patient consent mechanisms
consent. However, developing effective medical data is stored electronically. should be part of EHR access control
consent models that meet patient, Opt-out models may also reduce patient- models. Patient consent mechanisms are
clinician and public expectations has mandated restrictions on the use of authorization or permissioning regimes
proved to be a major challenge. data in support of clinical processes that allow patients to specify parts of
integral to care delivery and screening their medical record that they do not
In broad terms, there are two types of want particular user groups to have full
and surveillance programs, as well as
consent models: access to. Patients should be able to
epidemiological and clinical research. As
a result, opt-out models may maximize define multiple access levels to particular
• Opt-in models—in which patient dissent
the clinical benefits of e-health. compartments of information that can be
is assumed and patients must proactively
applied to a range of user groups. Figure
consent for their medical data to be stored
In practice, many health care organizations 1 illustrates some example access levels,
electronically, accessed or used. In some
adopt a hybrid approach in which an information compartments and user
cases patient consent will be assumed
opt-out model is adopted for certain groups that may be part of fine-grained
until withdrawn while in others it will be
functions, such as creating electronic patient consent mechanisms within a
time limited or renewed at each clinical
medical data, and an opt-in model is consent-based access control model.
encounter or episode of care.
adopted for others, such as sharing and
• Opt-out models—in which patient using medical data. While hybrid models
consent is assumed and patients must may enable health care organizations to
proactively dissent for their medical data capture some of the benefits and avoid
not to be stored electronically, accessed some of the pitfalls of using either model
or used. Patients are usually informed how exclusively, they can also be extremely
their data will be used and are invited complicated. This complexity can lead to
to opt out if they do not wish for their scalability problems, high implementation
medical data to be used in such a way. risk stemming from project management

Appendix:2
Figure 1: Possible elements of a patient consent mechanism

Access levels/permissions Information compartments User groups

Information is not visible to user Any freeform data in a medical Individual clinicians
group record
Clinical workgroups or departments
Information is visible to, but cannot Data related to a particular medical
be accessed by, user group specialty (such as psychiatry, Provider administrators
oncology or neurology) Public health organizations
Information can be accessed by user
group but only with patient consent Demographic data Researchers
When information is accessed by user Data associated with a specific Central management functions
group, an alert is generated episode of care
Patient proxies
Information can be accessed by Information on chronic conditions
user group, but authorization is and underlying health problems
time limited and must be renewed
periodically Prognostic information
Pharmaceutical and non-
pharmaceutical treatment
information

Patient-provider relationship- Patient access controls • Authentication verifies patients’ identity


and confirms that user accounts are
based access controls Solutions that provide patients with legitimate. Authentication factors include
To protect patient privacy, access to secure access to their medical data are username and password, digital certificate,
patient-identifiable clinical information in becoming an increasingly important security token and biometric identifiers,
e-health systems should be based on an part of e-health systems. Effective such as thumbprints. Two-factor
existing relationship between the patient patient access controls are particularly authentication, which requires patients to
and the clinician or provider requesting important for Internet-based patient prove their identities using two different
access. Clinicians or providers not involved portals. Allowing patients to access their factors, is used to reduce security and
in the delivery of care services to the medical records improves the accuracy and data privacy risks.
patient should be unable to access the completeness of information in EHR while
patient’s clinical information without empowering patients to manage their • Authorization grants user accounts
explicit consent. Moreover, clinicians health more effectively and contribute access rights and allows or rejects access
and providers should only have access to to clinical decision-making processes. requests based on these access rights. In
information necessary for them to fulfill most cases, these rights enable patients to
their clinical responsibilities. For example, Access control solutions have three key access all their medical information held in
a psychiatrist may not require access to elements: registration, authentication and a system, excluding information sealed by
information on a patient’s surgical history; authorization: clinicians or administrators.
likewise, a pharmacist may not require
access to a patient’s critical care record. • Registration enables patients to create
and manage user accounts that are
Protecting patient privacy requires access associated with access rights. By linking
control models and solutions that restrict user accounts through a single sign-on
access to information and functionality system, patients can access medical
based on real-world patient-provider information in disparate systems without
relationships. These relationships are creating multiple user accounts.
often very complex and, as a result,
e-health systems require fine-grained
permissioning and authorization regimes.
These permissioning and authorization
regimes should be part of sophisticated,
role-based access control models that
restrict access to clinical information
based on real-world job functions
and patient-provider relationships.

