SlideShare a Scribd company logo

WebShield eP3 Network Overview (02-04-2017)

One as of 2017-04-02

1 of 32
Download to read offline
Jonathan Hare
CEO, WebShield Inc.
jonathan@webshield.io
(415) 265-3250
eP3 Network Ecosystem Overview
Empowering People with Privacy and Personalization
www.eP3.network
2
Traditional enterprise-centric security and policy enforcement creates
an inherent conflict between privacy, security and sharing…
…making it fundamentally incapable of enabling personalization
while protecting privacy and security on a global scale.
WebShield Inc.
No reliable way for disparate organizations and systems to agree when they are talking about the same person
(either for online users, or records about them)
No robust way to enforce policies or enable personalization without undermining privacy
(enterprises control the “keys” to data, must understand context and monitor activities to enforce policies)
No reliable way to de-identify comprehensive longitudinal records
(genomics, claims, clinical, demographics, online behavior, etc.)
No way to get disparate stakeholders to trust each other with sensitive resources
(can’t agree on policies, commercial terms, or who is in control)
No way to link, analyze or use data without decrypting it somewhere
(who is trusted with the keys for everyone’s data?)
The Fundamental Barrier Enterprise-centric computing Personalization with Privacy
3 WebShield Inc.
4
fragmented islands of data and functionality,
ineffective personalization and process optimization across organizations,
systemic lack of security, privacy and consumer control,
and periodic disasters...
It always ends
the same way
WebShield Inc.
5
We need to try something
different that completely eliminates
the fundamental conflict
between privacy and sharing…
WebShield Inc.
6 WebShield Inc.
New Paradigm: “Quantum Privacy”
obfuscate data so that it is both
- fully opaque (meaningless gibberish)
and
- fully computable (no loss of information)
- at the same time…
simultaneously enforce policies of all stakeholders
at the finest possible level of granularity (‘quantum level’)
before any meaningful data is revealed to anyone (including “insiders”)
Ad

Recommended

Data goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copyData goverance two_8.2.18 - copy
Data goverance two_8.2.18 - copySandra (Sandy) Dunn
 
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...
aOS Monaco 2019 - S3 - Présentation Varonis - Cloud Data Protection - Benjami...aOS Community
 
Protect your Data even under breach
Protect your Data even under breachProtect your Data even under breach
Protect your Data even under breachCloudMask inc.
 
Securing sensitive data for the health care industry
Securing sensitive data for the health care industrySecuring sensitive data for the health care industry
Securing sensitive data for the health care industryCloudMask inc.
 
Law firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMaskLaw firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMaskCloudMask inc.
 
Corporate Data: A Protected Asset or a Ticking Time Bomb?
Corporate Data: A Protected Asset or a Ticking Time Bomb? Corporate Data: A Protected Asset or a Ticking Time Bomb?
Corporate Data: A Protected Asset or a Ticking Time Bomb? Varonis
 
DSS ITSEC Conference 2012 - Varonis Eliminating Data Security Threats
DSS ITSEC Conference 2012 - Varonis Eliminating Data Security ThreatsDSS ITSEC Conference 2012 - Varonis Eliminating Data Security Threats
DSS ITSEC Conference 2012 - Varonis Eliminating Data Security ThreatsAndris Soroka
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for GovernmentsCloudMask inc.
 

More Related Content

What's hot

A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingEditor IJCATR
 
Cyber Theft Solutions
Cyber Theft SolutionsCyber Theft Solutions
Cyber Theft Solutionswbesse
 
Cashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidenceCashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidenceCloudMask inc.
 
White paper-diligent-cybersecurity
White paper-diligent-cybersecurityWhite paper-diligent-cybersecurity
White paper-diligent-cybersecurityjames morris
 
Operational CyberSecurity Final Case Report
Operational CyberSecurity Final Case ReportOperational CyberSecurity Final Case Report
Operational CyberSecurity Final Case ReportJames Konderla
 
Solutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionSolutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionTrend Micro
 
Takshashila Blue Paper: Charting a New Framework for Data Protection in India
Takshashila Blue Paper: Charting a New Framework for Data Protection in IndiaTakshashila Blue Paper: Charting a New Framework for Data Protection in India
Takshashila Blue Paper: Charting a New Framework for Data Protection in IndiaThe Takshashila Institution
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoTnsangary
 
Self-Protecting Information for De-Perimiterised Electronic Relationships
Self-Protecting Information for De-Perimiterised Electronic RelationshipsSelf-Protecting Information for De-Perimiterised Electronic Relationships
Self-Protecting Information for De-Perimiterised Electronic RelationshipsJeremy Hilton
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationIRJET Journal
 
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...Cláudia Alves
 
Contractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive DataContractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive DataDigital Shadows
 
DYNAMIC PRIVACY PROTECTING SHORT GROUP SIGNATURE SCHEME
DYNAMIC PRIVACY PROTECTING SHORT GROUP SIGNATURE SCHEMEDYNAMIC PRIVACY PROTECTING SHORT GROUP SIGNATURE SCHEME
DYNAMIC PRIVACY PROTECTING SHORT GROUP SIGNATURE SCHEMEIJCI JOURNAL
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idDavid Kelts, CIPT
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyUlf Mattsson
 
Where Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudWhere Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudUlf Mattsson
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudKumar Goud
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudCheryl Goldberg
 

What's hot (20)

A Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud ComputingA Survey on Different Techniques Used in Decentralized Cloud Computing
A Survey on Different Techniques Used in Decentralized Cloud Computing
 
