<div dir="ltr">A couple of thoughts on this last Josh/John exchange, and the whole thread.<div><br></div><div>First, in this whole thread, we are assuming US-only in the impact of what we do. Our charter is international, though many of us work in the US sphere exclusively. So it's good to be mindful of state-specific requirements, but it's also good to be mindful of non-US jurisdiction needs too (which may require needs for extra stringency, extra care with the term "consent", etc.).</div><div><br></div><div>Second, it's true we definitely do rely on the technology layer to achieve specific effects of "authorization-ish stuff". I can definitely see the usefulness of distinguishing <b>gross</b> vs. <b>fine</b> ceremonies at different stages. It's also important to map what they apply to specifically in each technology. Here's an attempt:</div><div><br></div><div><table cellspacing="0" cellpadding="0" dir="ltr" border="1" style="table-layout:fixed;font-size:13px;font-family:arial,sans,sans-serif;border-collapse:collapse;border:1px solid #ccc"><colgroup><col width="133"><col width="133"><col width="133"><col width="199"></colgroup><tbody><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom;word-wrap:break-word">Ceremony</td><td style="padding:2px 3px;vertical-align:bottom;word-wrap:break-word">OAuth</td><td style="padding:2px 3px;vertical-align:bottom;word-wrap:break-word">UMA</td><td style="padding:2px 3px;vertical-align:bottom;word-wrap:break-word">What Alice is authorizing</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom;word-wrap:break-word">Authz for client to get scoped access to use protected resources at resource server</td><td style="padding:2px 3px;vertical-align:bottom;word-wrap:break-word">gross or fine (if unchecking is allowed)</td><td style="padding:2px 3px;vertical-align:bottom;word-wrap:break-word">n/a</td><td style="padding:2px 3px;vertical-align:bottom;word-wrap:break-word">Granting of access token with scopes</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom;word-wrap:break-word">Revocation of access token</td><td style="padding:2px 3px;vertical-align:bottom;word-wrap:break-word">gross</td><td style="padding:2px 3px;vertical-align:bottom;word-wrap:break-word">n/a</td><td style="padding:2px 3px;vertical-align:bottom;word-wrap:break-word">Revocation thereof</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom;word-wrap:break-word">Intro of authz server to resource server</td><td style="padding:2px 3px;vertical-align:bottom;word-wrap:break-word">n/a</td><td style="padding:2px 3px;vertical-align:bottom;word-wrap:break-word">gross</td><td style="padding:2px 3px;vertical-align:bottom;word-wrap:break-word">Use of UMA protection API, possibly Ts & Cs</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom;word-wrap:break-word">Revocation of intro of authz server to resource server</td><td style="padding:2px 3px;vertical-align:bottom;word-wrap:break-word">n/a</td><td style="padding:2px 3px;vertical-align:bottom;word-wrap:break-word">gross</td><td style="padding:2px 3px;vertical-align:bottom;word-wrap:break-word">Revocation thereof</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom;word-wrap:break-word">Intro of authz server/resource server to client</td><td style="padding:2px 3px;vertical-align:bottom;word-wrap:break-word">n/a</td><td style="padding:2px 3px;vertical-align:bottom;word-wrap:break-word">gross</td><td style="padding:2px 3px;vertical-align:bottom;word-wrap:break-word">Use of UMA authz API, possibly Ts & Cs</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom;word-wrap:break-word">Revocation of authz server/resource server to client</td><td style="padding:2px 3px;vertical-align:bottom;word-wrap:break-word">n/a</td><td style="padding:2px 3px;vertical-align:bottom;word-wrap:break-word">gross</td><td style="padding:2px 3px;vertical-align:bottom;word-wrap:break-word">Revocation thereof</td></tr><tr style="height:21px"><td style="padding:2px 3px;vertical-align:bottom;word-wrap:break-word">Configuring authz server (with policies) to allow or disallow access to protected resources at resource servers</td><td style="padding:2px 3px;vertical-align:bottom;word-wrap:break-word">n/a</td><td style="padding:2px 3px;vertical-align:bottom;word-wrap:break-word">fine</td><td style="padding:2px 3px;vertical-align:bottom;word-wrap:break-word">Access to protected resources, revocation of access, time periods of allowable access, possibly after-the-fact approvals of previously attempted accesses, possibly requirements for purpose of use once access that can only be enforceable at a nontechnical layer...