Appendix:3
Effective data security and Recommendations Communicate the purpose
of data privacy measures to
data handling policies
Implementing effective data privacy
clinicians and patients
Organizations’ data collection, data solutions has proved to be a major
handling, data security and data challenge for health care organizations Organizations should develop effective
sharing policies should minimize around the world. Designing solutions communication strategies to ensure that
information security risks and prevent that meet the expectations of regulators, clinicians and patients understand why
unauthorized use of information clinicians, administrators, managers, and how data privacy will be maintained.
by encouraging desirable behaviors patients, the public, politicians and Communication strategies should
among clinicians and administrators. other stakeholders is the most common demonstrate organizations’ commitment
Desirable behaviors include: challenge. However, organizations tend to data privacy and the effectiveness of
to concentrate on the technical and data privacy solutions while convincing
• Collecting, storing and sharing clinical aspects of data privacy while clinicians and other stakeholders that data
data securely using appropriate neglecting the strategic, organizational privacy controls will not reduce the clinical
security technologies, such as and cultural dimensions. From Accenture’s value of e-health.
encrypted storage devices and research and experience from e-health
secure communication channels. implementations around the world, we Educate patients so they
believe that to address these issues,
• Minimizing the risk of data loss or understand data privacy controls
health care organizations implementing
misuse by maintaining the effectiveness of
an e-health systems should: For consent-based access controls to be
access controls—for example, not sharing
effective, patients must be able to make
passwords and ensuring that passwords
Consult clinicians, patients informed judgments regarding data use.
meet certain criteria.• Proactively
and the public when At a minimum, patients should understand
identifying and minimizing security
designing consent models how their medical data will be used, how
and confidentiality risks—for example,
widely it will be disseminated and what
printing information only when absolutely
Designing consent models should be the benefits and potential drawbacks
necessary, disposing of hard copies
a transparent, collaborative process are. Patients should also understand
securely, anonymizing or pseudonymizing
involving a broad range of stakeholders. the processes through which they can
data where possible and removing
By adopting a collaborative approach, restrict and authorize access to data.
software that may compromise security,
such as peer-to-peer programs. organizations design more effective
consent models that are fit for purpose.
• Reporting security breaches and Further, by engaging stakeholders early
unauthorized or improper use of in the process, organizations reduce
information. resistance from patients, clinicians
and regulators. This reduces the risk
• Restricting physical access to hardware— of subsequent—and expensive—system
including laptops, desktops, mobile devices changes to access controls and data
and cell phones—that store or enable users privacy solutions.
to access sensitive data.

• Educating other users to raise awareness


of data security and data confidentiality
risks and encouraging them to adopt
behaviors that minimize these risks.

Appendix:4
Appendix:5
Data confidentiality
Overview Maintaining the confidentiality of
data in e-health systems requires
To ensure the confidentiality of
information in e-health systems,
Preventing unauthorized access to a range of solutions that prevent effective information governance
and use of information in e-health the unauthorized collection, architectures must include four
systems is a major challenge for storage, use and dissemination of components:
health care organizations. Ensuring information. Data confidentiality
the confidentiality and security solutions are designed to prevent • Role-based access control models
of electronic medical data is unauthorized access to information • Patient and provider record
becoming increasingly difficult as by enforcing access restrictions sealing
mobile networks, Internet-based and permissions defined by patients
patient and provider portals, health through consent-based access • Identification and authentication
2.0 technologies and health data control models.
banks become more common. • Anonymization and
Moreover, as EHR become more pseudonymization
widespread, health care regulators
and watchdogs are focusing
unprecedented attention on data
confidentiality.

Role-based access control affect treatment plans and clinical cannot be disseminated. Systems and
decision making. On the other hand, users must be able to identify records that
models clinicians involved in specialist care contain confidential information about
To ensure that users have access to the require access to more detailed clinical a third party and restrict access to this
information and functionality they require information related to their area of information. The ability to seal records
without compromising data confidentiality, specialty across a number of care episodes. should be granted only to a limited number
access control models should reflect of users. Further, guidelines should make
complex, real-world job functions and Patient and provider record clear under what circumstances records
patient-provider relationships. To that should be sealed.
end, access control models should enable sealing
patients to restrict or authorize access To ensure that patient consent is the Identification and
by granting permissions to user groups prime access control in e-health systems,
based on their actual job function or patients must be able to seal parts of authentication
role. In most cases, role-based access their medical record so clinicians and Also critical to data confidentiality:
control models must be quite detailed administrators outside a particular effective provider access controls that
so that very specific permissions can be workgroup cannot access them. The sealed enable clinicians and administrators
granted to individuals or small workgroups information compartments may or may not to securely access information in
based on their roles. Permissions not only be visible to users outside the authorized e-health systems and that monitor and
define what information a user can see workgroup. This enables patients to prevent unauthorized access and use of
and access, but they also determine how control access to sensitive information information. e-Health systems should
this information can be used and what in their medical record—thereby helping have effective access control solutions
functionality the user can access. to reduce privacy concerns and patient that enable the robust authentication
opposition to EHR. However, patient of health care professionals to health
The figure below demonstrates a record sealing can have a detrimental care systems, and the linking of real-
simplified role-based access control model impact on the clinical value of e-health world identity to system identity. Such
based on a range of patient-provider and may even affect patient safety. controls help ensure that only authorized
relationships and roles. Each user group users can access patient data. These
requires a set of permissions enabling To maintain data confidentiality in solutions should support fine-grained
them to access relevant information and certain circumstances, clinicians and role-based access control models and
functionality directly related to their administrators may have to restrict must also meet stringent regulatory
role and relationship with the patient. or prevent access to information requirements regarding data management,
For example, clinicians delivering acute- compartments in patients’ medical records. data protection and information audit.
care services require access to high-level Such action is usually necessary when Compliance requires systems to monitor
clinical information that may directly a medical record contains information and log access request, logins and
related to a third party that activity so audit trails can be generated.