Cyber Theft Solutions
Cyber Theft SolutionsCyber Theft Solutions
Cyber Theft Solutions
 
Cashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidenceCashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidence
 
White paper-diligent-cybersecurity
White paper-diligent-cybersecurityWhite paper-diligent-cybersecurity
White paper-diligent-cybersecurity
 
Sqrrl
SqrrlSqrrl
Sqrrl
 
Operational CyberSecurity Final Case Report
Operational CyberSecurity Final Case ReportOperational CyberSecurity Final Case Report
Operational CyberSecurity Final Case Report
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Solutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryptionSolutions for privacy, disclosure and encryption
Solutions for privacy, disclosure and encryption
 
Takshashila Blue Paper: Charting a New Framework for Data Protection in India
Takshashila Blue Paper: Charting a New Framework for Data Protection in IndiaTakshashila Blue Paper: Charting a New Framework for Data Protection in India
Takshashila Blue Paper: Charting a New Framework for Data Protection in India
 
The Weakest Point of Security in IoT
The Weakest Point of Security in IoTThe Weakest Point of Security in IoT
The Weakest Point of Security in IoT
 
Self-Protecting Information for De-Perimiterised Electronic Relationships
Self-Protecting Information for De-Perimiterised Electronic RelationshipsSelf-Protecting Information for De-Perimiterised Electronic Relationships
Self-Protecting Information for De-Perimiterised Electronic Relationships
 
Employment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous AuthenticationEmployment Feedback by Securing Data using Anonymous Authentication
Employment Feedback by Securing Data using Anonymous Authentication
 
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
Enabling privacy and_traceability_in_supply_chains_using_blockchain_and_zero_...
 
Contractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive DataContractor Exposed Manufacturer's Sensitive Data
Contractor Exposed Manufacturer's Sensitive Data
 
DYNAMIC PRIVACY PROTECTING SHORT GROUP SIGNATURE SCHEME
DYNAMIC PRIVACY PROTECTING SHORT GROUP SIGNATURE SCHEMEDYNAMIC PRIVACY PROTECTING SHORT GROUP SIGNATURE SCHEME
DYNAMIC PRIVACY PROTECTING SHORT GROUP SIGNATURE SCHEME
 
Lessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect idLessons in privacy engineering from a nation scale identity system - connect id
Lessons in privacy engineering from a nation scale identity system - connect id
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technology
 
Where Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudWhere Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the Cloud
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
 

Similar to WebShield eP3 Network Overview (02-04-2017)

HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield
HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShieldHXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield
HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShieldHxRefactored
 
Wireless Sensor Networks Is Growing Rapidly Over The Few...
Wireless Sensor Networks Is Growing Rapidly Over The Few...Wireless Sensor Networks Is Growing Rapidly Over The Few...
Wireless Sensor Networks Is Growing Rapidly Over The Few...Sasha Jones
 
Vantura Partners Case Study
Vantura Partners Case StudyVantura Partners Case Study
Vantura Partners Case StudyLucie Nicolas
 
Different Types Of Attacks
Different Types Of AttacksDifferent Types Of Attacks
Different Types Of AttacksKatie Fernandez
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYShakas Technologies
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdfmistryritesh
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51Felipe Prado
 
Blockchain For Enhancing Enterprise Cybersecurity.pdf
Blockchain For Enhancing Enterprise Cybersecurity.pdfBlockchain For Enhancing Enterprise Cybersecurity.pdf
Blockchain For Enhancing Enterprise Cybersecurity.pdfaNumak & Company
 
Privacy Of Data Stream Using Sliding Window Method
Privacy Of Data Stream Using Sliding Window MethodPrivacy Of Data Stream Using Sliding Window Method
Privacy Of Data Stream Using Sliding Window MethodMonica Rivera
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Controljwpiccininni
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldIdentive
 
Microsoft Access Exercise Essay
Microsoft Access Exercise EssayMicrosoft Access Exercise Essay
Microsoft Access Exercise EssayCarolina Fox
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability Adz91 Digital Ads Pvt Ltd
 
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...IJCSIS Research Publications
 
Blockchains Impact on Identity Management.pdf
Blockchains Impact on Identity Management.pdfBlockchains Impact on Identity Management.pdf
Blockchains Impact on Identity Management.pdfniahiggins21
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak PreventionTanvir Hashmi
 

Similar to WebShield eP3 Network Overview (02-04-2017) (20)

HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield
HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShieldHXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield
HXR 2016: Free the Data Access & Integration -Jonathan Hare, WebShield
 
Wireless Sensor Networks Is Growing Rapidly Over The Few...
Wireless Sensor Networks Is Growing Rapidly Over The Few...Wireless Sensor Networks Is Growing Rapidly Over The Few...
Wireless Sensor Networks Is Growing Rapidly Over The Few...
 
Vantura Partners Case Study
Vantura Partners Case StudyVantura Partners Case Study
Vantura Partners Case Study
 
Different Types Of Attacks
Different Types Of AttacksDifferent Types Of Attacks
Different Types Of Attacks
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51
 
Blockchain For Enhancing Enterprise Cybersecurity.pdf
Blockchain For Enhancing Enterprise Cybersecurity.pdfBlockchain For Enhancing Enterprise Cybersecurity.pdf
Blockchain For Enhancing Enterprise Cybersecurity.pdf
 
Privacy Of Data Stream Using Sliding Window Method
Privacy Of Data Stream Using Sliding Window MethodPrivacy Of Data Stream Using Sliding Window Method
Privacy Of Data Stream Using Sliding Window Method
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Control
 
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked WorldHirsch Identive | White Paper | Securing the Enterprise in a Networked World
Hirsch Identive | White Paper | Securing the Enterprise in a Networked World
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Microsoft Access Exercise Essay
Microsoft Access Exercise EssayMicrosoft Access Exercise Essay
Microsoft Access Exercise Essay
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
 
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
DS-NIZKP: A ZKP-based Strong Authentication using Digital Signature for Distr...
 
