AimTo identify the key requirements and challenges to interoperability between patient portals and electronic health records (EHRs). IntroductionPatient portals provide patients with access to their health information directly from EHRs within hospitals, primary care centres and general practices (GPs). Patient portals offer many benefits to patients including improved communication with healthcare providers and care coordination. However, many challenges exist with the integration and automatic and secure sharing of information between EHRs and patient portals. It is critical that countries learn from international experiences to successfully develop interoperable national patient portals. MethodsA scoping review methodology was undertaken. A search strategy using index terms and keywords was applied across four key databases, an additional grey literature search was also run. The identified studies were screened by two reviewers to determine eligibility against defined inclusion criteria. Data were abstracted from the eligible studies and reviewed to identify the key requirements and challenges to interoperability of patient portals with EHRs. ResultsAfter screening 3,462 studies, 34 were included across 11 countries. Of the 29 unique patient portals studied, few offered patients access to their entire healthcare record across multiple sites and a number of different functionalities were available. Key interoperability requirements and challenges identified were: Data Sharing Incentives & Supports; Heterogenous Organisations & Information Systems; Data Storage & Management; Available Information & Functionalities; Data Formats & Standards; Identification of Individuals; User Access, Control & Consent; and Security & Privacy. ConclusionSeamless exchange of health information across patient portals and EHRs required organisational and individual factors, as well as technical considerations. Interorganisational collaboration and engagement of key stakeholders to determine standards and guidelines for consent and sharing of information, as well as technical standards and security measures were recommended.
Read full abstract