Appendix:6
Figure 1: A simplified role-based access control model

Permissions:
Users can access, modify and use
information on current medications, past
medications and abuse/response history,
as well as pharmaceutical records

Permissions: Individual: Clinical workgroup: Administrative Permissions:


Users can grant Patient proxy Pharmacy workgroup: Users can only access
permissions to other user Primary care administrative data
groups and access entire clinic relevant to appointment
medical record except booking and outpatient
compartments sealed by management
physicians

Permissions: Administrative Clinical Permissions:


Users can only access workgroup: workgroup: Users can access, modify
administrative data Hospital Healthcare Psychiatric and use information on
related to a single inpatient Professional care past psychiatric
hospital admission conditions, session notes,
management
hospitalizations and
psychiatric treatments

Permissions: Individual: Clinical Permissions:


Users can access patient’s General workgroup: Users can access, modify
entire medical record, practitioner Emergency and use information on
modify data and care patient’s critical history,
disseminate information to major surgeries, chronic
other health care and/or current conditions
providers. and abnormalities

Access control solutions have three key • Authentication verifies the identity Anonymization and
elements: registration, authentication and of clinicians and administrators and
authorization: confirms that user accounts are legitimate.
Pseudonymization
Most health care organizations must When medical data is used for secondary
• Registration creates user accounts meet stringent regulatory requirements purposes other than delivery of health
for clinicians and administrators. These regarding authentication. Compliance care services, patients’ identity must be
accounts are linked to access rights. usually requires systems to employ obscured to maintain data confidentiality.
Registration can be a complex process multifactor authentication in which users The seven principal levels of data
in multisystem and multienterprise prove their identities using at least two obscuration (see Figure 2) range from
architectures with role-based access authentication factors, such as password, clear, patient-identifiable data to
control models. Users may require more personal identification number (PIN), anonymized data. The required level is
than one user account to access different biometric identifier, security token, smart usually determined by regulators based
systems. What’s more, each user account card and ID card. Mobile and telemedicine on local data privacy guidelines and is
may have different access rights and e-health solutions require very strong influenced by a range of factors, including
permissions depending on the type of authentication to ensure the security of data use and scope of dissemination.
information and system involved. Linking information communicated across wireless
user accounts through a single-sign-on networks and the Internet.
system can improve usability; users must
log in only once to access a number of • Authorization grants access rights
different systems. However, a single- to user accounts. It also restricts or
sign-on capability alone does not address authorizes access to systems based on
the underlying technical complexity of these access rights. In a fine-grained role-
registration in multisystem environments. based access control model, access rights
are granted to user groups defined by
their real-world job-functions or patient
relationships. To ensure system flexibility,
authorization solutions should enable
administrators to efficiently add and
remove users’ permissions and modify or
create new access levels.

Appendix:7
Recommendations Implement processes that
enable IT, legal, clinical and
Develop processes and solutions
to manage and report data
There are a range of technical challenges
administrative functions to work breaches effectively
associated with implementing effective
data confidentiality solutions across together effectively in developing The financial, organizational, reputational
complex architectures in distributed data handling policies and role- and regulatory consequences of data
environments. However, vendors, systems based access control models loss and misuse—including litigation,
integrators and health care organizations fines imposed by regulators, a collapse
Effective data handling policies and in patient confidence, and data
are developing effective solutions to
access controls should conform and be corruption—can be very serious for health
address these issues. Increasingly, the
adapted to meet regulatory and local legal care organizations. To minimize the
most important challenges organizations
requirements and reduce information impact of data confidentiality failures,
face when implementing data
security risks while minimizing disruption organizations should implement effective
confidentiality solutions are related to
to clinical and administrative processes. If processes to manage and report data
organizational and process issues. From
data handling policies and access controls breaches. In many countries, regulators
Accenture’s research and experience from
have a significant impact on clinical specify reporting requirements. However,
e-health implementations around the
and administrative processes, users are organizations should go beyond simply
world, we believe health care organizations
unlikely to adopt desirable behaviors, reporting data breaches; they should
implementing e-health systems should:
care quality may suffer and processes are also develop an integrated mechanism
likely to become less efficient. To avoid to proactively manage such breaches.
these problems, organizations should These solutions detect and analyze
enable stakeholders from across the breaches as quickly as possible to mitigate
organization to collaborate in designing their impact on patient confidentiality
access controls. If IT and legal teams while identifying vulnerabilities that
design and implement access controls can be addressed immediately.
in an organizational vacuum, those
controls are likely to be less effective
and cost more than those developed
through a collaborative approach.

