SlideShare a Scribd company logo
1 of 3
Download to read offline
Copyright © 2015, CYVA Research Corporation. All rights reserved.
COMPANY
Company Name: CYVA Research
Corporation
Address: 3525 Del Mar Heights
Road, Suite #327
City, State, Zip: San Diego, CA
92130
URL: http://www.cyva.com
CONTACT
Name: Kevin O’Neil
Position: Founder, Chairman &
CEO
eMail: koneil@cyva.com
Phone: 858-793-8100
FINANCIAL INFORMATION
Funding Stage: Early Stage
Patent Revenue: ~$420,000
Capital Seeking: $20 Million
Previous Capital: ~$400,000
Investors: Angel investors,
founder
Use of Proceeds: Product and
service development, operational
infrastructure, marketing and sales,
patent licensing.
COMPANY PROFILE
Industry: Security , Identity and
Information Asset Management
Management: Kevin O’Neil - CEO,
Dr. Glenn Seidman - CTO, Jay Sato
- CMO
Board of Directors: Kevin O’Neil,
Ron Martin, Dwight Whiting, John
Fowler
Advisors: Rafael Fernandez,
Geoffrey Strongin, Gilles Lisimaque,
Scott Blackmer, Esq.
Company Structure: Sub-S Corp.
CYVA Research Corporation (“CYVA” or the “Company”)
CYVA Research’s internationally patented Self-Determining Digital Persona™ (SDDP™) and
Trusted Network Community®
(TNC®
) technologies empower consumers and their chosen
custodians to securely control their digital identity and information assets anywhere, anytime. The
firm’s innovative self-protecting, self-governing identity and information asset management
technologies empower consumer-centric privacy and security at a wholly new and disruptive level.
Business Summary: CYVA’s user-controlled identity and information asset
management technologies are the foundation in strategically advancing user-
controlled, user-monetized mobile advertising, secure, trusted and privacy
enforced social networking for civilians and warfighter families, and a
smartphone-based, patient-controlled emergency medical agent.
Lifesaving Emergency Medical Agent™: An essential requirement
addressed by CYVA’s Emergency Medical Agent (EMA) is proactively mitigating
the annual deaths of over 400,000 patients resulting from preventable medical
errors, many due to a lack of or incomplete patient medical information. Result -
loss of life caused by preventable errors with litigation costs amounting to 2-4
billion dollars annually.
Objective: Securely Place Lifesaving Information in the Hands of the Right
People at the Right Moment
Every 14 seconds in the United States a car accident with injuries occurs. We
envision an Emergency Medical Agent being automatically dispatched to local
police, fire, 911 operators, emergency care personnel and facilities.
Why a Patient-Controlled Emergency Medical Agent?: Every week there is
news of another data breach, another failure to protect our human-digital
persona, our personal information and ourselves from abuse. Medical identity
theft is especially dangerous as it contaminates a true medical record with
another person’s health information. During an emergency this contaminated
health record can cause severe errors to be made, a dire risk to patients.
An estimated 1.8 million individuals suffered medical ID theft in 2013. 78% of
victims want direct assertive control of their medical record, they trust no one.
(source: 2013 Survey on Medical Identity Theft, Ponemon Institute)
People have a right to control their data wherever it exists. We provide
people the tools and services to take control of their personal information.
Restoring patient trust will be difficult. Trust in a business will be driven by a
verifiable respect for privacy: Human-Digital Dignity. CYVA’s user-controlled
identity technologies are a means for patients to take control and distinguish a
verifiably privacy respectful health care provider from an untrustworthy one.
Business Model: The EMA is part of a suite of user-controlled, user-
monetized identity and information asset management services. These services
are offered in a subscription and/or user-monetized advertising model wherein
consumers directly control and monetize their information assets sharing the
Trusted Agent-based Advertising (TA2) revenue with CYVA Research.
Providing consumers a simple, easy to manage and secure digital medical
identity that they control, at any time, from anywhere with their smartphones, will
empower a new and necessary patient-centric health care culture and industry.
Financial Summary ($000's) Year 1 Year 2 Year 3 Year 4 Year 5
Total Revenue 0 13,438 209,549 617,361 1,220,746
Operating costs 6,388 13,760 24,410 26,836 50,575
EBITDA (6,388) (322) 185,139 590,525 1,170,171
Copyright © 2015, CYVA Research Corporation. All rights reserved.
Kevin O’Neil, Founder,
Chairman & CEO
25+ years information
technology, diverse industry
experience: military,
aerospace, financial services.
Information security, IT
governance and privacy
assurance, principal inventor
and enterprise architect. B.S.,
Systems Science and B.A.,
Management Science,
University of California San
Diego - Revelle College
Ron Martin, COO
Ron Martin is the retired
President and CEO of Mission
Federal Credit Union, offering
consumer financial services to
more than 130,000 members
with an affinity to the San
Diego educational community.
Ron is a graduate of the
University of Puget Sound in
Tacoma, Washington, with
degrees in Business
Administration and Finance.
Martin was also an officer in
the US Navy.
Dr. Glenn Seidman, CTO
Glenn Seidman has more than
20 years of experience in the
design and development of
products and technology for
enterprise computing
environments. He holds 7
patents and 15 patents
pending. Dr. Seidman holds
