{"id":3865,"date":"2012-12-05T11:35:02","date_gmt":"2012-12-05T16:35:02","guid":{"rendered":"http:\/\/www.healthit.gov\/buzz-blog\/?p=3865"},"modified":"2026-01-06T05:42:24","modified_gmt":"2026-01-06T05:42:24","slug":"shape-ehr-certification-process-privacy-security","status":"publish","type":"post","link":"https:\/\/healthit.gov\/blog\/privacy-and-security\/shape-ehr-certification-process-privacy-security\/","title":{"rendered":"Help Shape the EHR Certification Process for Privacy &#038; Security"},"content":{"rendered":"\n<p>ONC\u2019s Certification Program includes the certification of two types of electronic health record (EHR) technology: Complete EHR and EHR Module. To meet the EHR adoption requirement to qualify for meaningful use incentive payments, an eligible professional or hospital can use either a Complete EHR, or a set of EHR Modules that collectively meets the definition of Certified EHR Technology (CEHRT).&nbsp; Responsibility for assuring that a set of certified EHR Modules can be successfully and securely integrated together is left up to the adopter. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-certified-ehr-modules\">Certified EHR Modules<\/h2>\n\n\n\n<p>Certified EHR Modules offer adopters the flexibility to select \u201cbest of breed\u201d products.&nbsp; At the same time, a decision to meet the CEHRT definition by combining a set of certified EHR Modules could affect system-wide security and the consistency through which an enterprise security policy is enforced if implementers are not careful and do not fully understand the technical differences among the certified EHR Modules.<\/p>\n\n\n\n<p>Combining a set of certified EHR Modules may introduce several types of security risks:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>A single EHR Module on its own may not provide the security functionality an enterprise needs to comply with HIPAA;<\/li>\n\n\n\n<li>The combination of certified EHR Modules may provide redundant security functionality that cannot be integrated with, and may even conflict with, enterprise security solutions within which all of the certified EHR Modules would operate; and<\/li>\n\n\n\n<li>The collective, system-wide behavior of separately developed certified EHR Modules operating together may result in system behaviors that put enterprise security at risk.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-2011-edition-ehr-certification-process\">2011 Edition EHR Certification Process<\/h2>\n\n\n\n<p>The 2011 Edition EHR certification process requires that EHR Modules meet all security certification criteria unless the presenter can demonstrate that certain security capabilities are either technically infeasible or inapplicable. &nbsp;In too many cases, this approach has led to product developers\u2019 implementing security functions that will never be used in actual operations, or having to generate documentation explaining why the requirements were inapplicable or technically infeasible, but providing no real value beyond the EHR certification process. Also, this approach discourages developers and implementers from taking advantage of external security services, such as those provided by enterprise security solutions (for which certification is generally not required).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-2014-edition-ehr-certification-process\">2014 Edition EHR Certification Process<\/h2>\n\n\n\n<p>In response to these concerns, the 2014 Edition Standards and Certification Criteria final rule eliminated the upfront requirement for EHR Modules to be certified against the privacy and security criteria.&nbsp; Rather, privacy and security criteria were made part of the \u201cBase EHR definition\u201d that all CEHRT must meet.&nbsp; In other words, if an eligible professional or hospital elects to use a set of certified EHR Modules as its CEHRT, one or more modules in the set must meet the security criteria, and it is left up to the eligible professional or hospital to make sure the modules can interoperate securely and\/or work within their overall organizational\/enterprise approach to security. So an EHR Module may or may not implement privacy and security capabilities in order to be issued a certification, and from a different perspective an EHR Module that meets the Base EHR definition may or may not make its security services available to other modules (because such \u201copenness\u201d is not currently required as part of certification).