</td></tr></tbody></table></div></div><div class="gmail_extra"><br clear="all"><div><div class="gmail_signature"><div dir="ltr"><div><div dir="ltr">
<p><b>Eve Maler<br></b>ForgeRock Office of the CTO | VP Innovation & Emerging Technology<br>Cell +1 425.345.6756 | Skype: xmlgrrl | Twitter: @xmlgrrl<br>Join our <a href="http://forgerock.org/openuma/" target="_blank">ForgeRock.org OpenUMA</a> community!</p></div></div></div></div></div>
<br><div class="gmail_quote">On Thu, Aug 6, 2015 at 6:28 AM, Moehrke, John (GE Healthcare) <span dir="ltr"><<a href="mailto:John.Moehrke@med.ge.com" target="_blank">John.Moehrke@med.ge.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div lang="EN-US" link="blue" vlink="purple"><div><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">YES!<u></u><u></u></span></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"><u></u> <u></u></span></p><p class="MsoNormal"><b><span style="font-size:10.0pt;font-family:"Tahoma","sans-serif"">From:</span></b><span style="font-size:10.0pt;font-family:"Tahoma","sans-serif""> <a href="mailto:jmandel@gmail.com" target="_blank">jmandel@gmail.com</a> [mailto:<a href="mailto:jmandel@gmail.com" target="_blank">jmandel@gmail.com</a>] <b>On Behalf Of </b>Josh Mandel<br><b>Sent:</b> Thursday, August 06, 2015 8:19 AM<span class=""><br><b>To:</b> Moehrke, John (GE Healthcare)<br></span><b>Cc:</b> Aaron Seib; Adrian Gropper; Debbie Bucci; <a href="mailto:openid-specs-heart@lists.openid.net" target="_blank">openid-specs-heart@lists.openid.net</a></span></p><div><div class="h5"><br><b>Subject:</b> Re: [Openid-specs-heart] HEART 2015-08-05 meeting notes<u></u><u></u></div></div><p></p><div><div class="h5"><p class="MsoNormal"><u></u> <u></u></p><div><p class="MsoNormal">As to the division between "gross ceremony" and "finer-grain adjustments", I want to suss out whether the following model (which readily applies to UMA, though not to vanilla OAuth) is consistent with you have in mind, or whether this model is addressing a different question entirely:<u></u><u></u></p><div><p class="MsoNormal"><u></u> <u></u></p><div><p class="MsoNormal">1. <b>Gross ceremony</b> consists of Alice introducing her resource server to an authorization server of her choice. For example, she might sign a document saying (effectively): "Dear Dr. Jones: please treat my authorization server, at <a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__authz.alice.org&d=AwMFaQ&c=IV_clAzoPDE253xZdHuilRgztyh_RiV3wUrLrDQYWSI&r=B4hg7NQHul-cxfpT_e9Lh49ujUftqzJ6q17C2t3eI64&m=-FRUOcSi1jbR3LldEvLj8fKY7nzRqZMJm15y378_4LM&s=QvDpF47TIOkp8zRSX9cFJzJ6ZALiPO_M0vsL3dZ-zZg&e=" target="_blank">https://authz.alice.org</a>, as representing my wishes for disclosure of my health data. Use the decisions that server renders to guide your access control decisions about my data." This document is easily comprehensible, could serve as evidence in court, etc. <u></u><u></u></p></div><div><p class="MsoNormal"><u></u> <u></u></p></div><div><p class="MsoNormal">2. And then the <b>finer-grain adjustments</b> would be made by Alice in concert with her authorization server (for example, establishing specific policies about who can access her data, and which data, and for what purposes, and under what conditions).