CC ss.pptx
CC ss.pptxCC ss.pptx
CC ss.pptx
 
Blockchains Impact on Identity Management.pdf
Blockchains Impact on Identity Management.pdfBlockchains Impact on Identity Management.pdf
Blockchains Impact on Identity Management.pdf
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak Prevention
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 

Recently uploaded

Let’s get moving! Setting some goals Optimizing your workflow
Let’s get moving! Setting some goals Optimizing your workflowLet’s get moving! Setting some goals Optimizing your workflow
Let’s get moving! Setting some goals Optimizing your workflowngothuyanct
 
Cracking the Leadership Shadow Code.pptx
Cracking the Leadership Shadow Code.pptxCracking the Leadership Shadow Code.pptx
Cracking the Leadership Shadow Code.pptxWorkforce Group
 
Miller Coors Presentation at CAGNY Feb 2024
Miller Coors Presentation at CAGNY Feb 2024Miller Coors Presentation at CAGNY Feb 2024
Miller Coors Presentation at CAGNY Feb 2024Neil Kimberley
 
02.22.2024 Email Options in Bloomerang.pdf
02.22.2024 Email Options in Bloomerang.pdf02.22.2024 Email Options in Bloomerang.pdf
02.22.2024 Email Options in Bloomerang.pdfBloomerang
 
The value chain is a concept that describes the full range of activities and ...
The value chain is a concept that describes the full range of activities and ...The value chain is a concept that describes the full range of activities and ...
The value chain is a concept that describes the full range of activities and ...Hamed Mehrzadegan
 
Ensuring Financial Integrity: Conducting Effective Audits of Branch Office Ac...
Ensuring Financial Integrity: Conducting Effective Audits of Branch Office Ac...Ensuring Financial Integrity: Conducting Effective Audits of Branch Office Ac...
Ensuring Financial Integrity: Conducting Effective Audits of Branch Office Ac...MiMOiQ1
 
Lazaro-Lugo_Sandra_.M.B_.pb1_2025October-2.pptx
Lazaro-Lugo_Sandra_.M.B_.pb1_2025October-2.pptxLazaro-Lugo_Sandra_.M.B_.pb1_2025October-2.pptx
Lazaro-Lugo_Sandra_.M.B_.pb1_2025October-2.pptxSLazaroLugo
 
Danylo Fedirko: Leveraging AI in SEO and optimizing for SRE (ChatGPT and Bard...
Danylo Fedirko: Leveraging AI in SEO and optimizing for SRE (ChatGPT and Bard...Danylo Fedirko: Leveraging AI in SEO and optimizing for SRE (ChatGPT and Bard...
Danylo Fedirko: Leveraging AI in SEO and optimizing for SRE (ChatGPT and Bard...Lviv Startup Club
 
SlideEgg_300445-Apple Inc(1).pptx case study
SlideEgg_300445-Apple Inc(1).pptx case studySlideEgg_300445-Apple Inc(1).pptx case study
SlideEgg_300445-Apple Inc(1).pptx case studyindobanglatradeinter
 
Clean/Renewable Energy Virtual Investor Conference
Clean/Renewable Energy Virtual Investor ConferenceClean/Renewable Energy Virtual Investor Conference
Clean/Renewable Energy Virtual Investor ConferenceMarketing847413
 
Ivan Verkalets: The Relevance of ISO 9001 & 27001 for Outsourcing Excellence ...
Ivan Verkalets: The Relevance of ISO 9001 & 27001 for Outsourcing Excellence ...Ivan Verkalets: The Relevance of ISO 9001 & 27001 for Outsourcing Excellence ...
Ivan Verkalets: The Relevance of ISO 9001 & 27001 for Outsourcing Excellence ...Lviv Startup Club
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitybayusch
 
How do hotel linen suppliers contribute to sustainable and eco-friendly pract...
How do hotel linen suppliers contribute to sustainable and eco-friendly pract...How do hotel linen suppliers contribute to sustainable and eco-friendly pract...
How do hotel linen suppliers contribute to sustainable and eco-friendly pract...indhumathi546580
 
Digital Demo Day : Mastering High Volume Recruitment: Leveraging Language Ass...
Digital Demo Day : Mastering High Volume Recruitment: Leveraging Language Ass...Digital Demo Day : Mastering High Volume Recruitment: Leveraging Language Ass...
Digital Demo Day : Mastering High Volume Recruitment: Leveraging Language Ass...TalentView
 
Grevault battery storage system manufacturer
Grevault battery storage system manufacturerGrevault battery storage system manufacturer
Grevault battery storage system manufacturerGrevault
 
Dive into Machine Learning Event--MUGDSC
Dive into Machine Learning Event--MUGDSCDive into Machine Learning Event--MUGDSC
Dive into Machine Learning Event--MUGDSCRakshaAgrawal21
 
FICCI Monthly Bulletin February 2024.pdf
FICCI  Monthly Bulletin February 2024.pdfFICCI  Monthly Bulletin February 2024.pdf
FICCI Monthly Bulletin February 2024.pdfsubarnamostafa1
 
Diageo Strategy Presentation made in February 2024 CAGNY
Diageo Strategy Presentation made in February 2024 CAGNYDiageo Strategy Presentation made in February 2024 CAGNY
Diageo Strategy Presentation made in February 2024 CAGNYNeil Kimberley
 