Ph.D. and M.S. degrees in
Computer Science from
UCLA, and a B.S. in
Engineering and Applied
Science from Caltech.
Jay Sato, CMO
Jay Sato has over 25 years of
executive marketing
experience at Sony Electronic
Inc. UC Berkeley Engineering
degree and Harvard MBA.
eMetro Emergency Medical Agent
Capability Objectives
The primary objective is saving lives. Another
core objective is to empower secure patient-
doctor control over the exchange and
processing of protected health information
anywhere, anytime. And to improve
marshaling, coordinating and delivering
emergency health care. To achieve these
objectives a standardized, unambiguous and
interoperable set of emergency medical
information objects and governing privacy
and security rules are essential.
CYVA Research will utilize existing (e.g., HL7
V3, ICD-10) and emerging health information,
security and digital identity reference models,
architectures, recommendations and
standards as they become available (e.g.,
NIST Guidelines on Hardware- Rooted
Security in Mobile Devices (draft) Special
Publication 800-164, Trusted Execution
Environment, Hardware Root of Trust). Many
core standards are in place with new
standards in progress to address gaps.
Going Beyond Current Legal & Regulatory
Data Protection Instruments
International and U.S. data protection laws
and regulations governing personal
information continue to evolve but are
continually playing catch-up in a world of
technological change, dynamic market forces
and persistent cyber security threats,
vulnerabilities and exploits. Omnibus laws
and regulations, Binding Corporate Rules,
privacy codes of conduct and harmonization
efforts have value. U.S. sectoral “patchwork”
of laws (e.g., HIPAA, HITECT, California data
security breach notification law SB 1386,
PCI, SOX) also have value but remain
inadequate as written laws can be too high
level, vague, open to interpretation, complex,
hard to change, unduly influenced by anti-
privacy lobbyist and difficult to enforce. A
new data protection paradigm is needed. Law
needs to be wrapped with the data,
executable and self-enforcing. The data
(primitive data) needs to be re-designed to be
self-protecting, self-governing with a resolute
purpose of placing humans in direct control
(applying their unambiguous law) over their
human-digital person wherever they exist.
User-Controlled Patient Identity and
Information Asset Management
Within and across health care providers there
is a fundamental need to securely and
continuously control the exchange and
ongoing processing of electronic health records (EHR), but patients are being left out.
Copyright © 2015, CYVA Research Corporation. All rights reserved.
CYVA Research’s user-controlled identity and information asset management
technologies and services empower a patient-controlled health care identity
wherein patients directly and assertively control their personal health records
(PHR), anywhere, anytime. Patients are empowered to manage their health
care experience more directly and participate more closely, confidently and
effectively in the continuous workflow of necessary exchanges and processing
of their personal health records.
Governing rules are authored by patients and/or their trusted custodians (e.g.,
primary care physicians, legal guardians) and are securely encapsulated and
assigned (bound) to and travel with
patient health information objects:
Human-Digital Integrity™ principle.
An individual’s data is never
separated from their authoritative
will, their policies. This innovative
approach brings a whole new level
of trustworthy and secure
processing as patients assertively
control their personal health
records anywhere, anytime.
EMA Privacy and Security Policy
Management Capability
Individual’s can set privacy and
security policy through the use of
the Policy Manager starting with
Policy Templates. Policy templates
are simpler and represent a pre-set
arrangement of standardized policy
configurations. More fine-grained
policy can be set to allow specific
actions, such as Display, Read,
Update, Exchange, Play and/or
Store. The Actions Permitted can
be assigned to the entire EMA set of protected health information objects or
selectively.
In the Policy Templates example shown the EMA will be sent to All In Case of
Emergency (ICE) group members, within a range of 25 miles, access granted
for 24 hours, Audit set to On, with Lockdown On and ICE Override On.
Patient’s can decide what Metered Time Policy best fits their needs. In this
case after 24 hours they wish all access be halted with Lockdown protections
applied and ICE Override privileges turned On. With ICE Override privileges
set to On an emergency care worker can enter a one-time password (OTP) to
regain access to the EMA and its encapsulated and encrypted protected
health information objects. This access will be audited as audit is set to On.
Audit is essential. Patients can see exactly who, what, where, when and why
their information is being processed; and can, at will, lock their deployed
EMAs anytime. A lockdown capability for patients is fundamental to security.
Trust and the Value of Respecting and Providing Patients Control
As a basic security principle patients should not trust anyone. They especially
should not trust any person, organization or institution that refuses to respect
the patient’s right to control (privacy) their information wherever it exists. A tool
to directly control and see an audit log of their private and personal health
information will set a new level of trustworthiness—a strategic differentiator.