<\/p>\n\n\n\n<p>This potential leaves open the possibility that a certified EHR Module could interact in unexpected ways with the protection provided by another EHR technology certified to provide privacy and security services \u2013 or that privacy and security services assumed to be available from EHR technology certified to meet the Base EHR definition may not be accessible to other modules.&nbsp;&nbsp;&nbsp;<strong><span style=\"text-decoration: underline;\"><br><\/span><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-onc-s-approach-to-the-next-edition-of-ehr-certification\">ONC\u2019s Approach to the Next Edition of EHR Certification<\/h2>\n\n\n\n<p>To help figure out the path forward, ONC tasked the <a href=\"https:\/\/healthit.gov\/\/policy-researchers-implementers\/privacy-security-standards-workgroup\">Privacy and Security Workgroup<\/a> of the <a href=\"https:\/\/healthit.gov\/\/policy-researchers-implementers\/health-it-standards-committee\">HIT Standards Committee (HITSC)<\/a> with addressing the following questions, and providing recommendations, targeted for the 2016 Edition of EHR certification.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Should ONC\u2019s approach stay the same for the next Edition of EHR certification?<\/li>\n\n\n\n<li>Are there small changes that could be made that could also have a big impact?<\/li>\n\n\n\n<li>For the 2016 Edition, might it be possible to require that each EHR Module be certified against some <span style=\"text-decoration: underline;\">minimal set <\/span>of privacy and security criteria, without imposing unreasonable regulatory burden?<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-hitsc-s-preliminary-recommendation\">HITSC\u2019s Preliminary Recommendation<\/h2>\n\n\n\n<p>At the November HITSC meeting, the Workgroup presented its <a href=\"https:\/\/healthit.gov\/2012nov13pswg.pdf\">preliminary recommendation [PDF &#8211; 711 KB]<\/a>:&nbsp; that each EHR Module presented for certification be required to meet each of the security criteria, except Amendments and the optional criterion for Accounting of Disclosures, using one of four paths:<\/p>\n\n\n\n<p>1)&nbsp;&nbsp;&nbsp;&nbsp; Implement the functionality;<\/p>\n\n\n\n<p>2)&nbsp;&nbsp;&nbsp;&nbsp; Implement a standards-based interface to external security services to meet the functionality;<\/p>\n\n\n\n<p>3)&nbsp;&nbsp;&nbsp;&nbsp; Implement a non-standards-based service interface to other certified EHR technology;<\/p>\n\n\n\n<p>4)&nbsp;&nbsp;&nbsp;&nbsp; Document why the criterion is inapplicable or technically infeasible.<\/p>\n\n\n\n<p>The HITSC discussed the four paths and suggested that the distinction between \u201cstandards-based\u201d and \u201cnon-standards-based\u201d be dropped, and replaced with a requirement for system documentation describing the interface in sufficient detail to enable integration.&nbsp; The HITSC also recommended the paths be applied to all privacy and security criteria (no exceptions), since any non-applicable criteria could be addressed using path #4.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-provide-feedback-on-the-hitsc-recommendation\"><strong>Provide Feedback on the HITSC Recommendation<\/strong><\/h2>\n\n\n\n<p>We are soliciting your feedback on the following recommendation.&nbsp; For 2016 Edition EHR certification, each EHR Module presented for certification should be required to meet each privacy and security criterion using one of the following three paths:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Demonstrate, through system documentation and certification testing, that the EHR Module <span style=\"text-decoration: underline;\">includes functionality that fully conforms to<\/span> the privacy and security certification criterion.<\/li>\n\n\n\n<li>Demonstrate, through system documentation sufficiently detailed to enable integration, that the EHR Module has implemented <span style=\"text-decoration: underline;\">service interfaces <\/span>that enable it to access external services necessary to conform to the privacy and security certification criterion.<\/li>\n\n\n\n<li>Demonstrate through documentation that the privacy and security certification criterion is <span style=\"text-decoration: underline;\">inapplicable or would be technically infeasible <\/span>for the EHR Module to meet.<\/li>\n<\/ol>\n\n\n\n<p><strong><em>Please provide your comments using the Comment function below<\/em><\/strong>.&nbsp; <strong><em>Thank you.