<u></u><u></u></p></div></div></div><div><p class="MsoNormal"><u></u> <u></u></p><div><p class="MsoNormal">On Thu, Aug 6, 2015 at 9:06 AM, Moehrke, John (GE Healthcare) <<a href="mailto:John.Moehrke@med.ge.com" target="_blank">John.Moehrke@med.ge.com</a>> wrote:<u></u><u></u></p><div><div><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">I agree with your proposal for ‘Authorize for Disclosure’ and to de-emphasize ‘Consent’… (although this problem with ‘Consent’ is only a USA problem)… </span><u></u><u></u></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"><br>But I don’t think that a UMA/OAuth ‘token’ will be seen as legitimate evidence in a court. It would be quickly shown to be not intelligible by the layperson, I can barely read them. Thus it is not evidence of the act of ‘authorizing for disclosure’ ceremony. This is indeed a practice-of-law problem that we all hope changes, but I have little hope that it will change in the coming 10 years. This is why I want the gross ceremony to be a pre-condition, with the UMA/OAuth technology be the fine-grain solution. I expect that a gross ceremony can be shown in a court as evidence that all parties understood the use of the technology would be used for fine-grain. Note that if the courtroom antics change, then this pre-condition simply goes away. But by putting it there we enable it to be used, and thus make our solution more palatable to the legal folks at those custodian organizations that are afraid to release information today.</span><u></u><u></u></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"> </span><u></u><u></u></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">John</span><u></u><u></u></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"> </span><u></u><u></u></p><div><div style="border:none;border-top:solid #b5c4df 1.0pt;padding:3.0pt 0in 0in 0in"><p class="MsoNormal"><b><span style="font-size:10.0pt;font-family:"Tahoma","sans-serif"">From:</span></b><span style="font-size:10.0pt;font-family:"Tahoma","sans-serif""> Aaron Seib [mailto:<a href="mailto:aaron.seib@nate-trust.org" target="_blank">aaron.seib@nate-trust.org</a>] <br><b>Sent:</b> Thursday, August 06, 2015 7:58 AM<br><b>To:</b> Moehrke, John (GE Healthcare); 'Adrian Gropper'; 'Debbie Bucci'<br><b>Cc:</b> <a href="mailto:openid-specs-heart@lists.openid.net" target="_blank">openid-specs-heart@lists.openid.net</a><br><b>Subject:</b> RE: [Openid-specs-heart] HEART 2015-08-05 meeting notes</span><u></u><u></u></p></div></div><div><div><p class="MsoNormal"> <u></u><u></u></p><p class="MsoNormal"><a name="14f0333266de66e8_14f031f41371de48__MailEndCompose"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">I tend to agree with John’s recommendation with a friendly amendment.</span></a><u></u><u></u></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"> </span><u></u><u></u></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">We should not mis-use the word consent. We should use the term – authorize for disclosure.</span><u></u><u></u></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"> </span><u></u><u></u></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">The primary reason being that the term consent has a lot of baggage and is defined in law for Human research protections and authorize for disclosure is more accurate to me. Consent – as pointed out by the Kind Sir from Boston (Adrian) to point out – meant something before 2002 that it doesn’t mean anymore.</span><u></u><u></u></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"> </span><u></u><u></u></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">In my opinion the notion of authorize for disclosure also conveniently aligns with my understanding of what ab “UMA/OAuth token” would represent on a per transaction basis.</span><u></u><u></u></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"> </span><u></u><u></u></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">In court we would expect the entity accused of unauthorized disclosure to be able to produce a valid UMA/OAuth token as a sufficient defense from mis-representations of trial lawyers.