More Related Content

What's hot

Introducing the mHealth Platform as a Service
Introducing the mHealth Platform as a ServiceIntroducing the mHealth Platform as a Service
Introducing the mHealth Platform as a Servicekidozen
 
mHealth Security: Stats and Solutions
mHealth Security: Stats and SolutionsmHealth Security: Stats and Solutions
mHealth Security: Stats and SolutionsKristie Allison
 
Information governance
Information governanceInformation governance
Information governanceGerardo Medina
 
Hospitals Magazine Who Will Run It
Hospitals Magazine Who Will Run ItHospitals Magazine Who Will Run It
Hospitals Magazine Who Will Run Itneillm
 
PKI Concerns in Healthcare
PKI Concerns in HealthcarePKI Concerns in Healthcare
PKI Concerns in Healthcarebarnetdh
 
Cyber Risk in Healthcare Industry- Are you Protected?
Cyber Risk in Healthcare Industry- Are you Protected?  Cyber Risk in Healthcare Industry- Are you Protected?
Cyber Risk in Healthcare Industry- Are you Protected? Mark Merrill
 
Future Of Healthcare It August 2010
Future Of Healthcare It   August 2010Future Of Healthcare It   August 2010
Future Of Healthcare It August 2010Mike Wons
 
HCAD_600_Paper1_Amer
HCAD_600_Paper1_AmerHCAD_600_Paper1_Amer
HCAD_600_Paper1_AmerAmer Nazar
 
Avior Healthcare Security Compliance Webcast Final1
Avior Healthcare Security Compliance Webcast Final1Avior Healthcare Security Compliance Webcast Final1
Avior Healthcare Security Compliance Webcast Final1jhietala
 
Citrix Customer Story: How Saint Francis Hospital & Medical Center Deploys A ...
Citrix Customer Story: How Saint Francis Hospital & Medical Center Deploys A ...Citrix Customer Story: How Saint Francis Hospital & Medical Center Deploys A ...
Citrix Customer Story: How Saint Francis Hospital & Medical Center Deploys A ...Citrix
 
