SlideShare a Scribd company logo
1 of 36
Download to read offline
How To Organize Patient Information
To Protect Data Privacy
Identity And Access Management In Healthcare. Seminar
24.01.2013 Zurich EPI-Park
Bangalore Campus
Dr. rer. nat. Hellmuth Broda
Principal Technology Architect
Retail, Consumer Goods, Life Sciences
Infosys Limited
2
Agenda
●
About Infosys
●
Privacy—An
Obsolete Model?
●
Challenges with
Identities
●
An Architecture for
Trust
●
How to Organize
Information
Pune Campus
3
Over 150,000 employees from 89 nationalities
Operations in 77 cities across 32 countries
4
WE FUELLED
OUR GROWTH
4
2000 2012 2000 2012
5389
153,761+
200 M
1500 EMPLOYEES $50 MILLION REVENUE
4 out of top 5
Global Aerospace & Defense
4 out of top 5
US Banks
6 out of top 10
Global Telecommunication
Giants
3 out of top 5
Health Plans
8 out of top 10
US Retailers
7.12 Billion
5
POWERFUL FORCES ARE DRIVING
OPPORTUNITIES
Emerging Economies
Smarter Organizations
Digital Consumers New Commerce
Pervasive Computing
Sustainable TomorrowHealthcare Economy
66
WE PARTNER WITH CLIENTS TO
BUILD
TOMORROW’S
ENTERPRISE
ACCELERATE
INNOVATION
BUSINESS
TRANSFORMATIO
N
OPTIMIZE
OPERATIONS
77
INNOVATIVE COMPANIES
THE WORLD’S MOST
2012
8
8TIME WINNER OF
THE GLOBAL MOST ADMIRED
KNOWLEDGE ENTERPRISES
AWARD
2004 2005 2006 2007 2008 2009 2010 2011
8
9
IT HAS COST US THE EQUIVALENT
OF A SPACE SHUTTLE LAUNCH TO
BUILD OUR TRAINING CENTER
•
Click icon to add picture
10
•
Click icon to add picture
The World’s Largest Corporate University
•
Click icon to add picture
11
Training 16’000 Students per Year
12
Upcoming Challenges In Security,
Governance, Compliance
Perimeter security cannot serve the collaborative
external ecosystems. It will be augmented
(and eventually replaced) by
application security and
secure tunnels
We will move from secure castles to secured tunnels
13
Multiple Defence Rings Will Become
Standard
Perimeter security
Network security
NW intrusion detection
Node/zone based
security
Laptop encryption
Mobile device security
Application security
Data leakage prevention
Compliance framework
14
Privacy—An Obsolete Model?
●
“You already have zero privacy anyway—
get over it!” (Scott McNealy, CEO Sun
Microsystems,1999)
●
Mobile phones track your location
●
Navigation systems track you and OnStar
even records your preferred gas stations
●
200 CHF quadrocopter drones turn your
neighbour into a spy
●
Google traces your behaviour to offer
“better services”
●
“Bundestrojaner” scans German (only?)
computers
15
Invasion By Authorities But Also Crooks
●
Are our basic privacy rights at stake?
●
Is everything allowed that is technically feasible?
●
Is there no limit?
●
Who will control the
controllers?
●
Are we making it easy
to become prey?
Image at datonel.deviantart.com
16
Fallacy Of Poorly Organized Information
●
We are following a long tradition of
“male chauvinism” by building
information pyramids
●
The first thing we do is look for a
(global) identifier
●
Then we attach all attributes to this
identifier
●
And then we try to sprinkle some
security on top
●
This model does not work and is a
Blanco invitation to data security
breaches
17
How Do We Do It In Real Life?
●
We don’t use global identifiers in real life
●
My passport number is different from my Swiss
ID card number
●
My driver’s licence has a different number
●
My bank account has another number
●
We sometimes even put information into the key
(which is a cardinal sin) – c.f. our
old AHV number in Switzerland
18
But Connecting Identities Became Easy
●
Proven models for federated identity
connect a person’s frequent flyer number
to his car rental loyalty card
●
Following the traces on the web became a
real business for market research firms
●
We are becoming more and more
transparent
●
While on the move to Personalized
Medicine—will my insurer hold a copy of
my DNA and “adjust” my premium
according to the predicted disease
probabilities?
Image by alancleaver_2000 via Flickr
19
What Can We Do About This?
●
Many global organizations have been working on
privacy protection and the organizational
mechanisms to conceal personal identifiable
information (PII): Liberty Alliance, Kantara
Initiative, Internet Society, W3C, . . .
●
Mechanisms for secure identity assertions allow
combination/translation of identifiers to combine
services as well as to keep identifiers and the
corresponding information separate (federated
identity)
20
So—Here Is The Trick
●
Keep separate what does not need
to be in one domain
●
Use masking and pseudonymization wherever
possible
●
Protect the connection table that equates
identities really well (it is a small table—much
easier to protect than an entire system)
●
Selectively enable access to this table on a strict
need basis
21
Confused? Let Me Explain . . .
●
What exactly is privacy anyway?
●
What are Identity Management, Authentication,
Authorization, Policies
●
How can we organize such a system
●
“I still did not get it—can you explain more?”
●
“Glad you asked”
22
What Is So Special About Privacy And
Trust?
●
The biggest concern (after health) of the patient is
privacy
●
Privacy does not mean that “nobody knows nothing about
me” *)
●
It is about managing the faith of the patient by adhering to
the agreed scope and holding the information in trust
●
Consumers and patients are afraid of
“Purpose Creep”
●
What could an architecture for privacy
and trust management look like?
*The Sopranos Purpose Creep
Original
Agreement
23
Architecture for Trust Management
Definitions
A combination of business and
technology practices which define how a
relationship is conducted and services
are performed
A set of rules governing decisions about
what the user can do: access to
information, services or resources
Assertion of validity of a set of credentials.
Credentials express a person´s identity.
“A Yes/No answer”
Policy/Governance
Authorization
Authentication
Identity Basic set of information that creates a
“unique” entity (a name with a