</span><u></u><u></u></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"> </span><u></u><u></u></p><div><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">Aaron Seib</span><u></u><u></u></p><p class="MsoNormal"><a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__www.nate-2Dtrust.org_&d=AwMFaQ&c=IV_clAzoPDE253xZdHuilRgztyh_RiV3wUrLrDQYWSI&r=B4hg7NQHul-cxfpT_e9Lh49ujUftqzJ6q17C2t3eI64&m=87vCtxeoEunALdecDlNur8aIU5qcY6YWTAxWw6j34cs&s=PU_01do09mzHBYjfdhFvZCLDAP7Tpxnm1P001w-6AlU&e=" target="_blank"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif"">NATE</span></a><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">, CEO</span><u></u><u></u></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">@CaptBlueButton</span><u></u><u></u></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">(o) <a href="tel:301-540-2311" target="_blank">301-540-2311</a></span><u></u><u></u></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">(m) <a href="tel:301-326-6843" target="_blank">301-326-6843</a></span><u></u><u></u></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"> </span><u></u><u></u></p></div><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"> </span><u></u><u></u></p><div><div style="border:none;border-top:solid #b5c4df 1.0pt;padding:3.0pt 0in 0in 0in"><p class="MsoNormal"><b><span style="font-size:10.0pt;font-family:"Tahoma","sans-serif"">From:</span></b><span style="font-size:10.0pt;font-family:"Tahoma","sans-serif""> Openid-specs-heart [<a href="mailto:openid-specs-heart-bounces@lists.openid.net" target="_blank">mailto:openid-specs-heart-bounces@lists.openid.net</a>] <b>On Behalf Of </b>Moehrke, John (GE Healthcare)<br><b>Sent:</b> Thursday, August 6, 2015 7:27 AM<br><b>To:</b> Adrian Gropper; Debbie Bucci<br><b>Cc:</b> <a href="mailto:openid-specs-heart@lists.openid.net" target="_blank">openid-specs-heart@lists.openid.net</a><br><b>Subject:</b> Re: [Openid-specs-heart] HEART 2015-08-05 meeting notes</span><u></u><u></u></p></div></div><p class="MsoNormal"> <u></u><u></u></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">At the federal level, under HIPAA alone, there is no need for consent for purposes of using the data within the Covered Entity for Treatment, Payment, and Normal operations.</span><u></u><u></u></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"> </span><u></u><u></u></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">BUT, there are plenty of states that require consent… Ignoring reality of states regulations is not useful.</span><u></u><u></u></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"> </span><u></u><u></u></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">AND, there are some institutions that would rather have a consent that authorizes them to share beyond their Covered Entity boundary. Not everyone reads HIPAA ‘Treatment’ as an authorization to share with any treating provider.</span><u></u><u></u></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"> </span><u></u><u></u></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">AND, there are some ‘sensitive’ health topics covered by federal money that do come with a requirement for consent for sharing. This was the main focus of the DS4P efforts.</span><u></u><u></u></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"> </span><u></u><u></u></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">So, let’s not focus on HIPAA alone. Let’s expect that ‘for whatever reason an organization wants to have positive evidence that the patient desires sharing to happen’ as the trigger to allow it to happen (otherwise deny it from happening. This would seem more helpful to the community we are doing this work for. </span><u></u><u></u></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"> </span><u></u><u></u></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">An important aspect of all of this is how will the organization holding the data be able to legally defend that a UMA/OAuth token was valid evidence of consent that would hold up in a courtroom… We can’t address this in HEART, but it should not slow us down. We again, document this as a precondition to our work. One way this is done is that a paper trail is a part of the initial setup of a patient engaging with the system.