<\/em><\/strong><\/p>\n\n\n\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ONC\u2019s Certification Program includes the certification of two types of electronic health record (EHR) technology: [&hellip;]<\/p>\n","protected":false},"author":619,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_selected_menu":"","_show_breadcrumbs":"true","_blog_show_featured_image":false,"footnotes":""},"categories":[45],"archived-category":[],"featured":[],"topics":[429,438,425,435],"class_list":["post-3865","post","type-post","status-publish","format-standard","hentry","category-privacy-and-security","topics-certification-program-rules","topics-hipaa-compliance","topics-hit-policy","topics-security-privacy"],"acf":{"blog_authors":[{"blog_author_profiles":"198507"}],"hp_news_hide":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.3 (Yoast SEO v24.8.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Help Shape the EHR Certification Process for Privacy and Security<\/title>\n<meta name=\"description\" content=\"Should ONC change its approach to EHR certification? Learn how to submit your feedback on privacy &amp; security criteria for the next stage of EHR certification.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/healthit.gov\/blog\/privacy-and-security\/shape-ehr-certification-process-privacy-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Help Shape the EHR Certification Process for Privacy &amp; Security\" \/>\n<meta property=\"og:description\" content=\"Should ONC change its approach to EHR certification? Learn how to submit your feedback on privacy &amp; security criteria for the next stage of EHR certification.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/healthit.gov\/blog\/privacy-and-security\/shape-ehr-certification-process-privacy-security\/\" \/>\n<meta property=\"og:site_name\" content=\"ONC Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-12-05T16:35:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-06T05:42:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/healthit.gov\/blog\/wp-content\/uploads\/sites\/4\/2025\/08\/ONC.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"sleigh\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"sleigh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/healthit.gov\/blog\/privacy-and-security\/shape-ehr-certification-process-privacy-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/healthit.gov\/blog\/privacy-and-security\/shape-ehr-certification-process-privacy-security\/\"},\"author\":{\"name\":\"sleigh\",\"@id\":\"https:\/\/healthit.gov\/blog\/#\/schema\/person\/0719592fcc77f0e269f191216da0aae7\"},\"headline\":\"Help Shape the EHR Certification Process for Privacy &#038; Security\",\"datePublished\":\"2012-12-05T16:35:02+00:00\",\"dateModified\":\"2026-01-06T05:42:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/healthit.gov\/blog\/privacy-and-security\/shape-ehr-certification-process-privacy-security\/\"},\"wordCount\":997,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/healthit.gov\/blog\/#organization\"},\"articleSection\":[\"Privacy &amp; Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/healthit.gov\/blog\/privacy-and-security\/shape-ehr-certification-process-privacy-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/healthit.gov\/blog\/privacy-and-security\/shape-ehr-certification-process-privacy-security\/\",\"url\":\"https:\/\/healthit.gov\/blog\/privacy-and-security\/shape-ehr-certification-process-privacy-security\/\",\"name\":\"Help Shape the EHR Certification Process for Privacy and Security\",\"isPartOf\":{\"@id\":\"https:\/\/healthit.gov\/blog\/#website\"},\"datePublished\":\"2012-12-05T16:35:02+00:00\",\"dateModified\":\"2026-01-06T05:42:24+00:00\",\"description\":\"Should ONC change its approach to EHR certification? Learn how to submit your feedback on privacy & security criteria for the next stage of EHR certification.\",\"breadcrumb\":{\"@id\":\"https:\/\/healthit.gov\/blog\/privacy-and-security\/shape-ehr-certification-process-privacy-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/healthit.gov\/blog\/privacy-and-security\/shape-ehr-certification-process-privacy-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/healthit.gov\/blog\/privacy-and-security\/shape-ehr-certification-process-privacy-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/healthit.gov\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Help Shape the EHR Certification Process for Privacy &#038; Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/healthit.gov\/blog\/#website\",\"url\":\"https:\/\/healthit.gov\/blog\/\",\"name\":\"ONC - Office of the National Coordinator for Health IT\",\"description\":\"Better health enabled by data\",\"publisher\":{\"@id\":\"https:\/\/healthit.gov\/blog\/#organization\"},\"alternateName\":\"ONC\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/healthit.gov\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/healthit.gov\/blog\/#organization\",\"name\":\"ONC - Office of the National Coordinator for Health IT\",\"alternateName\":\"ONC\",\"url\":\"https:\/\/healthit.gov\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/healthit.gov\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/healthit.gov\/blog\/wp-content\/uploads\/sites\/4\/2025\/08\/Logo-ONC-Transparent.png\",\"contentUrl\":\"https:\/\/healthit.gov\/blog\/wp-content\/uploads\/sites\/4\/2025\/08\/Logo-ONC-Transparent.png\",\"width\":800,\"height\":176,\"caption\":\"ONC - Office of the National Coordinator for Health IT\"},\"image\":{\"@id\":\"https:\/\/healthit.gov\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/healthit.gov\/blog\/#\/schema\/person\/0719592fcc77f0e269f191216da0aae7\",\"name\":\"sleigh\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/healthit.gov\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/afb1f0138c0c71ff7a91448bb10269ef95df9b5a5cceb7a5aabd43dd26e1a978?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/afb1f0138c0c71ff7a91448bb10269ef95df9b5a5cceb7a5aabd43dd26e1a978?s=96&d=mm&r=g\",\"caption\":\"sleigh\"},\"url\":\"https:\/\/healthit.gov\/blog\/author\/sleigh\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Help Shape the EHR Certification Process for Privacy and Security","description":"Should ONC change its approach to EHR certification? Learn how to submit your feedback on privacy & security criteria for the next stage of EHR certification.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/healthit.gov\/blog\/privacy-and-security\/shape-ehr-certification-process-privacy-security\/","og_locale":"en_US","og_type":"article","og_title":"Help Shape the EHR Certification Process for Privacy & Security","og_description":"Should ONC change its approach to EHR certification? Learn how to submit your feedback on privacy & security criteria for the next stage of EHR certification.","og_url":"https:\/\/healthit.gov\/blog\/privacy-and-security\/shape-ehr-certification-process-privacy-security\/","og_site_name":"ONC Blog","article_published_time":"2012-12-05T16:35:02+00:00","article_modified_time":"2026-01-06T05:42:24+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/healthit.gov\/blog\/wp-content\/uploads\/sites\/4\/2025\/08\/ONC.jpg","type":"image\/jpeg"}],"author":"sleigh","twitter_card":"summary_large_image","twitter_misc":{"Written by":"sleigh","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/healthit.gov\/blog\/privacy-and-security\/shape-ehr-certification-process-privacy-security\/#article","isPartOf":{"@id":"https:\/\/healthit.gov\/blog\/privacy-and-security\/shape-ehr-certification-process-privacy-security\/"},"author":{"name":"sleigh","@id":"https:\/\/healthit.gov\/blog\/#\/schema\/person\/0719592fcc77f0e269f191216da0aae7"},"headline":"Help Shape the EHR Certification Process for Privacy &#038; Security","datePublished":"2012-12-05T16:35:02+00:00","dateModified":"2026-01-06T05:42:24+00:00","mainEntityOfPage":{"@id":"https:\/\/healthit.gov\/blog\/privacy-and-security\/shape-ehr-certification-process-privacy-security\/"},"wordCount":997,"commentCount":0,"publisher":{"@id":"https:\/\/healthit.gov\/blog\/#organization"},"articleSection":["Privacy &amp; Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/healthit.gov\/blog\/privacy-and-security\/shape-ehr-certification-process-privacy-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/healthit.gov\/blog\/privacy-and-security\/shape-ehr-certification-process-privacy-security\/","url":"https:\/\/healthit.gov\/blog\/privacy-and-security\/shape-ehr-certification-process-privacy-security\/","name":"Help Shape the EHR Certification Process for Privacy and Security","isPartOf":{"@id":"https:\/\/healthit.gov\/blog\/#website"},"datePublished":"2012-12-05T16:35:02+00:00","dateModified":"2026-01-06T05:42:24+00:00","description":"Should ONC change its approach to EHR certification? Learn how to submit your feedback on privacy & security criteria for the next stage of EHR certification.","breadcrumb":{"@id":"https:\/\/healthit.gov\/blog\/privacy-and-security\/shape-ehr-certification-process-privacy-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/healthit.gov\/blog\/privacy-and-security\/shape-ehr-certification-process-privacy-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/healthit.gov\/blog\/privacy-and-security\/shape-ehr-certification-process-privacy-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/healthit.gov\/blog\/"},{"@type":"ListItem","position":2,"name":"Help Shape the EHR Certification