SARomics Biostructures 2024 Company Presentation
SARomics Biostructures 2024 Company PresentationSARomics Biostructures 2024 Company Presentation
SARomics Biostructures 2024 Company PresentationSalam Al-Karadaghi
 
BeMetals Presentation_February_15_2024.pdf
BeMetals Presentation_February_15_2024.pdfBeMetals Presentation_February_15_2024.pdf
BeMetals Presentation_February_15_2024.pdfDerekIwanaka1
 

Recently uploaded (20)

Let’s get moving! Setting some goals Optimizing your workflow
Let’s get moving! Setting some goals Optimizing your workflowLet’s get moving! Setting some goals Optimizing your workflow
Let’s get moving! Setting some goals Optimizing your workflow
 
Cracking the Leadership Shadow Code.pptx
Cracking the Leadership Shadow Code.pptxCracking the Leadership Shadow Code.pptx
Cracking the Leadership Shadow Code.pptx
 
Miller Coors Presentation at CAGNY Feb 2024
Miller Coors Presentation at CAGNY Feb 2024Miller Coors Presentation at CAGNY Feb 2024
Miller Coors Presentation at CAGNY Feb 2024
 
02.22.2024 Email Options in Bloomerang.pdf
02.22.2024 Email Options in Bloomerang.pdf02.22.2024 Email Options in Bloomerang.pdf
02.22.2024 Email Options in Bloomerang.pdf
 
The value chain is a concept that describes the full range of activities and ...
The value chain is a concept that describes the full range of activities and ...The value chain is a concept that describes the full range of activities and ...
The value chain is a concept that describes the full range of activities and ...
 
Ensuring Financial Integrity: Conducting Effective Audits of Branch Office Ac...
Ensuring Financial Integrity: Conducting Effective Audits of Branch Office Ac...Ensuring Financial Integrity: Conducting Effective Audits of Branch Office Ac...
Ensuring Financial Integrity: Conducting Effective Audits of Branch Office Ac...
 
Lazaro-Lugo_Sandra_.M.B_.pb1_2025October-2.pptx
Lazaro-Lugo_Sandra_.M.B_.pb1_2025October-2.pptxLazaro-Lugo_Sandra_.M.B_.pb1_2025October-2.pptx
Lazaro-Lugo_Sandra_.M.B_.pb1_2025October-2.pptx
 
Danylo Fedirko: Leveraging AI in SEO and optimizing for SRE (ChatGPT and Bard...
Danylo Fedirko: Leveraging AI in SEO and optimizing for SRE (ChatGPT and Bard...Danylo Fedirko: Leveraging AI in SEO and optimizing for SRE (ChatGPT and Bard...
Danylo Fedirko: Leveraging AI in SEO and optimizing for SRE (ChatGPT and Bard...
 
SlideEgg_300445-Apple Inc(1).pptx case study
SlideEgg_300445-Apple Inc(1).pptx case studySlideEgg_300445-Apple Inc(1).pptx case study
SlideEgg_300445-Apple Inc(1).pptx case study
 
Clean/Renewable Energy Virtual Investor Conference
Clean/Renewable Energy Virtual Investor ConferenceClean/Renewable Energy Virtual Investor Conference
Clean/Renewable Energy Virtual Investor Conference
 
Ivan Verkalets: The Relevance of ISO 9001 & 27001 for Outsourcing Excellence ...
Ivan Verkalets: The Relevance of ISO 9001 & 27001 for Outsourcing Excellence ...Ivan Verkalets: The Relevance of ISO 9001 & 27001 for Outsourcing Excellence ...
Ivan Verkalets: The Relevance of ISO 9001 & 27001 for Outsourcing Excellence ...
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivity
 
How do hotel linen suppliers contribute to sustainable and eco-friendly pract...
How do hotel linen suppliers contribute to sustainable and eco-friendly pract...How do hotel linen suppliers contribute to sustainable and eco-friendly pract...
How do hotel linen suppliers contribute to sustainable and eco-friendly pract...
 
Digital Demo Day : Mastering High Volume Recruitment: Leveraging Language Ass...
Digital Demo Day : Mastering High Volume Recruitment: Leveraging Language Ass...Digital Demo Day : Mastering High Volume Recruitment: Leveraging Language Ass...
Digital Demo Day : Mastering High Volume Recruitment: Leveraging Language Ass...
 
Grevault battery storage system manufacturer
Grevault battery storage system manufacturerGrevault battery storage system manufacturer
Grevault battery storage system manufacturer
 
Dive into Machine Learning Event--MUGDSC
Dive into Machine Learning Event--MUGDSCDive into Machine Learning Event--MUGDSC
Dive into Machine Learning Event--MUGDSC
 
FICCI Monthly Bulletin February 2024.pdf
FICCI  Monthly Bulletin February 2024.pdfFICCI  Monthly Bulletin February 2024.pdf
FICCI Monthly Bulletin February 2024.pdf
 
Diageo Strategy Presentation made in February 2024 CAGNY
Diageo Strategy Presentation made in February 2024 CAGNYDiageo Strategy Presentation made in February 2024 CAGNY
Diageo Strategy Presentation made in February 2024 CAGNY
 
SARomics Biostructures 2024 Company Presentation
SARomics Biostructures 2024 Company PresentationSARomics Biostructures 2024 Company Presentation
SARomics Biostructures 2024 Company Presentation
 
BeMetals Presentation_February_15_2024.pdf
BeMetals Presentation_February_15_2024.pdfBeMetals Presentation_February_15_2024.pdf
BeMetals Presentation_February_15_2024.pdf
 