</span><u></u><u></u></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"> </span><u></u><u></u></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d">John</span><u></u><u></u></p><p class="MsoNormal"><span style="font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1f497d"> </span><u></u><u></u></p><p class="MsoNormal"><b><span style="font-size:10.0pt;font-family:"Tahoma","sans-serif"">From:</span></b><span style="font-size:10.0pt;font-family:"Tahoma","sans-serif""> Openid-specs-heart [<a href="mailto:openid-specs-heart-bounces@lists.openid.net" target="_blank">mailto:openid-specs-heart-bounces@lists.openid.net</a>] <b>On Behalf Of </b>Adrian Gropper<br><b>Sent:</b> Wednesday, August 05, 2015 11:49 PM<br><b>To:</b> Debbie Bucci<br><b>Cc:</b> <a href="mailto:openid-specs-heart@lists.openid.net" target="_blank">openid-specs-heart@lists.openid.net</a><br><b>Subject:</b> Re: [Openid-specs-heart] HEART 2015-08-05 meeting notes</span><u></u><u></u></p><p class="MsoNormal"> <u></u><u></u></p><div><div><div><div><p class="MsoNormal" style="margin-bottom:12.0pt">I have never heard the term "simple consent". There's nothing like "consent" in the context of data sharing that I can think of. HIPAA removed the patient's right of consent in 2002 <a href="https://urldefense.proofpoint.com/v2/url?u=https-3A__patientprivacyrights.org_-3Fs-3DHIPAA-2BConsent&d=AwMFaQ&c=IV_clAzoPDE253xZdHuilRgztyh_RiV3wUrLrDQYWSI&r=B4hg7NQHul-cxfpT_e9Lh49ujUftqzJ6q17C2t3eI64&m=QPfpP6tNPhNn0uCYFnfBuRqSH5IVEwKw_Jqp3j4NGRQ&s=u1OCcH7ZkX-4jzmNs_eIhVZUi0lQOy0npXd30zYGE8I&e=" target="_blank">https://patientprivacyrights.org/?s=HIPAA+Consent</a><u></u><u></u></p></div><p class="MsoNormal" style="margin-bottom:12.0pt">There are consent forms for research but that's not part of the use cases we're tackling these days.<u></u><u></u></p></div><p class="MsoNormal" style="margin-bottom:12.0pt">Does anyone have an example of consent for clinical data sharing to share with us?<u></u><u></u></p></div><p class="MsoNormal">Adrian<u></u><u></u></p><div><div><div><div><p class="MsoNormal" style="margin-bottom:12.0pt"> <u></u><u></u></p></div></div></div></div></div><div><p class="MsoNormal"> <u></u><u></u></p><div><p class="MsoNormal">On Thu, Aug 6, 2015 at 12:10 AM, Debbie Bucci <<a href="mailto:debbucci@gmail.com" target="_blank">debbucci@gmail.com</a>> wrote:<u></u><u></u></p><div><div><p class="MsoNormal">@Eve - yes I know its client but I'm really hung up on the token generation/choices. Thanks for the tweaks.<u></u><u></u></p></div><div><p class="MsoNormal"> <u></u><u></u></p></div><div><p class="MsoNormal">I know we clarified that the release form is NOT consent in one of our earlier meetings but is this (release of information) what I have heard others refer to as simple consent? During this process would access to problems/meds/allergies be included in that authorization/consent flow? I visualized more than demographics in the conversation.<u></u><u></u></p></div><div><div><div><p class="MsoNormal"> <u></u><u></u></p></div><div><p class="MsoNormal"> <u></u><u></u></p></div><div><p class="MsoNormal"> <u></u><u></u></p><div><p class="MsoNormal">On Wed, Aug 5, 2015 at 9:21 PM, Justin Richer <<a href="mailto:jricher@mit.edu" target="_blank">jricher@mit.edu</a>> wrote:<u></u><u></u></p><div><p class="MsoNormal">Thank you, Adrian, this is a great reference! I think your annotations make sense as well, things should map pretty plainly to the OAuth process. The tricky part (that we got a start on today) is going to be the scopes bits and getting those right.<br><br>For an UMA flow, it's also similar, except that the "who can see it" is a set of claims instead of the client application.