Why does the Bureau of Prisons need access to the health records of non-felon Americans? It is just one of 38 agencies slated to collect, share and use Americans' health records under the new Federal Health IT Strategic Plan. While I’m a big fan of NASA, why the heck does NASA need access to my health records? It is one of the agencies listed under “participating federal departments and agencies” that are slated to help collect, share, and use electronic health information, according to the recently released “Federal Health IT Strategic Plan 2015-2020” draft (pdf). A better question… why the heck does the Bureau of Prisons need to access the health records of non-felons?When the new plan was released, National Coordinator Karen DeSalvo, MD, MPH, MSc said, “I am incredibly grateful for the participation of over thirty-five federal entities who worked in concert to develop this Plan, demonstrating the widespread interest across the government to digitize the health experience for every American.”Although there are 37 bullet points listed under “participating federal departments and agencies,” one of those, Department of Justice (DOJ) and Bureau of Prisons (BOP) actually has two listing under the same bullet point. After separating them, there are 38 federal departments or agencies slated to share your health information.Administration for Children & Families (ACF)Administration for Community Living (ACL)Agency for Healthcare Research and Quality (AHRQ)Centers for Disease Control and Prevention (CDC)Centers for Medicare & Medicaid Services (CMS)Department of Agriculture (USDA)Department of Defense (DOD)Department of Education (DOE)Department of Justice (DOJ)Bureau of Prisons (BOP)Department of Labor (DOL)Department of Veterans Affairs (VA)Federal Communications Commission (FCC)Federal Health Architecture (FHA)Federal Trade Commission (FTC)Food and Drug Administration (FDA)Health Resources and Services Administration (HRSA)HHS Assistant Secretary for Financial Resources (ASFR)HHS Assistant Secretary for Health (OASH)HHS Assistant Secretary for Legislation (ASL)HHS Assistant Secretary for Planning and Evaluation (ASPE)HHS Assistant Secretary for Preparedness and Response (ASPR)HHS Office of the National Coordinator for Health Information Technology (ONC)HHS Office for Civil Rights (OCR)HHS Office of the Chief Information Officer (OCIO)HHS Office of the Chief Technology Officer (CTO)HHS Office of the General Counsel (OGC)HHS Office of Minority Health (OMH)HHS Office of the Secretary (OS)Indian Health Service (IHS)National Aeronautics and Space Administration (NASA)National Institutes of Health (NIH)National Institute of Standards and Technology (NIST)National Science Foundation (NSF)Networking and Information Technology Research and Development (NITRD)Office of Personnel Management (OPM)Social Security Administration (SSA)Substance Abuse and Mental Health Services Administration (SAMHSA)At least the NSA, FBI and CIA are not on the list… Federal agencies will collaborate with one another and with state, local, tribal, and private stakeholders to: HealthIT The plan lists a series of three-year and six-year goals, further broken down into objectives. HealthIT According to DeSalvo, the goal of sharing health information “aligns with the Nationwide Interoperability Roadmap, a parallel activity led by ONC. The Roadmap is guiding interoperability solutions based on five key building blocks: core technical standards and functions; certification to support adoption and optimization of health IT products and services; privacy and security protections for health information; a supportive business, clinical, cultural, and regulatory environment; and rules of engagement and governance of health information exchange.”HealthAnalytics explained, “To help strengthen healthcare delivery as a whole, the ONC and other agencies will work to improve clinical services centered around population health management and raise healthcare quality and delivery to provide safe, effective, patient-centered care.”The new Federal Health IT and Strategic plan states, “The privacy and security of protected health information is a top priority of the federal government, and the government will continue to pursue efforts that ensure confidence and trust for individuals and their families, caregivers, providers, and others.” It might help boost confidence if federal agencies would stop being named in OIG reports as having poor security; it also doesn’t help that there are no guarantees that agencies, providers, or third-parties won’t get hacked.There have long been plans to move medical records to an electronic format for data sharing, but privacy issues are one of the legal barriers that have “hindered” the plan for sharing Electronic Health Records (EHR). BioMed Central broke down the barriers into the following categories: technical, motivation, economic, political, legal and ethical. Under legal barriers and protection of privacy, it states:Public health agencies have the mandate and authority to collect private data from the population governed by the Health Insurance Portability and Accountability Act (HIPAA) in the US or similar legislation in other countries. A clear distinction between data containing personal identifiers and fully anonymous data may not always be possible, leading to restrictive policies on all types of data due to privacy concerns. Aggregated data without personal identifiers may not be sufficiently detailed for certain applications. Existing tools and standards for the de-identification of personal identifiers such as statistical data masking may not be known or available in many contexts.But surely HIPPA implies that the agencies will collect, share and use our anonymized and fully de-identified health records? Back in 2009, the CDT explained how that is not necessarily the case. In “Privacy As An Enabler, Not An Impediment: Building Trust Into Health Information Exchange,” the CDT wrote:HIPAA’s protections do not extend to “deidentified” health information. Thus, covered entities may provide deidentified data to third parties for uses such as research and business intelligence without regard to HIPAA. In turn, these entities may use these data as they wish, subject only to the terms of any applicable contractual provisions (or state laws that might apply). If a third party then reidentifies these data—for example, by using information in its possession or available in a public database—the reidentified personal health information would not be subject to HIPAA. It could be used for any purpose unless the entity holding the reidentified data was a covered entity.Since “a number of researchers have documented how easy it is to reidentify deidentified data,” it seemed wise to search the Federal Health IT Strategic Plan for “opt” as in how to opt-out; but there were no results for that. Public comments on the newly proposed Federal Health IT Strategic Plan (pdf) can be posted here until February 6, 2015. The plan states, “Based on this feedback, the federal government will release a final version of the updated Plan in 2015.” Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe