Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Personal Healthcare IOT on PCF using Spring

297 views

Published on

From SpringOne Platform 2016 Jim Shingler Presentation: Personal Healthcare IOT on PCF using Spring

Published in: Technology
  • Be the first to comment

Personal Healthcare IOT on PCF using Spring

  1. 1. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Personal Healthcare IOT on PCF using Spring By Jim Shingler @JShingler
  2. 2. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Who is Jim Shingler Director of Engineering at Fuse by Cardinal Health in Columbus, Ohio Works at: Fuse, a Cardinal Health innovation center focused on connecting technology with healthcare to build the future of health and wellness. 
 Domain Experience: Healthcare, Insurance, Financial Services, Retail Passion: Applying leading edge technology to create sustainable solutions.  2
  3. 3. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ IOT 
 What is it 3
  4. 4. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Arthur C Clark Three "laws" of prediction: • When a distinguished but elderly scientist states that something is possible, he is almost certainly right. When he states that something is impossible, he is very probably wrong. • The only way of discovering the limits of the possible is to venture a little way past them into the impossible. • Any sufficiently advanced technology is indistinguishable from magic. 4 British science fiction writer (2001: A Space Odyssey)
  5. 5. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Where did IOT come from? 5 IOT = “Internet of Things” Kevin Ashton coined the phrase in 1999 in a presentation he made at Proctor and Gamble (P&G) “The problem is, people have limited time, attention and accuracy—all of which means they are not very good at capturing data about things in the real world.” “We need to empower computers with their own means of gathering information, so they can see, hear and smell the world for themselves, in all its random glory. “ “RFID and sensor technology enable computers to observe, identify and understand the world—without the limitations of human-entered data. “
  6. 6. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ What is IOT • IETF Definition
 The term Internet of Things generally refers to scenarios where network connectivity and computing capability extends to objects, sensors and everyday items not normally considered computers, allowing these devices to generate, exchange and consume data with minimal human intervention. • Oxford Definition
 Internet of things(noun): The interconnect via the Internet of computing devices embedded in everyday object, enabling them to send and receive data 6 There is no one universal definition
  7. 7. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ What Are Things • Sensors - What is going on in the environment
 Temp, Humidity, Weight, Blood Pressure, Glucose, … • Actuators - Do something to the environment
 Latch, Alarm, Motor, Turn on/off • Tags - What is in the environment
 RFID (active/passive), Barcode, Finger Print, Eyeball, …. 7 Sensors, Actuators, and Tags
  8. 8. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Everyday 8 Tag (Card) Actuator (Door Lock) Sensor Sensor Tag (Eyes) Actuator (Door Lock)
  9. 9. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ It is here now, You might even have some yourself 9
  10. 10. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ This isn’t Science Fiction 10
  11. 11. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Players / Potential Partners 11 Watson IOT AWS IoT is a platform that enables you to connect devices to AWS Services and other devices, secure data and interactions, process and act upon device data, and enable applications to interact with devices even when they are offline. IBM IOTF and Bluemix (Built on Cloud Foundry) IBM's Internet of Things Foundation is where you can set up and manage your connected devices. IBM's Bluemix platform is the place to quickly and easily create applications that can use real-time and historical data from your connected devices. GE Predix (Built on Cloud Foundry) A cloud purpose-built for industrial data and analytics At the intersection of people, machines, big data, and analytics stands Predix: The cloud-based platform powering innovative Industrial Internet apps that turns real-time operational data into insight for better and faster decision- making. At Pivotal, we see this IoT journey to the new normal made possible by the mobile revolution, inexpensive sensors and the falling cost of compute and storage resources. In aggregate, these trends provide the ability to analyze (and react to) very large amounts of information in real time. Sharing our observations, Silicon Valley guru Tim O’Reilly argues that collectively we are underestimating the impact of IoT, citing its potential to disrupt age old industries like healthcare. Feb 2015, Ben Black (one of the creators of Amazon Elastic Compute Cloud ) joins Pivotal to focus on IOT. Designed and Implemented IOT Platform for a major US Car Maker.
  12. 12. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Personal Healthcare 12
  13. 13. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Aging Population 13
  14. 14. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Aging Population 13 • Silent Generation (Born 1928-1945) 28 Million
 Declining Quickly • Baby Boomers (Born 1946-1964) 75 Million
 2012 - Started turning 65
 Peaked at 78.8 Million people in 1999. • Gen Xers (1965-1980) 66 Million
 2015 - Started turning 50 Rough Math: 169 Million People That is a lot!!!!
  15. 15. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ 14 patient caregiver(s) physician pharmacist payor pharma non-adherence is a 
 $290B problem hospital
  16. 16. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Additional Hurdles Compliance VS Adherence Intervention Strategies Security and Privacy - CC for $15, Medical Records $60 - Why? Legal and Regulatory - HIPAA - 18 PHI Data Points (IP Address, Device Serial Numbers) - OmniBu$$ (BIG $ FINES) - FDA (VERY SERIOUS) 15 See Bonus Material for More information
  17. 17. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ How? 16
  18. 18. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ How it works 17 IOT is the extension of classic Enterprise Integration (EAI) patterns outside the 4 walls of the enterprise. Gateway Application Application Application Application Application Sensor H ub Device Sensor Sensor Peripheral Peripheral TCP/IP
  19. 19. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Primary Concerns • Constrained vs Unconstrained Networks • Volume of data and taking action on data • Reliability and Management of Things and Data • Extending Services outside the walls • Security (Authentication, Authorization) Personal Healthcare Concerns (See Bonus Material Section) • Privacy (HIPAA, HITECH, PHI/ePHI, OmniBus) • FDA 18
  20. 20. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ How to succeed • Register and Manage remote Things • Securely Communicate from a constrained environment • Process and persist large amount of relatively simple data • Analyze data for potential triggers for action 19
  21. 21. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ 4 IOT Communication Models • Device-To-Device • Device-To-Cloud • Device-To-Gateway • Back-End Data-Sharing 20 http://www.thewhir.com/web-hosting-news/the-four-internet-of-things-connectivity-models-explained
  22. 22. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Device-To-Device 21
  23. 23. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Device-To-Cloud 22
  24. 24. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ 23
  25. 25. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ 24
  26. 26. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Components of an IOT Solution 25 Stakeholder Dashboards Event Processor Device Registry Security Push Notifications Application Analytics Big Data
  27. 27. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Spring and PCF Helps 26 Stakeholder Dashboards Event Processor Device Registry Security Push Notifications Application Analytics Big Data
  28. 28. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Even at the Application Infrastructure level 27 Dashb oards Event Processor Device Registry User Account & Authentication Push App Analyti cs Big Data Micro Proxy / API Gateway (Zuul) Service Registry (Eureka) Config Server
  29. 29. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ OAuth2 & OpenID Connect (SSO for PCF / UAA) • OAuth2 - http://oauth.net/2/
 “OAuth 2.0 focuses on client developer simplicity while providing specific authorization flows for web applications, desktop applications, mobile phones, and living room devices. ”
 http://tools.ietf.org/html/draft-ietf-oauth-v2-23 • OpenID Connect - http://openid.net/connect/
 “OpenID Connect 1.0 is a simple identity layer on top of the OAuth 2.0 protocol. It allows Clients to verify the identity of the End-User based on the authentication performed by an Authorization Server, as well as to obtain basic profile information about the End-User in an interoperable and REST-like manner.” 28
  30. 30. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ OAuth2 - Roles 29 http://tutorials.jenkov.com/oauth2/index.html
  31. 31. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ OAuth2 - Client Types 30 • Confidential Client • Capable of keeping Client Password confidential • Web Application (Maybe) • Public Client • Not capable of keeping Client Password confidential • Mobile Phone application • Desktop Application • Browser Application
  32. 32. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ 31 Confidential Client: Web App Public Client: User Agent Public Client: Native App
  33. 33. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ OAuth2 - The Client • Must be registered with Resource Servers Authorization Server
 32 Client Registration Administration APIs List Clients: GET /oauth/clients Inspect Client: GET /oauth/clients/{client_id} Register Client: POST /oauth/clients Update Client: PUT /oauth/clients/{client_id} Delete Client: DELETE /oauth/clients/{client_id} Change Client Secret: PUT /oauth/clients/{client_id}/secret Register Multiple Clients: POST /oauth/clients/tx Update Multiple Clients: PUT /oauth/clients/tx Register, update or delete Multiple Clients: POST /oauth/clients/tx/modify Change Multiple Client Secrets: POST /oauth/clients/tx/secret Delete Multiple Clients: POST /oauth/clients/tx/delete List Restricted Scopes: GET /oauth/clients/restricted Creating Restricted Client: POST /oauth/clients/restricted Updating Restricted Client: PUT /oauth/clients/restricted/{client_id}
  34. 34. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ OAuth2 - The Client • Must be registered with Resource Servers Authorization Server
 32 Client Registration Administration APIs List Clients: GET /oauth/clients Inspect Client: GET /oauth/clients/{client_id} Register Client: POST /oauth/clients Update Client: PUT /oauth/clients/{client_id} Delete Client: DELETE /oauth/clients/{client_id} Change Client Secret: PUT /oauth/clients/{client_id}/secret Register Multiple Clients: POST /oauth/clients/tx Update Multiple Clients: PUT /oauth/clients/tx Register, update or delete Multiple Clients: POST /oauth/clients/tx/modify Change Multiple Client Secrets: POST /oauth/clients/tx/secret Delete Multiple Clients: POST /oauth/clients/tx/delete List Restricted Scopes: GET /oauth/clients/restricted Creating Restricted Client: POST /oauth/clients/restricted Updating Restricted Client: PUT /oauth/clients/restricted/{client_id} POST /oauth/clients { "client_id" : "foo", "name" : "Foo Client Name", "client_secret" : "fooclientsecret", // optional for untrusted clients "scope" : ["uaa.none"], "resource_ids" : ["none"], "authorities" : ["cloud_controller.read","cloud_controller.write","openid"], "authorized_grant_types" : ["client_credentials"], "access_token_validity": 43200 "redirect_uri":["http://test1.com","http*://ant.path.wildcard/**/passback/*"] }
  35. 35. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ OAuth2 - Grant Type (Most to Least Secure) • Authorization Code • Implicit • Resource Owner Password Credentials • Client Credentials
 33
  36. 36. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ OAuth2 - Authorization Code Flow 34
  37. 37. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ OAuth2 - Authorization Code Flow 34 Mobile Application SSO Developers Guide
 https:// developer.pingidentity.com/en/ resources/napps-native-app- sso.html
  38. 38. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ OAuth2 - Implicit Flow 35
  39. 39. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ OAuth2 - Resource Owner Creds Flow • WARNING: User Must Really Trust the application. E.g. The “Official Application” from Cardinal Health 36
  40. 40. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ OAuth2 - Client Credentials Flow • Intended for use when accessing resources that are NOT specific to a resource owner (User). E.g Getting a list of Medications, Doctors, … 37
  41. 41. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Cloud Foundry and Spring • Spring Boot • Spring Data • Spring Cloud Services • Micro / API Proxy (Zuul) • Service Registry (Eureka) • Configuration (Config Server) • Data Flow (Spring Cloud Data Flow, XD, Integration) • Spring Security • SSO for PCF / CF UAA 38
  42. 42. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Review 39
  43. 43. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ IOT / PCF / SCS / YOU - A Great Start • Real opportunity to use our super powers for good • IOT - Not really NEW • Extension of EAI Patterns and Big Data • Security and Privacy - REALLY IMPORTANT • PCF / SCS - Cloud computing platform as a service (Paas) • Elastic Runtime and Infrastructure Services • Components that make creating an IOT Cloud Computing Solution Possible 40
  44. 44. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Now What? 41
  45. 45. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Next Steps • Learn about SSO for PCF or Cloud Foundry UAA • Learn about Spring Cloud and Spring Cloud Services • Investigate: • Spring Cloud Data Flow • Spring Integration 42
  46. 46. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Related 2016 Sessions • OpenID Connect & OAuth - Demystifying Cloud Identity
 8/2 11:30am-12:40PM
 https://2016.event.springoneplatform.io/schedule/sessions/ openid_connect_oauth_demystifying_cloud_identity.html • Data Science-Powered Apps for Internet of Things
 8/2 4:20PM-4:50PM • To Spring Security 4.1 and Beyond 
 8/3 5:00PM-6:10PM
 https://2016.event.springoneplatform.io/schedule/sessions/ to_spring_security_4_1_and_beyond.html 43
  47. 47. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Resources • IETF - The Internet of Things: An Overview
 http://www.internetsociety.org/doc/iot-overview • The OAuth 2.0 Authorization Framework
 https://tools.ietf.org/html/rfc6749 • IAB - Architectural Considerations in Smart Object Networking
 https://tools.ietf.org/html/rfc7452 • Authorization for the Internet of Things using OAuth 2.0
 https://tools.ietf.org/html/draft-seitz-ace-oauth-authz-00 • Use Cases for Authentication and Authorization in Constrained Environments
 https://tools.ietf.org/html/draft-ietf-ace-usecases-10 • Authorization for Internet of Things using OAuth 2.0
 http://www.slideshare.net/HannesTschofenig/authorization-for-internet-of-things-using-oauth-20 • https://github.com/jshingler/SpringOne2016 44
  48. 48. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Resources • Mobile Application SSO Developers Guide
 https://developer.pingidentity.com/en/resources/napps- native-app-sso.html • http://cloud.spring.io/spring-cloud-security/spring-cloud- security.html • https://spring.io/guides/gs/centralized-configuration/ • https://spring.io/guides/gs/service-registration-and-discovery/ • https://github.com/xetys/spring-cloud-oauth2-example 45
  49. 49. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Big Thanks • Will Tran @fivetenwill
 https://github.com/william-tran/freddys-bbq/tree/brixton
 https://github.com/william-tran/microservice-security • Ralph Meira • Kenny Bastani @kennybastani
 http://www.kennybastani.com/2016/04/event-sourcing- microservices-spring-cloud.html
 https://github.com/kbastani/spring-cloud-event-sourcing-example • Oleg Lavorskyi @jugglinhats
 https://github.com/oiavorskyi/microverse 46
  50. 50. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ THANK YOU Have a GREAT SpringOne @springcentral spring.io/blog @pivotal pivotal.io/blog @pivotalcf http://engineering.pivotal.io