WebShield eP3 Network Overview (02-04-2017)

  • 1. Jonathan Hare CEO, WebShield Inc. jonathan@webshield.io (415) 265-3250 eP3 Network Ecosystem Overview Empowering People with Privacy and Personalization www.eP3.network
  • 2. 2 Traditional enterprise-centric security and policy enforcement creates an inherent conflict between privacy, security and sharing… …making it fundamentally incapable of enabling personalization while protecting privacy and security on a global scale. WebShield Inc.
  • 3. No reliable way for disparate organizations and systems to agree when they are talking about the same person (either for online users, or records about them) No robust way to enforce policies or enable personalization without undermining privacy (enterprises control the “keys” to data, must understand context and monitor activities to enforce policies) No reliable way to de-identify comprehensive longitudinal records (genomics, claims, clinical, demographics, online behavior, etc.) No way to get disparate stakeholders to trust each other with sensitive resources (can’t agree on policies, commercial terms, or who is in control) No way to link, analyze or use data without decrypting it somewhere (who is trusted with the keys for everyone’s data?) The Fundamental Barrier Enterprise-centric computing Personalization with Privacy 3 WebShield Inc.
  • 4. 4 fragmented islands of data and functionality, ineffective personalization and process optimization across organizations, systemic lack of security, privacy and consumer control, and periodic disasters... It always ends the same way WebShield Inc.
  • 5. 5 We need to try something different that completely eliminates the fundamental conflict between privacy and sharing… WebShield Inc.
  • 6. 6 WebShield Inc. New Paradigm: “Quantum Privacy” obfuscate data so that it is both - fully opaque (meaningless gibberish) and - fully computable (no loss of information) - at the same time… simultaneously enforce policies of all stakeholders at the finest possible level of granularity (‘quantum level’) before any meaningful data is revealed to anyone (including “insiders”)
  • 7. enables global pooling and analytics of proprietary and regulated data 7 WebShield Inc. eP3 Network Ecosystem Empowering People with Privacy and Personalization open, self-funding and freely available – with privacy and prosperity for all Unified Trust Model supports diverse trust criteria for regulatory compliance, audit processes, commercial terms and access authorization by disparate stakeholders Trust Network precision cross-organizational policy enforcement via certified cloud-based trust authorities Privacy Network frictionless privacy-preserving data pooling, cloud analytics & personalization on a global scale Quantum Privacy
  • 8. Empowering People with Privacy and Personalization 8 eP3 Network Ecosystem eP3 Network Ecosystem is an informal multi-sector consortium of non-profits, commercial vendors, standards organizations, enterprises, research institutions, government agencies and individuals committed to empowering people with privacy and personalization. This means giving people in every aspect of their lives the ability to: • find, access and securely share information about them or that they’re authorized to use, and to… • select policies for privacy and security protection and personalization, while at the same time… • allowing individuals and society to benefit from shared services for precision personalization, process optimization, and population research on a global scale. Non-Profit and Trust Governance Launch Partners WebShield Inc.
  • 9. WebShield Inc.9 • Software defined ‘neutral zone’ enables privacy-preserving data pooling, analytics and access authorization on a global scale - all data is encrypted and anonymized at source, and linked to publisher’s “trust criteria” - supports analytics or policy enforcement without revealing any information to anyone • End-to-end attribute-level enforcement of trust criteria - commercial terms, regulatory compliance, authorized recipients and purposes of use, etc. - each publisher remains in control of their resources regardless of where they flow - no data sharing agreements or consent necessary for processing in the ‘neutral zone’ • Trust criteria automatically inherited by aggregates, analytic outputs and user responses - stakeholder’s policies are consistently enforced on any resources published, and upon anything directly or indirectly derived from them - enables global-scale pooling across organizations and people that don’t trust each other Privacy Network
  • 10. Privacy Network 10 WebShield Inc. Privacy Network 2952.3367731... sJ92fKA24sL… 72679426.3166… 82Fa4JiqR3i… 93742157.4126… We2B381H5… Privacy Proxy Node 1 Node 2 Node N encrypt tokenize randomize crypto-hash Input Graph 148.53 148.53 clear text Privacy Graph apply policies obfuscatePrivacy Algorithm management plane control plane data plane tokenized randomized crypto-hashed 429jQk1Mz9… 93742157.4126… We2B381H5… {148.53} {dx72Fx92Ua…} {T62p2JsV9sI…} 429jQk1Mz9…T62p2JsV9sI…dx72Fx92Ua… Trust Authority Privacy Algorithms Graphs are broken up into individual values, obfuscated by distributed “privacy pipes”, then re-assembled into a “privacy graph” made up entirely of opaque tokens. Privacy graphs are completely opaque and meaningless to any observer, yet remain fully computable. Algorithms and policy rules obfuscated by the same privacy algorithm can be executed upon privacy graph data without revealing any information to anyone. Self-describing input graphs including data, algorithms, schema, provenance & trust criteria
  • 11. 11 WebShield Inc. Privacy Network Privacy Proxy Node 1 Node 2 Node N encrypt tokenize randomize crypto-hash Input Graph 148.53 148.53 clear text 148.53 Privacy Graph apply policies obfuscate enforce policies de-obfuscate Privacy Algorithm management plane control plane data plane tokenized randomized crypto-hashed 429jQk1Mz9… 93742157.4126… We2B381H5… 429jQk1Mz9… {148.53} {dx72Fx92Ua…} {T62p2JsV9sI…} 429jQk1Mz9…T62p2JsV9sI…dx72Fx92Ua… Trust Authority Privacy Algorithms Privacy graph information can be resolved into clear text only after all of the trust criteria linked to all resources that contributed to creating it are enforced. • vastly better security and privacy (up to millions of times more secure) • unlimited aggregation and analysis with no loss of accuracy • precision access control (single attribute, single recipient, specified purpose, one-time) • no need to agree on trust criteria Privacy Network