What in the world is a digital hospital? Global trends in digital healthcare ...
What in the world is a digital hospital? Global trends in digital healthcare ...What in the world is a digital hospital? Global trends in digital healthcare ...
What in the world is a digital hospital? Global trends in digital healthcare ...MaRS Discovery District
 
Sarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small ProvidersSarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small ProvidersSarah Kim
 
Professor George Crooks - ECO 19: Care closer to home
Professor George Crooks - ECO 19: Care closer to homeProfessor George Crooks - ECO 19: Care closer to home
Professor George Crooks - ECO 19: Care closer to homeInnovation Agency
 
Tech Refresh - Cybersecurity in Healthcare
Tech Refresh - Cybersecurity in HealthcareTech Refresh - Cybersecurity in Healthcare
Tech Refresh - Cybersecurity in HealthcareCompTIA
 

What's hot (15)

Introducing the mHealth Platform as a Service
Introducing the mHealth Platform as a ServiceIntroducing the mHealth Platform as a Service
Introducing the mHealth Platform as a Service
 
mHealth Security: Stats and Solutions
mHealth Security: Stats and SolutionsmHealth Security: Stats and Solutions
mHealth Security: Stats and Solutions
 
Dov Greenbaum, "Avoiding Regulation in the Medical Internet of Things"
Dov Greenbaum, "Avoiding Regulation in the Medical Internet of Things"Dov Greenbaum, "Avoiding Regulation in the Medical Internet of Things"
Dov Greenbaum, "Avoiding Regulation in the Medical Internet of Things"
 
Information governance
Information governanceInformation governance
Information governance
 
Hospitals Magazine Who Will Run It
Hospitals Magazine Who Will Run ItHospitals Magazine Who Will Run It
Hospitals Magazine Who Will Run It
 
PKI Concerns in Healthcare
PKI Concerns in HealthcarePKI Concerns in Healthcare
PKI Concerns in Healthcare
 
Cyber Risk in Healthcare Industry- Are you Protected?
Cyber Risk in Healthcare Industry- Are you Protected?  Cyber Risk in Healthcare Industry- Are you Protected?
Cyber Risk in Healthcare Industry- Are you Protected?
 
Future Of Healthcare It August 2010
Future Of Healthcare It   August 2010Future Of Healthcare It   August 2010
Future Of Healthcare It August 2010
 
HCAD_600_Paper1_Amer
HCAD_600_Paper1_AmerHCAD_600_Paper1_Amer
HCAD_600_Paper1_Amer
 
Avior Healthcare Security Compliance Webcast Final1
Avior Healthcare Security Compliance Webcast Final1Avior Healthcare Security Compliance Webcast Final1
Avior Healthcare Security Compliance Webcast Final1
 
Citrix Customer Story: How Saint Francis Hospital & Medical Center Deploys A ...
Citrix Customer Story: How Saint Francis Hospital & Medical Center Deploys A ...Citrix Customer Story: How Saint Francis Hospital & Medical Center Deploys A ...
Citrix Customer Story: How Saint Francis Hospital & Medical Center Deploys A ...
 
What in the world is a digital hospital? Global trends in digital healthcare ...
What in the world is a digital hospital? Global trends in digital healthcare ...What in the world is a digital hospital? Global trends in digital healthcare ...
What in the world is a digital hospital? Global trends in digital healthcare ...
 
Sarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small ProvidersSarah Kim HIPAA for Small Providers
Sarah Kim HIPAA for Small Providers
 
Professor George Crooks - ECO 19: Care closer to home
Professor George Crooks - ECO 19: Care closer to homeProfessor George Crooks - ECO 19: Care closer to home
Professor George Crooks - ECO 19: Care closer to home
 
Tech Refresh - Cybersecurity in Healthcare
Tech Refresh - Cybersecurity in HealthcareTech Refresh - Cybersecurity in Healthcare
Tech Refresh - Cybersecurity in Healthcare
 