Appendix:8
Figure 2: Seven levels of data obscuration

Levels of data obscuration Possible purposes/uses within health care systems


Level 1 • Clinical processes involved in the delivery of health
Patient identifiable data, also known as clear data. care services
• Surveillance and screening
• Caseload management

Level 2 • Provider-level clinical governance processes,


Codification of information—extracts codified or including clinical audit and clinician performance
aggregate information from patient-identifiable data. management
• Distributing activity or patient-based funding
• Claims processing

Level 3 • Enterprise and clinical performance management


Two-way linkable pseudonymization—replaces • Clinical audit
unique identifiers, such as patient name or identifier,
• Administrative patient management processes
with a pseudonym, usually a code or number,
from which a patient’s identity cannot be inferred. • Clinical process optimization
Two-way pseudonymization allows an authorised
healthcare professional to translate pseudonyms
to patient identifiers. Linking pseudonyms
enables the whole-patient view to be maintained
within the pseudonymized information.

Level 4
Two-way pseudonymization—similar to two way linkable
pseudonymization but does not enable the whole-
patient view to be maintained within the pseudonymized
information.

Level 5 • Service delivery planning, evaluation and


One-way linkable pseudonymization—one-way optimization
pseudonymization is irreversible because pseudonyms • Reporting and analytics
are generated in such a way that patients cannot be
• Epidemiological research
reidentified from them. Linking pseudonyms enables
the whole-patient view to be maintained within the • Clinical research
pseudonymized information. • Compliance with “freedom of information” and
other transparency and accountability legislation
Level 6
One-way pseudonymization—similar to one-way
linkable pseudonymization but does not enable the
whole-patient view to be maintained within the
pseudonymizsed information.

Level 7
Anonymization—removes all unique identifiers and patient
identifiable information from data. Anonymization is not
reversible and anonymized data cannot be linked to other
data.

Appendix:9
Data security
Overview and processes cannot be replaced;
clinical process improvements
• Message integrity and
communications security
Data security has a significant driven by clinical analytics and
impact on data privacy, reporting cannot be achieved; • Event audit and alerting
confidentiality, quality and and care quality gains based on • IT security audit
integrity. Compliance with the implementation of decision
stringent data privacy and support tools cannot be realized. • Network integrity
confidentiality guidelines is
possible only if organizations Ensuring data security requires
can prevent unauthorized access health care enterprises to develop
to and dissemination of data in security architectures that
e-health systems. The quality proactively manage security risks,
and integrity of information in effectively identify and prioritize
e-health systems depends on their threats and rapidly address
ability to prevent unauthorized vulnerabilities. To help ensure the
data modification, as well as privacy, confidentiality, quality and
data corruption. If information in integrity of information by enabling
e-health systems is poor quality secure data collection, data
or lacks integrity, it diminishes sharing and data management,
the clinical and administrative effective information governance
value of the solution. In those architectures must include four
circumstances, paper-based records components:

Message integrity and When security-relevant events occur, the Network integrity
system should automatically generate
communications security alerts. As part of ongoing vulnerability
Data security can be affected by
Maintaining the validity of data network integrity and resilience—that is,
management and compliance programs,
transferred between systems in messages a network’s ability to deliver expected
IT organizations should develop effective
is critical to ensuring data integrity. functionality, performance and service
security alert management processes
Effective communications security availability during unexpected events.
to ensure that legal, clinical and
solutions prevent message corruption, Networks should be resilient enough to
administrative functions are aware of
reduce the risk of data loss and help continue operating as designed regardless
potential risks. Increasing awareness of
organizations meet data security of security threats, spikes in demand or
security risks across the organization helps
requirements by ensuring message security other incidents. This level of network
to increase system security by driving
and integrity. These solutions prevent and resilience ensures the availability of
changes in users’ behavior and data
detect unauthorized access to messages; processes and services that maintain
handling processes and policies.
encrypt and authenticate messages; and data security across the network. Further,
enable automatic message validation. high network resilience reduces the
IT security audit risk of data corruption and data loss
Health care organizations should conduct as a result of service unavailability and
Event audit and alerting periodic IT security audits to ensure interruption during data transmission;
To ensure compliance with stringent audit that data is properly protected from helping to maintain data quality and
requirements and maintain data quality unauthorized access, that all relevant integrity. Network integrity solutions
and integrity by preventing unauthorized security threats and vulnerabilities have should promote network resilience by
access, an EHR should monitor, log been identified, and that data handling automatically detecting and addressing
and report security relevant events. processes are correctly configured to security threats and unwanted network
Such events include access requests, minimize security risks. IT security audits traffic; preserving network bandwidth
database queries, logins, configuration may be conducted by a third party and by managing and prioritizing legitimate
changes, file and network access, firewall typically include a number of components. traffic; and generating reports on
reporting, attempted violation of access Among them: compliance verification, network performance to help network
control rules, and the modification and security standards certification, security administrators and decision makers
communication of restricted information. assessments, penetration testing and manage networks more effectively.
user awareness testing. In some cases,
regulators also require organizations to
include a number of certified assessments
in their IT security audits.