<span style="color:#888888"><br><br> -- Justin</span><u></u><u></u></p><div><div><p class="MsoNormal" style="margin-bottom:12.0pt"> <u></u><u></u></p><div><p class="MsoNormal">On 8/5/2015 9:12 PM, Adrian Gropper wrote:<u></u><u></u></p></div><blockquote style="margin-top:5.0pt;margin-bottom:5.0pt"><div><div><div><div><p class="MsoNormal" style="margin-bottom:12.0pt">I've attached a very typical Release of Information authorization. I've annotated the 5 elements common to all such documents that I have ever seen. The stuff outside if the rectangles is more or less optional. <u></u><u></u></p></div><p class="MsoNormal" style="margin-bottom:12.0pt">This form covers one direction of the EHR-PHR Use Case. It is presented to the Custodian (the patient or their designate ) and approved by them by the Resource Server and pre-filled with information supplied by the Client, if available. <br><br>In some cases, the Client information is not available at the time the Authorization form is signed. In that case, it will be up to the Authorization Server to consider the Client and User information and provide the authorization to the Resource Server.<u></u><u></u></p></div><p class="MsoNormal" style="margin-bottom:12.0pt">The Resource Server has the final say in all cases and could decide to ignore the authorization based on local or jurisdictional policy. This is outside the control of the Resource Owner and likely to be out of scope for HEART in all use-cases.<u></u><u></u></p></div><div><p class="MsoNormal">This ROI Authorization Form is the only "consent" that I'm aware of in clinical IT. Patients are asked to sign other documents, including:<u></u><u></u></p></div><div><p class="MsoNormal">Registration Form, Notice of Privacy Practices, and Treatment Consent but none of these has anything to do with sharing of health data (except for HIPAA TPO which we will not get into here.)<u></u><u></u></p></div><div><p class="MsoNormal"> <u></u><u></u></p></div><p class="MsoNormal">Adrian<u></u><u></u></p></div><div><p class="MsoNormal"> <u></u><u></u></p><div><p class="MsoNormal">On Wed, Aug 5, 2015 at 8:27 PM, jim kragh <<a href="mailto:kragh65@gmail.com" target="_blank">kragh65@gmail.com</a>> wrote:<u></u><u></u></p><div><p class="MsoNormal">Thanks for sharing,... informative and constructive in reaching the patient end point. <u></u><u></u></p><div><p class="MsoNormal"> <u></u><u></u></p></div><div><p class="MsoNormal">May all have a nice evening!<u></u><u></u></p></div></div><div><p class="MsoNormal"> <u></u><u></u></p><div><div><div><p class="MsoNormal">On Wed, Aug 5, 2015 at 3:26 PM, Debbie Bucci <<a href="mailto:debbucci@gmail.com" target="_blank">debbucci@gmail.com</a>> wrote:<u></u><u></u></p></div></div><blockquote style="border:none;border-left:solid #cccccc 1.0pt;padding:0in 0in 0in 6.0pt;margin-left:4.8pt;margin-top:5.0pt;margin-right:0in;margin-bottom:5.0pt"><div><div><div><div><p class="MsoNormal">Attendees:<u></u><u></u></p></div><div><p class="MsoNormal">Eve Maler<u></u><u></u></p></div><div><p class="MsoNormal">Justin Richer<u></u><u></u></p></div><div><p class="MsoNormal">Josh Mandel<u></u><u></u></p></div><div><p class="MsoNormal">Adrian Gropper<u></u><u></u></p></div><div><p class="MsoNormal">Thomas Sullivan <u></u><u></u></p></div><div><p class="MsoNormal">Debbie Bucci<u></u><u></u></p></div><div><p class="MsoNormal"> <u></u><u></u></p></div><div><p class="MsoNormal">We have decided to delineate between mechanical and semantic scope docs.<u></u><u></u></p></div><div><p class="MsoNormal"> <u></u><u></u></p></div><div><p class="MsoNormal">For the PCP <-> PHR use case:<u></u><u></u></p></div><div><p class="MsoNormal"> <u></u><u></u></p></div><div><p class="MsoNormal">The pre determined choice token confidential token choice and exactly what information needs (example: PHR's authorization endpoint) to be shared in advance between the PCP's EHR and Alice's PCP was left out of the discussion for now.<u></u><u></u></p></div><div><p class="MsoNormal"> <u></u><u></u></p></div><div><p class="MsoNormal">There is one basic mechanical Oauth generic flow that occurs twice in the use case.