Similar to CYVA_EMA3PageVentureSummaryAngelAM020150717

Research Report Health Informatics 05-2016_FINAL
Research Report Health Informatics 05-2016_FINALResearch Report Health Informatics 05-2016_FINAL
Research Report Health Informatics 05-2016_FINALBenjamin Wyrick
 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxwlynn1
 
Securing the digital front door
Securing the digital front doorSecuring the digital front door
Securing the digital front doorRyan Coleman
 
mHealth Security: Stats and Solutions
mHealth Security: Stats and SolutionsmHealth Security: Stats and Solutions
mHealth Security: Stats and SolutionsESET North America
 
MeHI Privacy & Security Webinar 3.18.15
MeHI Privacy & Security Webinar 3.18.15MeHI Privacy & Security Webinar 3.18.15
MeHI Privacy & Security Webinar 3.18.15MassEHealth
 
Revolutionary M-Health Technology
Revolutionary M-Health TechnologyRevolutionary M-Health Technology
Revolutionary M-Health TechnologyMy Crisis Records
 
Revolutionary m-Health Technology
Revolutionary m-Health TechnologyRevolutionary m-Health Technology
Revolutionary m-Health Technologyjtheis22
 
HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK? HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK? IJNSA Journal
 
Hot Topics in Privacy and Security
Hot Topics in Privacy and SecurityHot Topics in Privacy and Security
Hot Topics in Privacy and SecurityPYA, P.C.
 
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...ePlus
 
Systems AdminstratorAs your systems administrator  person I am.docx
Systems AdminstratorAs your systems administrator  person I am.docxSystems AdminstratorAs your systems administrator  person I am.docx
Systems AdminstratorAs your systems administrator  person I am.docxssuserf9c51d
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggonermihinpr
 
Developing a Privacy Culture in Health Care Organizations:The Experiences of ...
Developing a Privacy Culture in Health Care Organizations:The Experiences of ...Developing a Privacy Culture in Health Care Organizations:The Experiences of ...
Developing a Privacy Culture in Health Care Organizations:The Experiences of ...empower
 
How COVID-19 is Accelerating Digital Transformation in Health and Social Care?
How COVID-19 is Accelerating Digital Transformation in Health and Social Care?How COVID-19 is Accelerating Digital Transformation in Health and Social Care?
How COVID-19 is Accelerating Digital Transformation in Health and Social Care?NUS-ISS
 
ECOWAS Integrated eHealthcare Solution Overview
ECOWAS Integrated eHealthcare Solution OverviewECOWAS Integrated eHealthcare Solution Overview
ECOWAS Integrated eHealthcare Solution OverviewWilbert Williams, MBA
 
Healthcare Events 2024 To Discuss Cybersecurity Measures For Protecting Patie...
Healthcare Events 2024 To Discuss Cybersecurity Measures For Protecting Patie...Healthcare Events 2024 To Discuss Cybersecurity Measures For Protecting Patie...
Healthcare Events 2024 To Discuss Cybersecurity Measures For Protecting Patie...Health 2Conf
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by DesignUnisys Corporation
 

Similar to CYVA_EMA3PageVentureSummaryAngelAM020150717 (20)

Research Report Health Informatics 05-2016_FINAL
Research Report Health Informatics 05-2016_FINALResearch Report Health Informatics 05-2016_FINAL
Research Report Health Informatics 05-2016_FINAL
 
Running head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docxRunning head Information security threats 1Information secur.docx
Running head Information security threats 1Information secur.docx
 
Securing the digital front door
Securing the digital front doorSecuring the digital front door
Securing the digital front door
 
mHealth Security: Stats and Solutions
mHealth Security: Stats and SolutionsmHealth Security: Stats and Solutions
mHealth Security: Stats and Solutions
 
Healthcare's digital transformation
Healthcare's digital transformationHealthcare's digital transformation
Healthcare's digital transformation
 
MeHI Privacy & Security Webinar 3.18.15
MeHI Privacy & Security Webinar 3.18.15MeHI Privacy & Security Webinar 3.18.15
MeHI Privacy & Security Webinar 3.18.15
 
Revolutionary M-Health Technology
Revolutionary M-Health TechnologyRevolutionary M-Health Technology
Revolutionary M-Health Technology
 
Revolutionary m-Health Technology
Revolutionary m-Health TechnologyRevolutionary m-Health Technology
Revolutionary m-Health Technology
 
HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK? HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
HEALTHCARE IT: IS YOUR INFORMATION AT RISK?
 
