KeyTalkPortalTalk
(source: KPMG)
   General privacy laws and specific laws apply   All parties receiving data must be bound by professional secrecy (art....
   IPad toegang tot HIS (vb. Epic)   Onderzoeksdata (bv. Borstkanker: behandelen, genereren & combineren (big-)data, ana...
Health Professional requests a newrole .For example EPR for a medicaltreatment.                                     The pa...
KeyTalk protects your data in motion by providing secure access formachine-to-machine communication and data transmissions...
   Secures corporate data in-motion over the internet   Using short living certificate technology   Identification of u...
PortalTalk Controls and Secures access to the cloud from any device,anywhere and anytime.Solution descriptionElephant Secu...
Corporate Client Admin                                                                                      Corporate Netw...
Maarten Stultjens (Elephant Security) @ PIDS seminar
Maarten Stultjens (Elephant Security) @ PIDS seminar
Maarten Stultjens (Elephant Security) @ PIDS seminar
Maarten Stultjens (Elephant Security) @ PIDS seminar
Maarten Stultjens (Elephant Security) @ PIDS seminar
Maarten Stultjens (Elephant Security) @ PIDS seminar
Maarten Stultjens (Elephant Security) @ PIDS seminar
Maarten Stultjens (Elephant Security) @ PIDS seminar
Maarten Stultjens (Elephant Security) @ PIDS seminar
Maarten Stultjens (Elephant Security) @ PIDS seminar
Maarten Stultjens (Elephant Security) @ PIDS seminar
Maarten Stultjens (Elephant Security) @ PIDS seminar
Maarten Stultjens (Elephant Security) @ PIDS seminar
Maarten Stultjens (Elephant Security) @ PIDS seminar
Maarten Stultjens (Elephant Security) @ PIDS seminar
Upcoming SlideShare
Loading in …5
×

Maarten Stultjens (Elephant Security) @ PIDS seminar

708 views

Published on

Slides van Maarten Stultjens (Elephant Security). Hoe regel ik als ziekenhuis mijn autorisaties in een cloudomgeving?
Gepresenteerd tijdens Privacy, Identity & Security (PIDS) seminar van Almere DataCapital, zie www.almeredatacapital.nl.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
708
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • 09/26/12 14:23 © 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
  • 09/26/12 14:23 © 2010 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
  • Vereniging van Zorgaanbieders voor Zorgcommunicatie (VZVZ) De Vereniging van Zorgaanbieders voor Zorgcommunicatie (VZVZ) zet in op beheer en verbetering van de zorginfrastructuur. De VZVZ treedt op als verantwoordelijke voor de gegevensverwerking en is opdrachtgever van het Servicecentrum Zorgcommunicatie (SCZ) dat de infrastructuur beheert.
  • 1919 – 1930 > bauhaus school
  • Maarten Stultjens (Elephant Security) @ PIDS seminar

    1. 1. KeyTalkPortalTalk
    2. 2. (source: KPMG)
    3. 3.  General privacy laws and specific laws apply All parties receiving data must be bound by professional secrecy (art. 458) Limit access to relevant information (art. 458) Explicit approval by patient required (art. 458) ICT standards on the exchange of health data apply (law 21-08-’08) Hospital file= medical file managed by Doctor + nursing file managed by Nurse (Law 07-08-’87) Patients rights (Privacy guaranteed), health professional obligations (management of access rights) Patient Consent is required within medical team, within organization, across organizations ISO27001 (Other standards: HIPAA) HL7 – std for exchange of health dataSanctions: EUR 500-550K, imprisonment, health professional reputationApplicable legislation (BE)
    4. 4.  IPad toegang tot HIS (vb. Epic) Onderzoeksdata (bv. Borstkanker: behandelen, genereren & combineren (big-)data, analyseren) Regionale samenwerking van ziekenhuizen (bv. AMC, Flevo) EPR (bv. Tandheelkunde: beeldmateriaal delen) Diagnostische centra (vb. Diagnostiek4U) Zorg op afstand (MAD Europe) Zelfstandige behandelcentra (vb. Obesitas, Diaboss) Artsen die voor meerdere ziekenhuizen werkenDutch Cases
    5. 5. Health Professional requests a newrole .For example EPR for a medicaltreatment. The patient approves or rejects the request
    6. 6. KeyTalk protects your data in motion by providing secure access formachine-to-machine communication and data transmissions betweendevices, corporate networks and cloud applications. It prevents commonattacks such as man-in-the-middle.Solution descriptionKeyTalk generates, distributes and installs short living client certificateson the client device in a fully automated manner, leveraging yourexisting authentication methodology. Optionally it uses the devicehardware characteristics to strengthen the authentication process.
    7. 7.  Secures corporate data in-motion over the internet Using short living certificate technology Identification of user’s trusted devices No change in user experience, no administration KeyTalk secures your data-in-
    8. 8. PortalTalk Controls and Secures access to the cloud from any device,anywhere and anytime.Solution descriptionElephant Security helps enterprises and institutions with the rapidadoption of cloud applications while reducing IT costs and ensuringcompliance.Elephant Security gives complete control to IT and ComplianceManagement over user access to sensitive corporate cloud data and itgives end-users convenient and secure access to a wide range of cloudapplications.
    9. 9. Corporate Client Admin Corporate Network Enterprise Admin Portal Enterprise Enterprise Cloud Cloud Portal Connectivity Readiness ServicesPortalTalk provides & secures cloud

    ×