Appendix:10
Figure 1: Four Components of data security

Data Created Data Transmitted Data Consumed


Patient information Patient information
created by healthcare accessed by healthcare
professional professional
Network
Device Device
User eg. PC, Tablet, eg. PC, Tablet, User
Smart Phone Smart Phone

Ensure that communication


Message integrity and messages are securely
created, and can not be
communications security changed or compromised

Application events Communications processing Application events which process


Event Audit and Alerting which process patient points keep a log of inbound patient information have robust
information have robust and outbound communications audit points
audit points

Holistic approach to regular IT


IT Security audit Security Audit based upon
agreed and accepted standards

Network agnostic technologies


Resilient and protected
Network integrity network infrastructure
considered for the protection of
data in transit

Recommendations requirements and key vulnerabilities,


along with the probability and possible
Develop a comprehensive
impact of threats. The aim of a data
change program to drive user
A health care enterprise’s security
architecture plays a vital role in security assessment is to develop compliance with data handling
maintaining data privacy, confidentiality, a risk-based view of data assets, a and IT security policies
quality and integrity by identifying and strategic awareness of vulnerabilities
addressing security risks and vulnerabilities and threats, a clear understanding of To minimize security risks, all users must
efficiently and effectively. However, data the severity of impacts and a foundation follow data security and data handling
security is not just a technical issue; for investment in data security. policies. However, driving changes in
users’ behavior, organizations’ corporate clinicians’ behavior and making training
strategy and changing market conditions Ensure adequate audit “stick” can be major challenges. Clinical
are often major factors in creating or change management can be difficult.
capabilities Compounding the challenge:“Normal”
exacerbating information security risks.
From Accenture’s research and experience To reduce compliance and reputational change management strategies—even
from e-health implementations around risk, an EHR should automatically those based on best practices for
the world, we believe that organizations monitor and record all permission organizations outside health care—are
should as a minimum take the following changes, data errors, access requests, often ineffective. To address these
actions to help ensure data security: data transfers, alterations to medical issues, health care organizations should
records and data breaches. With this develop long-term change programs
monitoring and recording, organizations that target changes in organizational
Launch a proactive and can efficiently and effectively develop culture and user attitudes toward security
comprehensive data security detailed audit trails should the need and confidentiality. It is important for
assessment arise. Failure to implement adequate organizations to engage senior clinicians
automated capabilities increases the cost early on to act as change champions—
To ensure that data in e-health
of complying with auditing requirements encouraging the clinical workforce to
systems is secure, organizations must
in certification criteria. Inadequate follow data security policies.
have an accurate and comprehensive
auditing can also significantly impair an
understanding of current and potential
organization’s ability to maintain data For more information on Accenture's
security risks and vulnerabilities. A data
quality and integrity as access controls data security solutions see
security assessment should deliver a
and security measures are less effective. www.accenture.com/security
detailed inventory of all data assets
and should document current data
management practices, regulatory

Appendix:11
Data quality
Overview • Reduce user adoption
rates because clinicians and
poor quality data. Organizations
can also improve data quality
High-quality data is meaningful, administrators continue to use by enabling subsystems to share
accurate, internally consistent paper-based records to avoid errors information more effectively
and can be used for its intended resulting from poor data quality through standardized data
purpose. Failure to maintain the architectures and interfaces. To
quality of data in e-health systems • Adversely affect the performance help ensure high-quality data
can: and effectiveness of information in e-health systems information
discovery, clinical and performance governance architectures must
• Reduce patient safety if, for
analytics, business intelligence, include four components:
example, treatment plans are
reporting and audit platforms
based on erroneous test results or
• Error correction
prescription data is inaccurate Ensuring data quality is a major
challenge—especially in distributed • Data validation
• Affect quality of care if clinical
environments in which subsystems
systems that support evidence- • System and interface
do not use common technical,
based medicine and enable certification
data, communication, messaging or
physicians to develop more
terminology standards. To overcome • Standards-driven architecture
personalized treatment plans,
this challenge, organizations
such as Clinical Decision Support
can implement solutions with
Systems (CDSS) and Computer
intelligent data handling and
Physician Order Entry systems
data management functionality
(CPOE), are less effective
that identify data errors and

Error correction To ensure that errors can be corrected Data validation


efficiently, organizations should have
Errors within an EHR occur for a variety Solutions should validate clinical
standardized correction policies and
of reasons, including data-entry errors by and administrative data in an EHR to
processes. These processes should enable
users, use of poor translation lexicons and ensure it is meaningful, complete and
users to manage system alerts efficiently
ineffective data migration. An EHR should secure. Whether entered by users or
and to report and correct errors as quickly
have effective processes for detecting communicated from other systems,
as possible. They should also log all errors
and correcting errors. Such processes help information in an EHR should conform to
and ensure that all alterations to patients’
minimize the impact of errors on clinical a set of specifications or validation rules.
medical data are recorded. Further, these
and operational risk, patient safety and Validation rules should ensure data is
changes should be either visible or flagged
care quality. Stringent data quality regimes formatted and structured correctly and
so other users are aware data has been
that minimize user-generated errors at the uses a compatible language, ontology
changed to correct an error. For audit
point of entry and robust data migration and terminology. They should also check
purposes, when alterations are made
testing procedures can reduce the that the characteristics of data—meaning,
to medical information, systems should
probability of errors occurring—enabling rules, relationships, latency—are intact.
record the identity of users who make
organizations to focus resources on Clinical applications should also have
changes, as well as the time, date and
correcting errors. some capacity to validate the accuracy of
reason for those alterations.
information through manual and electronic
Systems may be able to detect some processes that reconcile data and highlight
errors automatically through sophisticated logical inconsistencies in information.
data validation rules, error checking and
event and exception handling routines;
however, in many cases, critical errors
are related to the accuracy of data and
are difficult to detect automatically.
When automatic error detection fails,
users must attempt to detect errors
manually. CDSS and CPOE systems
may help clinicians to identify errors
by highlighting logical inconsistencies
in medical data and generating
alerts to highlight possible errors.