Hot Topics in Privacy and Security
Hot Topics in Privacy and SecurityHot Topics in Privacy and Security
Hot Topics in Privacy and Security
 
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
ePlus Enabling a Total Healthcare IT Transformation to Deliver the Future of ...
 
Systems AdminstratorAs your systems administrator  person I am.docx
Systems AdminstratorAs your systems administrator  person I am.docxSystems AdminstratorAs your systems administrator  person I am.docx
Systems AdminstratorAs your systems administrator  person I am.docx
 
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
Nicolas Terry, "Big Data, Regulatory Disruption, and Arbitrage in Health Care"
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Panel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie WaggonerPanel Cyber Security and Privacy without Carrie Waggoner
Panel Cyber Security and Privacy without Carrie Waggoner
 
Developing a Privacy Culture in Health Care Organizations:The Experiences of ...
Developing a Privacy Culture in Health Care Organizations:The Experiences of ...Developing a Privacy Culture in Health Care Organizations:The Experiences of ...
Developing a Privacy Culture in Health Care Organizations:The Experiences of ...
 
How COVID-19 is Accelerating Digital Transformation in Health and Social Care?
How COVID-19 is Accelerating Digital Transformation in Health and Social Care?How COVID-19 is Accelerating Digital Transformation in Health and Social Care?
How COVID-19 is Accelerating Digital Transformation in Health and Social Care?
 
ECOWAS Integrated eHealthcare Solution Overview
ECOWAS Integrated eHealthcare Solution OverviewECOWAS Integrated eHealthcare Solution Overview
ECOWAS Integrated eHealthcare Solution Overview
 
Healthcare Events 2024 To Discuss Cybersecurity Measures For Protecting Patie...
Healthcare Events 2024 To Discuss Cybersecurity Measures For Protecting Patie...Healthcare Events 2024 To Discuss Cybersecurity Measures For Protecting Patie...
Healthcare Events 2024 To Discuss Cybersecurity Measures For Protecting Patie...
 
Privacy and Security by Design
Privacy and Security by DesignPrivacy and Security by Design
Privacy and Security by Design
 