Process for Privacy &#038; Security"}]},{"@type":"WebSite","@id":"https:\/\/healthit.gov\/blog\/#website","url":"https:\/\/healthit.gov\/blog\/","name":"ONC - Office of the National Coordinator for Health IT","description":"Better health enabled by data","publisher":{"@id":"https:\/\/healthit.gov\/blog\/#organization"},"alternateName":"ONC","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/healthit.gov\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/healthit.gov\/blog\/#organization","name":"ONC - Office of the National Coordinator for Health IT","alternateName":"ONC","url":"https:\/\/healthit.gov\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/healthit.gov\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/healthit.gov\/blog\/wp-content\/uploads\/sites\/4\/2025\/08\/Logo-ONC-Transparent.png","contentUrl":"https:\/\/healthit.gov\/blog\/wp-content\/uploads\/sites\/4\/2025\/08\/Logo-ONC-Transparent.png","width":800,"height":176,"caption":"ONC - Office of the National Coordinator for Health IT"},"image":{"@id":"https:\/\/healthit.gov\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/healthit.gov\/blog\/#\/schema\/person\/0719592fcc77f0e269f191216da0aae7","name":"sleigh","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/healthit.gov\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/afb1f0138c0c71ff7a91448bb10269ef95df9b5a5cceb7a5aabd43dd26e1a978?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/afb1f0138c0c71ff7a91448bb10269ef95df9b5a5cceb7a5aabd43dd26e1a978?s=96&d=mm&r=g","caption":"sleigh"},"url":"https:\/\/healthit.gov\/blog\/author\/sleigh\/"}]}},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/healthit.gov\/blog\/privacy-and-security\/shape-ehr-certification-process-privacy-security\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Help Shape the EHR Certification Process for Privacy &#038; Security","url":"http:\/\/healthit.gov\/blog\/privacy-and-security\/shape-ehr-certification-process-privacy-security\/","mainEntityOfPage":{"@type":"WebPage","@id":"http:\/\/healthit.gov\/blog\/privacy-and-security\/shape-ehr-certification-process-privacy-security\/"},"thumbnailUrl":"","image":{"@type":"ImageObject","url":""},"articleSection":"Privacy &amp; Security","author":[{"@type":"Person","name":"sleigh"}],"creator":["sleigh"],"publisher":{"@type":"Organization","name":"ONC Blog","logo":""},"keywords":[],"dateCreated":"2012-12-05T16:35:02Z","datePublished":"2012-12-05T16:35:02Z","dateModified":"2026-01-06T05:42:24Z"},"rendered":"<script type=\"application\/ld+json\" class=\"wp-parsely-metadata\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"NewsArticle\",\"headline\":\"Help Shape the EHR Certification Process for Privacy &#038; Security\",\"url\":\"http:\\\/\\\/healthit.gov\\\/blog\\\/privacy-and-security\\\/shape-ehr-certification-process-privacy-security\\\/\",\"mainEntityOfPage\":{\"@type\":\"WebPage\",\"@id\":\"http:\\\/\\\/healthit.gov\\\/blog\\\/privacy-and-security\\\/shape-ehr-certification-process-privacy-security\\\/\"},\"thumbnailUrl\":\"\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"\"},\"articleSection\":\"Privacy &amp; Security\",\"author\":[{\"@type\":\"Person\",\"name\":\"sleigh\"}],\"creator\":[\"sleigh\"],\"publisher\":{\"@type\":\"Organization\",\"name\":\"ONC Blog\",\"logo\":\"\"},\"keywords\":[],\"dateCreated\":\"2012-12-05T16:35:02Z\",\"datePublished\":\"2012-12-05T16:35:02Z\",\"dateModified\":\"2026-01-06T05:42:24Z\"}<\/script>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/healthit.gov\/p.js"},"_links":{"self":[{"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/posts\/3865","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/users\/619"}],"replies":[{"embeddable":true,"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/comments?post=3865"}],"version-history":[{"count":14,"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/posts\/3865\/revisions"}],"predecessor-version":[{"id":178828,"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/posts\/3865\/revisions\/178828"}],"wp:attachment":[{"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/media?parent=3865"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/categories?post=3865"},{"taxonomy":"archived-category","embeddable":true,"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/archived-category?post=3865"},{"taxonomy":"featured","embeddable":true,"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/featured?post=3865"},{"taxonomy":"topics","embeddable":true,"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/topics?post=3865"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}