corresponding set of attributes)
24
Architecture for Trust Management
Real World Example: Drivers License
4. The fact that we do have police; the rules that
allow me to drive with my national license in other
countries
3. The policeman will then see which kind of
vehicle you are authorized to drive and if you are
allowed to drive the one you are operating now
2. Assertion of validity: The policeman compares
the document with you. Result: “A Yes/No answer”
Policy/Governance
Authorization
Authentication
Identity 1. Name, address, picture identify the driver and
provide together with the document the credentials
expressing that the carrier is identical to the
person that passed the driving tests
25
Architecture for Trust Management
Digitally Speaking . . .
4. Business practices to manage risk, enforce
security/privacy, provide auditability.
User, customer preferences, history,
personalized services,
3. Determination of access rights to systems,
applications and information: Match credentials
against profiles, ACLs, policy
2. Log on with a UID/PW, token, certificate,
biometrics etc. A process that demands the
prove that the person presenting them is indeed
the person to which credentials were originally
issued. accept or reject
1. User, customer, device “facts”, e.g., name,
address, ID, token, keys; credentials,
certificates that were issued by a Certification
Authority (CA)
Policy/Governance
Authorization
Authentication
Identity
26
How People Will Trust Policies
 Policy and its audit have to be guaranteed and
certified by a approved public or private
independent organization, e. g.:
 Federal or state data protection agency
 TÜV (private institution)
 Audit firm
 Chamber of Commerce
 Postal Service or other basic service provider, . . .
 This can be achieved with defined processes and
responsibilities similar to ISO 9000
Trust is based on policies and the
audit of those -- not just on security
27
Where to Safeguard User's Information
Health & Travel
Insurance
Loyalty
Program
Retail
Bank
Car
Rental
Hotel
Chain
Airline
Travel
Agent
Insurance Records
Travel
History
Meal PreferencesCredit History
Health History
Meal Preferences Car Type Preferences
Single Identity
Operator
Credit History
Health History
Travel History
Insurance Records
Meal Preferences
28
A Federated Structure Promotes
Privacy and Security
●
Federated structure means no single centralized
data storage that would be vulnerable to attack
●
End user has more control of data because
permissions travel with data, guiding its use
No global identifier -- this model
protects against unauthorized
data sharing
29
How it Happens
Identity Provider
Authentication
Federation
Discovery Service
Personal Profile
Service
Provider
e.g. Pharmacy
Identity-Based
Web Service
Provider
e.g.
ePrescriptions.com
Identity Provider
Authentication
Federation
Discovery Service
Personal Profile
Principal
e.g. Patient
Circle of Trust
Circle of Trust – organizations and individuals
(example healthcare)
●
Business relationships
based on Liberty
architecture & operational
agreements
●
Enables patients,
physicians and healthcare
organizations to safely
share information in a
secure and apparently
seamless environment
Without violating privacy
Service
Provider
e.g.
Physician
Service
Provider
e.g. Hospital
Principal
e.g. Physician
Principal
e.g. Physician
Principal
e.g. Physician
30
The Example: Information Management
In The Practitioner’s Office
●
Today your GP (house
doctor) keeps a folder for
each patient with
administrative and medical
information in one place
●
Due to the sensitivity of
patient data this cabinet
should always be locked
●
But every secretary, nurse
(and visitor?) has (to have)
access
31
Enters The Smart Doctor
●
He keeps patient’s information
in two separate file cabinets
●
Cabinet One holds the administrative data of
patients (name, birth date, address, phone,
insurance information etc.)
●
Cabinet Two holds the folders with cases, a
knee operation, a liver exam, a x-ray, blood
exam results . . .
●
But the identifiers do not point to each other,
but to entries in a little black book, which the
doctor keeps in a safe place.
●
Only with this booklet the connection
between individuals and cases can be made
image at: uniforms-4all.com
32
Advantage Of This Data Masking
●
Cabinet One holds only administrative
information (phone book) and can be
left open
●
Cabinet Two holds only cases and can
be used e.g. for Public Health research
and can be left open
●
Pointers are only resolved in the
“Little Black Book” which is secured 23F147: H23K
F23XL
M4DB9
33
What About the Electronic Patient
Records?
●
Patient owns his medical
record in the cloud
●
Records should be
compartmentalised (“cases”)
●
No patient information (PII)
is needed in the records
●
Patient holds the “little black book” locked
●
Override for emergency services (with audit trail)
can be established
●
Electronic records open for public health studies
34
What Can We Learn From This Example?
●
By building information systems without global
identifiers we can compartmentalize information
so that information security and privacy become
an integral property of such architecture
●
Such systems can be secured and compliance to
data privacy laws can much easier be followed
●
The client/patient/consumer will acknowledge this
and build trust into such systems
quickbase.intuit.com
35
Bangalore Campus
36
THANK YOU
Hellmuth_Broda@infosys.com
www.infosys.com
The contents of this document are proprietary and
confidential to Infosys Limited and may not be
disclosed in whole or in part at any time, to any third
party without the prior written consent of Infosys
Limited.
© 2013 Infosys Limited. All rights reserved. Copyright
in the whole and any part of this document belongs to
Infosys Limited. This work may not be used, sold,
transferred, adapted, abridged, copied or reproduced
in whole or in part, in any manner or form, or in any
media, without the prior written consent of Infosys
Limited.

