IHE ITI Technical Framework
The Final Text ITI Technical Framework is published here in HTML format and is no longer published as PDF. Trial Implementation supplements are available from the Volume 1 Table of Contents.

Appendix L: XDS Affinity Domain Definition Checklist

The concept of an XDS Affinity Domain is defined in ITI TF-1:10 and ITI TF-1: Appendix K . ITI TF-1: Appendix L originally provided an informative checklist for the key policies that need to be addressed in order to deploy an EHR-LR document sharing environment for an XDS Affinity Domain. However, it was recognized that this checklist was incomplete as it did not deal with many necessary XDS Affinity Domain deployment issues. In order to address these shortcomings, a new “Template for XDS Affinity Domain Deployment Planning” White Paper has been created: http://ihe.net/Technical_Frameworks/#IT

It takes the form of a template rather than a checklist because it acts more as an outline for all the issues that should be considered, rather than a checklist to be used to verify the correctness of a particular implementation. This new template can be used when defining policies for either an individual XDS Affinity Domain, or multiple XDS Affinity Domains within a particular nation or region.

Here is a summary of the topics defined in the new “Template for XDS Affinity Domain Deployment Planning”:

  • Organizational Rules
  • Structure, Roles, Transparency, Legal Considerations and Enforcement
  • Operational Rules
  • Service Level Agreements, Daily Governance, Configuration Management, Data Retention, Archive, and Backup, and Disaster Recovery
  • Membership Rules
  • Acceptance, Types of Membership, Membership Policies
  • Connectivity to the XDS Affinity Domain from External Systems
  • System Architecture
  • Global Architecture, Affinity Domain Actors, Transaction Support
  • Terminology and Content
  • Refinement of Metadata and Content Attribute Use
  • Patient Privacy and Consent
  • Access and Use, Patient consent, and Override Guidelines
  • Technical Security
  • Authorization, Role Management, User/Role Authentication, Node Authentication, Certificates Management, Information Access Security, Information Integrity, Updates, and Maintenance Policies, Secure Audit Trails, Consistent Time, Audit Checks, and Risk analysis