10.08.2013 Views

ehr onc final certification - Department of Health Care Services

ehr onc final certification - Department of Health Care Services

ehr onc final certification - Department of Health Care Services

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

eferenced in FIPS 140-2 Annex A, which is being incorporated by reference. While the<br />

list is intended to be current, we anticipate that NIST will on an as-needed basis revise<br />

and update the list, based on the development <strong>of</strong> new technologies or perhaps on<br />

identified vulnerabilities associated with a particular algorithm. Regardless <strong>of</strong> any<br />

revisions to this list by NIST, this version <strong>of</strong> Annex A that is incorporated by reference<br />

will remain effective for purposes <strong>of</strong> serving as the adopted encryption standard. With<br />

that said, if the Secretary determines that one <strong>of</strong> the listed encryption algorithms poses a<br />

significant security risk for Certified EHR Technology, the Secretary will notify the<br />

public on the <strong>Department</strong>’s website (and perhaps with some time delay in the Federal<br />

Register), and will direct ONC-ATCBs or ONC-ACBs not to test and certify Complete<br />

EHRs and EHR Modules according to the specified compromised algorithm. The<br />

<strong>Department</strong> would then follow-up with rulemaking as necessary and appropriate to<br />

update the adopted list <strong>of</strong> acceptable encryption algorithms.<br />

Comments. Many commenters expressed c<strong>onc</strong>erns that the rule would require the<br />

encryption <strong>of</strong> data at rest. One commenter recommended that encryption not be a<br />

required functionality <strong>of</strong> EHR systems, but defined as limited to devices. Some<br />

commenters stated that requiring EHR systems to be capable <strong>of</strong> encryption would hinder<br />

adoption.<br />

Response. We require that Certified EHR Technology must be capable <strong>of</strong><br />

encrypting electronic health information. We do not specify the policies surrounding the<br />

use <strong>of</strong> encryption by an eligible pr<strong>of</strong>essional or eligible hospital nor do we specify that it<br />

should only apply to devices. Rather we intend for Certified EHR Technology to be<br />

technologically capable <strong>of</strong> encryption, thereby allowing, if desired or required, an eligible<br />

Page 119 <strong>of</strong> 228

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!