More Related Content

What's hot

Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Ulf Mattsson
 
Data foundation for analytics excellence
Data foundation for analytics excellenceData foundation for analytics excellence
Data foundation for analytics excellenceMudit Mangal
 
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...Booz Allen Hamilton
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideDLT Solutions
 
Security issues in big data
Security issues in big data Security issues in big data
Security issues in big data Shallote Dsouza
 
Privacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishPrivacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishRSIS International
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinSridhar Karnam
 
Delivering on the Promise of Big Data and the Cloud
Delivering on the Promise of Big Data and the CloudDelivering on the Promise of Big Data and the Cloud
Delivering on the Promise of Big Data and the CloudBooz Allen Hamilton
 
CB insights: How Blockchain Technology Could Disrupt Healthcare
CB insights: How Blockchain Technology Could Disrupt HealthcareCB insights: How Blockchain Technology Could Disrupt Healthcare
CB insights: How Blockchain Technology Could Disrupt HealthcareLevi Shapiro
 
Risks, Harms and Benefits Assessment Tool (Updated as of Jan 2019)
Risks, Harms and Benefits Assessment Tool (Updated as of Jan 2019)Risks, Harms and Benefits Assessment Tool (Updated as of Jan 2019)
Risks, Harms and Benefits Assessment Tool (Updated as of Jan 2019)UN Global Pulse
 
Digital cultural heritage spring 2015 day 2
Digital cultural heritage spring 2015 day 2Digital cultural heritage spring 2015 day 2
Digital cultural heritage spring 2015 day 2Stefano A Gazziano
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data AnalyticsEMC
 
The past, present, and future of big data security
The past, present, and future of big data securityThe past, present, and future of big data security
The past, present, and future of big data securityUlf Mattsson
 
Symantec Data Insight 3.0
Symantec Data Insight 3.0Symantec Data Insight 3.0
Symantec Data Insight 3.0Symantec
 

What's hot (20)

Resilience in the Cyber Era
Resilience in the Cyber EraResilience in the Cyber Era
Resilience in the Cyber Era
 
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...
 
Data foundation for analytics excellence
Data foundation for analytics excellenceData foundation for analytics excellence
Data foundation for analytics excellence
 
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the Outside
 
Big Data Ethics
Big Data EthicsBig Data Ethics
Big Data Ethics
 
Security issues in big data
Security issues in big data Security issues in big data
Security issues in big data
 
Privacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishPrivacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or Perish
 
Big Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy FranklinBig Data Security Analytics (BDSA) with Randy Franklin
Big Data Security Analytics (BDSA) with Randy Franklin
 
Delivering on the Promise of Big Data and the Cloud
Delivering on the Promise of Big Data and the CloudDelivering on the Promise of Big Data and the Cloud
Delivering on the Promise of Big Data and the Cloud
 
CB insights: How Blockchain Technology Could Disrupt Healthcare
CB insights: How Blockchain Technology Could Disrupt HealthcareCB insights: How Blockchain Technology Could Disrupt Healthcare
CB insights: How Blockchain Technology Could Disrupt Healthcare
 