  • 12. WebShield Inc.12 • Inherently neutral and open – can incorporate any standards or proprietary technologies - supports any data models, assessment methodologies, trust frameworks, audit standards, - supports any algorithms, software, technology infrastructure, etc. • Simultaneous enforcement of disparate policies & regulatory requirements - payment/licensing terms, privacy, security, authorized recipients, authorized purposes - HIPAA, CFR 42-2, GLBA, FERPA, IRS 6103, COPPA, FISMA, ISO-2701/2, EU GDPR, etc. - distributed governance by multiple stakeholders (including the subject of records) • Certification / accreditation of cloud-based shared services by neutral trust authorities - data sharing, cybersecurity, analytics, decision support, secure communication, etc. - FISMA/FedRAMP, EHNAC (18 accreditations programs), SAFE-BioPharma (FICAM), etc. Unified Trust Model
  • 13. Can dynamically combine any authentication services into a personalized many-factor authentication network that learns to recognize a user across devices and through time with an unprecedented combination of convenience, accuracy and privacy. WebShield Inc.13 Authentication SMS Touch IDVoice Authenticator Password Device ID Email ID Verification Privacy Network Genomic Exchange & Clearinghouse MPIs Online Device Profiles Insurance Claims Phone Registries Insurance Enrollment HR Payroll Government Records ERP/CRM Postal Database Security Directories Online Profiles In-Person Proofing EHR Records Labs Records Credit Bureau Online Device Profiles Public Records Practice Management Professional Licensing Trust Network Please enter your email address or mobile number: Mobile Phone - or - Email Address other options… * Protected by the Privacy Network ✅ Accept Privacy Policies explain CancelVerify my Identity* jonathan.hare@me.com Choose how to authenticate your identity: ◎ Message my Cell Phone AND send me Email ◎ Send me Email AND Google Authenticator ◎ Touch ID on my Cell Phone ` explainCancelAuthenticate Me Patient Record Request Digitally Signed Provider NPI Patient ID (at Provider) Deliver to (Direct Address) Patient Digital Signature Trust Network Certified / Accredited Authorization Credentials • Encrypted with intended recipient’s public key • Digitally signed by multiple trusted authorities • Attributes verified with unprecedented assurance • Linked to privacy-preserving trust authorities for cybersecurity, regulatory compliance, licensing, etc. • Eliminates identity theft and cyber-security fraud Supports convenient global single-sign-on and high-assurance authentication and authorization, with no need to remember usernames, passwords or account numbers. A diverse network of authoritative data sources, record-linking algorithms and consent and authorization services enables privacy-preserving precision identity and attribute proofing, record linking, resource discovery and access authorization – all without revealing any personal information to anyone.
  • 14. 14 WebShield Inc. treating clinicians & patient general public researchers & care managers Data and other resources can be shared, aggregated and analyzed in a virtual ‘data ocean’ without risking the regulatory compliance, privacy, security or commercial rights of any participants. trust authorities identity networks analytics networks data networks Data remains obfuscated until all trust criteria are satisfied for all inputs and all stakeholders, enforced with the finest-grained access control possible – individual attributes, a single recipient, a specified purpose, one time, on a trusted device Global Crowdsourcing Claims Records EHR Records Lab Records Pharmacy Records Genomic Data Practice Management Device Data Demographic Data Online Behavior Other Records trust frameworks & brands algorithms computing infrastructure software & cloud services schemas & data models Free crowdsourcing and value-added syndication via a virtual exchange and marketplace supports a self-funding network freely available to any participants….
  • 15. Child Teacher Clinician Colleague Friend Spouse any credential or relationship Trusted Social Networking Privacy Network WebShield Inc.* Brands shown are for illustration only any social media, messaging clients or websites any digital content general health education banking children online My Policies edit my polices JonathanHare cancel people devices security payments advertising messaging privacy general Users and organizations can link privacy and security policies directly to their content (documents, messages, pictures, videos, web pages, etc.), and freely share it through standard messaging clients, social media apps, websites and collaboration tools. Content is encrypted end-to-end until recipient is authenticated and authorized, and not revealed to apps or websites used for sharing. Neutral trust authorities independently verify the identities, credentials and relationships of recipients, enabling trusted social networking with built-in regulatory compliance (HIPAA, FERPA, COPPA, etc.) and rights management. 15
  • 16. Self-funding Network Each additional solution, person or organization pulls in more data, users, and ecosystem resources, creating a self-reinforcing network effect. Business Model Enabling global crowd-sourcing of privacy sensitive and proprietary resources translates into vastly lower costs, free access and unprecedented personalization and privacy. WebShield Inc.16 in-kind resources Individuals Enterprisesanonymised data, opt-ins, online engagement Consumers and enterprises “pay” for solutions with cash and/or in-kind resources. $ $ Solutions Vendors licensed resources 16
  • 17. privacy network data personalized education personalized entertainment identity fraud prevention virtual exchange & marketplace payment syndicate trust syndicate identity syndicate personalized healthcare 17 WebShield Inc. $ $ $$ $ $ $ $ $ $ $ Privacy Network Syndicates are virtual joint ventures whose members pool resources to create value-added services, receiving a share of resulting revenues and/or access to free services… revenues and in-kind resources generated by syndicates are allocated among their members based upon agreed-upon payment and syndication terms…. Enterprises Individuals