Appendix:12
System and interface Recommendations Adopt open or common standards
and terminologies wherever
certification
Data quality can be affected by a range
As countries around the world move of factors, including data entry standards
possible
toward regional and national EHR, and practices and information security. Designing, selecting and implementing
regulators are becoming more prescriptive However, in most cases, the most EHR standards and clinical terminologies
regarding the adoption of open standards, important factor affecting EHR data are complex processes. Even open
system capability and flexibility, clinical quality is the ability of subsystems to share standards and terminologies often must
application functionality and data meaningful and accurate information. be customized to reflect organizational,
quality. Moreover, under pressure from Connecting “islands” of health data within technical and clinical idiosyncrasies
regulators, organizations are increasingly and across enterprises has proved to be and so are subject to a number of
using standards developed by health care a major challenge. Despite efforts by organization-specific interpretations. As
standards development organizations governments and SDOs around the world, a result, adopting open standards cannot
(SDOs)—such as HL7 and openEHR—to universal standards for full and ubiquitous guarantee interoperability. However, it is
enable interoperability, minimize costs and semantic interoperability remain distant. likely that governments around the world
reduce implementation risks. To ensure Even so, organizations can realize will continue to push for greater e-health
compliance with SDO specifications and some of the benefits of sharing high- integration to achieve national EHR and
regulatory requirements, organizations quality data efficiently and effectively will exert pressure on organizations
should develop strong system certification without universal EHR standards or to adopt open and interoperable EHR
and interface certification programs. significant expenditure on a unified standards. Therefore, to reduce future
Based on regulatory requirements and e-health architecture. From Accenture’s costs of EHR integration, organizations
SDO specifications, these certification research and experience from e-health should immediately begin implementing—
programs design and execute tests to implementations around the world, we and pressuring vendors to develop—
verify compliance and identify required believe that health care organizations systems based on any available open
system changes. implementing e-health systems should: national or international standards.
System certification programs may Involve clinicians in designing
verify the compliance of a range of
Consider a service-oriented
hardware and software components, architecture as a means of and configuring clinical
standards, processes and policies to achieving interoperability in the applications
evaluate system characteristics, such short term Applications’ data validation and error-
as security, performance, availability, detection rules should reflect real-world
Achieving interoperability by enforcing
data management, functionality and logic in terms of understanding of
common standards and implementing
interoperability. Interface certification relationships between concepts such as
complex interfaces can be prohibitively
programs use detailed specifications, treatments and diagnoses; identifying
disruptive and expensive in the short
usually based on SDO specifications, illogical and inaccurate information using
term. A more efficient approach:
to verify the compliance of interfaces fine-grained parameters; and detecting
gradually implementing open standards
between systems and applications. These incomplete data or information that
over time as legacy systems are retired
programs verify that interfaces conform lacks meaning through rules based on
or integrated, infrastructure is updated
to a series of interoperability and data clinical and business logic. To achieve this
and new applications are developed.
management standards that enable level of intelligent data handling, clinical
However, to meet the short-term need
them to transfer information effectively subject matter experts must be involved
for interoperability, organizations
between systems. in the design and configuration of clinical
should consider replatforming toward
a service-oriented architecture (SOA). applications. Even “off-the shelf” products
Standards-driven architecture This shift involves implementing an SOA should be carefully configured to reflect
Data quality in e-health systems is and moving existing applications from local clinical practices and processes.
affected by the ability of subsystems to multiple, noninteroperable platforms to
share information effectively. To achieve an integrated SOA—without significantly
semantic and/or syntactic interoperability, changing applications’ programming
e-Health systems require a system language or functional environment. In the
architecture that leverages open standards long term, full semantic interoperability
for the recording and coding of data. will be achieved by implementing common
Standardized data architectures promote EHR standards. In the short term, a level of
a high level of data quality by enforcing interoperability can be achieved through
common data processing, formatting an SOA.
and storage across multiple component
systems. These standards enable those
systems to share information effectively
without undermining data quality

Appendix:13
Data integrity
Overview To maintain data integrity, the
infrastructure underlying e-health
• Code integrity