Risks, Harms and Benefits Assessment Tool (Updated as of Jan 2019)
Risks, Harms and Benefits Assessment Tool (Updated as of Jan 2019)Risks, Harms and Benefits Assessment Tool (Updated as of Jan 2019)
Risks, Harms and Benefits Assessment Tool (Updated as of Jan 2019)
 
Mobilization +
Mobilization +Mobilization +
Mobilization +
 
Security bigdata
Security bigdataSecurity bigdata
Security bigdata
 
Digital cultural heritage spring 2015 day 2
Digital cultural heritage spring 2015 day 2Digital cultural heritage spring 2015 day 2
Digital cultural heritage spring 2015 day 2
 
How does big data impact you
How does big data impact youHow does big data impact you
How does big data impact you
 
Big Data Analytics
Big Data AnalyticsBig Data Analytics
Big Data Analytics
 
The past, present, and future of big data security
The past, present, and future of big data securityThe past, present, and future of big data security
The past, present, and future of big data security
 
Spo2 t17
Spo2 t17Spo2 t17
Spo2 t17
 
Symantec Data Insight 3.0
Symantec Data Insight 3.0Symantec Data Insight 3.0
Symantec Data Insight 3.0
 

Viewers also liked

Soziale Medien im Unternehmen--ein rechtsfreier Raum?
Soziale Medien im Unternehmen--ein rechtsfreier Raum?Soziale Medien im Unternehmen--ein rechtsfreier Raum?
Soziale Medien im Unternehmen--ein rechtsfreier Raum?Hellmuth Broda
 
Thesen Podiumsdiskussion Social Media
Thesen Podiumsdiskussion Social MediaThesen Podiumsdiskussion Social Media
Thesen Podiumsdiskussion Social MediaHellmuth Broda
 
Social Media im Unternehmen werdengrundlegende Änderungen in der Geschäftswel...
Social Media im Unternehmen werdengrundlegende Änderungen in der Geschäftswel...Social Media im Unternehmen werdengrundlegende Änderungen in der Geschäftswel...
Social Media im Unternehmen werdengrundlegende Änderungen in der Geschäftswel...Hellmuth Broda
 
Open Systems, Innovation and Competitiveness
Open Systems, Innovation and CompetitivenessOpen Systems, Innovation and Competitiveness
Open Systems, Innovation and CompetitivenessHellmuth Broda
 
Social Media im Unternehmen
Social Media im UnternehmenSocial Media im Unternehmen
Social Media im UnternehmenHellmuth Broda
 
Big Data and its Impact on Industry (Example of the Pharmaceutical Industry)
Big Data and its Impact on Industry (Example of the Pharmaceutical Industry)Big Data and its Impact on Industry (Example of the Pharmaceutical Industry)
Big Data and its Impact on Industry (Example of the Pharmaceutical Industry)Hellmuth Broda
 
Presentation from the Patient Information Forum and The Information Standard ...
Presentation from the Patient Information Forum and The Information Standard ...Presentation from the Patient Information Forum and The Information Standard ...
Presentation from the Patient Information Forum and The Information Standard ...Alex Talbott
 
Universal Unique Patient Information Identifier UUPII
Universal Unique Patient Information Identifier UUPIIUniversal Unique Patient Information Identifier UUPII
Universal Unique Patient Information Identifier UUPIIFrank Avignone
 
EANM patient information on thyroid cancer
EANM patient information on thyroid cancerEANM patient information on thyroid cancer
EANM patient information on thyroid cancerMarika Porrey
 
Fanestra medical billing system
Fanestra medical billing systemFanestra medical billing system
Fanestra medical billing systemDevashish Pradhan
 
Netflix Billing System
Netflix Billing SystemNetflix Billing System
Netflix Billing SystemNirmalSrini
 
Purpose of project web based billing system
Purpose of project web based billing systemPurpose of project web based billing system
Purpose of project web based billing systemanandapadmanaban
 
Client billing System for ISP
Client billing System for ISPClient billing System for ISP
Client billing System for ISPsumi haque
 
School billing system software
School billing system softwareSchool billing system software
School billing system softwareaki_shu
 
school billing system report
school billing system reportschool billing system report
school billing system reportaki_shu
 
Navix billing system
Navix billing systemNavix billing system
Navix billing systemRade Strizak
 
Electricity billing-system-project-on-jsp
Electricity billing-system-project-on-jspElectricity billing-system-project-on-jsp
Electricity billing-system-project-on-jspFreeprojectz
 
Computer shop billing system
Computer shop billing systemComputer shop billing system
Computer shop billing systemMayur Solanki
 
Customer Billing System of Dalagita Hair and Body Salon
Customer Billing System of Dalagita Hair and Body SalonCustomer Billing System of Dalagita Hair and Body Salon
Customer Billing System of Dalagita Hair and Body SalonChristel Jane Del Prado
 

Viewers also liked (20)

Soziale Medien im Unternehmen--ein rechtsfreier Raum?
Soziale Medien im Unternehmen--ein rechtsfreier Raum?Soziale Medien im Unternehmen--ein rechtsfreier Raum?
Soziale Medien im Unternehmen--ein rechtsfreier Raum?
 