  • 18. eP3 Network Ecosystem has sweeping implications anywhere that privacy and trust matters 18 WebShield Inc. By empowering individuals and eliminating regulatory and commercial barriers to sharing resources, the eP3 Network cross-fertilizes previously disparate markets into a vast exchange and marketplace with a common underlying network of users, devices, computing infrastructure, trust authorities and data sources
  • 19. WebShield Inc. Merit-Based Incentive Payment System Alternative Payment Models OR MACRAMedicare Access and CHIP Reauthorization Act Moonshot to Cure Cancer Veterans Access Choice and Accountability Act fraud & abuse 19 eP3 Network for Personalized Healthcare
  • 20. Patient20 Hospital Radiology Imaging Center Labs Skilled Nursing Facility Pharmacy Genomics Consumer Devices & Apps Healthcare Clearinghouses Clinic Research Institutions Commercial Payers Federal Agencies Privacy Network Patient-Centered Health - On-demand, Privacy-Preserving, National Scale • comprehensive patient-centered longitudinal records • personalized care management & cost, quality and safety metrics • personalized prior authorization / pre-cert / e-referral management • patient-centered secure messaging, data access and care coordination • forgery proof audit trails, virtual audits, automated pre-emptive fraud prevention WebShield Inc.
  • 21. Patient21 Hospital Radiology Imaging Center Labs Skilled Nursing Facility Pharmacy Carebox VisionTree Genomics Consumer Devices & Apps Healthcare Clearinghouses Clinic Research Institutions Consumer Directed Exchange Network Commercial Payers Federal Agencies Identity and Authorization OpenID Connect OAuth 2.0, SAML UMA (User Managed Access) POET (Pre-OAuth Entity Trust) HEART Profile Data Exchange FHIR Direct Messaging eHealth Exchange Blue Button Privacy Network Open Standards WebShield Inc.
  • 22. web phone email tablet Privacy Network 22 Preemptive Fraud and Abuse Prevention • better identity screening and surveillance keeps “bad” guys out • forgery-proof audit trails keeps “good” guys honest and productive • analytics “connects dots” better, detects fraud and abuse before delivery or payment • Pre-payment Virtual Audits are self-funding, effective, fair, scalable • Trusted Provider Fast Track builds compliance into care coordination, flags and deters inappropriate utilization before it happens WebShield Inc.
  • 23. eP3 Network for Consumer Online and e-Commerce • Vastly better privacy and security for consumers, dramatically greater revenue for industry. • Privacy-preserving global single-sign-on and 1-click “Buy Button” enables trusted social commerce via any messaging client, social media app or website. • Precision anonymous personalization increases advertising revenue yield 500%+, opens new markets in personalized services and cross-organizational process optimization. • User-centric syndication gives consumers convenient access to content they want on any device at any time, while doubling online revenue for content owners. 23 WebShield Inc. Eliminating the conflict between privacy and personalization has sweeping implications
  • 24. Privacy Network Buy Season Pass $19.99 Watch Ad-Free for $1.99 Watch Free with Ads * Brands shown are for illustration only Watch Free with Ads Accept Privacy Protection Show Policies The Privacy Network uses information about you to authorize access to content, protect you from identity theft, and to enforce privacy policies on the use of your information and files. Cancel explain 1-click Privacy Protection opt-in First-time users must opt-in to privacy and cybersecurity protection in order to access protected content (e.g. a football game). Opt-in authorizes use of fully obfuscated data in order to anonymously: • authenticate user and verify attributes and relationships. • detect and verify user devices. • analyze obfuscated activity logs to detect identity theft & cyber-security fraud. • locate and authorize access to user’s records, accounts and digital media. • authorize 1-click payments. • enforce security, privacy and personalization policies of user and other stakeholders. better privacy, better security, better personalization • robust identity theft protection with multi-factor authentication, identity proofing and cyber-fraud detection. • user’s identity and personal data hidden from advertisers, content owners, apps and websites. • all user data and activity logging fully obfuscated and anonymised – no insider access by anyone. • personal information only revealed if authorized by user. • all payments information fully tokenized. The Privacy Network eliminates the conflict between privacy, personalization and convenience WebShield Inc.24
  • 25. Proving authorization without revealing any personal information to anyone Privacy Network Buy Season Pass $19.99 Watch Ad-Free for $1.99 Watch Free with Ads * Brands shown are for illustration only Watch Free with Ads Commercial Credit Bureaus Phone RegistriesProfessional Licensing Marketing Profiles Data Aggregators Fraud Analytics Enterprise Healthcare Records Security DirectoriesEmployer HR Retailer Affinity ProgramsSupply- Chain Insurance Databases Banking Records` CRM ERP Government Education Records Public Records DMV Records State & Local Records IRS Records Social Security Citizenship & Immigration Healthcare Data Sources (3) virtual database of obfuscated and anonymised data used to verify user’s identity, authorize access and derive authentication options. Accept Privacy Protection Show Policies Cancel explain Text my Cell Send me Email your phone your email- or - The Privacy Network does not recognize this device. To authorize access, please enter one of the following: other options verify device(415) 265-3250 verify device (Y4t) rG2-Ua91 xRs4Mw42dAk baX3yPEq7Nm (6) obfuscated log entries returned (5) User authenticated, which in turn: • verifies identity, authorizes access • validates privacy protection opt-in • registers device to enable subsequent no-login access and 1-click buy no personal information revealed to anyone E9ts S120Ls7V xRs4Mw42dAk baX3yPEq7Nm phone voice print password Authentication Services device fingerprint email fingerprint facial biometric (4) passes encrypted authentication parameters to neutral authentication services that satisfy authorization requirements. (415) 265-3250 jonathan.hare@me.com FaceBookID 2335135 Trust Authorities Y4trG2-Ua91 (2) attributes are obfuscated and anonymised by Privacy Network and submitted to Trust Authorities. Anonymised & Obfuscated Data Obfuscated Computation Unified Trust Model WebShield Inc.25 (1) for first-time users and unrecognized devices, user enters any attribute (phone, email, etc.) that specifies their identity.