<u></u><u></u></p></div><div><p class="MsoNormal"> <u></u><u></u></p></div><div><p class="MsoNormal">Given the group has generally agreed that the SMART specifications are a good place to <strong><i>start </i></strong><em>... </em>for this particular use case the only semantic FHIR scope that is necessary is the patient/*.read scope that grants permission to read any resource for the current patient.<u></u><u></u></p></div><div><p class="MsoNormal"> <u></u><u></u></p></div><div><p class="MsoNormal">During the registration process Alice should be able to select at a fine grain level which resources she is willing to share with the PHR. This mimic's a specific process - Adrian please provide. This information will be used to generate the access token.<u></u><u></u></p></div><div><p class="MsoNormal"> <u></u><u></u></p></div><div><p class="MsoNormal">The one thing left at the end of the discussion is whether the patient record is implicit or explicitly stated. This is a design decision that may make a difference as we move towards our next use case in which delegation is a factor.<u></u><u></u></p></div><div><p class="MsoNormal"> <u></u><u></u></p></div><div><p class="MsoNormal">Corrections/updates appreciated. <u></u><u></u></p></div><div><p class="MsoNormal"> <u></u><u></u></p></div><div><p class="MsoNormal"> <u></u><u></u></p></div></div></div></div></blockquote></div></div></div></div><pre> <u></u><u></u></pre></blockquote><p class="MsoNormal"> <u></u><u></u></p></div></div></div><p class="MsoNormal" style="margin-bottom:12.0pt"><br>_______________________________________________<br>Openid-specs-heart mailing list<br><a href="mailto:Openid-specs-heart@lists.openid.net" target="_blank">Openid-specs-heart@lists.openid.net</a><br><a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openid.net_mailman_listinfo_openid-2Dspecs-2Dheart&d=AwMFaQ&c=IV_clAzoPDE253xZdHuilRgztyh_RiV3wUrLrDQYWSI&r=B4hg7NQHul-cxfpT_e9Lh49ujUftqzJ6q17C2t3eI64&m=QPfpP6tNPhNn0uCYFnfBuRqSH5IVEwKw_Jqp3j4NGRQ&s=rCzIAK2qBPKQaibR7Ns2AF69bEcf2hFBrgPF6wgZ0i4&e=" target="_blank">http://lists.openid.net/mailman/listinfo/openid-specs-heart</a><u></u><u></u></p></div><p class="MsoNormal"> <u></u><u></u></p></div></div></div></div></div><p class="MsoNormal"><br><br clear="all"><br>-- <u></u><u></u></p><div><div><div><div><div><p class="MsoNormal"> <u></u><u></u></p><div><p class="MsoNormal">Adrian Gropper MD<br><br><span style="font-family:"Arial","sans-serif";color:#1f497d">RESTORE Health Privacy!<br>HELP us fight for the right to control personal health data.<br>DONATE: <a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__patientprivacyrights.org_donate-2D2_&d=AwMFaQ&c=IV_clAzoPDE253xZdHuilRgztyh_RiV3wUrLrDQYWSI&r=B4hg7NQHul-cxfpT_e9Lh49ujUftqzJ6q17C2t3eI64&m=QPfpP6tNPhNn0uCYFnfBuRqSH5IVEwKw_Jqp3j4NGRQ&s=5EO5dh5y1O7CjbbjqdwxTBcdii8ABtLHO2waj3VDYfw&e=" target="_blank"><span style="color:#0563c1">http://patientprivacyrights.org/donate-2/</span></a></span> <u></u><u></u></p></div></div></div></div></div></div></div></div></div></div></div><p class="MsoNormal" style="margin-bottom:12.0pt"><br>_______________________________________________<br>Openid-specs-heart mailing list<br><a href="mailto:Openid-specs-heart@lists.openid.net" target="_blank">Openid-specs-heart@lists.openid.net</a><br><a href="https://urldefense.proofpoint.com/v2/url?u=http-3A__lists.openid.net_mailman_listinfo_openid-2Dspecs-2Dheart&d=AwMFaQ&c=IV_clAzoPDE253xZdHuilRgztyh_RiV3wUrLrDQYWSI&r=B4hg7NQHul-cxfpT_e9Lh49ujUftqzJ6q17C2t3eI64&m=-FRUOcSi1jbR3LldEvLj8fKY7nzRqZMJm15y378_4LM&s=RTHrHj6upslZMRENmfMD79w7Do0-DvlVjasIHKE03f4&e=" target="_blank">http://lists.openid.net/mailman/listinfo/openid-specs-heart</a><u></u><u></u></p></div><p class="MsoNormal"><u></u> <u></u></p></div></div></div></div></div><br>_______________________________________________<br>
Openid-specs-heart mailing list<br>
<a href="mailto:Openid-specs-heart@lists.openid.net">Openid-specs-heart@lists.openid.net</a><br>
<a href="http://lists.openid.net/mailman/listinfo/openid-specs-heart" rel="noreferrer" target="_blank">http://lists.openid.net/mailman/listinfo/openid-specs-heart</a><br>
<br></blockquote></div><br></div>