Thesen Podiumsdiskussion Social Media
Thesen Podiumsdiskussion Social MediaThesen Podiumsdiskussion Social Media
Thesen Podiumsdiskussion Social Media
 
Social Media im Unternehmen werdengrundlegende Änderungen in der Geschäftswel...
Social Media im Unternehmen werdengrundlegende Änderungen in der Geschäftswel...Social Media im Unternehmen werdengrundlegende Änderungen in der Geschäftswel...
Social Media im Unternehmen werdengrundlegende Änderungen in der Geschäftswel...
 
Open Systems, Innovation and Competitiveness
Open Systems, Innovation and CompetitivenessOpen Systems, Innovation and Competitiveness
Open Systems, Innovation and Competitiveness
 
Social Media im Unternehmen
Social Media im UnternehmenSocial Media im Unternehmen
Social Media im Unternehmen
 
Big Data and its Impact on Industry (Example of the Pharmaceutical Industry)
Big Data and its Impact on Industry (Example of the Pharmaceutical Industry)Big Data and its Impact on Industry (Example of the Pharmaceutical Industry)
Big Data and its Impact on Industry (Example of the Pharmaceutical Industry)
 
Presentation from the Patient Information Forum and The Information Standard ...
Presentation from the Patient Information Forum and The Information Standard ...Presentation from the Patient Information Forum and The Information Standard ...
Presentation from the Patient Information Forum and The Information Standard ...
 
Universal Unique Patient Information Identifier UUPII
Universal Unique Patient Information Identifier UUPIIUniversal Unique Patient Information Identifier UUPII
Universal Unique Patient Information Identifier UUPII
 
EANM patient information on thyroid cancer
EANM patient information on thyroid cancerEANM patient information on thyroid cancer
EANM patient information on thyroid cancer
 
eFACiLiTY Tenant Billing System
eFACiLiTY Tenant Billing SystemeFACiLiTY Tenant Billing System
eFACiLiTY Tenant Billing System
 
Fanestra medical billing system
Fanestra medical billing systemFanestra medical billing system
Fanestra medical billing system
 
Netflix Billing System
Netflix Billing SystemNetflix Billing System
Netflix Billing System
 
Purpose of project web based billing system
Purpose of project web based billing systemPurpose of project web based billing system
Purpose of project web based billing system
 
Client billing System for ISP
Client billing System for ISPClient billing System for ISP
Client billing System for ISP
 
School billing system software
School billing system softwareSchool billing system software
School billing system software
 
school billing system report
school billing system reportschool billing system report
school billing system report
 
Navix billing system
Navix billing systemNavix billing system
Navix billing system
 
Electricity billing-system-project-on-jsp
Electricity billing-system-project-on-jspElectricity billing-system-project-on-jsp
Electricity billing-system-project-on-jsp
 
Computer shop billing system
Computer shop billing systemComputer shop billing system
Computer shop billing system
 
Customer Billing System of Dalagita Hair and Body Salon
Customer Billing System of Dalagita Hair and Body SalonCustomer Billing System of Dalagita Hair and Body Salon
Customer Billing System of Dalagita Hair and Body Salon
 

Similar to How to Organize Patient Information to Protect Patients' Data

HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield
HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShieldHXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield
HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShieldHxRefactored
 
Attacking Decentralized Identity.pdf
Attacking Decentralized Identity.pdfAttacking Decentralized Identity.pdf
Attacking Decentralized Identity.pdfssuser264cc11
 
How To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity CrisisHow To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity Crisiswieringa
 
Shaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital IdentityShaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital IdentityNoreen Whysel
 
Module 2 - Information Assurance Concepts.pptx
Module 2 - Information Assurance Concepts.pptxModule 2 - Information Assurance Concepts.pptx
Module 2 - Information Assurance Concepts.pptxHumphrey Humphrey
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
 
WebShield eP3 Network Overview (02-04-2017)
WebShield eP3 Network Overview (02-04-2017)WebShield eP3 Network Overview (02-04-2017)
WebShield eP3 Network Overview (02-04-2017)rich_webshield
 
Blockchain in Identity Management - An Overview.pdf
Blockchain in Identity Management - An Overview.pdfBlockchain in Identity Management - An Overview.pdf
Blockchain in Identity Management - An Overview.pdfJamieDornan2
 
2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?Raffa Learning Community
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJSherry Jones
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJSherry Jones
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsAT Internet
 
The Cloud Security Rules
The Cloud Security RulesThe Cloud Security Rules
The Cloud Security RulesKai Roer
 
What regulation for Artificial Intelligence?
What regulation for Artificial Intelligence?What regulation for Artificial Intelligence?
What regulation for Artificial Intelligence?Nozha Boujemaa
 