  51. 51. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Bonus Material @springcentral spring.io/blog @pivotal pivotal.io/blog @pivotalcf http://engineering.pivotal.io
  52. 52. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Are we too late? NO 49
  53. 53. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Aging Population • Baby Boomers (Born 1946-1964)
 2012 - Started turning 65 50
  54. 54. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ 51
  55. 55. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Adherence and Compliance Adherence and Compliance are not the same thing. Suppose I am instructed: 1 tablet 3 times a day. If I take all 3 tablets at once, I am Compliant BUT not Adherent 
 Possible Outcomes: • Permanent Damage • Death • …. 52
  56. 56. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Intervention Strategies • How do we get people to take their medications as prescribed? • How do we find out if the medications aren’t helping? 53
  57. 57. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Intervention Strategies • How do we get people to take their medications as prescribed? • How do we find out if the medications aren’t helping? 53 It requires that Stake Holders know whats going on
  58. 58. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Security and Privacy “While a Social Security number can be purchased on the Dark Web for around $15, medical records fetch at least $60 per record because of that additional information, such as addresses, phone numbers and employment history. “ http://www.cnbc.com/2016/03/10/dark-web-is-fertile-ground-for-stolen-medical- records.html 54
  59. 59. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ Legal and Regulatory • Health Insurance Portability and Accountability Act of 1996
 (Section 1171 of Part C of Subtitle F of Public Law 104-191) • HITECH Act provisions of the American Recovery and Reinvestment Act of 2009 • PHI / ePHI • HIPAA Omnibus Rule of 2013 • FDA 55
  60. 60. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ HIPAA - Health Information 56 “Health information means any information, whether oral or recorded in any form or medium, that– (A) is created or received by a health care provider, health plan, public health authority, employer, life insurer, school or university, or health care clearinghouse; and (B) relates to the past, present, or future physical or mental health or condition of any individual, the provision of health care to an individual, or the past, present, or future payment for the provision of health care to an individual.”
  61. 61. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ HIPAA - Individually Identifiable 57 “Individually identifiable health information is information that is a subset of health information, including demographic information collected from an individual, and: (1) Is created or received by a health care provider, health plan, employer, or health care clearinghouse; and (2) Relates to the past, present, or future physical or mental health or condition of an individual; the provision of health care to an individual; or the past, present, or future payment for the provision of health care to an individual; and (i) That identifies the individual; or (ii) With respect to which there is a reasonable basis to believe the information can be used to identify the individual.”
  62. 62. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ HIPAA - PHI / ePHI 58 • PHI - Protected Health Information 
 sometimes called Personal Health Information • ePHI - electronic Protected Health Information
 produced, saved, transferred, or received in electronic form
  63. 63. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ HIPAA - 18 Protected Data Points 59 1. Names 2. All geographical subdivisions smaller than a State
 including street address, city, county, precinct, zip code, … 3. All elements of dates (except year) for dates directly related to an individual
 including birth date, admission date, discharge date, date of death; and all ages over 89, …. 4. Phone numbers 5. Fax numbers 6. Electronic mail addresses 7. Social Security numbers 8. Medical record numbers 9. Health plan beneficiary numbers
  64. 64. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ HIPAA - 18 Protected Data Points 60 10. Account numbers 11. Certificate/license numbers 12. Vehicle identifiers and serial numbers, including license plate numbers 13. Device identifiers and serial numbers; 14. Web Universal Resource Locators (URLs); 15. Internet Protocol (IP) address numbers; 16. Biometric identifiers, including finger and voice prints; 17. Full face photographic images and any comparable images; and 18. Any other unique identifying number, characteristic, or code
  65. 65. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ HIPAA - Omnibus Rule 61 • Strengthening the privacy and security protection for individuals' personal health information (PHI). • Increasing penalties for noncompliance based on the level of negligence, with a maximum penalty of $1.5 million per violation. Most extensive changes to the HIPAA Privacy and Security Rules since they were first implemented
  66. 66. Unless otherwise indicated, these slides are © 2013-2016 Pivotal Software, Inc. and licensed under a Creative Commons Attribution-NonCommercial license: http://creativecommons.org/licenses/by-nc/3.0/ FDA - We won’t cover 62 • The FDA is Very Serious about Protecting the Patient • The FDA can make you withdraw the product from market • The FDA has a lot to say about the Product • How its built, • How its Manufactured
 
 Advice: Work with Partners that have done this before WOW

×