Data integrity refers to the validity, systems should prevent data • System hardening
accuracy and reliability of data corruption and data loss. It should • Interoperability governance
while it is being stored, transferred, also maintain the quality and
retrieved or processed. Data with characteristics of data—format, • Standards-driven architecture
integrity retains its meaning and meaning, rules, relationships and and standards management
clinical or administrative value after latency—during operations such as
it has been communicated or used. storage, retrieval, communication
Failure to ensure the integrity of and transfer. Data integrity
data in e-health systems adversely can be affected by a range of
affects data quality and system factors, including unauthorized
flexibility and performance. That, modification of data, poor-quality
in turn, has a negative impact on source code and noninteroperable
patient safety, quality of care, subsystems. To address these
compliance risk and user adoption. issues, effective information
governance architectures must
include four components:

Code integrity Interoperability governance To ensure data quality and maximize the
clinical and administrative value of EHR,
In many cases, data corruption and data Enabling subsystems that use different
systems require semantic interoperability
loss during storage and use are the result standards and clinical terminologies
in which subsystems can automatically
of bugs in source code. Maintaining data to share clinical data effectively
interpret, process and use data received
integrity requires high-quality source code and maintain data quality is a major
from other systems. In many cases, a level
verified through extensive static code challenge. Compounding the challenge
of semantic interoperability is achieved
analysis. Code with high levels of integrity are organizational and process issues
within enterprises by implementing an
has fewer functional defects and security associated with clinical data sharing. In
“off-the-shelf” EHR that is part of a
vulnerabilities that may affect data many cases, providers and physicians
unified e-health architecture that includes
integrity. Ensuring code integrity during use different processes and formats
a suite of clinical applications and medical
the development and unit testing stages for recording and storing clinical data.
devices. However, achieving semantic
reduces costs associated with fixing bugs Interoperability governance is a function
interoperability across enterprises is more
discovered later in the implementation that works across organizational and
difficult—mostly because there are no
lifecycle. information silos to develop and enforce
open national or international standards
common standards, protocols and
for clinical data.
System hardening processes to enable syntactic, semantic or
Ensuring the security of infrastructure process interoperability (see Figure 1). Current efforts to achieve semantic
underlying e-health systems is interoperability across health care
Developing effective interfaces and
important in maintaining the integrity organizations involve developing:
enforcing common standards and
of networks, messages and data. System communication protocols through
hardening is a periodic or ongoing • Common reference models for
standards management processes may representing clinical data that specify
process of reducing security risks by enable organizations to achieve a level
evaluating the effectiveness of security at a high level how information should
of syntactic interoperability. Syntactic be recorded, organized and managed in
architectures, identifying security risks interoperability enables subsystems to
and undertaking security improvements— a medical record, such as the openEHR
communicate data, but it does not enable Reference Model and HL7 Clinical
including removing vulnerable and receiving systems to interpret, process
unnecessary services and applications Document Architecture
or use it. Syntactic interoperability limits
and updating security configurations the benefits of data sharing; manual data • Standardized clinical data structure
and access controls. System hardening entry and modification is required, data definitions that specify restrictions, rules
is particularly important if systems quality cannot be ensured, analytics and and requirements for data used for specific
are currently configured to maximize reporting platforms are less effective, clinical and administrative purposes such
ease of use rather than security. and performance improvements resulting as openEHR Archetypes and HL7 Templates
from process automation and optimization
cannot be realized.
Appendix:14
Figure 1: Levels of interopability

Process Interoperability
Data created, used or modified
in clinical and administrative processes
can be used effectively by other processes

Semantic Interoperability
Subsystems can automatically interpret,
process and use data received from other systems

Syntactic Interoperability
Subsystems can communicate and exchange data but cannot
automatically interpret, process or use information received from other systems

• Common ontologies—that is, models Standards-driven architecture have system architectures based on
that describe a health-related domain and common or open standards, even if those
define the attributes of and relationships
and standards management standards vary, is easier than integrating
between concepts in that domain The most effective way for organizations complex, nonstandardized architectures
to achieve interoperability—within and with a number of noninteroperable
• Standardized coding systems for clinical among enterprises—is to develop a system interfaces.
concepts, classifications and clinical architecture that conforms to open or
terminologies such as SNOMED-CT and common messaging, infrastructure, Developing and enforcing common
LOINC communication, application, data and technical, communication, messaging
clinical terminology standards. While and data standards is an important step
To maximize the benefits of syntactic there are a range of solutions that enable toward a standards driven architecture. A
and semantic interoperability, clinicians, interoperability in nonstandardized standards management lifecycle should
administrators and researchers must use architectures—for example, vocabulary be developed to ensure standards are
combined data effectively to improve care servers and terminology services used and maintained correctly across
quality, identify and realize efficiencies, that enable systems using different the organization. This requires standards
and improve patient and public health terminologies to share information— management processes that monitor
outcomes. This approach requires a level the most effective means of achieving and enforce changes and updates to
of process interoperability that enables interoperability is to develop standards- standards, retire standards and ensure
discrete clinical and administrative driven architectures. that new hardware and software
processes to effectively leverage data components are standards compliant.
produced, used or modified by other Within an enterprise, a standards-driven Standards management within enterprises
processes. For example, clinical terms architecture enables organizations to with strong IT governance processes is
should be used consistently across achieve a level of semantic interoperability far easier than across enterprises with
organizations to represent exactly the more efficiently. Standards also increase discrete IT governance strategies. A critical
same diagnosis or treatment. Clinical and system flexibility as applications, challenge for organizations implementing
administrative processes do not have to devices and hardware and software inter-enterprise EHR is to coordinate
be standardized, but users must adopt the components can be integrated into and standardize each enterprise’s
same data entry and data management system architectures more efficiently and standards management strategy. Simply
standards across enterprises. effectively. Standards-driven architectures developing standards will not necessarily
also address some of the critical enable greater interoperability if those
challenges associated with implementing standards are not used or maintained
inter-enterprise EHR. Achieving uniformly across subsystems.
interoperability across enterprises that