GRC 2020 - IIA - ISACA Machine Learning Monitoring, Compliance and Governance
GRC 2020 - IIA - ISACA Machine Learning Monitoring, Compliance and GovernanceGRC 2020 - IIA - ISACA Machine Learning Monitoring, Compliance and Governance
GRC 2020 - IIA - ISACA Machine Learning Monitoring, Compliance and GovernanceAndrew Clark
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guideAdilsonSuende
 
An Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsAn Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsUbisecure
 

Similar to How to Organize Patient Information to Protect Patients' Data (20)

HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield
HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShieldHXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield
HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield
 
Attacking Decentralized Identity.pdf
Attacking Decentralized Identity.pdfAttacking Decentralized Identity.pdf
Attacking Decentralized Identity.pdf
 
How To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity CrisisHow To Prevent The World Wild Web Identity Crisis
How To Prevent The World Wild Web Identity Crisis
 
Shaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital IdentityShaping the Future of Trusted Digital Identity
Shaping the Future of Trusted Digital Identity
 
Module 2 - Information Assurance Concepts.pptx
Module 2 - Information Assurance Concepts.pptxModule 2 - Information Assurance Concepts.pptx
Module 2 - Information Assurance Concepts.pptx
 
Trust and inclusion
Trust and inclusionTrust and inclusion
Trust and inclusion
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
WebShield eP3 Network Overview (02-04-2017)
WebShield eP3 Network Overview (02-04-2017)WebShield eP3 Network Overview (02-04-2017)
WebShield eP3 Network Overview (02-04-2017)
 
Blockchain in Identity Management - An Overview.pdf
Blockchain in Identity Management - An Overview.pdfBlockchain in Identity Management - An Overview.pdf
Blockchain in Identity Management - An Overview.pdf
 
2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?2015 09-22 Is it time for a Security and Compliance Assessment?
2015 09-22 Is it time for a Security and Compliance Assessment?
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJCyber Security, User Interface, and You - Deloitte CIO - WSJ
Cyber Security, User Interface, and You - Deloitte CIO - WSJ
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
The Cloud Security Rules
The Cloud Security RulesThe Cloud Security Rules
The Cloud Security Rules
 
What regulation for Artificial Intelligence?
What regulation for Artificial Intelligence?What regulation for Artificial Intelligence?
What regulation for Artificial Intelligence?
 
GRC 2020 - IIA - ISACA Machine Learning Monitoring, Compliance and Governance
GRC 2020 - IIA - ISACA Machine Learning Monitoring, Compliance and GovernanceGRC 2020 - IIA - ISACA Machine Learning Monitoring, Compliance and Governance
GRC 2020 - IIA - ISACA Machine Learning Monitoring, Compliance and Governance
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
Intro To Secure Identity Management
Intro To Secure Identity ManagementIntro To Secure Identity Management
Intro To Secure Identity Management
 
An Introduction to Authentication for Applications
An Introduction to Authentication for ApplicationsAn Introduction to Authentication for Applications
An Introduction to Authentication for Applications
 
Ss
SsSs
Ss
 

Recently uploaded

Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsGOKUL JS
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...ssuserf63bd7
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamArik Fletcher
 
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...Associazione Digital Days
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfJamesConcepcion7
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdfMintel Group
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreNZSG
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterJamesConcepcion7
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxRakhi Bazaar
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdfChris Skinner
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersPeter Horsten
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesDoe Paoro
 

Recently uploaded (20)

Supercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebsSupercharge Your eCommerce Stores-acowebs
Supercharge Your eCommerce Stores-acowebs
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management Team
 
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdf
 
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdftrending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
trending-flavors-and-ingredients-in-salty-snacks-us-2024_Redacted-V2.pdf
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource Centre
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exporters
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
 