CYVA_EMA3PageVentureSummaryAngelAM020150717

  • 1. Copyright © 2015, CYVA Research Corporation. All rights reserved. COMPANY Company Name: CYVA Research Corporation Address: 3525 Del Mar Heights Road, Suite #327 City, State, Zip: San Diego, CA 92130 URL: http://www.cyva.com CONTACT Name: Kevin O’Neil Position: Founder, Chairman & CEO eMail: koneil@cyva.com Phone: 858-793-8100 FINANCIAL INFORMATION Funding Stage: Early Stage Patent Revenue: ~$420,000 Capital Seeking: $20 Million Previous Capital: ~$400,000 Investors: Angel investors, founder Use of Proceeds: Product and service development, operational infrastructure, marketing and sales, patent licensing. COMPANY PROFILE Industry: Security , Identity and Information Asset Management Management: Kevin O’Neil - CEO, Dr. Glenn Seidman - CTO, Jay Sato - CMO Board of Directors: Kevin O’Neil, Ron Martin, Dwight Whiting, John Fowler Advisors: Rafael Fernandez, Geoffrey Strongin, Gilles Lisimaque, Scott Blackmer, Esq. Company Structure: Sub-S Corp. CYVA Research Corporation (“CYVA” or the “Company”) CYVA Research’s internationally patented Self-Determining Digital Persona™ (SDDP™) and Trusted Network Community® (TNC® ) technologies empower consumers and their chosen custodians to securely control their digital identity and information assets anywhere, anytime. The firm’s innovative self-protecting, self-governing identity and information asset management technologies empower consumer-centric privacy and security at a wholly new and disruptive level. Business Summary: CYVA’s user-controlled identity and information asset management technologies are the foundation in strategically advancing user- controlled, user-monetized mobile advertising, secure, trusted and privacy enforced social networking for civilians and warfighter families, and a smartphone-based, patient-controlled emergency medical agent. Lifesaving Emergency Medical Agent™: An essential requirement addressed by CYVA’s Emergency Medical Agent (EMA) is proactively mitigating the annual deaths of over 400,000 patients resulting from preventable medical errors, many due to a lack of or incomplete patient medical information. Result - loss of life caused by preventable errors with litigation costs amounting to 2-4 billion dollars annually. Objective: Securely Place Lifesaving Information in the Hands of the Right People at the Right Moment Every 14 seconds in the United States a car accident with injuries occurs. We envision an Emergency Medical Agent being automatically dispatched to local police, fire, 911 operators, emergency care personnel and facilities. Why a Patient-Controlled Emergency Medical Agent?: Every week there is news of another data breach, another failure to protect our human-digital persona, our personal information and ourselves from abuse. Medical identity theft is especially dangerous as it contaminates a true medical record with another person’s health information. During an emergency this contaminated health record can cause severe errors to be made, a dire risk to patients. An estimated 1.8 million individuals suffered medical ID theft in 2013. 78% of victims want direct assertive control of their medical record, they trust no one. (source: 2013 Survey on Medical Identity Theft, Ponemon Institute) People have a right to control their data wherever it exists. We provide people the tools and services to take control of their personal information. Restoring patient trust will be difficult. Trust in a business will be driven by a verifiable respect for privacy: Human-Digital Dignity. CYVA’s user-controlled identity technologies are a means for patients to take control and distinguish a verifiably privacy respectful health care provider from an untrustworthy one. Business Model: The EMA is part of a suite of user-controlled, user- monetized identity and information asset management services. These services are offered in a subscription and/or user-monetized advertising model wherein consumers directly control and monetize their information assets sharing the Trusted Agent-based Advertising (TA2) revenue with CYVA Research. Providing consumers a simple, easy to manage and secure digital medical identity that they control, at any time, from anywhere with their smartphones, will empower a new and necessary patient-centric health care culture and industry. Financial Summary ($000's) Year 1 Year 2 Year 3 Year 4 Year 5 Total Revenue 0 13,438 209,549 617,361 1,220,746 Operating costs 6,388 13,760 24,410 26,836 50,575 EBITDA (6,388) (322) 185,139 590,525 1,170,171
  • 2. Copyright © 2015, CYVA Research Corporation. All rights reserved. Kevin O’Neil, Founder, Chairman & CEO 25+ years information technology, diverse industry experience: military, aerospace, financial services. Information security, IT governance and privacy assurance, principal inventor and enterprise architect. B.S., Systems Science and B.A., Management Science, University of California San Diego - Revelle College Ron Martin, COO Ron Martin is the retired President and CEO of Mission Federal Credit Union, offering consumer financial services to more than 130,000 members with an affinity to the San Diego educational community. Ron is a graduate of the University of Puget Sound in Tacoma, Washington, with degrees in Business Administration and Finance. Martin was also an officer in the US Navy. Dr. Glenn Seidman, CTO Glenn Seidman has more than 20 years of experience in the design and development of products and technology for enterprise computing environments. He holds 7 patents and 15 patents pending. Dr. Seidman