This page is no longer in use
This page is devoted to discussion and design related to security and access control. It arises from a Developers Forum meeting held June 20, 2013, and includes all the material from the notes of that meeting. During the meeting, we tried to catalog inadequacies of and alternatives to our current access control system as the first step in a process of deciding whether and at what priority we might want to upgrade our current access control system. We welcome peoples' experiences and ideas either in writing or in person.
USE CASES, PROBLEMS AND REQUIREMENTS
What standards are we trying to meet?
In the U.S., HIPAA and the states make the rules; Europe has privacy standards.
What about the countries we are working in? Are there minimal good practices that we should try to propagate? UNAIDS/PEPFAR have issued security and privacy guidance. In the U.S., the FDA has special requirements for drug trials; as I understand them, they deal more with auditing than with privacy. See Resources below.
We would like to have the ability to limit access to patient and encounter data by location. This handles two use cases: (a) a multi-facility installation, either internet connected or synchronized; and (b) a location within a facility with special privacy requirements, typically a psychiatric ward or an STD clinic. We should discuss whether a treating physician (or others) without special privileges should be able to access these records.
We would like to have the ability to limit access to patient and encounter data by role. Registration clerks and administrators should not have routine access to patient health data.
Do we need to limit access any further? E.g., should community health workers doing programmatic outreach have access to observations/encounters not related to the program?
We would like to have the ability to limit access to providers who have a relationship with the patient.
See the British Medical Association principles in the Powerpoint presentation by Dominic Duggan below.
Aggregate reports should always give the same results, regardless of who runs them. This probably requires us to distinguish between reads for the purpose of aggregating and reads for the purpose displaying detail; we might be able to have reporting tasks run as a different, trusted user. 8. Should a registration clerk be able print out a flow sheet?
WHAT DO WE HAVE NOW AND WHAT HAVE WE TRIED
Our basic role-based security involves basic SQL CRUD permissions on each table. In addition, we have permissions for viewing/editing forms. We have encountered the same issues described in Dominic Duggan's presentation – many privileges to assign, many facilities avoiding problems by giving people more rights than they should have.
Restrict by roles module https://modules.openmrs.org/modules/view.jsp?module=restrictbyrole. This is currently unsupported and apparently did not work quite as desired. It can do both location and role limitation if each location is given its own role.
In OpenMRS 1.10 it is possible to define a privilege required to view or edit an encounter. TRUNK-3377
A prototype implementation of the British Medical Association (BMA) security model was created as part of a senior design project. See this wiki page..
Lasantha Ranaweera created an XACML version of OpenMRS, see the discussion at https://groups.google.com/a/openmrs.org/forum/?fromgroups#!topic/dev/ZABGquZ8vdg and the Resources below
Philip Fong and Syed Zain Rizvi have implemented a Relationship-Based Access Control (ReBAC) system in OpenMRS. An important feature of ReBAC is the explicit tracking of relationships between individuals in the system, and making authorization decisions based on these relationships.Role-Based Access Control (RBAC), which OpenMRS implements, provides a reasonably robust mechanism for restricting access to information; however, OpenMRS does not yet have a mechanism for restricting access to specific data (e.g., a clinician is allowed to access the record of patient X, but not patient Y; or, a clinician is permitted to access a patient's data except for specific lab results). An important feature of ReBAC is the explicit tracking of relationships between individuals in the system, and making authorization decisions based on these relationships. See Resources below.
ALTERNATIVES
Dominic Duggan made a presentation which is attached to this page and available here.
RESOURCES
Information on HIPAA
UNAIDS/PEPFAR Confidentiality and Security Guidelines
Relationship-based Access Control
General information on XACML
Lasantha Ranaweera's implemention of XACML for OpenMRS