How to Organize Patient Information to Protect Patients' Data

  • 1. How To Organize Patient Information To Protect Data Privacy Identity And Access Management In Healthcare. Seminar 24.01.2013 Zurich EPI-Park Bangalore Campus Dr. rer. nat. Hellmuth Broda Principal Technology Architect Retail, Consumer Goods, Life Sciences Infosys Limited
  • 2. 2 Agenda ● About Infosys ● Privacy—An Obsolete Model? ● Challenges with Identities ● An Architecture for Trust ● How to Organize Information Pune Campus
  • 3. 3 Over 150,000 employees from 89 nationalities Operations in 77 cities across 32 countries
  • 4. 4 WE FUELLED OUR GROWTH 4 2000 2012 2000 2012 5389 153,761+ 200 M 1500 EMPLOYEES $50 MILLION REVENUE 4 out of top 5 Global Aerospace & Defense 4 out of top 5 US Banks 6 out of top 10 Global Telecommunication Giants 3 out of top 5 Health Plans 8 out of top 10 US Retailers 7.12 Billion
  • 5. 5 POWERFUL FORCES ARE DRIVING OPPORTUNITIES Emerging Economies Smarter Organizations Digital Consumers New Commerce Pervasive Computing Sustainable TomorrowHealthcare Economy
  • 6. 66 WE PARTNER WITH CLIENTS TO BUILD TOMORROW’S ENTERPRISE ACCELERATE INNOVATION BUSINESS TRANSFORMATIO N OPTIMIZE OPERATIONS
  • 8. 8 8TIME WINNER OF THE GLOBAL MOST ADMIRED KNOWLEDGE ENTERPRISES AWARD 2004 2005 2006 2007 2008 2009 2010 2011 8
  • 9. 9 IT HAS COST US THE EQUIVALENT OF A SPACE SHUTTLE LAUNCH TO BUILD OUR TRAINING CENTER
  • 10. • Click icon to add picture 10 • Click icon to add picture The World’s Largest Corporate University
  • 11. • Click icon to add picture 11 Training 16’000 Students per Year
  • 12. 12 Upcoming Challenges In Security, Governance, Compliance Perimeter security cannot serve the collaborative external ecosystems. It will be augmented (and eventually replaced) by application security and secure tunnels We will move from secure castles to secured tunnels
  • 13. 13 Multiple Defence Rings Will Become Standard Perimeter security Network security NW intrusion detection Node/zone based security Laptop encryption Mobile device security Application security Data leakage prevention Compliance framework
  • 14. 14 Privacy—An Obsolete Model? ● “You already have zero privacy anyway— get over it!” (Scott McNealy, CEO Sun Microsystems,1999) ● Mobile phones track your location ● Navigation systems track you and OnStar even records your preferred gas stations ● 200 CHF quadrocopter drones turn your neighbour into a spy ● Google traces your behaviour to offer “better services” ● “Bundestrojaner” scans German (only?) computers
  • 15. 15 Invasion By Authorities But Also Crooks ● Are our basic privacy rights at stake? ● Is everything allowed that is technically feasible? ● Is there no limit? ● Who will control the controllers? ● Are we making it easy to become prey? Image at datonel.deviantart.com
  • 16. 16 Fallacy Of Poorly Organized Information ● We are following a long tradition of “male chauvinism” by building information pyramids ● The first thing we do is look for a (global) identifier ● Then we attach all attributes to this identifier ● And then we try to sprinkle some security on top ● This model does not work and is a Blanco invitation to data security breaches
  • 17. 17 How Do We Do It In Real Life? ● We don’t use global identifiers in real life ● My passport number is different from my Swiss ID card number ● My driver’s licence has a different number ● My bank account has another number ● We sometimes even put information into the key (which is a cardinal sin) – c.f. our old AHV number in Switzerland
  • 18. 18 But Connecting Identities Became Easy ● Proven models for federated identity connect a person’s frequent flyer number to his car rental loyalty card ● Following the traces on the web became a real business for market research firms ● We are becoming more and more transparent ● While on the move to Personalized Medicine—will my insurer hold a copy of my DNA and “adjust” my premium according to the predicted disease probabilities? Image by alancleaver_2000 via Flickr
  • 19. 19 What Can We Do About This? ● Many global organizations have been working on privacy protection and the organizational mechanisms to conceal personal identifiable information (PII): Liberty Alliance, Kantara Initiative, Internet Society, W3C, . . . ● Mechanisms for secure identity assertions allow combination/translation of identifiers to combine services as well as to keep identifiers and the corresponding information separate (federated identity)
  • 20. 20 So—Here Is The Trick ● Keep separate what does not need to be in one domain ● Use masking and pseudonymization wherever possible ● Protect the connection table that equates identities really well (it is a small table—much easier to protect than an entire system) ● Selectively enable access to this table on a strict need basis
  • 21. 21 Confused? Let Me Explain . . . ● What exactly is privacy anyway? ● What are Identity Management, Authentication, Authorization, Policies ● How can we organize such a system ● “I still did not get it—can you explain more?” ● “Glad you asked”
  • 22. 22 What Is So Special About Privacy And Trust? ● The biggest concern (after health) of the patient is privacy ● Privacy does not mean that “nobody knows nothing about me” *) ● It is about managing the faith of the patient by adhering to the agreed scope and holding the information in trust ● Consumers and patients are afraid of “Purpose Creep” ● What could an architecture for privacy and trust management look like? *The Sopranos Purpose Creep Original Agreement
  • 23. 23 Architecture for Trust Management Definitions A combination of business and technology practices which define how a relationship is conducted and services are performed A set of rules governing decisions about what the user can do: access to information, services or resources Assertion of validity of a set of credentials. Credentials express a person´s identity. “A Yes/No answer” Policy/Governance Authorization Authentication Identity Basic set of information that creates a “unique” entity (a name with a corresponding set of attributes)