holds Ph.D. and M.S. degrees in Computer Science from UCLA, and a B.S. in Engineering and Applied Science from Caltech. Jay Sato, CMO Jay Sato has over 25 years of executive marketing experience at Sony Electronic Inc. UC Berkeley Engineering degree and Harvard MBA. eMetro Emergency Medical Agent Capability Objectives The primary objective is saving lives. Another core objective is to empower secure patient- doctor control over the exchange and processing of protected health information anywhere, anytime. And to improve marshaling, coordinating and delivering emergency health care. To achieve these objectives a standardized, unambiguous and interoperable set of emergency medical information objects and governing privacy and security rules are essential. CYVA Research will utilize existing (e.g., HL7 V3, ICD-10) and emerging health information, security and digital identity reference models, architectures, recommendations and standards as they become available (e.g., NIST Guidelines on Hardware- Rooted Security in Mobile Devices (draft) Special Publication 800-164, Trusted Execution Environment, Hardware Root of Trust). Many core standards are in place with new standards in progress to address gaps. Going Beyond Current Legal & Regulatory Data Protection Instruments International and U.S. data protection laws and regulations governing personal information continue to evolve but are continually playing catch-up in a world of technological change, dynamic market forces and persistent cyber security threats, vulnerabilities and exploits. Omnibus laws and regulations, Binding Corporate Rules, privacy codes of conduct and harmonization efforts have value. U.S. sectoral “patchwork” of laws (e.g., HIPAA, HITECT, California data security breach notification law SB 1386, PCI, SOX) also have value but remain inadequate as written laws can be too high level, vague, open to interpretation, complex, hard to change, unduly influenced by anti- privacy lobbyist and difficult to enforce. A new data protection paradigm is needed. Law needs to be wrapped with the data, executable and self-enforcing. The data (primitive data) needs to be re-designed to be self-protecting, self-governing with a resolute purpose of placing humans in direct control (applying their unambiguous law) over their human-digital person wherever they exist. User-Controlled Patient Identity and Information Asset Management Within and across health care providers there is a fundamental need to securely and continuously control the exchange and ongoing processing of electronic health records (EHR), but patients are being left out.
  • 3. Copyright © 2015, CYVA Research Corporation. All rights reserved. CYVA Research’s user-controlled identity and information asset management technologies and services empower a patient-controlled health care identity wherein patients directly and assertively control their personal health records (PHR), anywhere, anytime. Patients are empowered to manage their health care experience more directly and participate more closely, confidently and effectively in the continuous workflow of necessary exchanges and processing of their personal health records. Governing rules are authored by patients and/or their trusted custodians (e.g., primary care physicians, legal guardians) and are securely encapsulated and assigned (bound) to and travel with patient health information objects: Human-Digital Integrity™ principle. An individual’s data is never separated from their authoritative will, their policies. This innovative approach brings a whole new level of trustworthy and secure processing as patients assertively control their personal health records anywhere, anytime. EMA Privacy and Security Policy Management Capability Individual’s can set privacy and security policy through the use of the Policy Manager starting with Policy Templates. Policy templates are simpler and represent a pre-set arrangement of standardized policy configurations. More fine-grained policy can be set to allow specific actions, such as Display, Read, Update, Exchange, Play and/or Store. The Actions Permitted can be assigned to the entire EMA set of protected health information objects or selectively. In the Policy Templates example shown the EMA will be sent to All In Case of Emergency (ICE) group members, within a range of 25 miles, access granted for 24 hours, Audit set to On, with Lockdown On and ICE Override On. Patient’s can decide what Metered Time Policy best fits their needs. In this case after 24 hours they wish all access be halted with Lockdown protections applied and ICE Override privileges turned On. With ICE Override privileges set to On an emergency care worker can enter a one-time password (OTP) to regain access to the EMA and its encapsulated and encrypted protected health information objects. This access will be audited as audit is set to On. Audit is essential. Patients can see exactly who, what, where, when and why their information is being processed; and can, at will, lock their deployed EMAs anytime. A lockdown capability for patients is fundamental to security. Trust and the Value of Respecting and Providing Patients Control As a basic security principle patients should not trust anyone. They especially should not trust any person, organization or institution that refuses to respect the patient’s right to control (privacy) their information wherever it exists. A tool to directly control and see an audit log of their private and personal health information will set a new level of trustworthiness—a strategic differentiator.