PACIO Advance Directive Interoperability Implementation Guide, published by HL7 International / Patient Empowerment. This guide is not an authorized publication; it is the continuous build for version 2.1.0 built by the FHIR (HL7® FHIR® Standard) CI Build. This version is based on the current content of https://github.com/HL7/fhir-pacio-adi/ and changes regularly. See the Directory of published versions
Security, Privacy, and Consent
General Considerations
Advance Directive Interoperability (ADI) involves communication of advance directive information across multiple parties including who the information is about, their healthcare agents and identified advisors, and care providers. The author, who is also the person the information is about, needs access to create, modify, remove, and share this information either directly or through an authorized third party. Users of this information are the appointed healthcare agents or advisors, care providers in emergency, intensive, or critical care environments, or others providing longer term care in a skilled nursing or other similar facility.
Advance directive information contains patient specific information, which means that it needs to be protected with proper security and privacy protections to avoid malicious or unintentional exposure of such information. All Advance Directive Interoperability exchanges must be appropriately secured in transit and access limited only to authorized individuals.
The ADI IG focuses on providing a structure to share data and information. Policy, legal, and regulatory differences across states and local areas may impact the workflow and requirements associated with Advance Directives Information. Implementors should review the current context for where this IG is expected to be used to ensure those requirements are met.
Security Considerations and Guidance
All implementers of the Advance Directive Interoperability Implementation Guide (IG) SHOULD follow the FHIR Security guidance, Security and Privacy Module, and the FHIR Implementer’s Safety Checklist guidance as defined in the FHIR standard where applicable and not otherwise superseded by this Section of the ADI IG.
- The FHIR Security specification provides guidance related to communication security, authentication, authorization/access control, audit, digital signatures, attachments, labels, narrative, and input validation. The FHIR security specification is available here.
- The FHIR Security and Privacy Module describes access control and authorization considerations to protect a FHIR server, how to document permissions granted, and hot to keep records of performed events. The FHIR Security and privacy module can be found here.
- The FHIR Implementer’s Safety Checklist helps implementers be sure that they have considered all the parts of FHIR that impact their system design regarding safety. The FHIR safety check list is available here.
Security Requirements
For the purposes of Advance Directive Interoperability, additional security conformance requirements are as follows:
Exchange Security
- The exchange of information SHALL support Transport Layer Security (TLS) Protocol Version 1.2 (RFC5246) or a more recent version of TLS for transport layer security.
- Implementers of this Implementation Guide SHALL support SMART on FHIR STU 2.1 App Launch Framework and MAY support SMART on FHIR STU 2.1 Backend Services.
- Implementers of this Implementation Guide SHOULD support mutually authenticated TLS.
- Server implementations that expect to support browser-based javascript applications SHOULD enable Cross-Origin Resource Sharing (CORS) for REST operations. Many client web-based apps use javascript for API calls which requires CORS. However, CORS could present security concerns if not implemented correctly or is not continually updated as new security issues are found and addressed. Implementers of CORS SHOULD consider advice about CORS from sources such as Enable-CORS and Moesif blog on Guide to CORS Pitfalls.
Authentication and Authorization Requirements
SMART App Launch
The following only applies to servers supporting app launch:
- Implementations SHALL support the FHIR US Core Patient Privacy and Security requirements.
- Server systems SHALL publish their authorization and token endpoints for discovery in accordance with the SMART App Launch STU2 framework and publicly publish the Well-Known Uniform Resource Identifiers (URIs) JSON file with scopes defined in the
scopes_supported
property.
- Implementations SHOULD consider the SMART on FHIR STU2 Best Practices in Authorization
- Implementation MAY support Health Relationship Trust Profile for User-Managed Access (HEART).
-
This guide defines the following server requirements for SMART on FHIR Core Capabilities:
- SHALL support Patient Access for Standalone Apps
- SHOULD support Patient Access for EHR Launch
- SHALL support Clinician Access for Standalone Apps
- SHOULD support: Clinician Access for EHR Launch
- In addition to the guidance above, there are additional requirements for other SMART on FHIR capabilities not included above, including:
Element |
Requirement |
Reason |
sso-openid-connect |
SHALL |
Advance directive information is sensitive information, so authorization using SMART's OpenID Connect profile is required |
scopes |
SHALL |
openid: |
Permission to retrieve information about the current logged-in user |
fhirUser: |
Permission to retrieve information about the current logged-in user |
launch/patient: |
When launching outside EHR, ask for patient to be selected at launch time |
patient/Patient.read: |
Permission to read any resource for the current patient |
patient/DocumentReference.*: |
Permission to access document references for the current patient |
user/Patient.read: |
Allows the client app to select the patient |
user/DocumentReference.*: |
Allows the client app to select a document reference |
|
context-banner |
SHOULD |
The banner helps provides the patient context for the data |
permission-offline |
SHOULD |
Support for refresh tokens, which allow a session to be extended without repeated logins |
SMART Backend Systems
The following applies to servers that support backend services:
- Implementations SHALL support the SMART Backend Services: Authorization Guide
Privacy Requirement
For the purposes of Advance Directive Interoperability, privacy conformance requirements are as follows:
- Implementers SHOULD support data sharing policies with use of the Consent resource.
Provenance
- Server implementations SHOULD support the ability to directly record and/or enable clients to assert (store) provenance associated with advance directive information using the Provenance resource.