  • 24. 24 Architecture for Trust Management Real World Example: Drivers License 4. The fact that we do have police; the rules that allow me to drive with my national license in other countries 3. The policeman will then see which kind of vehicle you are authorized to drive and if you are allowed to drive the one you are operating now 2. Assertion of validity: The policeman compares the document with you. Result: “A Yes/No answer” Policy/Governance Authorization Authentication Identity 1. Name, address, picture identify the driver and provide together with the document the credentials expressing that the carrier is identical to the person that passed the driving tests
  • 25. 25 Architecture for Trust Management Digitally Speaking . . . 4. Business practices to manage risk, enforce security/privacy, provide auditability. User, customer preferences, history, personalized services, 3. Determination of access rights to systems, applications and information: Match credentials against profiles, ACLs, policy 2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting them is indeed the person to which credentials were originally issued. accept or reject 1. User, customer, device “facts”, e.g., name, address, ID, token, keys; credentials, certificates that were issued by a Certification Authority (CA) Policy/Governance Authorization Authentication Identity
  • 26. 26 How People Will Trust Policies  Policy and its audit have to be guaranteed and certified by a approved public or private independent organization, e. g.:  Federal or state data protection agency  TÜV (private institution)  Audit firm  Chamber of Commerce  Postal Service or other basic service provider, . . .  This can be achieved with defined processes and responsibilities similar to ISO 9000 Trust is based on policies and the audit of those -- not just on security
  • 27. 27 Where to Safeguard User's Information Health & Travel Insurance Loyalty Program Retail Bank Car Rental Hotel Chain Airline Travel Agent Insurance Records Travel History Meal PreferencesCredit History Health History Meal Preferences Car Type Preferences Single Identity Operator Credit History Health History Travel History Insurance Records Meal Preferences
  • 28. 28 A Federated Structure Promotes Privacy and Security ● Federated structure means no single centralized data storage that would be vulnerable to attack ● End user has more control of data because permissions travel with data, guiding its use No global identifier -- this model protects against unauthorized data sharing
  • 29. 29 How it Happens Identity Provider Authentication Federation Discovery Service Personal Profile Service Provider e.g. Pharmacy Identity-Based Web Service Provider e.g. ePrescriptions.com Identity Provider Authentication Federation Discovery Service Personal Profile Principal e.g. Patient Circle of Trust Circle of Trust – organizations and individuals (example healthcare) ● Business relationships based on Liberty architecture & operational agreements ● Enables patients, physicians and healthcare organizations to safely share information in a secure and apparently seamless environment Without violating privacy Service Provider e.g. Physician Service Provider e.g. Hospital Principal e.g. Physician Principal e.g. Physician Principal e.g. Physician
  • 30. 30 The Example: Information Management In The Practitioner’s Office ● Today your GP (house doctor) keeps a folder for each patient with administrative and medical information in one place ● Due to the sensitivity of patient data this cabinet should always be locked ● But every secretary, nurse (and visitor?) has (to have) access
  • 31. 31 Enters The Smart Doctor ● He keeps patient’s information in two separate file cabinets ● Cabinet One holds the administrative data of patients (name, birth date, address, phone, insurance information etc.) ● Cabinet Two holds the folders with cases, a knee operation, a liver exam, a x-ray, blood exam results . . . ● But the identifiers do not point to each other, but to entries in a little black book, which the doctor keeps in a safe place. ● Only with this booklet the connection between individuals and cases can be made image at: uniforms-4all.com
  • 32. 32 Advantage Of This Data Masking ● Cabinet One holds only administrative information (phone book) and can be left open ● Cabinet Two holds only cases and can be used e.g. for Public Health research and can be left open ● Pointers are only resolved in the “Little Black Book” which is secured 23F147: H23K F23XL M4DB9
  • 33. 33 What About the Electronic Patient Records? ● Patient owns his medical record in the cloud ● Records should be compartmentalised (“cases”) ● No patient information (PII) is needed in the records ● Patient holds the “little black book” locked ● Override for emergency services (with audit trail) can be established ● Electronic records open for public health studies
  • 34. 34 What Can We Learn From This Example? ● By building information systems without global identifiers we can compartmentalize information so that information security and privacy become an integral property of such architecture ● Such systems can be secured and compliance to data privacy laws can much easier be followed ● The client/patient/consumer will acknowledge this and build trust into such systems quickbase.intuit.com
  • 36. 36 THANK YOU Hellmuth_Broda@infosys.com www.infosys.com The contents of this document are proprietary and confidential to Infosys Limited and may not be disclosed in whole or in part at any time, to any third party without the prior written consent of Infosys Limited. © 2013 Infosys Limited. All rights reserved. Copyright in the whole and any part of this document belongs to Infosys Limited. This work may not be used, sold, transferred, adapted, abridged, copied or reproduced in whole or in part, in any manner or form, or in any media, without the prior written consent of Infosys Limited.