Appendix:15
Recommendations Target process interoperability
through comprehensive clinical
Aim to achieve a level of
interoperability that will
Maintaining and improving the integrity
transformation and process deliver tangible clinical and
of data in e-health systems without
adversely affecting system flexibility, optimization strategies administrative benefits by
reliability and performance are complex Organizations often fail to maximize developing specific use cases
challenges. However, given the potential the clinical and administrative value of Too often, health care organizations
impact of low data integrity on care syntactic or semantic interoperability invest in interoperability without a set
quality, compliance and efficiency, these because clinical and administrative of specific use cases that demonstrate
are challenges organizations should strive processes and workflows are how interoperability will add value by
to meet. There are a number of strategies, noninteroperable. In other words, data improving clinical decision making, care
solutions and standards organizations created, used or modified by discrete quality and process efficiency. Without
can use as part of a comprehensive processes cannot be used effectively specific use cases, organizations often
data management strategy to improve by other processes. Achieving process target an inadequate or unnecessary
data integrity. From Accenture’s interoperability requires clinicians and level of interoperability that either limits
research and experience with e-health administrators to use applications in the the clinical and administrative value of
implementations around the world, we same way for the same purpose, to refer interoperability or needlessly increases the
recommend the following actions: to concepts using the same terms, to use cost of achieving it. In many cases, the
terms consistently and to adopt common most efficient solution is for organizations
Implement effective data data entry practices and rules regarding to target different levels of interoperability
integrity checkpoints and edit content, format and frequency of updates. across systems, clinical departments and
Process interoperability also involves functions depending on specific use cases.
checks process reengineering to create efficient This approach enables organizations to
To maintain data integrity and quality, “touch points” and synergies between concentrate resources on achieving high
organizations should develop a library processes that enable meaningful, levels of interoperability in areas where it
of standard data elements and use data accurate and up-to-date information will deliver the most significant clinical or
integrity checkpoints and edit checks to to flow between processes. To achieve administrative benefits.
ensure data conforms to data standards. process interoperability, organizations
Data integrity checkpoints verify that should develop clinical transformation and
data’s characteristics meet data integrity process optimization strategies, supported
specifications after it has been created, by adequate clinical change management
stored, processed or used. Edit checks programs, to maximize user adoption,
enforce data rules and standards and are encourage desirable user behavior and
an important part of data cleansing. They reengineer clinical processes.
detect and correct, delete or highlight
errors, inconsistencies and missing data.

Appendix:16
Appendix:17
Contacts Project Team
Global Lead Andrew Truscott
Accenture Health Practice
Mark Knickrehm
Asia-Pacific
Health Industry Lead
mark.a.knickrehm@accenture.com Giles Randle
+1 310-426-5202 Researcher, Institute for Health and
Public Service Value
North America Julie McQueen
Marylou Bailey Director of Research, Institute for Health
Health Industry Lead and Public Service Value
marylou.y.bailey@accenture.com
Greg Parston
+1 727-897-4124 Director, Institute for Health and Public
Service Value
Europe, Africa and Latin America
Javier Mur
Health Industry Lead
javier.mur@accenture.com
+34 93-227-1058

Asia-Pacific
Bill Higbie
Health Industry Lead
bill.higbie@accenture.com
+61 3-98388188

About the Accenture About Accenture


Institute for Health & Accenture is a global management
Public Service Value consulting, technology services and
outsourcing company, with more than
The Accenture Institute for Health & Public 190,000 people serving clients in more
Service Value is dedicated to promoting than 120 countries. Combining unparalleled
high performance in the health care sector experience, comprehensive capabilities
and in public service delivery, policy- across all industries and business functions,
making and governance. Through research and extensive research on the world’s
and development initiatives, the Institute most successful companies, Accenture
aims to help health care and public collaborates with clients to help them
service organizations deliver better social, become high-performance businesses and
economic and health outcomes for the governments. The company generated net
people they serve. Its home page is revenues of US$21.58 billion for the fiscal
www.accenture.com/ year ended Aug. 31, 2009. Its home page is
healthpublicservicevalue. www.accenture.com.

Copyright © 2010 Accenture


All rights reserved.
Accenture, its logo, and
High Performance Delivered
are trademarks of Accenture.
The views and opinions in this article
should not be viewed as professional
advice with respect to your business.

ACC10-0473 / 11-1902

You might also like