  • 26. Individual users gain direct control of privacy and personalization policies Privacy Network Buy Season Pass $19.99 Watch Ad-Free for $1.99 Watch Free with Ads * Brands shown are for illustration only Watch Free with Ads Accept Privacy Protection Show Policies Cancel explain • Individuals control personal policies that are enforced globally on records and accounts held by any participating publisher, organization or online service. • Enables consumers to assert their legal rights to access and share their healthcare (HIPAA), educational (FERPA), financial and government records. • Consumer control with neutral governance of security, privacy and access control mitigates regulatory liability of participants. Accept Privacy Protection Show Policies general health education banking children online My Policies edit my polices Jonathan Hare cancel people devices security payments advertising messaging privacy general Retrieve my records for my personal health network: Healthcare providers can access my personal health network: o whenever they are treating me, as long as they are agree to enforce HIPAA. o only if they have my express consent. In an emergency, Emergency Room and Ambulance staff may: o access my complete personal health record network. o access only my critical health information (e.g. allergies, vaccinations, medications). o NOT access my personal health vault, even if my life is in jeopardy. I want to be notified whenever: o anyone accesses my health records. o my records are accessed by someone not on my list of authorized providers. o I do NOT want to be notified – just keep track so I can check later if I want to. Find and request copies of my health records and store them for me. Microsoft HealthVaultStore in: Welcome, Jonathan: You are now being protected by the Privacy Network: 26 WebShield Inc.
  • 27. 1-click purchasing anywhere, without privacy or security risks WebShield Inc. Privacy Network Buy Season Pass $19.99 Watch Ad-Free for $1.99 Watch Free with Ads * Brands shown are for illustration only27 • Embeddable “Buy Button” enables 1-click, no-login purchasing – can be linked to any digital content or online offer. • No need to reveal sensitive identity or credit card information to verify identity, log in, create accounts or authorize payments. • Eliminates identity fraud and cyber-security risks with multi-factor authentication and identity proofing, forgery-proof audit trails, and global ‘privatized’ fraud analytics.
  • 28. Precision-targeted advertising with “perfect privacy” 28 WebShield Inc. Privacy Network Buy Season Pass $19.99 Watch Ad-Free for $1.99 Watch Free with Ads • Enables 500%+ increase in online advertising revenue. • Anonymised advertising networks can be linked directly to any online content. Ads are personalized without login, and delivered via any social network, messaging app or website. • Ad-stream is embedded in content and can’t be detected or blocked by ad-blockers or non-participating websites or apps. * Brands shown are for illustration only
  • 29. Global single-sign-on – 1-click access on any registered user device, for any online content 29 WebShield Inc. Any Device Privacy Network • 1-click access to all purchases, subscriptions and ad-supported content from any participating retailers and publishers, on any user devices. • Devices can be provisioned on demand without remembering account names or passwords or revealing any sensitive information. • Seamless digital library management across all retailers and publishers. * Brands shown are for illustration only
  • 30. Any Device Any Online Channel User-centric social commerce and content distribution Privacy Network Buy Episode 1 $1.99 Buy Season 1 $15.99 Watch Free with Ads Hi, Jonathan My Policies Protected by Privacy Network Watch Free with Ads 30 WebShield Inc.* Brands shown are for illustration only • Digital content and e-commerce offers can be freely distributed through any social media apps, messaging clients or websites. • Digital content (and embedded ads) can be dynamically personalized without requiring user login or revealing any sensitive information to anyone. • Branded “Buy” or “Subscribe” buttons and advertising networks can be embedded in any online content, offering owners multi-channel distribution without losing control.
  • 31. Any Device Any Online Channel User-Centric Syndication: consumers create their own personal entertainment networks Privacy Network Any Content Movies Videos Games Digital Media Messaging Files TV Music Web Sites WebShield Inc.31 * Brands shown are for illustration only • Content owners more than double their online revenues via precision targeted anonymous ads, free social marketing, and frictionless conversion into purchases and paid subscriptions. • Consumers choose their own personal bundle of free ad-supported viewing, paid subscriptions and paid on-demand or purchases. • Online channels incorporate Privacy Network services to deliver faster performance and “native” user experience in exchange for a share of advertising and commerce revenues.
  • 32. WebShield Inc.32 April eP3 Network Ecosystem Stakeholder Meetings & Events April 25th in Washington DC: • Patient-Centered Data Liquidity and Regulatory Compliance • Sponsored by EHNAC, SAFE BioPharma Association, NH-ISAC April 26th in Washington DC: • Consumer Empowerment and Privacy Protection • Veterans Health, Education and Student Privacy, Child Safety, Identity & Privacy for BlockChain, Legislative Opportunities, etc. • Organized by moderators, speakers from IEEE, Society for Women’s Health, Future of Privacy Forum, Veterans Prostate Cancer Awareness, etc. April 27th - 28th in Washington DC: • Health Datapalooza Start-up Panel, Consumer Directed Exchange Exhibit Hall